Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Illegal evidence tracing system based on block chain

A traceability system and blockchain technology, applied in the field of information recording, can solve problems such as illegality, inability to trace videos or images, etc.

Pending Publication Date: 2021-07-06
重庆风云际会智慧科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a blockchain-based illegal evidence traceability system, which solves the technical problem that the existing technology cannot trace the leaked case-related videos or images

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal evidence tracing system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The embodiment is basically as attached figure 1 shown, including:

[0032] The collection module is used to collect original illegal evidence, which includes surveillance video and surveillance images;

[0033] The allocation module is used to obtain the progress information of the case, and distribute the original illegal evidence to the case nodes according to the progress information. The case nodes are public security nodes, procuratorate nodes and court nodes in the blockchain network;

[0034] The extraction module is used to extract the leaked original illegal evidence, which is recorded as the leaked illegal evidence, and the relationship between the change amount and time of the pixel set of the leaked illegal evidence is related to the case node;

[0035] The calculation module is used to obtain the original illegal evidence corresponding to the leaking illegal evidence, and obtain key information; and obtain multiple pairs of key frames from the leaking ill...

Embodiment 2

[0045] The only difference from Embodiment 1 is that before assigning the original illegal evidence according to the progress information, the distribution module adds the information of the person in charge to the original illegal evidence to obtain encrypted illegal evidence. In this embodiment, after receiving the calling instruction of the input original illegal evidence, the information of the person in charge corresponding to the calling instruction is obtained, and the original illegal evidence is extracted, and the variation of the pixel set in the original illegal evidence is changed according to the information of the person in charge. According to the relationship of time, the encrypted illegal evidence is obtained. When the original illegal evidence is leaked, the corresponding person in charge can be quickly found based on the information of the person in charge, which is conducive to accurate traceability. At the same time, the distribution module uses the hash a...

Embodiment 3

[0048] The only difference from Embodiment 2 is that in this embodiment, for collecting the original illegal evidence, the technical idea of ​​"photographing first, then deleting" is adopted, that is to say, the surveillance video is collected first, and then the surveillance video is captured. Surveillance images that do not meet the requirements are deleted. It should be noted that, technically speaking, surveillance video is composed of several surveillance images. Specifically, in this embodiment, firstly, the monitoring video is collected by the camera; then, the image data of the monitoring image with the preset frame number in the monitoring video is extracted, and the monitoring image with the preset frame number in the monitoring video is detected by image recognition technology. Whether the image data of the image changes: If the image data of the surveillance image with the preset number of frames changes, an evidence electronic stamp is generated according to the su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information recording, in particular to an illegal evidence tracing system based on a block chain, and the system comprises a collection module which is used for collecting original illegal evidence; a distribution module, which is used for acquiring progress information of the case and distributing the original illegal evidence to case nodes according to the progress information, wherein the case nodes are a public security node, a procuratorial hospital node and a court node in the block chain network; an extraction module, which is used for extracting the leaked original illegal evidence and recording the leaked original illegal evidence as a leakage illegal evidence; a calculation module, which is used for acquiring original illegal evidences corresponding to the secret leakage illegal evidences to obtain key information, and obtaining a plurality of pairs of key frames from the secret leakage illegal evidence according to the key information, and calculating a time difference value corresponding to each pair of key frames; a processing module, which is used for obtaining a divulged case node according to the time difference value and tracing divulged illegal evidence. The technical problem that leaked videos or images related to cases cannot be traced in the prior art is solved.

Description

technical field [0001] The invention relates to the technical field of information recording, in particular to a blockchain-based illegal evidence traceability system. Background technique [0002] With the development of society and economy, the living standards of the people have gradually improved, and the awareness of the legal system has become stronger and stronger. The vast majority of the people will consciously abide by the law, but there are still illegal and criminal acts. For the handling of illegal and criminal cases, the collection and storage of evidence is particularly important. In the corresponding investigation, prosecution, and trial processes, the responsible agencies corresponding to each process node, such as public security organs, procuratorates, and courts, are responsible for the investigation. The relevant evidence of the process is preserved and managed by itself, which may cause information deviations between different departments, and is not co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06Q50/18G06Q50/26H04L9/32
CPCG06F21/602G06F21/6218G06Q50/18G06Q50/26H04L9/3239H04L9/50
Inventor 苏远超王宇骁王学春熊倩王政张志亮
Owner 重庆风云际会智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products