CN110602455B - Video storage system, video processing method, device, equipment and storage medium - Google Patents
Video storage system, video processing method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN110602455B CN110602455B CN201910854369.1A CN201910854369A CN110602455B CN 110602455 B CN110602455 B CN 110602455B CN 201910854369 A CN201910854369 A CN 201910854369A CN 110602455 B CN110602455 B CN 110602455B
- Authority
- CN
- China
- Prior art keywords
- video
- camera
- abstract
- node
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Closed-Circuit Television Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The application provides a video storage system, a video processing method, a video processing device, a video processing apparatus and a storage medium, which relate to the technical field of block chains, and the technical scheme comprises the following steps: the method comprises the steps of endorsing a first video through a first endorsement node to obtain a first endorsement signature, verifying the first endorsement signature by a supervision node, storing an abstract of the first video on a block link, generating the abstract of the first video through an irreversible encryption algorithm, decoding a second video, and obtaining an abstract of identification information of a camera contained in a watermark of the second video.
Description
Technical Field
The present disclosure relates to the field of block chain technologies, and in particular, to a video storage system, a video processing method, a video processing device, a video processing apparatus, and a storage medium.
Background
The rise of the network causes a great amount of videos to be generated and transmitted every day, wherein the transmission of partial videos has adverse effects on the society, and therefore, the video information needs to be traced to confirm the video source.
In the related technology, suspicious or bad videos (such as videos related to yellow, storm, anti-social videos and the like) in the internet are found out through an automatic identification technology, characteristic information such as the environment in the videos is observed manually, the video shooting place is presumed manually, and the videos are traced.
In the above technology, the feature information in the manually observable video is limited, and the accuracy of manually estimating the shooting location of the video is low, so that the efficiency of tracing the video is low.
Disclosure of Invention
The embodiment of the application provides a video storage system, a video processing method, a video processing device, video processing equipment and a storage medium, and can solve the technical problem of low efficiency of tracing videos. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a video storage system, where the video storage system includes n block link points forming a block chain network, a block chain is configured on a block chain node, and n is an integer greater than 1;
the block chain node is configured to receive a video storage request sent by a first camera, where the video storage request is used to request that a first video is stored in the block chain, and the video storage request includes a summary of identification information of the first camera and the first video; sending the video storage request to at least one first endorsement node in the video storage system;
the first endorsement node is used for generating a first endorsement signature according to the video storage request and sending the first endorsement signature to the monitoring node;
the supervising node is used for verifying the first endorsement signature based on a first endorsement policy; when the first endorsement signature is verified, generating a first block based on the video storage request, and adding the first block into the block chain, wherein the first block comprises a summary of the first video.
In another aspect, an embodiment of the present application provides a video processing method, where the method includes:
decoding a second video to obtain a watermark of the second video;
acquiring an abstract of camera identification information contained in the watermark of the second video;
determining a second camera for shooting the second video according to the abstract of the camera identification information;
wherein the second video is stored in a blockchain of a blockchain system configuration.
In another aspect, an embodiment of the present application provides a video processing apparatus, including:
the video decoding module is used for decoding a second video to acquire a watermark of the second video;
the abstract acquisition module is used for acquiring an abstract of the camera identification information contained in the watermark of the second video;
the camera determining module is used for determining a second camera for shooting the second video according to the abstract of the camera identification information;
wherein the second video is stored in a blockchain of a blockchain system configuration.
In still another aspect, an embodiment of the present application provides a computer device, where the computer device includes a processor and a memory, where the memory stores a computer program, and the computer program is loaded and executed by the processor to implement the video processing method described above.
In a further aspect, an embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is loaded and executed by a processor to implement the video processing method described above.
The technical scheme provided by the embodiment of the application can bring the following beneficial effects:
the first endorsement signature is sent to a supervision node through a first endorsement node, the supervision node verifies the first endorsement signature, the abstract of the first video is stored on a block chain, the abstract of the first video is generated through an irreversible encryption algorithm and has non-tamper property, each node (supervision node and each block chain node) in the block chain system is configured with the same block chain, decentralized information storage is realized, the safety of information storage is ensured, when the video is traced, the abstract of the identification information of the camera contained in the video can be obtained, because the abstract has the non-tamper property and uniqueness, according to the abstract of the identification information of the camera, the identification information corresponding to the abstract of the identification information of the camera can be quickly and accurately found in the video storage system, and the identification information comprises information such as the geographic position of a second camera for shooting a second video, therefore, the position of the second camera can be quickly determined, and the efficiency of tracing the second video is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of a video storage system provided by one embodiment of the present application;
FIG. 2 is a flow chart of a video storage method provided by an embodiment of the present application;
fig. 3 is a flowchart of a camera uplink procedure according to an embodiment of the present application;
FIG. 4 is a flow chart of a video processing method provided by an embodiment of the present application;
fig. 5 is a flowchart of a video processing method according to another embodiment of the present application;
FIG. 6 is a block diagram of a video processing device provided by an embodiment of the present application;
fig. 7 is a block diagram of a video processing apparatus according to another embodiment of the present application;
fig. 8 is a block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
First, a block chain technique according to an embodiment of the present application will be described.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block.
The block chain underlying platform may include processing modules such as base services, intelligent contracts, and the like. The basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, contract triggering and contract execution, developers can define contract logic through a certain programming language, issue the contract logic onto a block chain (contract registration), and call keys or other event triggering execution according to the logic of contract terms to complete the contract logic.
In order to ensure the information intercommunication in the blockchain system, information connection can exist between each node in the blockchain system, and the nodes can transmit information through the information connection. For example, when an arbitrary node in the blockchain system receives input information, other nodes in the blockchain system acquire the input information according to a consensus algorithm, and store the input information as data in shared data, so that the data stored on all nodes in the blockchain system are consistent.
Each node in the blockchain system has a corresponding node identifier, and each node in the blockchain system can store node identifiers of other nodes in the blockchain system, so that the generated block can be broadcast to other nodes in the blockchain system according to the node identifiers of other nodes. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address or any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
Node name | Node identification |
Node 1 | 117.114.151.174 |
Node 2 | 117.116.189.145 |
… | … |
Node N | 119.123.789.258 |
Each node in the blockchain system stores one identical blockchain. The block chain is composed of a plurality of blocks, the starting block comprises a block head and a block main body, the block head stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
When each block in the block chain is generated, when a node where the block chain is located receives input information, the input information is verified, after the verification is completed, the input information is stored in a memory pool, and a hash tree used for recording the input information is updated; and then, updating the updating time stamp to the time when the input information is received, trying different random numbers, and calculating the characteristic value for multiple times, so that the calculated characteristic value can meet the following formula:
SHA256(SHA256(version+prev+hash+merkle_ntime+nbits+x))<TARGET
wherein, SHA256 is a characteristic value algorithm used for calculating a characteristic value; version is version information of the relevant block protocol in the block chain; prev _ hash is a block head characteristic value of a parent block of the current block; merkle _ root is a characteristic value of the input information; ntime is the update time of the update timestamp; nbits is the current difficulty, is a fixed value within a period of time, and is determined again after exceeding a fixed time period; x is a random number; TARGET is a feature threshold, which can be determined from nbits.
Therefore, when the random number meeting the formula is obtained through calculation, the information can be correspondingly stored, and the block head and the block main body are generated to obtain the current block. And then, the node where the block chain is located respectively sends the newly generated blocks to other nodes in the block chain system where the newly generated blocks are located according to the node identifications of the other nodes in the block chain system, the newly generated blocks are verified by the other nodes, and the newly generated blocks are added to the block chain stored in the newly generated blocks after the verification is completed.
Referring to fig. 1, a schematic diagram of a video storage system provided by an embodiment of the present application is shown, where the system may include: a camera 10, a blockchain network 20 and a supervisory node 30.
The number of cameras 10 may be plural, and each camera 10 is used to capture video in one area. For example, in a video surveillance scenario, multiple cameras 10 may be deployed in a surveillance environment, and different areas in the surveillance environment are video-monitored by the multiple cameras 10.
The blockchain network 20 may include n blockchain nodes 21, where n is an integer greater than 1. Blockchain node 21 may be a server, or other computer device with data processing and storage capabilities. The blockchain node 21 is configured with a blockchain. In the embodiment of the present application, by storing the video collected by the camera 10 in the blockchain, since the blockchain storage has non-tamper-ability, when tracing the video, the camera 10 that shoots the video can be quickly and accurately determined.
The supervisory node 30 is a device or cluster of devices corresponding to a supervisory authority. The number of the supervisory nodes 30 may be one, or may be multiple, and different supervisory nodes 30 may implement the same or different functions, which is not limited in this embodiment of the application. The supervision node 30 is configured to decode a video, obtain information related to the video contained in a video watermark, determine a camera 10 that shoots the video, and the supervision node 30 is further configured to determine whether identification information of the camera 10 in the camera 10 is tampered, and determine whether the video in the camera 10 that shoots the video is tampered. The policing node 30 may include a sequencing node 31, a consensus node 32, and a commit node 33, where the sequencing node 31 may provide sequencing services, the consensus node 32 may provide consensus services, and the commit node 33 may be used to broadcast the results of consensus sequencing to the blockchain network 20.
In the embodiment of the present application, the blockchain node 21 in the blockchain network 20 may include the camera 10 that has been linked (i.e., authenticated and joined to the blockchain network 20), may also include the supervisory node 30 (e.g., one or more devices in a regulatory body), and may also include other computer devices, which is not limited in this embodiment of the present application. The above-mentioned blockchain nodes 21 belong to different respective federation members, and thus the blockchain involved in the embodiment of the present application may be a federation chain. A federation chain, also known as a community block chain (Consortium Blockchains), refers to a block chain whose consensus process is controlled by a preselected node. In the alliance chain, all or part of functions are opened only for the node members in the chain, and each block chain link point in the alliance chain can customize read-write permission, query permission and the like based on needs.
Referring to fig. 2, a flow chart of a video storage method provided by an embodiment of the present application is shown, where the method can be applied to the block chain system shown in fig. 1, and the method can include the following steps:
in step 201, a block link node receives a video storage request sent by a first camera.
The video storage request is used for requesting to store the first video into the block chain, and the video storage request comprises the summary of the identification information of the first camera and the first video. The identification information of the first camera is used for uniquely indicating the first camera, different cameras have different identification information, and the identification information of the first camera may include at least one of the following items: the first camera is used for detecting the first camera, and the first camera is used for detecting the first camera. The digest of the identification information of the first camera may be obtained by processing the identification information of the first camera by using a message digest algorithm, for example, calculating a Hash value of the identification information of the first camera by using a Hash (Hash) algorithm, and using the Hash value as the digest. The first video is a video shot by the first camera, and the information of the first video may include video content of the first video, and optionally at least one of the following: shooting time, shooting duration, shooting mode, and the like.
The first camera may watermark a first video it captures, and then generate a video storage request based on the first video, the watermark including a summary of identification information of the first camera.
In step 202, the block link node sends a video storage request to at least one first endorsement node in the video storage system.
The endorsement node is used for responding to an endorsement request of a specific chain code and endorses the endorsement request, and the first endorsement node is used for responding to the received video storage request and endorses the video storage request.
The block link node may obtain a node identifier of the first endorsement node, and the block link node may send the video storage request to the first endorsement node based on the node identifier of the first endorsement node. The first intelligent contract can be installed on the block chain node of the video storage system in advance, and the block chain node can execute the flow of video storage on the video storage system based on the first intelligent contract. In generating the first smart contract, a first endorsement node in the video storage system may be specified, and the block link point may store a node identification of the first endorsement node. The intelligent contract is a contract program automatically executed according to specific conditions, and is an important way for a user to interact with the block chain and realize business logic by utilizing the block chain.
The first endorsement node may be a supervisory node in the video storage system, or may be a blockchain node. The first intelligent contract may be created by a block link point and sent to other block chain nodes, the first intelligent contract being validated when the other block link points install and agree on the first intelligent contract. It should be noted that, when creating the first intelligent contract, the first endorsement node in the video storage system may be specified in advance. Of course, the number of the first endorsement nodes may be multiple, and the first intelligent contract may also be correspondingly stored in the block chain.
And step 203, the first endorsement node generates a first endorsement signature according to the video storage request.
The first endorsement node verifies the video storage request based on the first intelligent contract; and according to the verification result, performing endorsement on the video storage request to obtain a first endorsement signature, and then sending the first endorsement signature to the monitoring node.
When the video storage request meets a first preset condition, the first endorsement node verifies the video storage request; otherwise, the verification is not passed. The first preset condition includes, but is not limited to, at least one of: whether the first video has the storage authority or not and whether the video storage request is legal information or not. For whether the first video has the storage right, the first endorsement node may determine whether the video shot by the first camera has the storage right based on the abstract of the identification information of the first camera shooting the first video. For whether the video storage request is legal or not, the first endorsement node can judge whether the block link point sending the video storage request is a disguised node or not, and when the block link point is a disguised node with storage authority, the first endorsement node determines that the video storage request is not legal information; when the block link point is not a masquerading node, the first endorsement node determines that the video storage request is legal information.
In the actual technical process, a first intelligent contract may also be installed on the first endorsement node, or the first intelligent contract of the video storage system is acquired, where the first intelligent contract includes the above-mentioned judgment logic for judging whether the video storage request meets the first preset condition. When the video storage is actually executed, the first endorsement node requests parameters of a first intelligent contract from the video storage, inputs the first intelligent contract and runs the first intelligent contract. When the intelligent contract outputs the video storage request to be legal, the first endorsement node signs the output result and sends the signed output result as a first endorsement signature to the monitoring node.
It should be noted that the operation performed by the first endorsement node may be implemented by a camera in the video storage system as the first endorsement node. The first endorsement node encrypts the first endorsement signature through the private key, so that the information of the first endorsement signature cannot be tampered even if the first endorsement node sends the first endorsement signature to the supervision node or the first endorsement signature is transmitted for multiple times subsequently, and the accuracy and the reliability of the information are ensured.
If the number of the first endorsement nodes is more than one, a plurality of first endorsement signatures can be obtained, and the first endorsement signatures comprise two cases of verification passing and verification failing.
And step 204, the first endorsement node sends the first endorsement signature to the supervision node.
And after the first endorsement node generates the first endorsement signature, the first endorsement signature is sent to the supervision node by the first endorsement node. Optionally, the first endorsement node may attach the first endorsement signature to the video storage request and send the video storage request to the supervising node, so as to inform the supervising node of the endorsement signature of which video storage request the first endorsement signature is directed.
In step 205, the supervising node verifies the first endorsement signature based on the first endorsement policy.
The supervision node comprises a consensus node, and the consensus node provides consensus service. After the supervision node collects the first endorsement signatures of the first endorsement nodes, the consensus node verifies the first endorsement signatures based on the first endorsement policy.
Verification logic for verifying the first endorsement signature by a supervising node of the first endorsement policy, the first endorsement policy may comprise at least one of: the video storage request obtains a first endorsement signature or more; the ratio of the first endorsement name number obtained by the video storage request to the first endorsement node number is greater than or equal to b; the video storage request obtains a first endorsement signature of a specified first endorsement node, and the first endorsement signature passes verification; otherwise, the first endorsement signature verification fails. The designated first endorsement nodes can be a plurality of endorsement nodes, can be supervision nodes, and can also be other first endorsement nodes, wherein a is a positive integer, and b is a positive number less than or equal to 1.
If the first endorsement signature passes verification, the following step 206 is executed; if the first endorsement signature fails to be verified, the supervision node can send the information that the verification fails to be passed to the blockchain node.
In step 206, when the first endorsement signature passes verification, the supervisory node generates a first block based on the video storage request, and adds the first block to the block chain, wherein the first block comprises the abstract of the first video.
Wherein the supervisory nodes may include sequencing nodes, the sequencing nodes providing sequencing services. Step 206 may include the following sub-steps:
1. when the first endorsement signature passes the verification, the consensus node sends the verified information to the sequencing node.
2. The sorting node sorts the video storage requests.
The sequencing node can sequence according to the time stamp contained in the video storage request. The sequencing node may sequence the video storage request according to the time when the first camera sends the video storage request or the time when the first endorsement signature passes.
Among other things, the supervisory node may provide a zookeeper service for maintaining high availability of the sequencing node.
3. And the sequencing node sends the information of finishing sequencing of the video storage request to the first camera.
Optionally, the sorting node sends the information that the video storage request is sorted to the submitting node first, and the submitting node sends the information that the video storage request is sorted to the first camera, and the submitting node is a block link node.
The video storage system can simultaneously operate on a plurality of video storage requests, and the supervision node can comprise a plurality of consensus nodes and a plurality of sequencing nodes. When the supervision node performs consensus service or sequencing service, the consensus node or the sequencing node can be selected nearby, so that the overall operation efficiency of the system is improved.
4. After receiving the information that the first video is sequenced, the first camera generates an abstract of the first video according to the first video, wherein the abstract of the first video is used for generating a first block, and the first block is stored on a block chain.
Optionally, the first camera generates a first block according to the summary of the first video, and then adds the block to the block chain.
Optionally, the first camera sends the first video summary to the supervisory node, and the supervisory node generates a first block according to the first video summary and adds the block to the block chain.
The summary of the first video may be obtained by the first camera according to the content of the first video through a first preset encryption algorithm. The first preset encryption algorithm can be a one-way Hash (Hash) algorithm, a unique and irreversible abstract can be obtained through the one-way Hash algorithm, other people cannot reversely deduce the first video from the abstract of the person, and the obtained abstract is different from the abstract of any other information, so that the safety and the privacy of the information are further ensured. It should be noted that the first preset encryption algorithm may be set based on actual needs, and this is not specifically limited in this embodiment of the application.
The supervising node may store information of the first video into the first database, and the information of the first video may include the first video, a summary of identification information of the first camera, and the like.
In summary, in the technical solution provided in this embodiment of the present application, a first endorsement signature is sent to a monitoring node by a first endorsement node, the monitoring node verifies the first endorsement signature, stores a digest of a first video in a block link, the digest of the first video is generated by an irreversible encryption algorithm and has non-tamper-resistance, and each node (the monitoring node and each block link node) in the block link system is configured with the same block link, thereby implementing decentralized information storage, ensuring the security of information storage, and when tracing a video, acquiring a digest of identification information of a camera included in the video, because the digest has non-tamper-resistance and uniqueness, according to the digest of the identification information of the camera, quickly and accurately finding the identification information corresponding to the digest of the identification information of the camera in the video storage system, the identification information comprises information such as the geographic position of the second camera for shooting the second video, so that the position of the second camera can be quickly determined, and the efficiency of tracing the second video is greatly improved.
In addition, the content of the first video is only stored in the first camera and the monitoring mechanism, and other cameras only store the abstract of the first video, so that the storage space can be saved while the information storage safety is ensured.
Referring to fig. 3, a flowchart of a camera uplink process according to an embodiment of the present application is shown, where the method can be applied to the block chain system shown in fig. 1, and the method can include the following steps:
step 301, a block link point receives a uplink request sent by a first camera, where the uplink request is used to request to store identification information of the first camera into a block chain, and the uplink request includes the identification information of the first camera.
The first camera can pack the identification information of the first camera, so that the uplink request is convenient to carry the identification information.
In step 302, the block link node sends a uplink request to at least a second endorsement node in the video storage system.
The second endorsement node is used for responding to the received uplink request and endorses the uplink request. The block link point may obtain a node identifier of the second endorsement node, and the block link point may send the video storage request to the second endorsement node based on the node identifier of the second endorsement node. The second intelligent contract can be installed on the block chain node of the video storage system in advance, and the block chain node can execute the process of accessing the first camera to the block chain network based on the second intelligent contract.
The second endorsement node may be a monitoring node in the video storage system, or may be a block chain node, and the second endorsement node and the first endorsement node may be the same node or different nodes, which is not limited in this embodiment of the present application. The second intelligent contract may be created by a block link point and sent to other block link nodes, the second intelligent contract being effective when the other block link points install and agree to the second intelligent contract. It should be noted that, when creating the second intelligent contract, the second endorsement node in the video storage system may be specified in advance. Of course, the number of the second endorsement nodes may be multiple, and the second intelligent contract may also be correspondingly stored in the block chain.
Step 303, the second endorsement node generates a second endorsement signature according to the uplink request.
The second endorsement node verifies the uplink request based on the second intelligent contract; and according to the verification result, endorsing the uplink request to obtain a second endorsing signature, and sending the second endorsing signature to the monitoring node.
When the video storage request meets a second preset condition, the second endorsement node verifies the video storage request; otherwise, the verification is not passed. The second preset condition includes but is not limited to: information whether the uplink request is legitimate. The second endorsement node can judge whether the uplink request is legal or not according to the identification information of the first camera carried in the uplink request.
In the actual technical process, a second intelligent contract may also be installed on the second endorsement node, or a second intelligent contract of the video storage system is obtained, where the second intelligent contract includes a judgment logic for judging whether the uplink request meets a second preset condition. And when the video is actually executed, the second endorsement node requests parameters of a second intelligent contract from the video storage, inputs the second intelligent contract and runs the second intelligent contract. When the intelligent contract output cochain request is legal, the second endorsement node signs the output result and sends the signed output result as a second endorsement signature to the monitoring node.
It should be noted that the operation performed by the second endorsement node may be implemented by a camera in the video storage system as the second endorsement node. The second endorsement node encrypts the second endorsement signature through a private key, so that even if the second endorsement node sends the second endorsement signature to the monitoring node or the second endorsement signature undergoes multiple transmissions subsequently, the information of the second endorsement signature cannot be tampered, and the accuracy and the reliability of the information are ensured.
If there are a plurality of second endorsement nodes, a plurality of second endorsement signatures can be obtained, and the second endorsement signatures include two cases of verification passing and verification failing.
And step 304, the second endorsement node sends the second endorsement signature to the supervision node.
And after the second endorsement node generates the second endorsement signature, the second endorsement signature is sent to the supervision node. Optionally, the second endorsement node may send the second endorsement signature to the supervising node in an uplink request, so as to inform the supervising node of which uplink request the second endorsement signature is the endorsement signature for.
305, the supervision node verifies the second endorsement signature based on the second endorsement policy;
and after the supervision node collects the second endorsement signatures of the second endorsement nodes, the consensus node verifies the second endorsement signatures based on a second endorsement strategy.
Verification logic for verifying the second endorsement signature by a supervising node of the second endorsement policy, the second endorsement policy may comprise at least one of: the uplink request obtains more than or equal to c second endorsement signatures; the ratio of the name number of the second endorsement node to the number of the second endorsement node obtained by the uplink request is greater than or equal to d; the uplink request obtains a second endorsement signature of the appointed second endorsement node, and the second endorsement signature passes verification; otherwise, the second endorsement signature verification fails.
The number of the designated second endorsement nodes can be multiple, and can be supervision nodes or other second endorsement nodes, c is a positive integer, and d is a positive number less than or equal to 1.
If the second endorsement signature passes the verification, the following step 306 is executed; if the second endorsement signature fails to be verified, the supervision node can send the information that the verification fails to be sent to the block chain node.
Step 306, when the second endorsement signature passes the verification, the supervisory node generates a second block based on the uplink request, and adds the second block to the block chain, wherein the second block includes the abstract of the identification information of the first camera.
Step 306 may include the following sub-steps:
1. when the second endorsement signature passes the verification, the consensus node sends the verified information to the sequencing node.
2. The sequencing node sequences the uplink requests.
The sequencing node may sequence the uplink request according to the time of the uplink request or the time when the second endorsement signature passes.
3. And the sequencing node sends the information of finishing sequencing of the uplink request to the first camera.
Optionally, the sorting node sends the information that the sorting of the uplink request is completed to the submitting node, and the submitting node sends the information that the sorting of the uplink request is completed to the first camera, and the submitting node is a block link point.
4. After receiving the information of finishing the sequencing of the uplink request, the first camera generates an abstract of the first video according to the identification information of the first camera, wherein the abstract of the first video is used for generating a second block, and the second block is stored on the block chain.
Optionally, the first camera generates a second block according to the summary of the identification information of the first camera, and then adds the block to the block chain.
Optionally, the first camera sends the summary of the identification information of the first camera to the supervisory node, and the supervisory node generates a second block according to the summary of the identification information of the first camera and adds the second block to the block chain.
The summary of the identification information of the first camera may be obtained by the first camera according to the identification information of the first camera through a second preset encryption algorithm. The second preset encryption algorithm can be a one-way Hash (Hash) algorithm, a unique and irreversible abstract can be obtained through the one-way Hash algorithm, other people cannot reversely deduce the identification information of the first camera from the abstract of the person, and the obtained abstract is different from the abstract of any other information, so that the safety and the privacy of the information are further ensured. It should be noted that the second preset encryption algorithm may be set based on actual needs, and this is not specifically limited in this embodiment of the application.
And the supervision node is also used for correspondingly storing the identification information of the first camera and the abstract of the identification information of the first camera into a second database.
The first database and the second database may be the same database or different databases.
To sum up, in the technical solution provided in the embodiment of the present application, through endorsement signature of the second endorsement node on the identification information of the first camera and verification of the second endorsement result by the supervisory node, the digest of the identification information of the first camera is stored on the block chain, so that the first camera is added to the block chain system; the abstract of the identification information of the first camera is generated through an irreversible encryption algorithm, has non-tamper property, and each node (a supervision node and each block link node) in the block link system is configured with the same block link, so that decentralized information storage is realized, and the safety of the information storage is ensured; meanwhile, the identification information of the first camera is only stored in the first camera and the monitoring mechanism, and other cameras only store the abstract of the identification information of the first camera, so that the storage space can be saved while the information storage safety is ensured.
Referring to fig. 4, a flowchart of a video processing method according to an embodiment of the present application is shown. The method can be applied to the block chain system shown in fig. 1, and the method can include the following steps:
The second video may be a video that needs to be processed. Optionally, the second video is a video that is streamed over a network in a wide range and has adverse effects, for example, the video includes, but is not limited to, at least one of: yellow-related content, storm-related content, anti-social content, national confidentiality, and the like.
The processing of the second video may be tracing the second video, and determining a second camera for shooting the second video and a shooting location of the second video; the video storage system stores videos and related information of the videos in a multi-party mode, and can also compare the second videos and the related information of the second videos.
Optionally, the supervising authority to which the supervising node corresponds comprises a video decoding means for decoding the second video.
Optionally, the watermark of the second video is not visible during playing, but exists in the second video in the form of encrypted data or compressed data.
And step 403, the supervision node determines a second camera for shooting the second video according to the abstract of the camera identification information.
The monitoring node can locally find the identification information corresponding to the summary according to the summary of the identification information of the cameras contained in the second video, the identification information is the identification information of the second camera, and the second camera for shooting the second video can be determined according to the identification information of the second camera.
After the second camera is determined, other related information of the second camera, such as the surrounding environment of the second video shooting point, other videos shot by the second camera, a person in charge of the second camera, and the like, can be further known through investigation.
In summary, in the technical scheme provided in the embodiment of the present application, by decoding the second video, the digest of the identification information of the camera included in the watermark of the second video is obtained, and because the digest has non-tamper property and uniqueness, according to the digest of the identification information of the camera, the identification information corresponding to the digest of the identification information of the camera can be quickly and accurately found in the video storage system, and the identification information includes factory code, geographical position and other information of the second camera shooting the second video, so that the second camera shooting the second video and the shooting location of the second video can be quickly determined, and the video can be traced.
Referring to fig. 5, a flow chart of a video processing method according to another embodiment of the present application is shown. The method can be applied to the block chain system shown in fig. 1, and the method can include the following steps:
and step 501, the supervision node decodes the second video to acquire the watermark of the second video.
Optionally, to further enhance the video surveillance function, the video processing method may further include the following step 504.
The monitoring node sends a camera information verification request to a second camera, the camera information verification request comprises an abstract of the camera identification information, and the second camera detects whether the abstract of the camera identification information is the same as the abstract of the identification information of the second camera; and if not, determining that the identification information of the second camera stored in the second camera is tampered.
In step 505, the supervisory node checks the video content.
Optionally, the supervision node decodes the second video, and may further obtain an abstract of video information included in the watermark of the second video; the monitoring node sends a video content verification request to the second camera, wherein the video content verification request comprises the abstract of the video information; the second camera inquires whether the video library has the abstract of the original video corresponding to the abstract of the video information or not according to the abstract of the video information, and if the video library does not have the abstract of the original video, the fact that the original video is tampered is determined; and if the abstract of the original video exists in the video library, determining that the original video is not tampered.
Optionally, if the second camera is destroyed, the supervisory node may further obtain an abstract of video information included in the watermark of the second video; inquiring whether an original video corresponding to the abstract of the video information exists in a first database or not according to the abstract of the video information; and if the original video exists in the first database, comparing the contents of the second video and the original video to determine whether the original video is tampered.
In summary, in the technical solution provided in this embodiment of the present application, by decoding the second video, the digest of the identification information of the camera and the digest of the video information contained in the watermark of the second video are obtained, and because the digest has non-tamper-resistance and uniqueness, according to the digest of the identification information of the camera, the identification information of the second camera corresponding to the digest of the identification information of the camera can be quickly and accurately found in the video storage system, and the identification information includes factory code, geographical location, and other information of the second camera shooting the second video, so that the shooting location of the second camera shooting the second video and the shooting location of the second video can be quickly determined, thereby tracing the video, and simultaneously, by comparing the digest of the identification information, the digest of the video information, or the video content, determining whether the identification information of the second camera stored in the second camera is tampered or not, and whether the video information stored in the second camera is tampered.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Referring to fig. 6, fig. 6 is a block diagram of a video processing apparatus according to an exemplary embodiment of the present application. The device has the function of realizing the video processing method example, and the function can be realized by hardware or by executing corresponding software by hardware. The apparatus may be the computer device described above, or may be provided in a computer device. As shown in fig. 6, the apparatus 600 may include: a video decoding module 610, a summary obtaining module 620 and a camera determination module 630.
The video decoding module 610 is configured to decode the second video to obtain a watermark of the second video.
And the abstract acquiring module 620 is configured to acquire an abstract of the camera identification information included in the watermark of the second video.
The camera determination module 630 is configured to determine a second camera for shooting the second video according to the summary of the camera identification information.
Wherein the second video is stored in a blockchain of the blockchain system configuration.
In an exemplary embodiment, as shown in fig. 7, the apparatus 600 further comprises: a first request sending module 640.
A first request sending module 640, configured to send a camera information verification request to the second camera, where the camera information verification request includes a summary of the camera identification information;
the camera information verification request is used for triggering the second camera to detect whether the digest of the camera identification information is the same as the digest of the identification information of the second camera, and if not, the identification information of the second camera is determined to be tampered.
In an exemplary embodiment, as shown in fig. 7, the apparatus 600 further comprises: a second request sending module 650.
The summary obtaining module 620 is further configured to obtain a summary of video information included in the watermark of the second video.
The second request sending module 650 is configured to send a video content verification request to the second camera, where the video content verification request includes the summary of the video information;
the video content verification request is used for triggering the second camera to inquire whether an original video corresponding to the abstract of the video information exists in a video library or not according to the abstract of the video information; if the abstract of the original video does not exist in the video library, determining that the original video is tampered; and if the abstract of the original video exists in the video library, determining that the original video is not tampered.
In an exemplary embodiment, as shown in fig. 7, the apparatus 600 further comprises: a video query module 660 and a content comparison module 670.
The summary obtaining module 620 is further configured to obtain a summary of video information included in the watermark of the second video.
The video query module 660 is configured to query whether an original video corresponding to the summary of the video information exists in the first database according to the summary of the video information.
The content comparing module 670 is configured to compare the contents of the second video and the original video when the original video exists in the first database, and determine whether the original video is tampered.
In summary, in the technical scheme provided in the embodiment of the present application, by decoding the second video, the digest of the identification information of the camera and the digest of the video information contained in the watermark of the second video are obtained, and because the digest has non-tamper-resistance and uniqueness, according to the digest of the identification information of the camera, the second camera shooting the second video can be quickly and accurately determined, so that the video can be monitored, and meanwhile, the video can be further monitored by comparing the digest of the identification information with the digest of the video information or video content.
It should be noted that, when the apparatus provided in the foregoing embodiment implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Referring to fig. 8, a block diagram of a computer device according to an embodiment of the present application is shown. The computer device is used for implementing the video processing method provided in the above embodiment. Specifically, the method comprises the following steps:
the computer apparatus 800 includes a CPU (Central Processing Unit) 801, a system Memory 804 including a RAM (Random Access Memory) 802 and a ROM (Read-Only Memory) 803, and a system bus 805 connecting the system Memory 804 and the Central Processing Unit 801. The computer device 800 also includes a basic I/O (Input/Output) system 806 that facilitates transfer of information between devices within the computer, and a mass storage device 807 for storing an operating system 813, application programs 814, and other program modules 812.
The basic input/output system 806 includes a display 808 for displaying information and an input device 809 such as a mouse, keyboard, etc. for user input of information. Wherein the display 808 and the input device 809 are connected to the central processing unit 801 through an input output controller 810 connected to the system bus 805. The basic input/output system 806 may also include an input/output controller 810 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 810 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 807 is connected to the central processing unit 801 through a mass storage controller (not shown) connected to the system bus 805. The mass storage device 807 and its associated computer-readable media provide non-volatile storage for the computer device 800. That is, the mass storage device 807 may include a computer-readable medium (not shown) such as a hard disk or CD-ROM (Compact disk Read-Only Memory) drive.
Without loss of generality, the computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other solid state Memory technology, CD-ROM, DVD (Digital Video Disc) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that the computer storage media is not limited to the foregoing. The system memory 804 and mass storage 807 described above may be collectively referred to as memory.
According to various embodiments of the present application, the computer device 800 may also operate as a remote computer connected to a network via a network, such as the Internet. That is, the computer device 800 may be connected to the network 812 through the network interface unit 811 coupled to the system bus 805, or may be connected to other types of networks or remote computer systems (not shown) using the network interface unit 811.
In an exemplary embodiment, a computer-readable storage medium is also provided, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the above-mentioned video processing method.
In an exemplary embodiment, a computer program product is also provided for implementing the above-described video processing method when executed by a processor.
It should be understood that reference to "a plurality" herein means two or more. In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.
Claims (12)
1. A video storage system is characterized in that the video storage system comprises n block chain link points forming a block chain network, block chains are configured on the block chain link points, and n is an integer greater than 1;
the block chain node is configured to receive a video storage request sent by a first camera, where the video storage request is used to request that a first video shot by the first camera is stored in the block chain, and the video storage request includes a summary of identification information of the first camera and the first video; sending the video storage request to at least one first endorsement node in the video storage system; the first camera is used for adding a watermark to the first video, and generating the video storage request based on the first video, wherein the watermark comprises an abstract of identification information of the first camera;
the first endorsement node is used for generating a first endorsement signature according to the video storage request and directly sending the first endorsement signature to the monitoring node;
the supervising node is used for verifying the first endorsement signature based on a first endorsement policy; when the first endorsement signature passes verification, generating a first block based on the video storage request, and adding the first block into the block chain, wherein the first block comprises a summary of the first video;
the supervision node is further configured to decode a second video to obtain a watermark of the second video; acquiring an abstract of camera identification information contained in the watermark of the second video; and determining a second camera for shooting the second video according to the abstract of the camera identification information.
2. The system of claim 1,
the supervision node is further used for storing the information of the first video into a first database;
wherein the information of the first video comprises: the first video, the summary of the first video, and the summary of the identification information of the first camera.
3. The system of claim 1,
the block chain node is further configured to receive an uplink request sent by the first camera, where the uplink request includes identification information of the first camera; sending the uplink request to at least one second endorsement node in the video storage system;
the second endorsement node is configured to generate a second endorsement signature according to the uplink request, and send the second endorsement signature to the supervising node;
the supervising node is further configured to verify the second endorsement signature based on a second endorsement policy; and when the second endorsement signature passes verification, generating a second block based on the uplink request, and adding the second block into the block chain, wherein the second block comprises the abstract of the identification information of the first camera.
4. The system of claim 3,
the monitoring node is further configured to correspondingly store the identification information of the first camera and the abstract of the identification information of the first camera in a second database.
5. The system of claim 2,
the monitoring node is further configured to send a camera information verification request to the second camera, where the camera information verification request includes an abstract of the camera identification information;
the second camera is configured to detect whether the digest of the camera identification information is the same as the digest of the identification information of the second camera stored in the first database; and if not, determining that the identification information of the second camera is tampered.
6. The system of claim 1,
the supervision node is further used for acquiring an abstract of video information contained in the watermark of the second video; sending a video content verification request to the second camera, wherein the video content verification request comprises the abstract of the video information;
the second camera is used for inquiring whether the abstract of the original video corresponding to the abstract of the video information exists in a video library or not according to the abstract of the video information; if the abstract of the original video does not exist in the video library, determining that the original video is tampered; and if the abstract of the original video exists in the video library, determining that the original video is not tampered.
7. The system of claim 1, wherein the supervisory node is further configured to:
acquiring an abstract of video information contained in the watermark of the second video;
inquiring whether an original video corresponding to the abstract of the video information exists in a first database or not according to the abstract of the video information;
and if the original video exists in the first database, comparing the contents of the second video and the original video, and determining whether the original video is tampered.
8. A method of video processing, the method comprising:
decoding a second video to obtain a watermark of the second video;
acquiring an abstract of camera identification information contained in the watermark of the second video;
determining a second camera for shooting the second video according to the abstract of the camera identification information;
wherein the second video is stored in a blockchain of a blockchain system configuration;
after the obtaining of the abstract of the camera identification information contained in the watermark of the second video, the method further includes:
sending a camera information verification request to the second camera, wherein the camera information verification request comprises an abstract of the camera identification information;
the camera information verification request is used for triggering the second camera to detect whether the abstract of the camera identification information is the same as the abstract of the identification information of the second camera stored in the first database, and if not, the identification information of the second camera is determined to be tampered;
after the decoding the second video and obtaining the watermark of the second video, the method further includes:
acquiring an abstract of video information contained in the watermark of the second video;
sending a video content verification request to the second camera, wherein the video content verification request comprises the abstract of the video information;
the video content verification request is used for triggering the second camera to inquire whether an original video corresponding to the abstract of the video information exists in a video library or not according to the abstract of the video information; if the abstract of the original video does not exist in the video library, determining that the original video is tampered; and if the abstract of the original video exists in the video library, determining that the original video is not tampered.
9. The method of claim 8, wherein after decoding the second video and obtaining the watermark of the second video, further comprising:
acquiring an abstract of video information contained in the watermark of the second video;
inquiring whether an original video corresponding to the abstract of the video information exists in a first database or not according to the abstract of the video information;
and if the original video exists in the first database, comparing the contents of the second video and the original video, and determining whether the original video is tampered.
10. A video processing apparatus, characterized in that the apparatus comprises:
the video decoding module is used for decoding a second video to acquire a watermark of the second video;
the abstract acquisition module is used for acquiring an abstract of the camera identification information contained in the watermark of the second video;
the camera determining module is used for determining a second camera for shooting the second video according to the abstract of the camera identification information;
wherein the second video is stored in a blockchain of a blockchain system configuration;
a first request sending module, configured to send a camera information verification request to the second camera, where the camera information verification request includes a summary of the camera identification information;
the camera information verification request is used for triggering a second camera to detect whether the abstract of the camera identification information is the same as the abstract of the identification information of the second camera stored in a first database, and if the abstract of the camera identification information is not the same as the abstract of the identification information of the second camera, the identification information of the second camera is determined to be tampered;
the abstract acquiring module is further used for acquiring an abstract of video information contained in the watermark of the second video;
a second request sending module, configured to send a video content verification request to the second camera, where the video content verification request includes the summary of the video information;
the video content verification request is used for triggering the second camera to inquire whether an original video corresponding to the abstract of the video information exists in a video library or not according to the abstract of the video information; if the abstract of the original video does not exist in the video library, determining that the original video is tampered; and if the abstract of the original video exists in the video library, determining that the original video is not tampered.
11. A computer device, characterized in that it comprises a processor and a memory in which a computer program is stored, which computer program is loaded and executed by the processor to implement the video processing method according to any one of claims 8 to 9.
12. A computer-readable storage medium, in which a computer program is stored, which is loaded and executed by a processor to implement the video processing method according to any one of claims 8 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910854369.1A CN110602455B (en) | 2019-09-10 | 2019-09-10 | Video storage system, video processing method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910854369.1A CN110602455B (en) | 2019-09-10 | 2019-09-10 | Video storage system, video processing method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110602455A CN110602455A (en) | 2019-12-20 |
CN110602455B true CN110602455B (en) | 2021-06-18 |
Family
ID=68858632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910854369.1A Active CN110602455B (en) | 2019-09-10 | 2019-09-10 | Video storage system, video processing method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110602455B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111050133B (en) * | 2019-12-23 | 2020-10-23 | 广州公评科技有限公司 | Video data processing system based on block chain technology |
CN111078799A (en) * | 2019-12-27 | 2020-04-28 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Tracing information storage method, device, equipment and readable storage medium |
CN112073728A (en) * | 2020-08-29 | 2020-12-11 | 富盛科技股份有限公司 | Video processing method and device, electronic equipment and computer readable storage medium |
CN112949394B (en) * | 2021-01-29 | 2023-06-16 | 恒瑞通(福建)信息技术有限公司 | Remote monitoring method based on blockchain, electronic equipment and storage medium |
CN113872772B (en) * | 2021-12-03 | 2022-07-15 | 杭州宇链科技有限公司 | Video segment shooting device and time recording method and corresponding verification method |
CN115499138B (en) * | 2022-11-16 | 2023-03-24 | 成都同步新创科技股份有限公司 | High-performance storage tamper-proof verification method and storage system combined with block chain |
CN117728962B (en) * | 2024-02-18 | 2024-06-11 | 深圳码隆智能科技有限公司 | Signature transmission method for ensuring storage consistency of multi-level video data |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108416578A (en) * | 2018-03-14 | 2018-08-17 | 郑杰骞 | A kind of block catenary system and data processing method |
CN108595126A (en) * | 2018-04-27 | 2018-09-28 | 腾讯科技(深圳)有限公司 | Data-storage system, querying method, inquiry unit, server and storage medium |
CN108632268A (en) * | 2018-04-28 | 2018-10-09 | 腾讯科技(深圳)有限公司 | The method for authenticating and device, storage medium, electronic device that block chain accesses |
CN108681572A (en) * | 2018-05-04 | 2018-10-19 | 蔷薇信息技术有限公司 | Date storage method, device and the electronic equipment of block chain |
CN108846010A (en) * | 2018-04-28 | 2018-11-20 | 腾讯科技(深圳)有限公司 | The method of product traceability, system, computer system and storage medium in network |
CN108898495A (en) * | 2018-07-03 | 2018-11-27 | 济南浪潮高新科技投资发展有限公司 | A kind of finance and money management confirmation of responsibility method based on block chain |
CN109242681A (en) * | 2018-08-21 | 2019-01-18 | 北京京东金融科技控股有限公司 | Storage method, device, equipment and the system of asset data |
CN109522698A (en) * | 2018-10-11 | 2019-03-26 | 平安科技(深圳)有限公司 | User authen method and terminal device based on block chain |
CN109523243A (en) * | 2018-11-19 | 2019-03-26 | 济南浪潮高新科技投资发展有限公司 | A kind of mist calculates the date storage method based on block chain under environment |
CN110189140A (en) * | 2019-04-16 | 2019-08-30 | 北京农业信息技术研究中心 | Agricultural product based on block chain, which are traced to the source, deposits card method and deposit system of tracing to the source |
US10425230B1 (en) * | 2019-03-01 | 2019-09-24 | Capital One Services, Llc | Identity and electronic signature verification in blockchain |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104717343A (en) * | 2013-12-16 | 2015-06-17 | 成都宇飞信息工程有限责任公司 | Intelligent digital watermarking mobile phone |
CN107133906A (en) * | 2017-04-28 | 2017-09-05 | 安徽四创电子股份有限公司 | A kind of video source tracing method based on digital watermark |
CN110009374A (en) * | 2018-04-01 | 2019-07-12 | 天津德言科技有限公司 | A kind of product traceability system based on block chain |
CN108769665B (en) * | 2018-04-28 | 2020-02-11 | Oppo广东移动通信有限公司 | Data transmission method and device, electronic equipment and computer readable storage medium |
CN108965824B (en) * | 2018-08-13 | 2020-06-19 | 晋商博创(北京)科技有限公司 | Video monitoring method and system based on CPK, camera, server and client |
CN109886370A (en) * | 2019-01-23 | 2019-06-14 | 云南万兴隆集团蜂业有限公司 | A kind of honey is quickly traced to the source device |
CN110097373A (en) * | 2019-03-18 | 2019-08-06 | 杭州特股软件开发有限公司 | The traceability system and method combined based on block chain with Internet of Things |
CN110113535A (en) * | 2019-05-14 | 2019-08-09 | 软通智慧科技有限公司 | terminal information tracing method, device, terminal and medium |
-
2019
- 2019-09-10 CN CN201910854369.1A patent/CN110602455B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108416578A (en) * | 2018-03-14 | 2018-08-17 | 郑杰骞 | A kind of block catenary system and data processing method |
CN108595126A (en) * | 2018-04-27 | 2018-09-28 | 腾讯科技(深圳)有限公司 | Data-storage system, querying method, inquiry unit, server and storage medium |
CN108632268A (en) * | 2018-04-28 | 2018-10-09 | 腾讯科技(深圳)有限公司 | The method for authenticating and device, storage medium, electronic device that block chain accesses |
CN108846010A (en) * | 2018-04-28 | 2018-11-20 | 腾讯科技(深圳)有限公司 | The method of product traceability, system, computer system and storage medium in network |
CN108681572A (en) * | 2018-05-04 | 2018-10-19 | 蔷薇信息技术有限公司 | Date storage method, device and the electronic equipment of block chain |
CN108898495A (en) * | 2018-07-03 | 2018-11-27 | 济南浪潮高新科技投资发展有限公司 | A kind of finance and money management confirmation of responsibility method based on block chain |
CN109242681A (en) * | 2018-08-21 | 2019-01-18 | 北京京东金融科技控股有限公司 | Storage method, device, equipment and the system of asset data |
CN109522698A (en) * | 2018-10-11 | 2019-03-26 | 平安科技(深圳)有限公司 | User authen method and terminal device based on block chain |
CN109523243A (en) * | 2018-11-19 | 2019-03-26 | 济南浪潮高新科技投资发展有限公司 | A kind of mist calculates the date storage method based on block chain under environment |
US10425230B1 (en) * | 2019-03-01 | 2019-09-24 | Capital One Services, Llc | Identity and electronic signature verification in blockchain |
CN110189140A (en) * | 2019-04-16 | 2019-08-30 | 北京农业信息技术研究中心 | Agricultural product based on block chain, which are traced to the source, deposits card method and deposit system of tracing to the source |
Non-Patent Citations (1)
Title |
---|
基于区块链技术的网络视听内容管理支撑系统设计;方宏;《广播与电视技术》;20190515;第46卷(第5期);第40-43页 * |
Also Published As
Publication number | Publication date |
---|---|
CN110602455A (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110602455B (en) | Video storage system, video processing method, device, equipment and storage medium | |
CN110377239B (en) | Data signature method, device, server, system and storage medium | |
CN110795755B (en) | Building project scene type evidence storing and non-tampering method and system based on block chain | |
CN106230851B (en) | Data security method and system based on block chain | |
CN107483419B (en) | Method, device and system for authenticating access terminal by server, server and computer readable storage medium | |
CN111737360B (en) | Block chain-based equipment management method and device and computer equipment | |
CN111970129A (en) | Data processing method and device based on block chain and readable storage medium | |
CN109547407B (en) | Whole-process tracking method for environment monitoring data and block chain link points | |
CN114372296B (en) | Block chain-based user behavior data auditing method and system | |
CN110381075B (en) | Block chain-based equipment identity authentication method and device | |
CN111882233A (en) | Storage risk early warning method, system and device based on block chain and storage medium | |
CN111881481A (en) | Block chain-based medical data processing method, device, equipment and storage medium | |
CN111899019A (en) | Method and system for cross validation and sharing of blacklist and multiple parties | |
CN109861996B (en) | Block chain-based relationship proving method, device, equipment and storage medium | |
CN110502889B (en) | Login method, login device, computer readable storage medium and computer equipment | |
CN110910110B (en) | Data processing method and device and computer storage medium | |
CN110928880A (en) | Data processing method, device, terminal and medium based on block chain | |
CN111367923A (en) | Data processing method, data processing device, node equipment and storage medium | |
CN110825776B (en) | Air quality detection report processing method and device, computing equipment and storage medium | |
CN115271853A (en) | Rental contract management method, system, medium and equipment based on block chain | |
Feng et al. | Autonomous vehicles' forensics in smart cities | |
CN110958598A (en) | Binding authentication method and device for mobile terminal and SIM card | |
CN102299927A (en) | Content security supervision system and method | |
CN112465516B (en) | Block chain network-based device management method, related device and storage medium | |
CN116232608A (en) | Distributed trusted data sharing method and device based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |