CN110445617B - Vehicle parking image storage method, device and system based on block chain - Google Patents

Vehicle parking image storage method, device and system based on block chain Download PDF

Info

Publication number
CN110445617B
CN110445617B CN201910642549.3A CN201910642549A CN110445617B CN 110445617 B CN110445617 B CN 110445617B CN 201910642549 A CN201910642549 A CN 201910642549A CN 110445617 B CN110445617 B CN 110445617B
Authority
CN
China
Prior art keywords
image information
parking
information
user terminal
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910642549.3A
Other languages
Chinese (zh)
Other versions
CN110445617A (en
Inventor
苟晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201910642549.3A priority Critical patent/CN110445617B/en
Publication of CN110445617A publication Critical patent/CN110445617A/en
Application granted granted Critical
Publication of CN110445617B publication Critical patent/CN110445617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Multimedia (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Traffic Control Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

One or more embodiments of the present specification provide a block chain-based vehicle stop image storage method, apparatus, and system, the method including: acquiring parking image information of a target shared vehicle to be uploaded; performing signature processing on the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.

Description

Vehicle parking image storage method, device and system based on block chain
Technical Field
One or more of the present description relates to the technical field of information storage, and in particular, to a block chain-based vehicle stop image storage method, apparatus, and system.
Background
At present, in daily life, a shared bicycle serving as a vehicle becomes a new generation of city mobility aid, the shared bicycle is spread over all corners of a city, and the shared bicycle has the advantages of being available at any time, available at any place, riding and green for traveling, and brings great convenience to daily life of people; along with the same, shared electric vehicles, shared automobiles and the like are produced, different appearance requirements of users are met, more various travel services are provided for the users, and the users are more and more favored.
The electric vehicle charging system is different from a shared single vehicle in that the shared electric vehicle and a shared automobile are higher in investment cost and maintenance cost, particularly for the electric vehicle, the vehicle needs to be charged regularly to ensure that the vehicle can be normally used by a user, and in order to facilitate management, the user is usually required to park the vehicle in a designated area; however, the phenomenon that the shared electric vehicles and the shared automobiles are parked and placed randomly cannot be effectively controlled, and the follow-up shared vehicles have problems and cannot be traced and collected, so that certain economic loss is brought, and the urban traffic is adversely affected.
It is therefore seen that there is a need to provide a solution that enables efficient monitoring and retroactive parking of shared vehicles.
Disclosure of Invention
One or more embodiments of the present disclosure provide a method, an apparatus, and a system for storing a vehicle stop image based on a block chain, where after a user uses a shared vehicle, the user uploads the vehicle stop image to a cloud server through a user terminal, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be subsequently retrieved at any time for performing abnormal stop tracing.
To solve the above technical problem, one or more embodiments of the present specification are implemented as follows:
in a first aspect, one or more embodiments of the present specification provide a blockchain-based vehicle stop image storage method applied to a user terminal having a secure hardware module, the method including:
acquiring parking image information of a target shared vehicle to be uploaded;
signing the parking image information by using the safety hardware module based on a pre-generated private key to obtain signed parking image information, wherein the private keys correspond to the user terminals one to one;
uploading the signed parking image information to a cloud server so that the cloud server can carry out signature verification on the parking image information and store the parking image information passing the signature verification into a block chain.
In a second aspect, one or more embodiments of the present specification provide a block chain-based vehicle parking image storage method applied to a cloud server, where the method includes:
receiving signed parking image information of a target shared vehicle, wherein the signed parking image information is obtained by a user terminal by utilizing a security hardware module to sign the parking image information of the target shared vehicle based on a pre-generated private key, and the private keys correspond to the user terminal one to one;
utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information;
and if the signature verification result is that the signature verification is passed, storing the parking image information into the block chain.
In a third aspect, one or more embodiments of the present specification provide a block chain-based vehicle stop image storage apparatus provided at a user terminal having a secure hardware module, the apparatus including:
the image acquisition module is used for acquiring parking image information of the target shared vehicle to be uploaded;
the safety hardware module is used for signing the docking image information based on a pre-generated private key to obtain the signed docking image information, wherein the private key corresponds to the user terminal one to one;
and the information processing module is used for uploading the signed parking image information to a cloud server so that the cloud server can carry out signature verification on the parking image information and store the parking image information passing the signature verification into a block chain.
In a fourth aspect, one or more embodiments of the present specification provide a block chain-based vehicle stop image storage apparatus, provided on a cloud server, the apparatus including:
the system comprises an information receiving module, a data processing module and a data processing module, wherein the information receiving module is used for receiving signed parking image information of a target shared vehicle, the signed parking image information is obtained by a user terminal by utilizing a safety hardware module to sign the parking image information of the target shared vehicle based on a pre-generated private key, and the private keys are in one-to-one correspondence with the user terminal;
the signature verification module is used for performing signature verification on the signed parking image information by using a public key corresponding to the user terminal;
and the information storage module is used for storing the stopping image information into the block chain if the signature verification result is that the signature verification is passed.
In a fifth aspect, one or more embodiments herein provide a block chain-based vehicle stop image storage system, including: the system comprises a user terminal and a cloud server, wherein the user terminal is provided with a safety hardware module;
the user terminal is used for acquiring parking image information of a target shared vehicle to be uploaded; the safety hardware module is used for carrying out signature processing on the docking image information based on a private key generated in advance to obtain the signed docking image information; uploading the signed docking image information to a cloud server, wherein the private keys correspond to the user terminals one to one;
the cloud server is used for receiving the signed parking image information of the target shared vehicle; utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information; if the signature verification result is that the signature verification is passed, storing the parking image information into a block chain
In a sixth aspect, one or more embodiments of the present specification provide a block chain-based vehicle stop image storage apparatus including:
a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to implement the blockchain-based vehicle stop image storage method of the first aspect described above.
In a seventh aspect, one or more embodiments of the present specification provide a block chain-based vehicle stop image storage apparatus, including:
a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to implement the block chain-based vehicle stop image storage method of the second aspect described above.
In an eighth aspect, one or more embodiments of the present specification provide a storage medium for storing computer-executable instructions that, when executed, implement the block chain-based vehicle stop image storage method of the first aspect described above.
In a ninth aspect, one or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed, implement the block chain-based vehicle stop image storage method of the second aspect described above.
In one or more embodiments of the present description, a block chain-based vehicle stop image storage method, apparatus, and system obtain stop image information of a target shared vehicle to be uploaded; and signing the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions of the present specification, the drawings that are needed in the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some of the embodiments described in one or more of the specification, and that other drawings can be obtained by those skilled in the art without inventive exercise.
Fig. 1 is a schematic view of an application scenario of a block chain-based vehicle stop image storage system according to one or more embodiments of the present disclosure;
fig. 2 is a first flowchart of a block chain-based vehicle stop image storage method applied to a user terminal according to one or more embodiments of the present disclosure;
fig. 3 is a first schematic diagram of a multi-terminal interaction process involved in a block chain-based vehicle stop image storage method according to one or more embodiments of the present disclosure;
fig. 4a is a second flowchart of a block chain-based vehicle stop image storage method applied to a user terminal according to one or more embodiments of the present disclosure;
fig. 4b is a third flowchart of a block chain-based vehicle stop image storage method applied to a user terminal according to one or more embodiments of the present disclosure;
fig. 4c is a fourth flowchart of a block chain-based vehicle stop image storage method applied to a user terminal according to one or more embodiments of the present disclosure;
fig. 5 is a second schematic diagram of a multi-terminal interaction process involved in a block chain-based vehicle stop image storage method according to one or more embodiments of the present disclosure;
fig. 6 is a fifth flowchart of a block chain-based vehicle stop image storage method applied to a user terminal according to one or more embodiments of the present disclosure;
fig. 7 is a third schematic diagram of a multi-terminal interaction process involved in the block chain-based vehicle stop image storage method according to one or more embodiments of the present disclosure;
fig. 8 is a fourth schematic diagram of a multi-terminal interaction process involved in the block chain-based vehicle stop image storage method according to one or more embodiments of the present disclosure;
fig. 9 is a flowchart illustrating a block chain-based vehicle stop image storage method applied to a cloud server according to one or more embodiments of the present disclosure;
fig. 10 is a schematic block diagram of a block chain-based vehicle stop image storage device provided in a user terminal according to one or more embodiments of the present disclosure;
fig. 11 is a block diagram of a block chain-based vehicle stop image storage device disposed on a cloud server according to one or more embodiments of the present disclosure;
FIG. 12 is a block chain-based vehicle stop image storage system according to one or more embodiments of the present disclosure;
fig. 13 is a schematic structural diagram of a block chain-based vehicle stop image storage apparatus according to one or more embodiments of the present disclosure.
Detailed Description
In order to make the technical solutions in one or more embodiments of the present disclosure better understood, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of one or more embodiments of the present disclosure, but not all embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments in one or more of the specification without inventive faculty are intended to fall within the scope of one or more of the specification.
One or more embodiments of the present disclosure provide a block chain-based vehicle parking image storage method, apparatus, and system, where after a user uses a shared vehicle, the user uploads a vehicle parking image to a cloud server through a user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, and thus, the corresponding vehicle parking image can be subsequently retrieved at any time for abnormal parking tracing.
Fig. 1 is a schematic view of an application scenario of a block chain-based vehicle stop image storage system according to one or more embodiments of the present disclosure, as shown in fig. 1, the system includes: the system comprises a user terminal and a cloud server, wherein the user terminal can be a shooting device terminal deployed on a user side, can be a mobile terminal such as a smart phone and a tablet personal computer, and can also be a special shooting device; the cloud server can be a background server used for checking and storing the stop image information uploaded by the user terminal, a block chain used for storing the stop image information is deployed in the cloud server, and the specific process of vehicle stop image storage based on the block chain is as follows:
(1) the method comprises the steps that a user terminal obtains parking image information of a target shared vehicle to be uploaded, wherein after a user uses the shared vehicle to finish travel service and the shared vehicle is parked in a preset area, the user terminal (such as a smart phone) needs to actively shoot parking image information of the shared vehicle used by the user terminal, and the user triggers a designated control on the user terminal to request to upload the parking image information to a service terminal;
specifically, the parked shared vehicle can be shot through a camera on the smart phone, after a user terminal detects an uploading request of a user for a certain target image, the target image can be determined as the parked image information of the shared vehicle needing to be uploaded to the cloud server, and the target image can be the image information of the shared vehicle currently parked by the user;
specifically, an information processing module SDK in the user terminal detects whether a parking image uploading request exists in real time, if so, the corresponding parking image information is determined as the parking image information of the target shared vehicle to be uploaded, and the parking image information is transmitted to a safety hardware module;
(2) the user terminal signs the obtained parking image information through the safety hardware module based on a pre-generated private key to obtain signed parking image information; the signed docking image information is transmitted to an information processing module, wherein if the user terminal is a mobile terminal such as a smart phone and a tablet personal computer, the Secure hardware module can be a functional module for running a program developed based on TEE, and if the user terminal is a special shooting device, the Secure hardware module can be a Secure Element (SE) unit, and functions such as Secure storage of private information and Secure execution of important programs can be provided through the Secure hardware module;
specifically, the user terminal may include: the system comprises a shooting module, an image acquisition module, a safety hardware module and an information processing module SDK, wherein the image acquisition module can belong to the information processing module, namely the image acquisition module and the information processing module are the same functional module, and each user terminal is provided with a respective safety hardware module; the security hardware module randomly generates a group of asymmetric key pairs, namely a public key and a private key, by using an asymmetric encryption algorithm in a key pair generation stage, the private key for information signature is only locally stored in the security hardware module, and the public key for information signature is transmitted to the cloud server, so that the cloud server performs signature verification on docking image information uploaded by a corresponding shooting equipment terminal by using the public key;
(3) the information processing module in the user terminal uploads the signed docking image information to the cloud server, so that the cloud server conducts information signature verification on the signed docking image information and stores the docking image information;
(4) the cloud server obtains a public key corresponding to the parking image information after receiving the signed parking image information, utilizes the public key to verify the parking image information, concretely, decrypts the signed parking image information by utilizing the public key, judges whether the parking image information passes the verification according to a decryption result, if the decryption is successful, the verification is passed, and if the decryption is unsuccessful, the verification is not passed;
(5) if the cloud server determines that the verification tag passes, the docking image information is stored in the block chain, wherein the block chain technology has non-tamper property, so that the docking image information written in the block chain can be guaranteed not to be tampered, and the credibility and the safety of data are guaranteed; meanwhile, the docking image information stored in the block chain can be directly used as traceable evidence subsequently;
in the storage process of the parking image information, after a user uses a shared vehicle, the user terminal uploads the vehicle parking image to the cloud server so that the cloud server can reliably store the vehicle parking image uploaded by the user terminal, and therefore the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a double protection mechanism of information tagging and block chain storage of a service end is carried out through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved;
in addition, the user is required to actively shoot and upload the parking images of the shared vehicles used by the user aiming at the completion of the use of the shared vehicles each time, and due to the fact that the process of uploading the parking images of the vehicles is added, the user can be urged to carry out the compliant parking on the shared vehicles used by the user according to the restricted parking standard to a certain extent;
furthermore, the user can be required to upload the parking image information of the shared vehicle to be used so as to monitor the parking condition of the previous user on the shared vehicle; specifically, the stop image information to be uploaded may also be a vehicle stop image shot before the user terminal executes the service order, and correspondingly, after receiving the signed stop image information, the cloud server determines the identification information of the historical user terminal corresponding to the latest finished service order of the target shared vehicle, and stores the stop image information passing the signature verification and the identification information of the historical user terminal into the block chain.
Fig. 2 is a first flowchart of a block chain-based vehicle stop image storage method according to one or more embodiments of the present disclosure, where the method in fig. 2 can be executed by the user terminal having the security hardware module in fig. 1, and as shown in fig. 2, the method at least includes the following steps:
s201, obtaining parking image information of a target shared vehicle to be uploaded, wherein after a user finishes travel service by using the shared vehicle and the shared vehicle is parked in a preset area, the user needs to actively shoot the parking image information of the shared vehicle used by the user through a user terminal (such as a smart phone), and the user uploads the parking image information to a service terminal by triggering a specified control on the user terminal to request;
specifically, the parked shared vehicle can be shot through a camera on the smart phone, after a user terminal detects an uploading request of a user for a certain target image, the target image can be determined as the parked image information of the shared vehicle needing to be uploaded to the cloud server, and the target image can be the image information of the shared vehicle currently parked by the user;
s202, signing the acquired parking image information by using a security hardware module based on a pre-generated private key to obtain signed parking image information, wherein the private key corresponds to the user terminal one to one;
specifically, after acquiring image information requested to be uploaded by a user, a user terminal does not directly upload the image information to a server, but performs signature processing on the image information, wherein the image information is shot by a shooting module to obtain parking image information of a shared vehicle, and an information processing module acquires a vehicle parking image and triggers a safety hardware module to perform signature processing on the vehicle parking image after detecting an image uploading request of the user; the safety hardware module transmits the signed vehicle parking image to the information processing module;
the secure hardware module may be a module running a Trusted Execution Environment (TEE) because the secure hardware module can provide functions such as secure storage of private information, secure Execution of important programs, and the like. Before the information is stored in the block chain, the docking image information is signed by using the security hardware module, so that the security and the credibility of the docking image information at a client and the security and the tamper resistance in the process of transmitting the docking image information to the cloud server can be ensured;
s203, uploading the signed parking image information to a cloud server so that the cloud server can carry out signature verification on the signed parking image information and store the parking image information passing the signature verification into a block chain;
specifically, the information processing module receives signed docking image information transmitted by the security hardware module and uploads the signed docking image information to the cloud server;
in addition, in specific implementation, in order to play a role in restricting the uploading of images for a user by considering the fact that the user may not actively upload the vehicle stop images, the user is allowed to end the service order initiated by the user only when the vehicle stop images uploaded by the user are received;
specifically, after detecting a service order ending request of the user terminal, the cloud server judges whether stop image information of a shared vehicle corresponding to the service order is received or not, if yes, the cloud server responds to the service order ending request, and if not, prompt information for uploading stop images is sent to the user terminal, so that the user terminal is ensured to upload corresponding vehicle stop image information according to requirements.
In addition, in order to further improve the security of the uploaded information, the signed docking image information can be uploaded to a cloud server through a trusted channel, so that the information is prevented from being intercepted and tampered in the information transmission process;
specifically, after receiving the docking image information uploaded by the user terminal, the cloud server performs signature verification processing on the docking image information, and if the signature verification is passed, the docking image information is stored into the block chain, so that the process of information signature verification is added before the information is stored into the block chain, and the data stored into the block chain can be ensured to be credible;
the block chain technology has non-tamper property, so that the docking image information written in the block chain can be guaranteed not to be tampered, and the credibility and the safety of data are guaranteed; meanwhile, the docking image information stored in the block chain can be directly used as traceable evidence subsequently.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
In a specific embodiment, as shown in fig. 3, a schematic diagram of a first interaction process between a user terminal and a cloud server is provided, specifically:
s301, a user terminal collects parking image information of a target shared vehicle to be uploaded through a shooting module, wherein a user can request to upload the parking image information by triggering a specified control on the user terminal;
s302, after monitoring the triggering operation of a user for a specified control, an information processing module acquires docking image information to be uploaded, wherein the information processing module is provided with a corresponding Software Development Kit (SDK);
specifically, in order to ensure the authenticity of the parking image uploaded by the user, the authenticity of the vehicle parking image requested to be uploaded by the user can be verified, and then the parking image information passing the authenticity verification is transmitted to the safety hardware module, so that the safety hardware module performs information tagging processing;
s303, the information processing module sends docking image information to be uploaded to the safety hardware module;
s304, the safety hardware module signs the parking image information by using a pre-generated private key to obtain the signed parking image information;
s305, the safety hardware module sends the signed docking image information to the information processing module;
s306, the information processing module uploads the signed docking image information to a service module server in a cloud server;
s307, the service module server performs signature verification on the signed docking image information;
s308, the service module server stores the stop image information passing the signature verification into the block chain.
Further, considering that the vehicle parking image requested to be uploaded by the user may have poor authenticity, the user may request to upload a parking image previously captured for the target shared vehicle, and therefore the parking situation of the shared vehicle used by the user this time cannot be truly reflected, based on this, before uploading the parking image of the shared vehicle to the service end, the authenticity verification is performed on the vehicle parking image, that is, the authenticity of the geographic position information and the time information of the vehicle parking image requested to be uploaded by the user is automatically identified, so as to determine whether the vehicle parking image requested to be uploaded by the user is the latest captured parking image, specifically:
as shown in fig. 4a, the step S201 of acquiring parking image information of the target shared vehicle to be uploaded specifically includes:
s2011, after detecting an upload request of a user for a target image, acquiring current shooting scene information, where the current shooting scene information includes: shooting time information and/or shooting position information;
s2012, judging whether the shooting scene information carried in the target image is matched with the acquired current shooting scene information;
if the judgment result is yes, S2013 is executed, and the target image is determined as the parking image information of the target shared vehicle to be uploaded;
if the judgment result is negative, executing S2014, and generating and displaying prompt information for representing that the user is requested to upload the latest shot image;
specifically, shooting scene information carried in a target image requested to be uploaded by a user is compared with current shooting scene information acquired in real time;
if the matching degree of the two images is larger than a preset threshold value, the target image which is requested to be uploaded by the user is the latest vehicle parking image shot by the user;
if the matching degree of the two images is smaller than or equal to the preset threshold value, it is indicated that the target image requested to be uploaded by the user is not the vehicle parking image which is shot by the user latest, namely the target image may not truly reflect the parking condition of the shared bicycle used by the user at this time.
Further, considering that the vehicle parking image requested to be uploaded by the user may have poor authenticity, the user may also request to upload the parking image of another shared vehicle around the shared vehicle used by the user, that is, there may be a situation that the user requests to upload the parking image of the shared vehicle not parked by the user, and therefore, the parking situation of the shared vehicle used by the user at this time cannot be truly reflected, based on this, before uploading the parking image of the shared vehicle to the server, the authenticity verification is performed on the vehicle parking image, that is, whether the unique identifier of the vehicle parking image requested to be uploaded by the user is accurate or not is automatically identified, so as to determine whether the vehicle parking image requested to be uploaded by the user is the parking image of the shared vehicle used by the user, specifically:
as shown in fig. 4b, the step S201 of acquiring parking image information of the target shared vehicle to be uploaded specifically includes:
s2015, after an uploading request of a user for a target image is detected, extracting a first vehicle identifier from the target image; determining a second vehicle identifier in a service order aimed at by the uploading request, wherein the first vehicle identifier can be obtained by identifying a vehicle graphic code in a target image, and the second vehicle identifier is a unique vehicle identifier corresponding to the unlocking request of the user terminal;
s2016, judging whether the first vehicle identifier is consistent with the second vehicle identifier;
if the judgment result is yes, S2017, determining the target image as the parking image information of the target shared vehicle to be uploaded;
if the judgment result is negative, S2018, prompt information representing that the user is requested to upload the vehicle image used by the user is generated and displayed;
specifically, a vehicle unique identifier in a target image uploaded by a user request is compared with a vehicle unique identifier corresponding to a current business order; namely, the unique vehicle identifier in the ongoing business order of the user is the unique identifier of the shared vehicle used by the user himself, and the unique vehicle identifier and the unique identifier need to be consistent;
if the comparison result shows that the identifiers are consistent, the target image which is requested to be uploaded by the user is the parking image of the shared vehicle used by the user;
if the comparison result shows that the identifiers are not consistent, the target image which is requested to be uploaded by the user is not the parking image of the shared vehicle used by the user, namely the target image possibly cannot truly reflect the parking condition of the shared vehicle used by the user at this time.
Further, considering that there may be a situation of falsification of the environment information of the vehicle parking image, in order to further ensure the authenticity of the parking image information stored in the block chain, at the client, the environment information marking on the vehicle parking image is introduced, and correspondingly, at the background server, the step of performing environment verification on the parking image information is introduced, and only the parking image information that passes the signature verification and the environment verification is stored in the block chain, based on this, as shown in fig. 4c, the above S203 uploads the parking image information after signature to the cloud server, so that the cloud server performs signature verification on the parking image information after signature and stores the parking image information that passes the signature verification into the block chain, specifically including:
s2031, carrying out environment information marking on the signed docking image information to obtain the docking image information after the environment marking;
specifically, a corresponding relation between the signed docking image information and the environment information is established, the signed docking image information and the corresponding environment information are bound, and the combination of the signed docking image information and the environment information is determined as the docking image information marked by the environment;
in addition, the obtained combination of the parking image information of the shared vehicle and the corresponding environment information can be directly signed to obtain the signed parking image information marked by the environment;
s2032, uploading the environment marked docking image information to a cloud server so that the cloud server can perform signature verification and environment verification on the environment marked docking image information, and storing the docking image information which passes the signature verification and the environment verification into a block chain;
specifically, the information processing module receives the signed docking image information transmitted by the security hardware module, performs environment information marking on the docking image information, and uploads the environment-marked docking image information to the cloud server;
specifically, before uploading the docking image information to the cloud server, the user terminal not only signs the docking image information, but also marks the docking image information, so that after receiving the docking image information uploaded by the user terminal, the cloud server not only needs to check the signing processing of the docking image information, but also needs to perform environment verification processing on the docking image information, and if the signing processing is passed and the environment verification is passed, the docking image information is stored into the block chain, so that the data stored into the block chain can be further ensured to be credible and real.
For the process of marking the environmental information, the S2031 performs the environmental information marking on the signed docking image information to obtain the docking image information marked with the environmental information, and specifically includes:
the method comprises the following steps of firstly, obtaining current environment information of a target sharing vehicle, wherein the current environment information comprises: at least one item of satellite positioning information, network equipment identification and communication network identification;
specifically, the satellite positioning information may be GPS information, the network device identifier may be identification information of a base station used for communication, and the communication network identifier may be identification information of a wireless communication network, for example, the wireless communication network may be wifi;
secondly, performing environment marking on the signed parking image information based on the obtained current environment information to obtain environment marked parking image information;
specifically, the signed stop image information and the corresponding current environment information are subjected to information binding, and a set of the signed stop image information and the corresponding current environment information is determined as the stop image information marked by the environment.
Specifically, to the signature verification process of the cloud server to the docking image information, specifically:
(1) acquiring a public key corresponding to the parking image information to be signed and verified;
specifically, determining a target terminal identifier of a user terminal uploading signed parking image information; the method comprises the steps of obtaining a public key which is stored in advance and corresponds to a target terminal identification, wherein the public key is recorded by a cloud server requested by a user terminal with the target terminal identification in a stage of generating an asymmetric key pair in a security hardware module;
(2) the obtained public key is used for carrying out signature verification on the received signed parking image information;
specifically, if the landing image information of the plaintext can be obtained by decryption based on the public key, the signature verification result is determined to be that the signature verification is passed; if the landing image information of the plaintext can not be obtained through decryption based on the public key, determining that the signature verification result is that the signature verification fails;
specifically, to the environment truth checking process of the cloud server to the image information of berthing, specifically:
(1) acquiring environment information corresponding to docking image information to be subjected to environment verification, wherein the environment information comprises attribute values of a plurality of environment attribute parameters, and the environment attribute parameters can be environment parameters representing geographic positions, for example, the environment attribute parameters can be satellite positioning information, network equipment identifiers or communication network identifiers;
specifically, environment information corresponding to parking image information to be subjected to environment verification is analyzed from the parking image information subjected to the environment marking, wherein the environment information is current environment information of a target shared vehicle embedded when the user terminal performs the environment marking on the parking image information;
(2) determining geographic position information corresponding to the attribute value of each environment attribute parameter;
specifically, if the environment attribute parameter is satellite positioning information, determining the current longitude and latitude information locked by using a GPS positioning technology as corresponding geographic position information, if the environment attribute parameter is a network equipment identifier, determining the longitude and latitude information where the network equipment is located as the corresponding geographic position information, and if the environment attribute parameter is a network communication network identifier, determining the current longitude and latitude information covered by a wireless communication network as the corresponding geographic position information;
(3) if the determined plurality of geographical position information meet the preset conditions, determining that the environment verification result is that the environment verification passes;
specifically, considering the situation that geographical position information corresponding to each environmental attribute parameter may have a deviation, if the position distance of the plurality of pieces of geographical position information is smaller than a preset threshold, determining that the plurality of pieces of geographical position information satisfy a preset condition; aiming at the condition that a plurality of geographic position information are kept consistent, namely the position distance is zero, any one of the satellite positioning information, the network equipment identifier and the communication network identifier is not modified;
for example, if the geographic position information corresponding to the satellite positioning information is a geographic position 1, if the geographic position information corresponding to the network device identifier is a geographic position 2, if the geographic position information corresponding to the communication network identifier is a geographic position 3, if the distance between every two of the geographic position 1, the geographic position 2 and the geographic position 3 is smaller than a preset threshold value, it is determined that the environment authentication result is that the environment authentication passes, and thus, if the attribute value of any one environment attribute parameter is forged or tampered, the environment authentication result is recognized in the environment authentication process;
in addition, in specific implementation, whether the environment verification passes or not can be determined by comparing the environment information analyzed from the docking image information after the environment mark with the environment information stored in advance for the user terminal.
In a specific embodiment, a process of performing environment marking and environment verification on docking image information is introduced, as shown in fig. 5, a second interaction process diagram between a user terminal and a cloud server is provided, specifically:
s501, a user terminal collects stop image information of a target shared vehicle to be uploaded through a shooting module, wherein a user can request to upload the stop image information by triggering a specified control on the user terminal;
s502, after monitoring the triggering operation of a user for a specified control, an information processing module acquires docking image information to be uploaded, wherein the information processing module is provided with a corresponding Software Development Kit (SDK);
s503, the information processing module sends the docking image information to be uploaded to the safety hardware module;
s504, the safety hardware module signs the parking image information by using a pre-generated private key to obtain the signed parking image information;
s505, the safety hardware module sends the signed parking image information to the information processing module;
s506, the information processing module carries out environment information marking on the signed parking image information to obtain parking image information after environment marking;
s507, the information processing module uploads the docking image information marked by the environment to a service module server in a cloud server;
s508, the service module server performs signature verification and environment verification on the docking image information after the environment mark;
s509, the service module server stores the stop image information which passes signature verification and environment verification to the block chain.
Further, before the shared vehicle is captured in the parking image, a private key for signature and a public key for signature verification need to be generated, that is, a set of asymmetric key pairs may be generated by the security hardware module in the key pair generation stage, based on this, as shown in fig. 6, before the obtaining of the parking image information of the target shared vehicle to be uploaded in S201, the method further includes:
s204, randomly generating a public key and a corresponding private key by using the security hardware module; the public key is used for carrying out signature verification processing (namely signature verification) on the docking image information, and the private key is used for carrying out signature processing on the docking image information;
specifically, in the generation stage of the key pair of the secure hardware module, the secure hardware module automatically and randomly generates a pair of public key and private key by using a non-encryption algorithm, that is, the public key and the private key are generated in a trusted environment, and each user terminal corresponds to a unique pair of public key and private key;
s205, storing the private key to the local, specifically, in the stage of taking a parking image of a shared vehicle providing travel service for a user, the secure hardware module uses the private key to sign the collected parking image information, so as to obtain the signed parking image information; and the number of the first and second groups,
s206, transmitting the public key to a cloud server so that the cloud server records the public key corresponding to the user terminal and performs signature verification on the received parking image information based on the public key;
specifically, in a stage of capturing parking images of shared vehicles providing travel services for users, the cloud server performs signature verification on the signed parking image information uploaded by the corresponding user terminal by using a pre-recorded public key.
Further, considering that there may be a case that the illegal camera terminal requests the remote server to store the respective public key, in order to avoid the cloud server from storing the public key uploaded by the illegal camera terminal, in the process of uploading the public key for signature verification to the cloud server, a link of requesting the trusted authority to issue a digital certificate with public trust for the public key is introduced, since only the legal camera terminal allows the requesting trusted authority to issue a corresponding digital certificate, the cloud server only stores the digital certificate issued by the trusted authority so as to ensure that the docking image information passing the signature verification is all uploaded by the legal camera terminal, based on which the S206 transmits the public key to the cloud server so that the cloud server records the public key corresponding to the user terminal and performs the signature verification on the received docking image information based on the public key, the method specifically comprises the following steps:
step one, the public key is sent to a trusted service management platform, so that the trusted service management platform generates a digital certificate containing the public key;
specifically, the legal user terminals are all in communication connection with the trusted service management platform, the legal user terminals can be user terminals which pass the website registration verification, the user terminals with the security hardware modules store the randomly generated private keys to the local in the key pair generation stage, and upload the randomly generated public keys to the trusted service management platform; the trusted service management platform authenticates the received public key, issues a corresponding digital certificate and returns the digital certificate to the corresponding user terminal;
receiving a digital certificate containing a public key sent by the trusted service management platform, wherein the digital certificate is issued by a trusted authority, the digital certificate has public credibility, and when a subsequent cloud server records the digital certificate, the issuing authority can be analyzed from the digital certificate to be recorded so as to identify whether the received digital certificate is issued by the trusted authority or not, so that the public key is prevented from being attacked, and the credibility of the public key is improved;
step three, sending a certificate recording request to a cloud server based on the received digital certificate so that the cloud server records the digital certificate and performs signature verification on the received docking image information based on a public key in the digital certificate;
specifically, a user terminal sends a certificate recording request carrying a digital certificate to a cloud server to trigger the cloud server to record the digital certificate corresponding to the user terminal;
correspondingly, in the stage of shooting parking images of shared vehicles providing travel services for users, the cloud server performs signature verification on the signed parking image information uploaded by the corresponding user terminal by using public keys in the pre-recorded digital certificates.
Wherein, to the in-process of requesting the public key that the cloud end server record is used for signature verification, increase the condition that trusted authority certifies and issues the certificate to public key, corresponding, the signature verification process of cloud end server to docking image information specifically is:
(1) acquiring a digital certificate containing a public key corresponding to docking image information to be signed and verified;
specifically, determining a target terminal identifier of a user terminal uploading signed parking image information; acquiring a pre-stored digital certificate which corresponds to a target terminal identifier and contains a public key, wherein the digital certificate is recorded by a cloud server requested by a user terminal with the target terminal identifier at the stage of generating an asymmetric key pair by a security hardware module;
(2) analyzing a corresponding public key from the acquired digital certificate, wherein the public key is key information corresponding to a private key for signature generated in the stage of generating an asymmetric key pair in the security hardware module;
(3) utilizing the analyzed public key to perform signature verification on the received signed docking image information;
specifically, if the landing image information of the plaintext can be obtained by decryption based on the public key, the signature verification result is determined to be that the signature verification is passed; and if the landing image information in the plaintext can not be obtained through decryption based on the public key, determining that the signature verification result is that the signature verification fails.
In a specific embodiment, as shown in fig. 7, a third schematic interaction process between the user terminal and the cloud server is given by introducing a process of requesting the trusted authority to issue a digital certificate with public trust for a public key, specifically:
s701, a user terminal sends a key pair generation request to a security hardware module through a client App;
s702, the security hardware module randomly generates a public key and a corresponding private key after receiving a key pair generation request;
s703, the security hardware module stores the private key locally;
s704, the secure hardware module sends the public key to the trusted service management platform TSM;
s705, the trusted service management platform TSM generates a digital certificate containing a public key;
s706, the trusted service management platform TSM sends a digital certificate containing a public key to an information processing module of the user terminal;
s707, the information processing module sends a certificate recording request carrying a digital certificate to a service module server in the cloud server, wherein the TSM and the service module server can be arranged in the same server or different servers;
s708, the service module server verifies and records the digital certificate corresponding to the user terminal, specifically, verifies whether an issuing mechanism of the digital certificate is a preset trusted mechanism, and if so, records the digital certificate;
specifically, for each user terminal, a digital certificate corresponding to the user terminal is recorded in advance, and in a stage of parking image shooting of a shared vehicle providing travel service for a user, after receiving parking image information uploaded by the user terminal, the cloud server performs signature verification on the uploaded signed parking image information by using a public key in the digital certificate corresponding to the user terminal.
Further, considering that although the record request from the illegal device is identified by adding the digital certificate issuing link, there may be a case that the illegal device acquires the digital certificate through an improper channel, in order to quickly identify the case that the untrusted device requests to record the digital certificate, the untrusted device is prevented from uploading the digital certificate, so as to improve the accuracy of the digital certificate recorded by the cloud server, ensure that the digital certificate recorded by the cloud server comes from the authentic legal shooting device terminal, and further improve the passing accuracy of the verification of the subsequent docked image information, therefore, before uploading the digital certificate by the shooting device terminal, the respective encryption keys are used for encryption, so that the cloud server can identify the shooting device terminal by using whether the corresponding decryption key can decrypt the ciphertext data, based on this, step three, sending a certificate recording request to a cloud server based on the received digital certificate so as to enable the cloud server to record the digital certificate, and specifically comprising:
acquiring a terminal identifier stored in a secure hardware module and an allocated encryption key, wherein the terminal identifier is a unique serial number of a user terminal, and the unique serial number is stored in the secure hardware module in order to improve the security of the unique serial number;
specifically, the cloud server randomly generates key information by using a symmetric encryption algorithm, that is, an encryption key is the same as a decryption key, distributes corresponding key information to different user terminals, and locally stores the key information corresponding to each user terminal at a server, that is, stores the key information corresponding to each user terminal in a service module server, so that when a user terminal requests to record a digital certificate, the received encrypted certificate information is subjected to credibility verification by using the key information;
encrypting the terminal identification and the digital certificate by using the obtained encryption key to obtain encrypted certificate information;
specifically, the digital certificate and the terminal identification are bound, each user terminal corresponds to a unique digital certificate, and the terminal identification is also unique, so that the cloud server can identify an invalid digital certificate by verifying whether the stored digital certificate corresponds to the terminal identification one by one or not;
sending a certificate recording request carrying the encrypted certificate information to a cloud server so that the cloud server can carry out credibility verification on the encrypted certificate information and record certificate information passing the credibility verification;
specifically, the cloud server obtains a decryption key corresponding to the user terminal after receiving the certificate recording request; using the decryption key to verify the credibility of the encrypted certificate information;
and if the credibility is verified to be passed, recording the digital certificate and the terminal identification corresponding to the user terminal.
In one or more embodiments of the present description, in a process that a shooting device terminal requests a server to record a public key, a link that requests a trusted authority to issue a digital certificate for the public key is added, and a link that a user terminal encrypts the digital certificate using respective key information (i.e., key information allocated by the server) is also added, so that a cloud server decrypts the certificate information using a decryption key (i.e., allocated key information) corresponding to the user terminal, and if decryption is successful, it is determined that trustworthiness verification is passed, that is, the certificate information is trusted, and if decryption is failed, it is determined that trustworthiness verification is not passed, that is, the certificate information is not trusted.
Specifically, the process of acquiring the encryption key may be performed in a scanning manner, and based on this, the acquiring the distributed encryption key specifically includes:
scanning a graphic code distributed by a cloud server to obtain corresponding graphic code information, wherein the graphic code can be a dynamic graphic code such as a dynamic two-dimensional code in order to improve the security of an encryption key, and the cloud server distributes the corresponding dynamic two-dimensional code to a user terminal after receiving a graphic code distribution request of the user terminal;
the acquired graphic code information is determined as a distributed encryption key, specifically, the encryption key is used for the shooting equipment terminal to prove the credible identity of the shooting equipment terminal to the server side, and the condition that an untrusted illegal equipment acquires a digital certificate through an illegal channel is avoided.
In a specific embodiment, as shown in fig. 8, a process of encrypting and uploading a digital certificate by introducing a shooting device terminal is provided, and a fourth interaction process diagram between a user terminal and a cloud server is provided, specifically:
s801, a user terminal sends a key pair generation request to a security hardware module through a client App;
s802, the security hardware module randomly generates a public key and a corresponding private key after receiving a key pair generation request;
s803, the secure hardware module stores the private key locally;
s804, the secure hardware module sends the public key to the trusted service management platform TSM;
s805, the trusted service management platform TSM generates a digital certificate containing a public key;
s806, the trusted service management platform TSM sends a digital certificate containing a public key to the information processing module of the user terminal;
s807, after receiving the digital certificate, the information processing module acquires a terminal identifier stored in the secure hardware module and a corresponding encryption key obtained by scanning by the client App, wherein the encryption key is key information pre-distributed to the user terminal by the cloud server and is used for proving the trusted identity of the user terminal;
s808, the information processing module encrypts the terminal identifier and the digital certificate by using the encryption key to obtain encrypted certificate information;
s809, the information processing module sends the certificate recording request carrying the encrypted certificate information to a service module server in the cloud server;
s810, after receiving the certificate record request, the service module server acquires a decryption key corresponding to the user terminal;
s811, the service module server uses the obtained decryption key to verify the credibility of the encrypted certificate information, specifically, uses the corresponding decryption key to decrypt the encrypted certificate information, and if the decryption is successful, the credibility verification is determined to be passed, and the digital certificate and the terminal identification of the plaintext are obtained;
s812, the service module server verifies and records the digital certificate and the terminal identification of the plaintext, specifically, verifies whether an issuing mechanism of the digital certificate is a preset trusted mechanism, and records the digital certificate if the issuing mechanism of the digital certificate is the preset trusted mechanism;
specifically, for each user terminal, a digital certificate corresponding to the user terminal is recorded in advance, and in a stage of parking image shooting for a shared vehicle providing travel service for a user, after receiving parking image information uploaded by the user terminal, the cloud server performs signature verification on the uploaded signed parking image information by using a public key in the digital certificate corresponding to the user terminal.
In one or more embodiments of the present description, a block chain-based vehicle stop image storage method obtains stop image information of a target shared vehicle to be uploaded; and signing the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
Based on the same technical concept, corresponding to the block chain-based vehicle stop image storage method described in fig. 2 to 8, one or more embodiments of the present specification further provide a block chain-based vehicle stop image storage method, fig. 9 is a flowchart of the block chain-based vehicle stop image storage method provided in one or more embodiments of the present specification, and the method in fig. 9 can be executed by a cloud server, as shown in fig. 9, and the method at least includes the following steps:
s901, receiving signed parking image information of the target shared vehicle, wherein the signed parking image information is obtained by a user terminal by utilizing a security hardware module to sign the parking image information of the target shared vehicle based on a pre-generated private key, and the private keys correspond to the user terminal one to one;
s902, utilizing a public key corresponding to the user terminal to perform signature verification on the received signed parking image information;
and S903, if the signature verification result is that the signature verification is passed, storing the parking image information into the block chain.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
In order to further ensure the authenticity of the vehicle stop image stored in the block chain, at the client, the environment information mark is introduced to the vehicle stop image, and correspondingly, at the background server, the step of performing environment verification on the vehicle stop image is introduced, and only the vehicle stop image passing through the signature verification and the environment verification is stored in the block chain, based on this, the above S901 receives the stop image information after the signature of the target shared vehicle, and specifically includes:
receiving parking image information after environment marking of a target shared vehicle, wherein the parking image information after the environment marking is obtained by performing environment marking on the signed parking image information;
correspondingly, if the signature verification result in S903 is that the signature verification is passed, the step of storing the docking image information in the block chain specifically includes:
if the signature verification result is that the signature verification is passed, performing environment verification on the docking image information marked by the environment;
and if the environment verification result is that the environment verification passes, storing the docking image information into the block chain.
Wherein, the docking image information after the environment mark comprises: the signed parking image information and the current environment information of the target sharing vehicle;
wherein the current environment information includes: at least one of satellite positioning information, network device identification, communication network identification.
Specifically, before uploading the docking image information to the cloud server, the user terminal not only signs the docking image information, but also marks the docking image information, so that after receiving the docking image information uploaded by the user terminal, the cloud server not only needs to check the signing processing of the docking image information, but also needs to perform environment verification processing on the docking image information, and if the signing processing is passed and the environment verification is passed, the docking image information is stored into the block chain, so that the data stored into the block chain can be further ensured to be credible and real.
Further, in order to facilitate subsequent tracing and evidence obtaining of the actual parking situation of the shared vehicle, for the situation that the actual parking of the shared vehicle needs to be checked based on the historical vehicle parking image, because the data stored on the block chain has the characteristics of credibility and non-falsification, the parking image information of the corresponding shared vehicle can be directly obtained from the block chain, and the credibility verification of the parking image information is not required again, based on this, after the S903 stores the parking image information into the block chain, the method further includes:
receiving a vehicle parking image verification request aiming at a shared vehicle to be traced, wherein the verification request carries identification information and tracing time information of the shared vehicle to be traced;
specifically, the vehicle parking image verification request may be sent by the monitoring terminal to the cloud server;
step two, obtaining vehicle parking image information corresponding to the verification request from the block chain;
thirdly, according to the vehicle parking image information acquired from the block chain, performing abnormal parking identification on the shared vehicle to be traced;
specifically, after the cloud server identifies abnormal parking of the vehicle, the cloud server can also send the abnormal parking identification result to a corresponding monitoring terminal (namely, a terminal requesting verification) and/or a user terminal;
specifically, if the parking image information acquired from the blockchain is encrypted data, the encrypted data needs to be decrypted by using corresponding key information to obtain the parking image information of the plaintext, then, required key features are extracted from the parking image information of the plaintext, abnormal parking identification is performed on the key features, if the identification result meets a preset condition, it is determined that the parking of the shared vehicle to be traced is abnormal, and corresponding punishment is performed on a user terminal uploading the parking image information;
for example, if the recognition result shows that the vehicle is not parked in the preset parking area, determining that the recognition result meets the preset condition;
for another example, if the recognition result shows that the vehicle is not parked according to the preset normal parking posture (for example, the vehicle is in an inclined or inverted state, etc.), it is determined that the recognition result satisfies the preset condition.
According to the third step, according to the vehicle parking image information acquired from the block chain, abnormal parking recognition is performed on the shared vehicle to be traced, and the method specifically comprises the following steps:
determining a parking geographic position carried in vehicle parking image information acquired from a block chain; judging whether the determined parking geographic position belongs to a preset parking position or not to obtain a first judgment result;
and/or the presence of a gas in the gas,
carrying out image recognition on vehicle parking image information acquired from the block chain, and determining a vehicle parking posture; judging whether the determined vehicle parking posture belongs to a preset abnormal parking posture or not to obtain a second judgment result;
determining an abnormal parking identification result aiming at the shared vehicle to be traced according to the first judgment result and/or the second judgment result;
specifically, when abnormal parking recognition is performed on the shared vehicle, only any one of the parking position and the parking posture can be considered, and the parking position and the parking posture can also be considered at the same time.
It should be noted that the abnormal parking verification process of the shared vehicle may also be executed between the storage of the parking image information to the block chain, specifically, if the signature verification result is that the signature verification passes, the abnormal parking identification is performed on the target shared vehicle according to the parking image information, and if the identification result is that the vehicle is parked normally, the service order ending request of the user terminal is responded, and the parking image information is stored to the block chain; and if the recognition result is that the vehicle stops abnormally, sending corresponding abnormal stop prompting information to the user terminal.
Further, considering whether the parking compliance of the vehicle is directly related to the habit of the user, the method may further include periodically evaluating the parking condition of the ue based on the image data of the uplink so as to accurately identify the important monitoring ue, and based on this, after storing the parking image information into the blockchain in S903, the method further includes:
acquiring a plurality of pieces of vehicle parking image information within a preset time period of a user terminal to be evaluated from a block chain;
determining the abnormal parking probability of the user terminal to be evaluated according to the acquired information of the plurality of vehicle parking images;
and if the abnormal parking probability is greater than the preset threshold value, marking the corresponding user terminal as a key monitoring terminal, and sending abnormal parking prompt information to the corresponding user terminal to remind the user to park the shared vehicle according to the preset requirement subsequently.
Further, before parking image shooting is performed on the shared vehicle, the secure hardware module is required to generate a private key for signature and a public key for signature verification, that is, a group of asymmetric key pairs can be generated at the key pair generation stage by the secure hardware module, and the public key is uploaded to the cloud server, so that the cloud server records the public key corresponding to each user terminal, and based on this, before S901 receives the signed parking image information of the target shared vehicle, the method further includes:
receiving a public key transmitted by a user terminal, wherein the public key is key information which is randomly generated by a security hardware module and corresponds to a private key;
the public key corresponding to the user terminal is recorded, and specifically, the corresponding relationship between the terminal identifier of the user terminal and the public key is stored.
Specifically, in a stage of capturing parking images of shared vehicles providing travel services for users, the cloud server performs signature verification on the signed parking image information uploaded by the corresponding user terminal by using a pre-recorded public key.
Considering that there may be a case that an illegal shooting device terminal requests a remote server to store respective public keys, in order to avoid the cloud server from storing the public keys uploaded by the illegal shooting device terminal, during the process of uploading the public keys for signature verification to the cloud server, a link of requesting a trusted authority to issue a digital certificate with public trust for the public keys is introduced, because only a legal shooting device terminal allows the requesting trusted authority to issue a corresponding digital certificate, the cloud server only stores the digital certificate issued by the trusted authority so as to ensure that docking image information passing signature verification is uploaded by the legal shooting device terminal, and based on this, the receiving of the public keys transmitted by the user terminal specifically includes:
receiving a certificate record request sent by a user terminal, wherein the certificate record request carries a digital certificate containing a public key, and the digital certificate is generated by a trusted service management platform based on the public key sent by the user terminal;
correspondingly, the recording of the public key corresponding to the user terminal specifically includes:
the method includes recording a digital certificate containing a public key corresponding to the user terminal, and specifically, storing a correspondence between a terminal identifier of the user terminal and the digital certificate containing the public key.
In consideration of the fact that although a digital certificate issuing link is added to identify a recording request from an illegal device, the illegal device may acquire a digital certificate through an illegal channel, and in order to quickly identify the situation that the untrusted device requests to record the digital certificate, the untrusted device is prevented from uploading the digital certificate, so that the accuracy of the digital certificate recorded by a cloud server is improved, the digital certificate recorded by the cloud server is ensured to come from a credible legal shooting device terminal, and the verification passing accuracy of subsequent docking image information is improved, therefore, the shooting device terminal uses respective encryption keys to encrypt before uploading the digital certificate, and the cloud server identifies the shooting device terminal by using the corresponding decryption keys to decrypt ciphertext data;
correspondingly, the certificate record request carries encrypted certificate information, and the encrypted certificate information is obtained by encrypting the terminal identifier and the digital certificate containing the public key by using the distributed encryption key.
The recording of the digital certificate corresponding to the user terminal and including the public key specifically includes:
acquiring a decryption key corresponding to a user terminal;
carrying out credibility verification on the encrypted certificate information by using the acquired decryption key;
and if the credibility is verified to be passed, recording a digital certificate containing the public key in the certificate information corresponding to the user terminal.
In one or more embodiments of the present description, in a process that a shooting device terminal requests a server to record a public key, a link that requests a trusted authority to issue a digital certificate for the public key is added, and a link that a user terminal encrypts the digital certificate using respective key information (i.e., key information allocated by the server) is also added, so that a cloud server decrypts the certificate information using a decryption key (i.e., allocated key information) corresponding to the user terminal, and if decryption is successful, it is determined that trustworthiness verification is passed, that is, the certificate information is trusted, and if decryption is failed, it is determined that trustworthiness verification is not passed, that is, the certificate information is not trusted.
Before receiving a certificate recording request sent by a user terminal, the method further comprises the following steps:
and distributing the graphic code to the user terminal in advance so that the user terminal scans the graphic code to obtain the encryption key.
Specifically, after receiving a registration request of a user terminal, if the user terminal passes the registration verification, the cloud server sends a randomly distributed graphic code to the user terminal, so that the user terminal can encrypt a digital certificate requested to be recorded by using an encryption key corresponding to the graphic code, and thus, the cloud server can identify whether the user terminal requested to record the digital certificate is a registered trusted user terminal by decrypting received certificate information, and further improve the storage accuracy of the digital certificate;
in addition, in order to improve the security of the encryption key, a dynamic graphic code can be distributed to the registered user terminal, namely the graphic code can be a dynamic graphic code such as a dynamic two-dimensional code, and the cloud server distributes a corresponding dynamic two-dimensional code to the user terminal after receiving a graphic code distribution request of the user terminal;
specifically, the encryption key is used for the shooting device terminal to prove the trusted identity of the shooting device terminal to the server, so that the situation that an untrusted illegal device obtains the digital certificate through an improper channel is avoided.
For the signature verification process of the cloud server on the docking image information, the above S902 performs signature verification on the received signed docking image information by using the public key corresponding to the user terminal, and specifically includes:
acquiring a digital certificate corresponding to docking image information to be signed and verified, wherein the digital certificate is a certificate requested to be recorded by a user terminal in advance;
the public key corresponding to the user terminal is analyzed from the acquired digital certificate;
and utilizing the analyzed public key to perform signature verification on the received signed parking image information.
Wherein, to the environment truth checking process of high in the clouds server to berthing image information, the aforesaid is carried out the environment truth checking to the berthing image information after the environment mark, specifically includes:
acquiring environment information corresponding to docking image information to be subjected to environment verification, wherein the environment information comprises attribute values of a plurality of items of environment attribute parameters;
determining geographic position information corresponding to the attribute value of each environment attribute parameter;
if the determined plurality of geographical position information meet the preset conditions, determining that the environment verification result is that the environment verification passes;
specifically, considering the situation that geographical position information corresponding to each environmental attribute parameter may have a deviation, if the position distance of the plurality of pieces of geographical position information is smaller than a preset threshold, determining that the plurality of pieces of geographical position information satisfy a preset condition; aiming at the condition that a plurality of geographic position information are kept consistent, namely the position distance is zero, any one of the satellite positioning information, the network equipment identifier and the communication network identifier is not modified;
for example, if the geographic location information corresponding to the satellite positioning information is the geographic location 1, if the geographic location information corresponding to the network device identifier is the geographic location 2, if the geographic location information corresponding to the communication network identifier is the geographic location 3, if the distances between every two of the geographic location 1, the geographic location 2, and the geographic location 3 are all smaller than a preset threshold value, it is determined that the environment authentication result is that the environment authentication passes, and thus, if the attribute value of any one environment attribute parameter is forged or tampered, the environment authentication result is recognized in the environment authentication process.
In one or more embodiments of the present description, a block chain-based vehicle parking image storage method receives signed parking image information of a target shared vehicle, where the signed parking image information is obtained by a user terminal signing parking image information to be uploaded based on a pre-generated private key by using a secure hardware module; utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information; and if the signature passes the verification, storing the parking image information into the block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
It should be noted that the embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, and therefore specific implementation of this embodiment may refer to implementation of the vehicle stop image storage method based on the block chain, and repeated details are not repeated.
Corresponding to the block chain-based vehicle stop image storage method described in fig. 2 to 8, based on the same technical concept, one or more embodiments of the present specification further provide a block chain-based vehicle stop image storage apparatus disposed at a user terminal, and fig. 10 is a schematic block diagram of the block chain-based vehicle stop image storage apparatus provided in one or more embodiments of the present specification, and the apparatus is configured to execute the block chain-based vehicle stop image storage method described in fig. 2 to 8, and as shown in fig. 10, the apparatus includes:
an image obtaining module 1001, configured to obtain parking image information of a target shared vehicle to be uploaded;
the secure hardware module 1002 is configured to perform signature processing on the docking image information based on a pre-generated private key to obtain signed docking image information, where the private key corresponds to the user terminal one to one;
the information processing module 1003 is configured to upload the signed docking image information to a cloud server, so that the cloud server performs signature verification on the docking image information and stores the docking image information that passes the signature verification into a block chain.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
Optionally, the image obtaining module 1001 is specifically configured to:
after an uploading request of a user for a target image is detected, current shooting scene information is obtained, wherein the current shooting scene information comprises: shooting time information and/or shooting position information;
judging whether the shooting scene information carried in the target image is matched with the current shooting scene information;
and if so, determining the target image as the parking image information of the target shared vehicle to be uploaded.
Optionally, the image obtaining module 1001 is further specifically configured to:
after an uploading request of a user for a target image is detected, extracting a first vehicle identifier from the target image; determining a second vehicle identifier in a business order aimed at by the uploading request;
judging whether the first vehicle identification is consistent with the second vehicle identification;
and if so, determining the target image as the parking image information of the target shared vehicle to be uploaded.
Optionally, the information processing module 1003 is specifically configured to:
carrying out environment information marking on the signed parking image information to obtain environment marked parking image information;
and uploading the docking image information after the environment mark to a cloud server so that the cloud server performs signature verification and environment verification on the docking image information, and storing the docking image information which passes the signature verification and the environment verification into a block chain.
Optionally, the information processing module 1003 is further specifically configured to:
acquiring current environment information of the target shared vehicle, wherein the current environment information comprises: at least one item of satellite positioning information, network equipment identification and communication network identification;
and based on the current environment information, carrying out environment marking on the signed parking image information to obtain the parking image information subjected to the environment marking.
Optionally, the secure hardware module 1002 is further configured to:
randomly generating a public key and a corresponding private key;
storing the private key locally; and the number of the first and second groups,
and transmitting the public key to a cloud server so that the cloud server records the public key and performs signature verification on the received docking image information based on the public key.
Optionally, the secure hardware module 1002 is further specifically configured to:
sending the public key to a trusted service management platform so that the trusted service management platform generates a digital certificate containing the public key;
correspondingly, the information processing module 1003 is further specifically configured to:
receiving the digital certificate sent by the trusted service management platform;
and sending a certificate recording request to a cloud server based on the digital certificate so that the cloud server records the digital certificate and performs signature verification on the received docking image information based on the public key in the digital certificate.
Optionally, the information processing module 1003 is further specifically configured to:
acquiring a terminal identifier stored in the security hardware module and acquiring a distributed encryption key;
encrypting the terminal identification and the digital certificate by using the encryption key to obtain encrypted certificate information;
sending a certificate recording request carrying the encrypted certificate information to a cloud server so that the cloud server performs credibility verification on the encrypted certificate information and records the digital certificate passing the credibility verification.
Optionally, the apparatus further comprises a code scanning module, configured to:
scanning a graphic code distributed by a cloud server to acquire corresponding graphic code information;
and determining the acquired graphic code information as a distributed encryption key.
In one or more embodiments of the present description, a block chain-based vehicle stop image storage apparatus obtains stop image information of a target shared vehicle to be uploaded; and signing the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
It should be noted that, the embodiment of the vehicle stop image storage apparatus based on the block chain in this specification and the embodiment of the vehicle stop image storage method based on the block chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the vehicle stop image storage method based on the block chain, and repeated details are not described again.
Based on the same technical concept, in correspondence to the block chain-based vehicle stop image storage method described in fig. 9, one or more embodiments of the present specification further provide a block chain-based vehicle stop image storage apparatus disposed in a cloud server, and fig. 11 is a schematic diagram of module compositions of the block chain-based vehicle stop image storage apparatus provided in one or more embodiments of the present specification, where the apparatus is configured to execute the block chain-based vehicle stop image storage method described in fig. 9, and as shown in fig. 11, the apparatus includes:
the information receiving module 1101 is configured to receive signed parking image information of a target shared vehicle, where the signed parking image information is obtained by a user terminal signing parking image information of the target shared vehicle based on a pre-generated private key by using a secure hardware module, and the private keys are in one-to-one correspondence with the user terminal;
a signature verification module 1102, configured to perform signature verification on the signed parking image information by using a public key corresponding to the user terminal;
and the information storage module 1103 is configured to store the docking image information into the block chain if the signature verification result indicates that the signature verification passes.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
Optionally, the apparatus further comprises: a docking image verification module to:
receiving a parking image verification request aiming at a shared vehicle to be traced, wherein the verification request carries identification information and tracing time information of the shared vehicle to be traced;
acquiring vehicle parking image information corresponding to the parking image verification request from a block chain;
and according to the vehicle parking image information, carrying out abnormal parking identification on the shared vehicle to be traced.
Optionally, the docking image verification module is specifically configured to:
acquiring a parking geographical position carried in the vehicle parking image information;
judging whether the stopping geographic position belongs to a preset stopping position or not to obtain a first judgment result;
and/or the presence of a gas in the gas,
carrying out image recognition on the vehicle parking image information to obtain a vehicle parking posture;
judging whether the vehicle parking posture belongs to a preset abnormal parking posture or not to obtain a second judgment result;
and determining an abnormal parking identification result aiming at the shared vehicle to be traced according to the first judgment result and/or the second judgment result.
Optionally, the information receiving module 1101 is specifically configured to:
receiving parking image information after environment marking of a target shared vehicle, wherein the parking image information after the environment marking is obtained by performing environment marking on the parking image information after signature;
correspondingly, the device further comprises: an environment truth-verifying module for:
performing environment verification on the docking image information marked by the environment;
the information storage module 1103 is specifically configured to:
and if the environment verification result is that the environment verification passes, storing the parking image information into the block chain.
Optionally, the environment marked docking image information includes: the signed parking image information and the current environment information of the target sharing vehicle;
wherein the current environment information includes: at least one of satellite positioning information, network device identification, communication network identification.
Optionally, the apparatus further comprises: the signature verification key recording module is used for:
receiving a public key transmitted by a user terminal, wherein the public key is key information which is randomly generated by a security hardware module and corresponds to a private key;
and recording the public key corresponding to the user terminal.
Optionally, the signature verification key recording module is specifically configured to:
receiving a certificate record request sent by a user terminal, wherein the certificate record request carries a digital certificate containing a public key, and the digital certificate is generated by a trusted service management platform based on the public key sent by the user terminal;
and recording the digital certificate containing the public key corresponding to the user terminal.
Optionally, the certificate record request carries encrypted certificate information, where the encrypted certificate information is obtained by encrypting the terminal identifier and the digital certificate containing the public key with the distributed encryption key.
Optionally, the signature verification key recording module is further specifically configured to:
acquiring a decryption key corresponding to the user terminal;
using the decryption key to verify the credibility of the encrypted certificate information;
and if the credibility is verified to be passed, recording a digital certificate containing a public key in the certificate information corresponding to the user terminal.
Optionally, the apparatus further comprises: a key information distribution module to:
and distributing a graphic code to the user terminal in advance so that the user terminal scans the graphic code to obtain an encryption key.
Optionally, the signature verification module 1102 is specifically configured to:
acquiring a digital certificate corresponding to docking image information to be signed and verified, wherein the digital certificate is a certificate requested to be recorded by the user terminal in advance;
resolving a public key corresponding to the user terminal from the digital certificate;
and utilizing the public key to carry out signature verification on the signed parking image information.
Optionally, the environment verification module is specifically configured to:
acquiring environment information corresponding to docking image information to be subjected to environment verification, wherein the environment information comprises attribute values of a plurality of items of environment attribute parameters;
determining geographical position information corresponding to the attribute value of each environmental attribute parameter;
and if the determined plurality of geographical position information meet the preset conditions, determining that the environment verification result is that the environment verification passes.
In one or more embodiments of the present description, a block chain-based vehicle stop image storage apparatus receives signed stop image information of a target shared vehicle, where the signed stop image information is obtained by a user terminal signing stop image information to be uploaded based on a pre-generated private key by using a secure hardware module; utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information; and if the signature passes the verification, storing the parking image information into the block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
It should be noted that, the embodiment of the vehicle stop image storage apparatus based on the block chain in this specification and the embodiment of the vehicle stop image storage method based on the block chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the vehicle stop image storage method based on the block chain, and repeated details are not described again.
Corresponding to the above vehicle stop image storage method based on the block chain described in fig. 2 to 8, based on the same technical concept, one or more embodiments of the present specification further provide a vehicle stop image storage system based on the block chain, where fig. 12 is a schematic structural diagram of the vehicle stop image storage system based on the block chain provided in one or more embodiments of the present specification, where the system is configured to execute the vehicle stop image storage method based on the block chain described in fig. 2 to 8, and as shown in fig. 12, the system includes: a user terminal 10 and a cloud server 20;
the user terminal 10 is configured to obtain parking image information of a target shared vehicle to be uploaded; the safety hardware module is used for carrying out signature processing on the docking image information based on a private key generated in advance to obtain the signed docking image information; uploading the signed docking image information to the cloud server 20, wherein the private keys correspond to the user terminals one to one;
the cloud server 20 is configured to receive the signed docking image information uploaded by the user terminal 10; performing signature verification on the signed parking image information by using a public key corresponding to the user terminal 10; and if the signature verification result is that the signature verification is passed, storing the parking image information into the block chain.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
The specific process of storing the vehicle parking image based on the block chain is as follows:
(1) the method comprises the steps that a user terminal obtains parking image information of a target shared vehicle to be uploaded, wherein after a user uses the shared vehicle to finish travel service and parks the shared vehicle in a preset area, the user terminal (such as a smart phone) needs to actively shoot parking image information of the shared vehicle used by the user terminal, and the user requests to upload the parking image information to a service terminal by triggering a specified control on the user terminal;
specifically, the parked shared vehicle can be shot through a camera on the smart phone, after a user terminal detects an uploading request of a user for a certain target image, the target image can be determined as the parked image information of the shared vehicle needing to be uploaded to the cloud server, and the target image can be the image information of the shared vehicle currently parked by the user;
specifically, an information processing module SDK in the user terminal detects whether a parking image uploading request exists in real time, if so, the corresponding parking image information is determined as the parking image information of the target shared vehicle to be uploaded, and the parking image information is transmitted to a safety hardware module;
(2) the user terminal signs the obtained parking image information through the safety hardware module based on a pre-generated private key to obtain signed parking image information; the signed docking image information is transmitted to an information processing module, wherein if the user terminal is a mobile terminal such as a smart phone and a tablet personal computer, the Secure hardware module can be a functional module for running a program developed based on TEE, and if the user terminal is a special shooting device, the Secure hardware module can be a Secure Element (SE) unit, so that functions such as Secure storage of private information, Secure execution of important programs and the like can be provided through the Secure hardware module;
specifically, the user terminal may include: the system comprises a shooting module, an image acquisition module, a safety hardware module and an information processing module SDK, wherein the image acquisition module can belong to the information processing module, and each user terminal is provided with the safety hardware module; the security hardware module randomly generates a group of asymmetric key pairs, namely a public key and a private key, by using an asymmetric encryption algorithm in a key pair generation stage, the private key for information signature is only locally stored in the security hardware module, and the public key for information signature is transmitted to the cloud server, so that the cloud server performs signature verification on docking image information uploaded by a corresponding shooting equipment terminal by using the public key;
(3) the information processing module in the user terminal uploads the signed docking image information to the cloud server, so that the cloud server conducts information signature verification on the signed docking image information and stores the docking image information;
(4) the cloud server obtains a public key corresponding to the parking image information after receiving the signed parking image information, utilizes the public key to verify the parking image information, concretely, decrypts the signed parking image information by utilizing the public key, judges whether the parking image information passes the verification according to a decryption result, if the decryption is successful, the verification is passed, and if the decryption is unsuccessful, the verification is not passed;
(5) if the cloud server determines that the verification tag passes, the docking image information is stored in the block chain, wherein the block chain technology has non-tamper property, so that the docking image information written in the block chain can be guaranteed not to be tampered, and the credibility and the safety of data are guaranteed; meanwhile, the docking image information stored in the block chain can be directly used as traceable evidence subsequently.
Further, after the cloud server stores the docking image information into the block chain, the method further includes:
the method comprises the steps that a cloud server receives a parking image verification request aiming at a shared vehicle to be traced, wherein the verification request carries identification information and tracing time information of the shared vehicle to be traced;
the cloud server acquires vehicle parking image information corresponding to the parking image verification request from the block chain;
and the cloud server performs abnormal parking identification on the shared vehicle to be traced according to the vehicle parking image information.
The abnormal parking recognition of the shared vehicle to be traced back according to the vehicle parking image information specifically includes:
acquiring a parking geographical position carried in the vehicle parking image information;
judging whether the stopping geographic position belongs to a preset stopping position or not to obtain a first judgment result;
and/or the presence of a gas in the gas,
carrying out image recognition on the vehicle parking image information to obtain a vehicle parking posture;
judging whether the vehicle parking posture belongs to a preset abnormal parking posture or not to obtain a second judgment result;
and determining an abnormal parking identification result aiming at the shared vehicle to be traced according to the first judgment result and/or the second judgment result.
In one or more embodiments of the present description, a block chain-based vehicle stop image storage system obtains stop image information of a target shared vehicle to be uploaded; and signing the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
It should be noted that, the embodiment of the vehicle stop image storage system based on the block chain in this specification and the embodiment of the vehicle stop image storage method based on the block chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the vehicle stop image storage method based on the block chain, and repeated details are not described again.
Further, corresponding to the methods illustrated in fig. 2 to 8 described above, based on the same technical idea, one or more embodiments of the present specification also provide a block chain-based vehicle stop image storage apparatus for performing the above block chain-based vehicle stop image storage method, as illustrated in fig. 13.
The blockchain-based vehicle stop image storage apparatus may have a relatively large difference due to a difference in configuration or performance, and may include one or more processors 1301 and a memory 1302, and one or more storage applications or data may be stored in the memory 1302. Memory 1302 may be, among other things, transient or persistent storage. The application program stored in memory 1302 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for a block chain based vehicle stop image storage device. Still further, the processor 1301 may be configured to communicate with the memory 1302 to execute a series of computer executable instructions in the memory 1302 on a blockchain based vehicle stop image storage device. The blockchain-based vehicle stop image storage apparatus may also include one or more power supplies 1303, one or more wired or wireless network interfaces 1304, one or more input-output interfaces 1305, one or more keyboards 1306, and the like.
In one particular embodiment, the blockchain based vehicle stop image storage device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer executable instructions for the blockchain based vehicle stop image storage device, and the one or more programs configured to be executed by the one or more processors include computer executable instructions for:
acquiring parking image information of a target shared vehicle to be uploaded;
signing the parking image information by using a safety hardware module based on a pre-generated private key to obtain signed parking image information, wherein the private keys correspond to the user terminals one to one;
uploading the signed parking image information to a cloud server so that the cloud server can carry out signature verification on the parking image information and store the parking image information passing the signature verification into a block chain.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
Optionally, the computer executable instructions, when executed, obtain parking image information of the target shared vehicle to be uploaded, comprising:
after an uploading request of a user for a target image is detected, current shooting scene information is obtained, wherein the current shooting scene information comprises: shooting time information and/or shooting position information;
judging whether the shooting scene information carried in the target image is matched with the current shooting scene information;
and if so, determining the target image as the parking image information of the target shared vehicle to be uploaded.
Optionally, the computer executable instructions, when executed, obtain parking image information of the target shared vehicle to be uploaded, comprising:
after an uploading request of a user for a target image is detected, extracting a first vehicle identifier from the target image; determining a second vehicle identifier in a business order aimed at by the uploading request;
judging whether the first vehicle identification is consistent with the second vehicle identification;
and if so, determining the target image as the parking image information of the target shared vehicle to be uploaded.
Optionally, when executed, the computer-executable instructions upload the signed docking image information to a cloud server, so that the cloud server performs signature verification on the docking image information and stores the docking image information that passes the signature verification into a block chain, including:
carrying out environment information marking on the signed parking image information to obtain environment marked parking image information;
and uploading the docking image information after the environment mark to a cloud server so that the cloud server performs signature verification and environment verification on the docking image information, and storing the docking image information which passes the signature verification and the environment verification into a block chain.
Optionally, when executed, the computer-executable instructions perform environment information tagging on the signed docking image information to obtain environment tagged docking image information, including:
acquiring current environment information of the target shared vehicle, wherein the current environment information comprises: at least one item of satellite positioning information, network equipment identification and communication network identification;
and based on the current environment information, carrying out environment marking on the signed parking image information to obtain the parking image information subjected to the environment marking.
Optionally, the computer executable instructions, when executed, further comprise, prior to obtaining the parking image information of the target shared vehicle to be uploaded:
randomly generating a public key and a corresponding private key by using a security hardware module;
storing the private key locally; and the number of the first and second groups,
and transmitting the public key to a cloud server so that the cloud server records the public key and performs signature verification on the received docking image information based on the public key.
Optionally, when executed, the computer-executable instructions transmit the public key to a cloud server, so that the cloud server records the public key and performs signature verification on the received docking image information based on the public key, including:
sending the public key to a trusted service management platform so that the trusted service management platform generates a digital certificate containing the public key;
receiving the digital certificate sent by the trusted service management platform;
and sending a certificate recording request to a cloud server based on the digital certificate so that the cloud server records the digital certificate and performs signature verification on the received docking image information based on the public key in the digital certificate.
Optionally, when executed, the computer-executable instructions, when sending a certificate logging request to a cloud server based on the digital certificate, to cause the cloud server to log the digital certificate, include:
acquiring a terminal identifier stored in the security hardware module and acquiring a distributed encryption key;
encrypting the terminal identification and the digital certificate by using the encryption key to obtain encrypted certificate information;
sending a certificate recording request carrying the encrypted certificate information to a cloud server so that the cloud server performs credibility verification on the encrypted certificate information and records the digital certificate passing the credibility verification.
Optionally, the computer executable instructions, when executed, obtain the assigned encryption key, comprising:
scanning a graphic code distributed by a cloud server to acquire corresponding graphic code information;
and determining the acquired graphic code information as a distributed encryption key.
In one or more embodiments of the present description, a block chain-based vehicle stop image storage device obtains stop image information of a target shared vehicle to be uploaded; and signing the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
In another particular embodiment, a blockchain based vehicle stop image storage device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer executable instructions for the blockchain based vehicle stop image storage device, and the one or more programs configured to be executed by the one or more processors include computer executable instructions for:
receiving signed parking image information of a target shared vehicle, wherein the signed parking image information is obtained by a user terminal by utilizing a security hardware module to sign the parking image information of the target shared vehicle based on a pre-generated private key, and the private keys correspond to the user terminal one to one;
utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information;
and if the signature verification result is that the signature verification is passed, storing the parking image information into the block chain.
In one or more embodiments of the present description, after a user uses a shared vehicle, the user terminal uploads a vehicle stop image to the cloud server, so that the cloud server can perform trusted storage on the vehicle stop image uploaded by the user terminal, and thus, the corresponding vehicle stop image can be called at any time for performing abnormal stop tracing, and meanwhile, a dual protection mechanism of information tagging and block chain storage of the service end is performed through a security hardware module of the user terminal, so that the credibility, the security and the tamper resistance of the vehicle stop image are improved.
Optionally, the computer executable instructions, when executed, further comprise, after storing the docking image information into a block chain:
receiving a parking image verification request aiming at a shared vehicle to be traced, wherein the verification request carries identification information and tracing time information of the shared vehicle to be traced;
acquiring vehicle parking image information corresponding to the parking image verification request from a block chain;
and according to the vehicle parking image information, carrying out abnormal parking identification on the shared vehicle to be traced.
Optionally, when executed, the computer-executable instructions perform abnormal parking recognition on the shared vehicle to be traced according to the vehicle parking image information, including:
acquiring a parking geographical position carried in the vehicle parking image information;
judging whether the stopping geographic position belongs to a preset stopping position or not to obtain a first judgment result;
and/or the presence of a gas in the gas,
carrying out image recognition on the vehicle parking image information to obtain a vehicle parking posture;
judging whether the vehicle parking posture belongs to a preset abnormal parking posture or not to obtain a second judgment result;
and determining an abnormal parking identification result aiming at the shared vehicle to be traced according to the first judgment result and/or the second judgment result.
Optionally, the computer executable instructions, when executed, receive signed parking image information of the target shared vehicle, comprising:
receiving parking image information after environment marking of a target shared vehicle, wherein the parking image information after the environment marking is obtained by performing environment marking on the parking image information after signature;
correspondingly, the storing the docking image information into the block chain includes:
performing environment verification on the docking image information marked by the environment;
and if the environment verification result is that the environment verification passes, storing the parking image information into the block chain.
Optionally, the environment tagged docking image information, when executed, comprises: the signed parking image information and the current environment information of the target sharing vehicle;
wherein the current environment information includes: at least one of satellite positioning information, network device identification, communication network identification.
Optionally, the computer executable instructions, when executed, further comprise, prior to receiving the signed parking image information of the target shared vehicle:
receiving a public key transmitted by a user terminal, wherein the public key is key information which is randomly generated by a security hardware module and corresponds to a private key;
and recording the public key corresponding to the user terminal.
Optionally, the computer executable instructions, when executed, receive a public key transmitted by a user terminal, comprising:
receiving a certificate record request sent by a user terminal, wherein the certificate record request carries a digital certificate containing a public key, and the digital certificate is generated by a trusted service management platform based on the public key sent by the user terminal;
correspondingly, the recording the public key corresponding to the user terminal includes:
and recording the digital certificate containing the public key corresponding to the user terminal.
Optionally, when the computer executable instruction is executed, the certificate record request carries encrypted certificate information, where the encrypted certificate information is obtained by encrypting the terminal identifier and the digital certificate containing the public key by using the distributed encryption key.
Optionally, the recording of the digital certificate containing the public key corresponding to the user terminal when the computer-executable instructions are executed includes:
acquiring a decryption key corresponding to the user terminal;
using the decryption key to verify the credibility of the encrypted certificate information;
and if the credibility is verified to be passed, recording a digital certificate containing a public key in the certificate information corresponding to the user terminal.
Optionally, the computer executable instructions, when executed, further comprise, before receiving a certificate record request sent by a user terminal:
and distributing a graphic code to the user terminal in advance so that the user terminal scans the graphic code to obtain an encryption key.
Optionally, when executed, the signing and verifying the signed docking image information by using a public key corresponding to the user terminal includes:
acquiring a digital certificate corresponding to docking image information to be signed and verified, wherein the digital certificate is a certificate requested to be recorded by the user terminal in advance;
resolving a public key corresponding to the user terminal from the digital certificate;
and utilizing the public key to carry out signature verification on the signed parking image information.
Optionally, the performing environment verification on the environment marked docking image information when the computer executable instructions are executed comprises:
acquiring environment information corresponding to docking image information to be subjected to environment verification, wherein the environment information comprises attribute values of a plurality of items of environment attribute parameters;
determining geographical position information corresponding to the attribute value of each environmental attribute parameter;
and if the determined plurality of geographical position information meet the preset conditions, determining that the environment verification result is that the environment verification passes.
In one or more embodiments of the present description, a block chain-based vehicle parking image storage device receives signed parking image information of a target shared vehicle, where the signed parking image information is obtained by a user terminal signing parking image information to be uploaded based on a pre-generated private key by using a secure hardware module; utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information; and if the signature passes the verification, storing the parking image information into the block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
It should be noted that, the embodiment of the vehicle stop image storage device based on the block chain in this specification and the embodiment of the vehicle stop image storage method based on the block chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the vehicle stop image storage method based on the block chain, and repeated details are not described again.
Further, corresponding to the methods shown in fig. 2 to 8, based on the same technical concept, one or more embodiments of the present specification further provide a storage medium for storing computer-executable instructions, which in a specific embodiment may be a usb disk, an optical disk, a hard disk, or the like, and when being executed by a processor, the storage medium stores computer-executable instructions capable of implementing the block chain-based vehicle stop image storage method applied to the user terminal as described above;
the storage medium in one or more embodiments of the present description stores computer-executable instructions that, when executed by the processor, obtain parked image information of a target shared vehicle to be uploaded; and signing the docking image information; and uploading the signed parking image information to a cloud server so that the cloud server performs signature verification on the parking image information and stores the parking image information passing the signature verification into a block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
In another specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, or the like, and the storage medium stores computer-executable instructions that, when executed by the processor, can implement the block chain-based vehicle parking image storage method applied to the cloud server as described above;
in one or more embodiments of the present description, when executed by a processor, computer executable instructions stored in a storage medium receive signed parking image information of a target shared vehicle, where the signed parking image information is obtained by a user terminal signing, by using a secure hardware module, parking image information to be uploaded based on a pre-generated private key; utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information; and if the signature passes the verification, storing the parking image information into the block chain. After the user uses the shared vehicle, the vehicle parking image is uploaded to the cloud server through the user terminal, so that the cloud server can perform trusted storage on the vehicle parking image uploaded by the user terminal, the corresponding vehicle parking image can be called at any time for abnormal parking tracing, meanwhile, a dual protection mechanism of information signing and block chain storage of the server side is performed through a safety hardware module of the user terminal, and the credibility, the safety and the tamper resistance of the vehicle parking image are improved.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the vehicle stop image storage method based on the block chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the corresponding vehicle stop image storage method based on the block chain, and repeated details are not repeated.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (computer unified Programming Language), HD call, JHDL (Java Hardware Description Language), Lava, Lola, HDL, las, software, rhyd (Hardware Description Language), and the like, which are currently used in most popular languages. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations of one or more of the present descriptions.
As will be appreciated by one skilled in the art, one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied in the medium.
One or more of the present specification has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to one or more embodiments of the specification. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied in the medium.
One or more of the present specification can be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more of the present specification can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is merely illustrative of one or more embodiments of the present disclosure and is not intended to limit one or more embodiments of the present disclosure. Various modifications and alterations to one or more of the present descriptions will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of one or more of the present specification should be included in the scope of one or more claims of the present specification.

Claims (28)

1. A vehicle parking image storage method based on a block chain is applied to a user terminal with a safety hardware module, and the method comprises the following steps:
acquiring parking image information of a target shared vehicle to be uploaded;
signing the parking image information by using the safety hardware module based on a pre-generated private key to obtain signed parking image information, wherein the private keys correspond to the user terminals one to one;
uploading the signed parking image information to a cloud server so that the cloud server can carry out signature verification on the parking image information and store the parking image information passing the signature verification into a block chain;
the method comprises the steps that a plurality of pieces of parking image information of a user terminal to be evaluated, which are stored in a block chain, are used for determining the abnormal parking probability of the user terminal to be evaluated so as to judge whether the user terminal to be evaluated is marked as a key monitoring terminal or not.
2. The method of claim 1, wherein the obtaining parking image information of the target shared vehicle to be uploaded comprises:
after an uploading request of a user for a target image is detected, current shooting scene information is obtained, wherein the current shooting scene information comprises: shooting time information and/or shooting position information;
judging whether the shooting scene information carried in the target image is matched with the current shooting scene information;
and if so, determining the target image as the parking image information of the target shared vehicle to be uploaded.
3. The method of claim 1, wherein the obtaining parking image information of the target shared vehicle to be uploaded comprises:
after an uploading request of a user for a target image is detected, extracting a first vehicle identifier from the target image; determining a second vehicle identifier in a business order aimed at by the uploading request;
judging whether the first vehicle identification is consistent with the second vehicle identification;
and if so, determining the target image as the parking image information of the target shared vehicle to be uploaded.
4. The method of claim 1, wherein uploading the signed docking image information to a cloud server, so that the cloud server performs signature verification on the docking image information and stores the docking image information passing the signature verification into a blockchain, comprises:
carrying out environment information marking on the signed parking image information to obtain environment marked parking image information;
and uploading the docking image information after the environment mark to a cloud server so that the cloud server performs signature verification and environment verification on the docking image information, and storing the docking image information which passes the signature verification and the environment verification into a block chain.
5. The method of claim 4, wherein the tagging the signed docking image information for environmental information to obtain the environmentally tagged docking image information comprises:
acquiring current environment information of the target shared vehicle, wherein the current environment information comprises: at least one item of satellite positioning information, network equipment identification and communication network identification;
and based on the current environment information, carrying out environment marking on the signed parking image information to obtain the parking image information subjected to the environment marking.
6. The method of claim 1, wherein prior to obtaining the parking image information of the target shared vehicle to be uploaded, further comprising:
randomly generating a public key and a corresponding private key by using a security hardware module;
storing the private key locally; and the number of the first and second groups,
and transmitting the public key to a cloud server so that the cloud server records the public key and performs signature verification on the received docking image information based on the public key.
7. The method of claim 6, wherein the transmitting the public key to a cloud server to cause the cloud server to record the public key and to sign verify the received dock image information based on the public key comprises:
sending the public key to a trusted service management platform so that the trusted service management platform generates a digital certificate containing the public key;
receiving the digital certificate sent by the trusted service management platform;
and sending a certificate recording request to a cloud server based on the digital certificate so that the cloud server records the digital certificate and performs signature verification on the received docking image information based on the public key in the digital certificate.
8. The method of claim 7, wherein the sending a certificate logging request to a cloud server based on the digital certificate to cause the cloud server to log the digital certificate comprises:
acquiring a terminal identifier stored in the security hardware module and acquiring a distributed encryption key;
encrypting the terminal identification and the digital certificate by using the encryption key to obtain encrypted certificate information;
sending a certificate recording request carrying the encrypted certificate information to a cloud server so that the cloud server performs credibility verification on the encrypted certificate information and records the digital certificate passing the credibility verification.
9. The method of claim 8, wherein the obtaining the assigned encryption key comprises:
scanning a graphic code distributed by a cloud server to acquire corresponding graphic code information;
and determining the acquired graphic code information as a distributed encryption key.
10. A vehicle parking image storage method based on a block chain is applied to a cloud server, and comprises the following steps:
receiving signed parking image information of a target shared vehicle, wherein the signed parking image information is obtained by a user terminal by utilizing a security hardware module to sign the parking image information of the target shared vehicle based on a pre-generated private key, and the private keys correspond to the user terminal one to one;
utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information;
if the signature verification result is that the signature verification is passed, storing the parking image information into a block chain;
and determining the abnormal parking probability of the user terminal to be evaluated according to a plurality of parking image information of the user terminal to be evaluated, which is stored in the block chain, so as to judge whether the user terminal to be evaluated is marked as a key monitoring terminal.
11. The method of claim 10, wherein after storing the docking image information into a blockchain, further comprising:
receiving a parking image verification request aiming at a shared vehicle to be traced, wherein the verification request carries identification information and tracing time information of the shared vehicle to be traced;
acquiring vehicle parking image information corresponding to the parking image verification request from a block chain;
and according to the vehicle parking image information, carrying out abnormal parking identification on the shared vehicle to be traced.
12. The method according to claim 11, wherein the identifying abnormal parking of the shared vehicle to be traced according to the vehicle parking image information comprises:
acquiring a parking geographical position carried in the vehicle parking image information;
judging whether the stopping geographic position belongs to a preset stopping position or not to obtain a first judgment result;
and/or the presence of a gas in the gas,
carrying out image recognition on the vehicle parking image information to obtain a vehicle parking posture;
judging whether the vehicle parking posture belongs to a preset abnormal parking posture or not to obtain a second judgment result;
and determining an abnormal parking identification result aiming at the shared vehicle to be traced according to the first judgment result and/or the second judgment result.
13. The method of claim 10, wherein the receiving signed parking image information of the target shared vehicle comprises:
receiving parking image information after environment marking of a target shared vehicle, wherein the parking image information after the environment marking is obtained by performing environment marking on the parking image information after signature;
correspondingly, the storing the docking image information into the block chain includes:
performing environment verification on the docking image information marked by the environment;
and if the environment verification result is that the environment verification passes, storing the parking image information into the block chain.
14. The method of claim 13, wherein the environment tagged docking image information comprises: the signed parking image information and the current environment information of the target sharing vehicle;
wherein the current environment information includes: at least one of satellite positioning information, network device identification, communication network identification.
15. The method of claim 10, wherein prior to receiving the signed parking image information of the target shared vehicle, further comprising:
receiving a public key transmitted by a user terminal, wherein the public key is key information which is randomly generated by a security hardware module and corresponds to a private key;
and recording the public key corresponding to the user terminal.
16. The method of claim 15, wherein the receiving the public key transmitted by the user terminal comprises:
receiving a certificate record request sent by a user terminal, wherein the certificate record request carries a digital certificate containing a public key, and the digital certificate is generated by a trusted service management platform based on the public key sent by the user terminal;
correspondingly, the recording the public key corresponding to the user terminal includes:
and recording the digital certificate containing the public key corresponding to the user terminal.
17. The method of claim 16, wherein the certificate record request carries encrypted certificate information, wherein the encrypted certificate information is obtained by encrypting the terminal identifier and the digital certificate containing the public key by using the distributed encryption key.
18. The method of claim 17, wherein the recording the digital certificate containing the public key corresponding to the user terminal comprises:
acquiring a decryption key corresponding to the user terminal;
using the decryption key to verify the credibility of the encrypted certificate information;
and if the credibility is verified to be passed, recording a digital certificate containing a public key in the certificate information corresponding to the user terminal.
19. The method of claim 17, wherein prior to receiving the certificate record request sent by the user terminal, further comprising:
and distributing a graphic code to the user terminal in advance so that the user terminal scans the graphic code to obtain an encryption key.
20. The method of claim 16, wherein the signature verification of the signed docking image information using a public key corresponding to the user terminal comprises:
acquiring a digital certificate corresponding to docking image information to be signed and verified, wherein the digital certificate is a certificate requested to be recorded by the user terminal in advance;
resolving a public key corresponding to the user terminal from the digital certificate;
and utilizing the public key to carry out signature verification on the signed parking image information.
21. The method of claim 14, wherein the performing environmental validation on the environment tagged docking image information comprises:
acquiring environment information corresponding to docking image information to be subjected to environment verification, wherein the environment information comprises attribute values of a plurality of items of environment attribute parameters;
determining geographical position information corresponding to the attribute value of each environmental attribute parameter;
and if the determined plurality of geographical position information meet the preset conditions, determining that the environment verification result is that the environment verification passes.
22. A blockchain-based vehicle stop image storage apparatus provided to a user terminal having a security hardware module, the apparatus comprising:
the image acquisition module is used for acquiring parking image information of the target shared vehicle to be uploaded;
the safety hardware module is used for signing the docking image information based on a pre-generated private key to obtain the signed docking image information, wherein the private key corresponds to the user terminal one to one;
the information processing module is used for uploading the signed parking image information to a cloud server so that the cloud server can carry out signature verification on the parking image information and store the parking image information passing the signature verification into a block chain;
the method comprises the steps that a plurality of pieces of parking image information of a user terminal to be evaluated, which are stored in a block chain, are used for determining the abnormal parking probability of the user terminal to be evaluated so as to judge whether the user terminal to be evaluated is marked as a key monitoring terminal or not.
23. A vehicle parking image storage device based on a block chain is arranged on a cloud server, and the device comprises:
the system comprises an information receiving module, a data processing module and a data processing module, wherein the information receiving module is used for receiving signed parking image information of a target shared vehicle, the signed parking image information is obtained by a user terminal by utilizing a safety hardware module to sign the parking image information of the target shared vehicle based on a pre-generated private key, and the private keys are in one-to-one correspondence with the user terminal;
the signature verification module is used for performing signature verification on the signed parking image information by using a public key corresponding to the user terminal;
the information storage module is used for storing the parking image information into the block chain if the signature verification result is that the signature verification is passed; and determining the abnormal parking probability of the user terminal to be evaluated according to a plurality of parking image information of the user terminal to be evaluated, which is stored in the block chain, so as to judge whether the user terminal to be evaluated is marked as a key monitoring terminal.
24. A blockchain-based vehicle stop image storage system, comprising: the system comprises a user terminal and a cloud server, wherein the user terminal is provided with a safety hardware module;
the user terminal is used for acquiring parking image information of a target shared vehicle to be uploaded; the safety hardware module is used for carrying out signature processing on the docking image information based on a private key generated in advance to obtain the signed docking image information; uploading the signed docking image information to a cloud server, wherein the private keys correspond to the user terminals one to one;
the cloud server is used for receiving the signed parking image information of the target shared vehicle; utilizing a public key corresponding to the user terminal to perform signature verification on the signed parking image information; if the signature verification result is that the signature verification is passed, storing the parking image information into a block chain; and determining the abnormal parking probability of the user terminal to be evaluated according to a plurality of parking image information of the user terminal to be evaluated, which is stored in the block chain, so as to judge whether the user terminal to be evaluated is marked as a key monitoring terminal.
25. A block chain-based vehicle stop image storage apparatus comprising:
a processor; and a memory arranged to store computer executable instructions which, when executed, cause the processor to implement the blockchain-based vehicle parking image storage method of any one of the above claims 1 to 9.
26. A block chain-based vehicle stop image storage apparatus comprising:
a processor; and a memory arranged to store computer executable instructions that when executed cause the processor to implement the blockchain based vehicle stop image storage method of any one of the above claims 10 to 21.
27. A storage medium storing computer-executable instructions that, when executed, implement the block chain-based vehicle stop image storage method of any one of claims 1 to 9.
28. A storage medium storing computer-executable instructions that, when executed, implement the blockchain-based vehicle stop image storage method of any one of claims 10 to 21.
CN201910642549.3A 2019-07-16 2019-07-16 Vehicle parking image storage method, device and system based on block chain Active CN110445617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910642549.3A CN110445617B (en) 2019-07-16 2019-07-16 Vehicle parking image storage method, device and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910642549.3A CN110445617B (en) 2019-07-16 2019-07-16 Vehicle parking image storage method, device and system based on block chain

Publications (2)

Publication Number Publication Date
CN110445617A CN110445617A (en) 2019-11-12
CN110445617B true CN110445617B (en) 2022-05-03

Family

ID=68430364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910642549.3A Active CN110445617B (en) 2019-07-16 2019-07-16 Vehicle parking image storage method, device and system based on block chain

Country Status (1)

Country Link
CN (1) CN110445617B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113051418A (en) * 2019-12-27 2021-06-29 宇龙计算机通信科技(深圳)有限公司 Image source tracking method and device, storage medium and electronic equipment
CN113254947B (en) * 2020-02-13 2023-04-14 宁波吉利汽车研究开发有限公司 Vehicle data protection method, system, equipment and storage medium
CN111371559B (en) * 2020-02-27 2021-07-27 支付宝(杭州)信息技术有限公司 Material inventory data providing method, device and system based on block chain
CN113353022A (en) * 2020-03-05 2021-09-07 广州汽车集团股份有限公司 Vehicle anti-theft method and system and vehicle-mounted equipment
CN111815939A (en) * 2020-05-21 2020-10-23 摩拜(北京)信息技术有限公司 Parking control method for vehicle and electronic equipment
CN111400769A (en) * 2020-05-29 2020-07-10 支付宝(杭州)信息技术有限公司 Method, device and equipment for sending running state information of rented equipment
CN111784924B (en) * 2020-06-24 2022-03-29 摩拜(北京)信息技术有限公司 Parking control method of vehicle, electronic equipment and shared vehicle system
JP7494666B2 (en) 2020-09-09 2024-06-04 トヨタ自動車株式会社 Information management system, and in-vehicle device, mobile terminal, and image management server used therein
CN116781916B (en) * 2023-08-21 2023-11-17 北京中星微人工智能芯片技术有限公司 Vehicle image storage method, apparatus, electronic device, and computer-readable medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106898024A (en) * 2017-04-12 2017-06-27 上海量明科技发展有限公司 Shared vehicle parking monitoring and managing method, system and device
CN107786639A (en) * 2017-09-28 2018-03-09 山东鲁能智能技术有限公司 A kind of electric automobile networked system and its method of work based on block chain technology
JP7066366B2 (en) * 2017-10-17 2022-05-13 キヤノン株式会社 System and its method
CN109660350A (en) * 2018-10-31 2019-04-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109712392B (en) * 2018-12-29 2022-05-20 百度在线网络技术(北京)有限公司 Parking information processing method, device, equipment and storage medium based on block chain

Also Published As

Publication number Publication date
CN110445617A (en) 2019-11-12

Similar Documents

Publication Publication Date Title
CN110445617B (en) Vehicle parking image storage method, device and system based on block chain
CN111464980B (en) Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment
Petit et al. Pseudonym schemes in vehicular networks: A survey
Chuang et al. TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks
CN111917799B (en) Verification information-based and privacy data-based verification method, device and equipment
US11228438B2 (en) Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
CN111279310A (en) Vehicle-mounted equipment upgrading method and related equipment
CN108650220B (en) Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate
CN102694794B (en) A kind of scene information guard method for Android application program
CN110177088B (en) Temporary identity authentication method, device and system
CN104216907A (en) Method, device and system for providing database access control
CN111669408A (en) Identity registration and authentication method and device
CN112839040A (en) Identity authentication method, apparatus and medium
CN110365928A (en) A kind of Driving Test videotape storage means, apparatus and system based on block chain
EP3206329A1 (en) Security check method, device, terminal and server
Davydov et al. Accident detection in internet of vehicles using blockchain technology
CN112422270A (en) BC-LHE-based vehicle networking data sharing method and system
Hataba et al. Security and privacy issues in autonomous vehicles: A layer-based survey
CN109857769A (en) Drive slip control method, system, equipment and storage medium based on block chain
CN114091690A (en) Method for training federated learning model, method for calling federated learning model and federated learning system
CN113079511B (en) Method, device, vehicle and storage medium for sharing information between vehicles
CN113393237A (en) Secure payment method, positioning terminal, device, system and storage medium
KR102355918B1 (en) Method for providing electoric data using block-chain and system thereof
Feng et al. Autonomous vehicles' forensics in smart cities
CN116011028B (en) Electronic signature method, electronic signature device and electronic signature system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40017423

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant