CN109040783A - A kind of video anti-counterfeiting system, method and device - Google Patents
A kind of video anti-counterfeiting system, method and device Download PDFInfo
- Publication number
- CN109040783A CN109040783A CN201811057951.7A CN201811057951A CN109040783A CN 109040783 A CN109040783 A CN 109040783A CN 201811057951 A CN201811057951 A CN 201811057951A CN 109040783 A CN109040783 A CN 109040783A
- Authority
- CN
- China
- Prior art keywords
- node
- section
- video flowing
- video
- check value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/23418—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/44008—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Abstract
This application provides a kind of video anti-counterfeiting systems, method and device, are related to technical field of data processing, which includes: first node, at least one second node and third node;Wherein, first node, for obtaining video flowing and being segmented to video flowing;N section video flowing to obtain after segmentation generates the first check value respectively;Selected second node, for receiving and recording i-th section of video flowing and corresponding first check value;Third node generates corresponding second check value of i-th section of video flowing;When it is inconsistent for detecting corresponding first check value of i-th section of video flowing the second check value corresponding with i-th section of video flowing, determine that the i-th section of video flowing obtained from j-th of selected second node is tampered.The problem of the application judges the true and false of video by check value, alleviates complex steps in video authenticity identification in the prior art.
Description
Technical field
This application involves technical field of data processing, in particular to a kind of video anti-counterfeiting system, method and device.
Background technique
With the development of network technology, store the safety of information more and more attention has been paid to and pay attention to, although can pass through
Internet facilitates the various data (picture, video, music etc.) of storage, but the safety of these data still needs these third parties
Guaranteeing, internet itself does not have the mechanism of value protection, and if the information of these need for confidentiality is leaked, and then quilt
It distorts, just not can guarantee the safety and authenticity of these information more.
Recently, growing stronger day by day with the universal of digital camera equipment, the reduction of carrying cost and software for editing, number
Video is increasingly becoming people and protects stored important means, but the true and false of video information is by judging each frame image at present
In information be compared, and then whether judgment frame video is changed, and step is relatively complicated.
But most video tampering detection algorithms can only be detected for one kind mode of distorting in practical operation, be usurped when a variety of
Change when distorting information jointly, can not one-time detection go out authenticity so that the step of authenticity identification of video is relatively complicated.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of video log anti-counterfeiting system, method and device, make
The process for obtaining video authenticity identification is no longer complicated.
In a first aspect, the embodiment of the present application provides a kind of video anti-counterfeiting system, comprising: first node, at least one
Two nodes and third node;Wherein, first node, for obtaining video flowing and being segmented to video flowing;To be obtained after segmentation
To N section video flowing generate the first check value respectively, N is positive integer;Selected second is filtered out from least one second node
Node, and i-th section of video flowing and corresponding first verification of i-th section of video flowing in N sections of video flowings are sent to selected second node
Value, i are any positive integer less than or equal to N;Selected second node, for receiving and recording i-th section of video flowing and correspondence
The first check value, and other nodes into video anti-counterfeiting system send the first instruction message, and the first instruction message is for referring to
Show that selected second node record has i-th section of video flowing and corresponding first check value;Third node is used for from selected second section
I-th section of video flowing and corresponding first check value in N sections of video flowings are obtained at j-th of selected second node in point;It generates
Corresponding second check value of i-th section of video flowing;When detecting corresponding first check value of i-th section of video flowing and i-th section of video flowing
When corresponding second check value is inconsistent, determine that the i-th section of video flowing obtained from j-th of selected second node is tampered, j
For positive integer.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein the
One node is specifically used for when filtering out selected second node from least one second node:
Send the second instruction message respectively at least one second node, the second instruction message be used to indicate at least one
Two nodes provide i-th section of video flowing corresponding proof of work respectively;It is corresponding that different second nodes calculates i-th section of video flowing
The difficulty of proof of work is different.
The second node for successfully calculating the corresponding proof of work of i-th section of video flowing is determined as selected second node.
With reference to first aspect, the embodiment of the present application provides second of possible embodiment of first aspect, wherein choosing
Determine second node, be also used to: recording selected second node and be directed to the historical operation that i-th section of video flowing is carried out, and generate log
Information, log information include the historical operation information that i-th section of video flowing is carried out;Third node, is also used to: determining i-th
After section video flowing is tampered, j-th of selected second node into selected second node sends third instruction message, and third refers to
Show that message is used to indicate the i-th section of video flowing obtained from j-th of selected second node and is tampered;J-th of selected second node,
It is also used to: when receiving third instruction message, when determining that i-th section of video flowing is tampered, i-th section of view being inquired according to log information
The concrete operations that frequency stream is tampered.
With reference to first aspect, the embodiment of the present application provides the third possible embodiment of first aspect, wherein the
Three nodes, are also used to: after determining that the i-th section of video flowing obtained from j-th of selected second node is tampered, from selected second
Other selected second nodes in node in addition to j-th of selected second node obtain i-th section of video flowing.
With reference to first aspect, the embodiment of the present application provides the 4th kind of possible embodiment of first aspect, first segment
Point is specifically used for when the N section video flowing obtained after for segmentation generates the first check value respectively: in N sections of video flowings i-th
Section video flowing generates corresponding first check value of i-th section of video flowing according to specified hash function corresponding with i-th section of video flowing;
Wherein, corresponding first check value of i-th section of video flowing is used for the unique identification whether being tampered as i-th section of video flowing of identification.
Second aspect, the embodiment of the present application also provide a kind of video anticounterfeiting method, wherein the described method includes:
First node obtains video flowing and is segmented to video flowing;First node is the N section video flowing obtained after being segmented
The first check value is generated respectively, and N is positive integer;First node filters out selected second node from least one second node,
And i-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings, i are sent to selected second node
For any positive integer less than or equal to N, wherein selected second node be used to provide to third node i-th section of video flowing and
Corresponding first check value, third node is that the second check value is generated based on i-th section of video flowing, and based on the first check value and the
The node of two check values progress video anti-counterfeiting.
The third aspect, the embodiment of the present application also provide a kind of video anticounterfeiting method, wherein the described method includes: selected the
Two nodes receive i-th section of video flowing and corresponding first verification of i-th section of video flowing in the N section video flowing that first node is sent
Value;Other nodes of the selected second node into video anti-counterfeiting system send the first instruction message, and the first instruction message is for referring to
Show that selected second node record has i-th section of video flowing and corresponding first check value;Selected second node receives third section
After the acquisition request that point is sent, i-th section of video flowing and corresponding first check value are sent to third node;Third node is
The second check value is generated based on i-th section of video flowing, and carries out the node of video anti-counterfeiting based on the first check value and the second check value.
Fourth aspect, the embodiment of the present application also provide a kind of video anticounterfeiting method, wherein the described method includes: third section
Point is from obtaining i-th section of video flowing and corresponding the in N sections of video flowings from j-th of selected second node in selected second node
One check value;Third node generates corresponding second check value of i-th section of video flowing;Third node, which is worked as, detects i-th section of video flowing
When corresponding first check value the second check value corresponding with i-th section of video flowing is inconsistent, determine from j-th of selected second section
The i-th section of video flowing obtained at point is tampered.
5th aspect, the embodiment of the present application also provide a kind of video anti-counterfeiting device, in which:
Module is obtained, for obtaining video flowing and being segmented to the video flowing;
Generation module, for generating the first check value respectively for obtained N section video flowing after segmentation, N is positive integer;
Sending module selectes second for filtering out selected second node from least one second node, and to described
Node sends i-th section of video flowing and corresponding first check value of i-th section of video flowing in the N sections of video flowing, and i is small
In or equal to N any positive integer, wherein the selected second node be used to provide to third node i-th section of video flowing,
And corresponding first check value, the third node are the second check value to be generated based on i-th section of video flowing, and be based on institute
It states the first check value and second check value carries out the node of video anti-counterfeiting.
6th aspect, the embodiment of the present application also provide a kind of video anti-counterfeiting device, in which:
Receiving module, for receiving i-th section of video flowing and i-th section of view in the N section video flowing that first node is sent
Frequency flows corresponding first check value;
First sending module, for into video anti-counterfeiting system other nodes send the first instruction message, described first
Instruction message, which is used to indicate the selected second node record, i-th section of video flowing and corresponding first check value;
Second sending module sends institute to the third node after receiving the acquisition request that third node is sent
State i-th section of video flowing and corresponding first check value;The third node is to generate second based on i-th section of video flowing
Check value, and the node based on first check value and second check value progress video anti-counterfeiting.
7th aspect, the embodiment of the present application also provide a kind of video anti-counterfeiting device, in which:
Module is obtained, for obtaining i-th in N sections of video flowings from from j-th of selected second node in selected second node
Section video flowing and corresponding first check value;
Generation module, for generating corresponding second check value of i-th section of video flowing;
Determining module detects corresponding first check value of i-th section of video flowing and i-th section of video flowing for working as
When corresponding second check value is inconsistent, the i-th section of video flowing obtained from described j-th selected second node is determined
It is tampered.
Eighth aspect, the embodiment of the present application also provide a kind of electronic equipment, wherein processor, memory and bus, storage
Device is stored with the executable machine readable instructions of processor, when electronic equipment operation, by total between processor and memory
The step of line communicates, and the video anticounterfeiting method as described in second aspect is executed when machine readable instructions are executed by processor, alternatively,
The step of video anticounterfeiting method as described in the third aspect, alternatively, the step of video anticounterfeiting method as described in fourth aspect.
A kind of video provided by the embodiments of the present application and the anti-fake method, apparatus and system of log, the system pass through first
Node generates i-th section of video flowing and corresponding first check value, is received by selected second node and records i-th section of video flowing
And corresponding first check value;Third node, that is, accessed node generates corresponding second check value of i-th section of video flowing;Third section
It puts when it is inconsistent for detecting corresponding first check value of i-th section of video flowing the second check value corresponding with i-th section of video flowing,
Determine that the i-th section of video flowing obtained is tampered.Whether the application unanimously judges to regard by the first check value and the second check value
The true and false of frequency stream, and the specifying information that video flowing needs to analyze video flowing frame image in the prior art could judge the true of video flowing
The problem of reality, present application addresses complex steps present in existing video flowing identification of means, also, can also be promoted to view
Frequency flows the accuracy rate of authenticity.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of structure chart of video anti-counterfeiting system provided by the embodiment of the present application;
Fig. 2 shows a kind of signals of the process of video anti-counterfeiting system interaction process provided by the embodiment of the present application;
Fig. 3 shows a kind of flow diagram of video anticounterfeiting method provided by the embodiment of the present application;
Fig. 4 shows the flow diagram of another kind video anticounterfeiting method provided by the embodiment of the present application;
Fig. 5 shows the flow diagram of another kind video anticounterfeiting method provided by the embodiment of the present application;
Fig. 6 shows a kind of structural schematic diagram of video anti-counterfeiting device provided by the embodiment of the present application;
Fig. 7 shows the structural schematic diagram of another kind video anti-counterfeiting device provided by the embodiment of the present application;
Fig. 8 shows the structural schematic diagram of another kind video anti-counterfeiting device provided by the embodiment of the present application;
Fig. 9 shows the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present application.
It illustrates:
601- obtains module;602- generation module;603- sending module;701- receiving module;The first sending module of 702-;
The second sending module of 703-;801- obtains module;802- generation module;803- determining module;901- processor;902- storage
Device;903- bus.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real
The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings
The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application
Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work
There are other embodiments, shall fall in the protection scope of this application.
Currently, popularizing with camera-shooting and recording device, digital video becomes people and protects stored means, but video is true at present
The method of puppet judgement is relatively complicated.Based on this, a kind of video log anti-counterfeiting system provided by the present application, method and device can be with
The problem of alleviating complex steps in video authenticity identification in the prior art.
For convenient for understanding the present embodiment, first to the anti-fake system of a kind of video log disclosed in the embodiment of the present application
System describes in detail:
Embodiment one:
The embodiment of the present application provides a kind of video anti-counterfeiting system, and above-mentioned video anti-counterfeiting system uses block chain technology, leads to
It crosses and builds meshed network composition block chain network on multiple servers in internet, node refers to the clothes in block chain network
Business device.It can be communicated based on application layer protocol between node, the communication protocol used for example, hypertext transfer protocol
(HyperText Transfer Protocol, HTTP), File Transfer Protocol (File Transfer Protocol, FTP) and
Transmission control protocol (Transmission Control Protocol, TCP) etc..Pass through domain name system (Domain Name
System, DNS) it seed, node seed and enumerates the mode of specified network segment and realizes bootstrapping and interconnection, so that each section built
Message can be sent and received mutually between point.
It is a kind of structure chart of video anti-counterfeiting system provided by the embodiments of the present application, comprising: first segment shown in referring to Fig.1
Point, at least one second node and third node.Wherein, first node, at least one second node and third node be simultaneously
Not limiting is fixed node, and each node in block chain network built all can serve as first node therein,
Two nodes and third node.Specifically, first node is the server for obtaining Video stream information, first node can will be acquired
Video flowing be segmented, the video flowing after segmentation and the Video stream information after segmentation can also be sent to second node;
Second node can be as memory segment after video flowing and the Video stream information after corresponding segmentation server, second
The storage information of video flowing after memory segment and the Video stream information after corresponding segmentation can be sent to entirely by node
At other nodes in block chain network;Selected second section of the third node as access server, in access second node
After putting and getting specified section video flowing and corresponding specified section Video stream information, it can be determined that specified section Video stream information
The true and false, when judging that the specified section video information got from selected second node is tampered, third node is according to storage information
Find the specified section Video stream information being not tampered in addition to selected second node.
In order to which the interactive process of video anti-counterfeiting system interior joint is better described, Fig. 2 shows a kind of video anti-counterfeiting systems
The flow diagram of interactive process, wherein the following steps are included:
Step S202, first node obtain video flowing and are segmented to video flowing;For the N section video flowing obtained after segmentation
The first check value is generated respectively, and N is positive integer.
The video flowing that first node obtains can be to be obtained from camera-shooting and recording device, is also possible to store video flowing from other
Terminal in obtain.After first node obtains video flowing, by analyzing the information of video flowing, if acquired video flowing
Size be more than preset value, just acquired video flowing is compressed, video flowing is segmented after compression, make every section view
The size of frequency stream meets preset value, and every section of video flowing that size can be met preset value by first node generates corresponding first school
Test value.
Specifically, first node can generate the first verification corresponding with i-th section of video flowing according to specified hash function
Value, wherein the unique identification whether corresponding first check value of i-th section of video flowing is tampered as i-th section of video flowing of identification.
Wherein, hash function is the output by hashing algorithm by Input transformation at regular length, which is exactly to hash
Value.Briefly hash function is exactly a kind of function of the message compression by random length to a certain regular length.First node
Corresponding first check value of i-th section of video flowing is generated by specified hash function, this specifies hash function such as: MD5
(Message-Digest Algorithm, Message Digest 5), wherein the eap-message digest of MD5 file is exactly to pass through Hash letter
What number was calculated.Regardless of file size, its hash function calculate the result is that the numerical value of a regular length, MD5
This hash function is an irreversible one-way function.Such as the byte serial of random length is mapped as a 128bit by MD5
Numerical value, be highly difficult by the anti-original character string that pushes away of the numerical value of this 128bit, even if obtaining source program and algorithm, also without
The value of one MD5 is switched back to original character string by method.This specifies hash function for another example: SHA (Secure Hash
Algorithm, secure hash algorithm), this secure hash algorithm, which can calculate, to be arrived corresponding to a digital massage, and length is solid
Fixed eap-message digest, and if input message it is different, the probability of corresponding kinds of characters string is very high.
Using highly-safe hash algorithm, when such as MD5, SHA, two different files are almost impossible obtain it is identical
Hash result.Therefore, video flowing is indicated using the first check value that above-mentioned hash function generates, once video flowing is modified,
It will be detected.
Step S204, first node filter out selected second node from least one second node, and to selected second
Node sends i-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings, and i is less than or equal to N
Any positive integer.
Specifically, first node, when filtering out selected second node from least one second node, can first to
At least one second node sends the second instruction message respectively, and the second instruction message indicates that at least one second node provides respectively
The corresponding proof of work of i-th section of video flowing;Different second nodes calculates the difficulty of the corresponding proof of work of i-th section of video flowing
Degree is different.The second node for successfully calculating the corresponding proof of work of i-th section of video flowing is determined as selected second node.
Wherein, proof of work refers to the proof of workload, and proof of work is that second node is required to carry out some time-consumings
Complex calculation appropriate is simultaneously sent to first node, and answer can quickly be checked by first node, and first node can basis
Second node amount of calculation proves the consumed time etc., and selected second node is selected from from second node and stores i-th section
Video stream information and corresponding first check value.Time, equipment and the energy of consumption can be remembered as Cost of Guarantee, first node
Recording second node amount of calculation proves the information of consumed time, equipment and the energy, to ensure that selected second node is to need
I-th section of Video stream information and corresponding first check value are wanted, simultaneously because providing i-th section of Video stream information and corresponding first
Be to the loss of equipment, time and the energy when proof of work of check value it is very big, first node can select equipment, the time and
The loss of the energy all maximum selected second node stores i-th section of Video stream information and corresponding first check value, workload
Proof ensure that selected second node will not distort i-th section of video flowing letter after obtaining i-th section of Video stream information from first node
Breath, because in this case, the loss to equipment, time and the energy is huge, even if this selected second node is distorted
I-th section of Video stream information, third node also can judge i-th section of video by the second check value of generation in access later
Stream information is tampered.
Wherein, selected second node is at least two second node, in this way when selected second node corresponding one
The video flowing that a server occurs in delay machine or one of them selected corresponding server of second node is tampered, and can also be protected
The integrality and authenticity of the i-th section of Video stream information recorded in card block chain network.
The difficulty that different second nodes calculates the corresponding proof of work of i-th section of video flowing is different, proof of work
What difficulty can be adjusted according to previous piece of time-consuming dynamic, the difficulty that proof of work generates can reflect in block chain network
The quantity of second node adjusts the redundancy backup number of every section of video flowing according to the number of nodes in network, but should at least have one
The node of backup, i.e., selected second node is at least two.Successfully calculate the of the corresponding proof of work of i-th section of video flowing
Two nodes can be determined as selected second node by first node.
Step S206, selected second node receive and record i-th section of video flowing and corresponding first check value, and to view
Other nodes in frequency anti-counterfeiting system send the first instruction message, and the first instruction message indicates that selected second node record has i-th
Section video flowing and corresponding first check value.
Selected second node sends the first instruction message and stores information other nodes into block chain network, stores information
The position of title including every section of video flowing, the size of every section of video and selected second node, so that its in block chain network
His node can find corresponding selected second node when inquiring or accessing i-th section of video flowing.
Specifically, selected second node can also record selected second node and be directed to the history that i-th section of video flowing is carried out
Operation, and log information is generated, log information includes the historical operation information that i-th section of video flowing is carried out.
Step S208, third node obtain in N sections of video flowings from from j-th of selected second node in selected second node
I-th section of video flowing and corresponding first check value.
The first instruction message that third node is sent according to selected second node finds i-th section of video flowing of storage and the
The selected second node of j-th of one check value, j-th of selected second node are any one storages i-th in selected second node
The node of section video flowing and the first check value.
Step S210, third node generate corresponding second check value of i-th section of video flowing.
I-th section of video flowing that third node will acquire generates corresponding second check value of i-th section of video flowing, the second verification
The principle of the generating process of value and the generating process of the first check value be it is identical, may refer to description above here.
Step S212, when third nodal test is corresponding with i-th section of video flowing to corresponding first check value of i-th section of video flowing
The second check value be it is inconsistent when, determine from j-th of selected second node obtain i-th section of video flowing be tampered, j is positive
Integer.
When third nodal test goes out corresponding first check value of i-th section of video flowing the second school corresponding with i-th section of video flowing
It tests value to be consistent, then can determine acquisition is i-th section of video flowing being not tampered with.
When third nodal test goes out corresponding first check value of i-th section of video flowing the second school corresponding with i-th section of video flowing
Test value be it is inconsistent, then can determine acquisition is i-th section of video flowing being tampered.Further, third node sends the
Three instruction messages obtain i-th section of video at j-th of selected second node to other nodes in block chain network, other nodes
The message that stream is tampered.
Further, when j-th of selected second node receives third instruction message, j-th of selected second node is also
J-th of selected second node can be searched and be directed to the log information that i-th section of video flowing generates, log information includes i-th section of view
Frequency flows carried out historical operation information, inquires the time and specific operation information that i-th section of video flowing is tampered.
Step S214, third node determine that the i-th section of video flowing obtained from j-th of selected second node is tampered it
Afterwards, other selected second nodes from selected second node in addition to j-th of selected second node obtain i-th section of video flowing.
In the embodiment of the present application, the selected second node more than one of i-th section of video flowing is stored in second node due to selecting
It is a, therefore the i-th section of video flowing obtained at j-th of selected second node, after be tampered, third node can also be from block chain
Storage information in network, which inquires, is stored with the other of i-th section of video flowing and corresponding first check value of i-th section of video flowing
Selected second node, so from except j-th of selected second node in addition to other selected second nodes obtain i-th section of video
Stream, and the second new check value of corresponding i-th section of video flowing is generated again, third node compares new the second check value and first
Check value, when detecting that the second new check value is consistent with the first check value, i-th section of video flowing is not tampered with, to guarantee
Three nodes apply i-th section of video flowing.
Embodiment two:
The embodiment of the present application also provides a kind of video anticounterfeiting method, and in order to be better described, Fig. 3 shows a kind of video
The flow diagram of method for anti-counterfeit, steps are as follows:
Step S302, first node obtain video flowing and are segmented to video flowing;First node is the N obtained after being segmented
Section video flowing generates the first check value respectively, and N is positive integer.
Step S304, first node filter out selected second node from least one second node.
Step S306, first node send i-th section of video flowing and i-th section of view in N sections of video flowings to selected second node
Frequency flows corresponding first check value, and i is any positive integer less than or equal to N, wherein selected second node is used for third section
Point provides i-th section of video flowing and corresponding first check value, and third node is that the second verification is generated based on i-th section of video flowing
Value, and the node based on the first check value and the second check value progress video anti-counterfeiting.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description method
Specific work process, can be with reference to the corresponding process of system in previous embodiment, and details are not described herein.
Embodiment three:
The embodiment of the present application also provides a kind of video anticounterfeiting method, and in order to be better described, Fig. 4 shows another view
The flow diagram of frequency method for anti-counterfeit, steps are as follows:
Step S402 selectes second node and receives i-th section of video flowing and i-th in the N section video flowing that first node is sent
Corresponding first check value of section video flowing.
Step S404, other nodes transmission first instruction message of the selected second node into video anti-counterfeiting system, first
Instruction message, which is used to indicate selected second node record, i-th section of video flowing and corresponding first check value.
Step S406 after selected second node receives the acquisition request of third node transmission, sends i-th to third node
Section video flowing and corresponding first check value;Third node is to generate the second check value based on i-th section of video flowing, and be based on
First check value and the second check value carry out the node of video anti-counterfeiting.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description method
Specific work process, can be with reference to the corresponding process of system in previous embodiment, and details are not described herein.
Example IV:
The embodiment of the present application also provides another video anticounterfeiting method, and in order to be better described, Fig. 5 shows another kind
The flow diagram of video anticounterfeiting method, steps are as follows:
Step S502, third node obtain in N sections of video flowings from from j-th of selected second node in selected second node
I-th section of video flowing and corresponding first check value.
Step S504, third node generate corresponding second check value of i-th section of video flowing.
Step S506, third node, which is worked as, detects that corresponding first check value of i-th section of video flowing is corresponding with i-th section of video flowing
The second check value be it is inconsistent when, determine from j-th of selected second node obtain i-th section of video flowing be tampered.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description method
Specific work process, can be with reference to the corresponding process of system in previous embodiment, and details are not described herein.
Embodiment five:
The embodiment of the present application also provides a kind of video anti-counterfeiting device, is a kind of knot of video anti-counterfeiting device as shown in Figure 6
Structure schematic diagram is wherein:
Module 601 is obtained, for obtaining video flowing and being segmented to the video flowing;
Generation module 602, for generating the first check value respectively for obtained N section video flowing after segmentation, N is positive integer;
Sending module 603, for filtering out selected second node from least one second node, and to described selected the
Two nodes send i-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings, and i is to be less than or wait
In any positive integer of N, wherein selected second node provides i-th section of video flowing and corresponding first verification to third node
Value, third node are the second check value to be generated based on i-th section of video flowing, and regarded based on the first check value and the second check value
Frequently anti-fake node.
The embodiment of the present application is a kind of video anti-counterfeiting device based on the composition of server corresponding to first node, including is obtained
Modulus block 601, generation module 602 and sending module 603, obtaining module 601 is that video anti-counterfeiting device is used to obtain video flowing
Module, generation module 602 are mainly that video anti-counterfeiting device is each for generating correspondence for each section of video flowing in N sections of video flowings
The module of first check value of section video flowing, sending module 603 are to send i-th section of video flowing and i-th section in N sections of video flowings
Corresponding first check value of video flowing gives selected second node, selectes second node more than one, so corresponding send i-th section
The movement of video flowing is more than one.
Embodiment six:
The embodiment of the present application also provides a kind of video anti-counterfeiting device, is a kind of knot of video anti-counterfeiting device as shown in Figure 7
Structure schematic diagram is wherein:
Receiving module 701, for receiving i-th section of video flowing and described i-th in the N section video flowing that first node is sent
Corresponding first check value of section video flowing;
First sending module 702 sends the first instruction message for other nodes into video anti-counterfeiting system, and described the
One instruction message, which is used to indicate the selected second node record, i-th section of video flowing and corresponding first check value;
Second sending module 703 is sent after receiving the acquisition request that third node is sent to the third node
I-th section of video flowing and corresponding first check value;The third node is to generate the based on i-th section of video flowing
Two check values, and the node based on first check value and second check value progress video anti-counterfeiting.
The embodiment of the present application is a kind of video anti-counterfeiting device based on the composition of server corresponding to selected second node, packet
Include receiving module 701, the first sending module 702 and the second sending module 703.Since the device solution in the embodiment of the present application is asked
The principle of topic is similar to the selected second node in video anti-counterfeiting system in the embodiment of the present application one, therefore the implementation of device can be with
Referring to the implementation of system, overlaps will not be repeated.
Embodiment seven:
The embodiment of the present application also provides a kind of video anti-counterfeiting device, is a kind of knot of video anti-counterfeiting device as shown in Figure 8
Structure schematic diagram, in which:
Module 801 is obtained, for obtaining in N sections of video flowings from from j-th of selected second node in selected second node
I-th section of video flowing and corresponding first check value.
Generation module 802, for generating corresponding second check value of i-th section of video flowing.
Determining module 803 detects corresponding first check value of i-th section of video flowing and described i-th section view for working as
Frequency flow corresponding second check value be it is inconsistent when, determine from described j-th selected second node obtain it is described i-th section view
Frequency stream is tampered.
Based on the same inventive concept, video anti-counterfeiting dress corresponding with video anticounterfeiting method is additionally provided in the embodiment of the present application
It sets, since the principle that the device in the embodiment of the present application solves the problems, such as is similar to the above-mentioned video anticounterfeiting method of the embodiment of the present application,
Therefore the implementation of device may refer to the implementation of method and system, and overlaps will not be repeated.
Embodiment eight:
The embodiment of the present application also provides a kind of electronic equipment, the structural schematic diagram of a kind of electronic equipment referring to shown in Fig. 9,
Wherein, processor 901, memory 902 and bus 903, memory 902 are stored with the executable machine readable finger of processor 901
It enables, when electronic equipment operation, is communicated between processor 901 and memory 902 by bus 903, machine readable instructions are located
The step of executing the video anticounterfeiting method as described in embodiment two when device executes is managed, alternatively, the video as described in embodiment three is anti-
The step of the step of fake method, video anticounterfeiting method as described in example IV.
Wherein, memory 902 may include high-speed random access memory (RAM, Random Access Memory),
It may further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Bus
903 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..
Wherein, memory 902 is for storing program, and the processor 901 executes the journey after receiving and executing instruction
Sequence, method performed by the device that the flowchart process that aforementioned any embodiment of the embodiment of the present invention discloses defines can be applied to locate
It manages in device 901, or realized by processor 901.
Processor 901 may be a kind of IC chip, the processing capacity with signal.It is above-mentioned during realization
Each step of method can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.On
The processor 901 stated can be general processor, including central processing unit (Central Processing Unit, abbreviation
CPU), network processing unit (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital
Signal Processing, abbreviation DSP), specific integrated circuit (Application Specific Integrated
Circuit, abbreviation ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or
Person other programmable logic device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute sheet
Disclosed each method, step and logic diagram in inventive embodiments.General processor can be microprocessor or the processing
Device is also possible to any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in
Hardware decoding processor executes completion, or in decoding processor hardware and software module combination execute completion.Software mould
Block can be located at random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable storage
In the storage medium of this fields such as device, register maturation.The storage medium is located at memory 902, and processor 901 reads memory
Information in 902, in conjunction with the step of its hardware completion above method.
The computer program product of a kind of video log anti-counterfeiting system, method and device provided by the embodiment of the present application,
Computer readable storage medium including storing program code, the instruction that said program code includes can be used for executing front side
Method method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application
In provided several embodiments, it should be understood that disclosed systems, devices and methods, it can be real by another way
It is existing.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic function
It can divide, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can collect
At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling
Conjunction or direct-coupling or communication connection can be the indirect coupling or communication connection by some communication interfaces, device or unit,
It can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words
The form of product embodies, which is stored in a storage medium, including some instructions use so that
One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application
State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only
Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit
Store up the medium of program code.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application
Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen
It please be described in detail, those skilled in the art should understand that: anyone skilled in the art
Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application
Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
Claims (10)
1. a kind of video anti-counterfeiting system characterized by comprising first node, at least one second node and third section
Point;Wherein,
The first node, for obtaining video flowing and being segmented to the video flowing;For the N section video flowing obtained after segmentation
The first check value is generated respectively, and N is positive integer;Filter out selected second node from least one second node, and to described
Selected second node sends i-th section of video flowing and corresponding first verification of i-th section of video flowing in the N sections of video flowing
Value, i are any positive integer less than or equal to N;
The selected second node, for receiving and recording i-th section of video flowing and corresponding first check value, and to institute
It states other nodes in video anti-counterfeiting system and sends the first instruction message, first instruction message is used to indicate described selected the
Two nodes records have i-th section of video flowing and corresponding first check value;
The third node, for obtaining the N sections of video from j-th of selected second node in the selected second node
I-th section of video flowing and corresponding first check value in stream;Generate corresponding second check value of i-th section of video flowing;Work as inspection
It is inconsistent for measuring corresponding first check value of i-th section of video flowing the second check value corresponding with i-th section of video flowing
When, determine that the i-th section of video flowing obtained from described j-th selected second node is tampered, j is positive integer.
2. system according to claim 1, which is characterized in that the first node, from least one second node
When filtering out the selected second node, it is specifically used for:
The second instruction message is sent respectively at least one described second node, and second instruction message is used to indicate at least one
A second node provides i-th section of video flowing corresponding proof of work respectively;Different second nodes calculates described i-th section
The difficulty of the corresponding proof of work of video flowing is different.
The second node for successfully calculating the corresponding proof of work of i-th section of video flowing is determined as selected second section
Point.
3. system according to claim 1, which is characterized in that the selected second node is also used to:
It records the selected second node and is directed to the historical operation that i-th section of video flowing is carried out, and generate log information, institute
Stating log information includes the historical operation information that i-th section of video flowing is carried out;
The third node, is also used to:
Described j-th selected second section after determining that i-th section of video flowing is tampered, into the selected second node
Point sends third instruction message, and the third instruction message is used to indicate the institute obtained from described j-th selected second node
I-th section of video flowing is stated to be tampered;
J-th of selected second node, is also used to:
When receiving the third instruction message, when determining that i-th section of video flowing is tampered, inquired according to the log information
The concrete operations being tampered to i-th section of video flowing.
4. system according to claim 1, which is characterized in that the third node is also used to:
After determining that the i-th section of video flowing obtained from described j-th selected second node is tampered, from described selected the
Other selected second nodes in two nodes in addition to described j-th selected second node obtain i-th section of video flowing.
5. system according to claim 1, which is characterized in that the first node, the N section video obtained after for segmentation
When stream generates the first check value respectively, it is specifically used for:
It is raw according to specified hash function corresponding with i-th section of video flowing for i-th section of video flowing in the N sections of video flowing
At corresponding first check value of i-th section of video flowing;Wherein, corresponding first check value of i-th section of video flowing is for making
The unique identification whether being tampered for identification i-th section of video flowing.
6. a kind of video anticounterfeiting method, which is characterized in that the described method includes:
First node obtains video flowing and is segmented to the video flowing;
First node is that the N section video flowing obtained after being segmented generates the first check value respectively, and N is positive integer;
First node filters out selected second node from least one second node, and sends institute to the selected second node
I-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings are stated, i is less than or equal to N's
Any positive integer, wherein the selected second node is used to provide i-th section of video flowing and corresponding to third node
First check value, the third node are the second check value to be generated based on i-th section of video flowing, and verify based on described first
Value and second check value carry out the node of video anti-counterfeiting.
7. a kind of video anticounterfeiting method, which is characterized in that the described method includes:
Selected second node receives i-th section of video flowing and i-th section of video flowing in the N section video flowing that first node is sent
Corresponding first check value;
Other nodes of the selected second node into video anti-counterfeiting system send the first instruction message, and first instruction message is used
There are i-th section of video flowing and corresponding first check value in the instruction selected second node record;
After selected second node receives the acquisition request of third node transmission, i-th section of view is sent to the third node
Frequency stream and corresponding first check value;The third node be based on i-th section of video flowing generate the second check value, and
The node of video anti-counterfeiting is carried out based on first check value and second check value.
8. a kind of video anticounterfeiting method, which is characterized in that the method also includes:
Third node from from j-th of selected second node in selected second node obtain N sections of video flowings in i-th section of video flowing with
And corresponding first check value;
Third node generates corresponding second check value of i-th section of video flowing;
Third node is when detecting corresponding first check value of i-th section of video flowing corresponding with i-th section of video flowing the
When two check values are inconsistent, determine that the i-th section of video flowing obtained from described j-th selected second node is tampered.
9. a kind of video anti-counterfeiting device, which is characterized in that described device includes:
Obtain module, for from from j-th of selected second node in selected second node obtain N section video flowings in i-th section regard
Frequency stream and corresponding first check value;
Generation module, for generating corresponding second check value of i-th section of video flowing;
Determining module detects that corresponding first check value of i-th section of video flowing is corresponding with i-th section of video flowing for working as
The second check value be it is inconsistent when, determine from described j-th selected second node obtain i-th section of video flowing usurped
Change.
10. a kind of electronic equipment characterized by comprising processor, memory and bus, the memory are stored with described
The executable machine readable instructions of processor, when electronic equipment operation, by total between the processor and the memory
Line communication, the machine readable instructions execute video anticounterfeiting method as claimed in claim 6 when being executed by the processor
Step, alternatively, the step of video anticounterfeiting method as claimed in claim 7, alternatively, video anti-counterfeiting as claimed in claim 8
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811057951.7A CN109040783A (en) | 2018-09-11 | 2018-09-11 | A kind of video anti-counterfeiting system, method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811057951.7A CN109040783A (en) | 2018-09-11 | 2018-09-11 | A kind of video anti-counterfeiting system, method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109040783A true CN109040783A (en) | 2018-12-18 |
Family
ID=64621080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811057951.7A Pending CN109040783A (en) | 2018-09-11 | 2018-09-11 | A kind of video anti-counterfeiting system, method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040783A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109887046A (en) * | 2019-01-18 | 2019-06-14 | 深圳壹账通智能科技有限公司 | Image processing method, image authentication method, device, equipment and medium |
CN113141542A (en) * | 2020-01-20 | 2021-07-20 | 亦非云互联网技术(上海)有限公司 | Video stream safe playing system, method, medium and server based on block chain |
CN113938702A (en) * | 2020-07-13 | 2022-01-14 | 富泰华工业(深圳)有限公司 | Multimedia data stream tamper-proof device, method and medium based on block chain system |
CN114760533A (en) * | 2022-05-17 | 2022-07-15 | 北京达佳互联信息技术有限公司 | Check value storage method, frame data check device and electronic equipment |
CN115396344A (en) * | 2021-05-08 | 2022-11-25 | 华为技术有限公司 | Method, device and equipment for detecting link |
CN115499138A (en) * | 2022-11-16 | 2022-12-20 | 成都同步新创科技股份有限公司 | High-performance storage tamper-proof verification method and storage system combined with block chain |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101521818A (en) * | 2009-04-08 | 2009-09-02 | 四川长虹电器股份有限公司 | Encryption and decryption system based on medium security protection of IPTV platform |
CN106534273A (en) * | 2016-10-31 | 2017-03-22 | 中金云金融(北京)大数据科技股份有限公司 | Block chain metadata storage system, and storage method and retrieval method thereof |
CN106789908A (en) * | 2016-11-23 | 2017-05-31 | 江苏通付盾科技有限公司 | Block common recognition method for building up and system in block chain |
CN107005574A (en) * | 2016-12-23 | 2017-08-01 | 深圳前海达闼云端智能科技有限公司 | Block generation method and device and block chain network |
CN107018432A (en) * | 2017-03-28 | 2017-08-04 | 华为技术有限公司 | The Licensing Methods and equipment of media content |
CN107135661A (en) * | 2016-12-26 | 2017-09-05 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, system and information collecting device |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107580196A (en) * | 2017-07-28 | 2018-01-12 | 国创科视科技股份有限公司 | A kind of video data shared system and method |
US20180068091A1 (en) * | 2016-09-06 | 2018-03-08 | Intel Corporation | Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content |
CN107801059A (en) * | 2017-09-26 | 2018-03-13 | 武汉斗鱼网络科技有限公司 | A kind of method for authenticating and server |
CN108243250A (en) * | 2018-01-05 | 2018-07-03 | 无锡井通网络科技有限公司 | A kind of fragment fast selecting method based on distributed network |
-
2018
- 2018-09-11 CN CN201811057951.7A patent/CN109040783A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101521818A (en) * | 2009-04-08 | 2009-09-02 | 四川长虹电器股份有限公司 | Encryption and decryption system based on medium security protection of IPTV platform |
US20180068091A1 (en) * | 2016-09-06 | 2018-03-08 | Intel Corporation | Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content |
CN106534273A (en) * | 2016-10-31 | 2017-03-22 | 中金云金融(北京)大数据科技股份有限公司 | Block chain metadata storage system, and storage method and retrieval method thereof |
CN106789908A (en) * | 2016-11-23 | 2017-05-31 | 江苏通付盾科技有限公司 | Block common recognition method for building up and system in block chain |
CN107005574A (en) * | 2016-12-23 | 2017-08-01 | 深圳前海达闼云端智能科技有限公司 | Block generation method and device and block chain network |
CN107135661A (en) * | 2016-12-26 | 2017-09-05 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, system and information collecting device |
CN107018432A (en) * | 2017-03-28 | 2017-08-04 | 华为技术有限公司 | The Licensing Methods and equipment of media content |
CN107316239A (en) * | 2017-07-14 | 2017-11-03 | 众安信息技术服务有限公司 | A kind of authentification of message and source tracing method and system based on block chain |
CN107580196A (en) * | 2017-07-28 | 2018-01-12 | 国创科视科技股份有限公司 | A kind of video data shared system and method |
CN107801059A (en) * | 2017-09-26 | 2018-03-13 | 武汉斗鱼网络科技有限公司 | A kind of method for authenticating and server |
CN108243250A (en) * | 2018-01-05 | 2018-07-03 | 无锡井通网络科技有限公司 | A kind of fragment fast selecting method based on distributed network |
Non-Patent Citations (1)
Title |
---|
凌峰: "《一本书读懂区块链》", 31 July 2018 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109887046A (en) * | 2019-01-18 | 2019-06-14 | 深圳壹账通智能科技有限公司 | Image processing method, image authentication method, device, equipment and medium |
WO2020147439A1 (en) * | 2019-01-18 | 2020-07-23 | 深圳壹账通智能科技有限公司 | Image processing method, image verification method, apparatus, device and medium |
CN113141542A (en) * | 2020-01-20 | 2021-07-20 | 亦非云互联网技术(上海)有限公司 | Video stream safe playing system, method, medium and server based on block chain |
CN113938702A (en) * | 2020-07-13 | 2022-01-14 | 富泰华工业(深圳)有限公司 | Multimedia data stream tamper-proof device, method and medium based on block chain system |
CN115396344A (en) * | 2021-05-08 | 2022-11-25 | 华为技术有限公司 | Method, device and equipment for detecting link |
CN114760533A (en) * | 2022-05-17 | 2022-07-15 | 北京达佳互联信息技术有限公司 | Check value storage method, frame data check device and electronic equipment |
CN114760533B (en) * | 2022-05-17 | 2024-04-09 | 北京达佳互联信息技术有限公司 | Check value storage method, frame data check method, device and electronic equipment |
CN115499138A (en) * | 2022-11-16 | 2022-12-20 | 成都同步新创科技股份有限公司 | High-performance storage tamper-proof verification method and storage system combined with block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040783A (en) | A kind of video anti-counterfeiting system, method and device | |
CN109067541B (en) | Data verification method and device based on block chain and electronic equipment | |
TWI715999B (en) | Identification method and device of identity information | |
US20190163925A1 (en) | System and method for monitoring and verifying software behavior | |
CN107395557A (en) | A kind of processing method and processing device of service request | |
EP3652885B1 (en) | Secure token passing via blockchains | |
US20020156724A1 (en) | System and method for depicting on-line transactions | |
US11182873B2 (en) | Multiple source watermarking for surveillance | |
CN105681380B (en) | Client off-line method and its system | |
CN110213380B (en) | Message pushing method and device, computer equipment and storage medium | |
CN107465660A (en) | A kind of video flowing address method for authenticating and device | |
CN112163412B (en) | Data verification method and device, electronic equipment and storage medium | |
CN107612877A (en) | Verify the methods, devices and systems of multimedia file legitimacy | |
CN111177795A (en) | Method, device and computer storage medium for identifying video tampering by using block chain | |
CN110796269B (en) | Method and device for generating model, and method and device for processing information | |
CN109034135A (en) | A kind of art work method for anti-counterfeit and device based on block chain | |
CN108875478A (en) | The testimony of a witness unifies checking method, device and system and storage medium | |
CN112668453A (en) | Video identification method and related equipment | |
CN108876405A (en) | Product traceability records processing method, device and electronic equipment | |
CN107016043A (en) | A kind of information processing method and device | |
CN107995167B (en) | Equipment identification method and server | |
CN113872772B (en) | Video segment shooting device and time recording method and corresponding verification method | |
CN110472128A (en) | Webpage evidence collecting method, device, storage medium and server based on image recognition | |
CN106790160B (en) | Security level identification and method of calibration and device | |
CN108595957A (en) | Main browser page altering detecting method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |