CN109040783A - A kind of video anti-counterfeiting system, method and device - Google Patents

A kind of video anti-counterfeiting system, method and device Download PDF

Info

Publication number
CN109040783A
CN109040783A CN201811057951.7A CN201811057951A CN109040783A CN 109040783 A CN109040783 A CN 109040783A CN 201811057951 A CN201811057951 A CN 201811057951A CN 109040783 A CN109040783 A CN 109040783A
Authority
CN
China
Prior art keywords
node
section
video flowing
video
check value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811057951.7A
Other languages
Chinese (zh)
Inventor
汪孝斌
马兆远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Langda Heshun Technology Co Ltd
Original Assignee
Beijing Langda Heshun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Langda Heshun Technology Co Ltd filed Critical Beijing Langda Heshun Technology Co Ltd
Priority to CN201811057951.7A priority Critical patent/CN109040783A/en
Publication of CN109040783A publication Critical patent/CN109040783A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/23418Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments

Abstract

This application provides a kind of video anti-counterfeiting systems, method and device, are related to technical field of data processing, which includes: first node, at least one second node and third node;Wherein, first node, for obtaining video flowing and being segmented to video flowing;N section video flowing to obtain after segmentation generates the first check value respectively;Selected second node, for receiving and recording i-th section of video flowing and corresponding first check value;Third node generates corresponding second check value of i-th section of video flowing;When it is inconsistent for detecting corresponding first check value of i-th section of video flowing the second check value corresponding with i-th section of video flowing, determine that the i-th section of video flowing obtained from j-th of selected second node is tampered.The problem of the application judges the true and false of video by check value, alleviates complex steps in video authenticity identification in the prior art.

Description

A kind of video anti-counterfeiting system, method and device
Technical field
This application involves technical field of data processing, in particular to a kind of video anti-counterfeiting system, method and device.
Background technique
With the development of network technology, store the safety of information more and more attention has been paid to and pay attention to, although can pass through Internet facilitates the various data (picture, video, music etc.) of storage, but the safety of these data still needs these third parties Guaranteeing, internet itself does not have the mechanism of value protection, and if the information of these need for confidentiality is leaked, and then quilt It distorts, just not can guarantee the safety and authenticity of these information more.
Recently, growing stronger day by day with the universal of digital camera equipment, the reduction of carrying cost and software for editing, number Video is increasingly becoming people and protects stored important means, but the true and false of video information is by judging each frame image at present In information be compared, and then whether judgment frame video is changed, and step is relatively complicated.
But most video tampering detection algorithms can only be detected for one kind mode of distorting in practical operation, be usurped when a variety of Change when distorting information jointly, can not one-time detection go out authenticity so that the step of authenticity identification of video is relatively complicated.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of video log anti-counterfeiting system, method and device, make The process for obtaining video authenticity identification is no longer complicated.
In a first aspect, the embodiment of the present application provides a kind of video anti-counterfeiting system, comprising: first node, at least one Two nodes and third node;Wherein, first node, for obtaining video flowing and being segmented to video flowing;To be obtained after segmentation To N section video flowing generate the first check value respectively, N is positive integer;Selected second is filtered out from least one second node Node, and i-th section of video flowing and corresponding first verification of i-th section of video flowing in N sections of video flowings are sent to selected second node Value, i are any positive integer less than or equal to N;Selected second node, for receiving and recording i-th section of video flowing and correspondence The first check value, and other nodes into video anti-counterfeiting system send the first instruction message, and the first instruction message is for referring to Show that selected second node record has i-th section of video flowing and corresponding first check value;Third node is used for from selected second section I-th section of video flowing and corresponding first check value in N sections of video flowings are obtained at j-th of selected second node in point;It generates Corresponding second check value of i-th section of video flowing;When detecting corresponding first check value of i-th section of video flowing and i-th section of video flowing When corresponding second check value is inconsistent, determine that the i-th section of video flowing obtained from j-th of selected second node is tampered, j For positive integer.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein the One node is specifically used for when filtering out selected second node from least one second node:
Send the second instruction message respectively at least one second node, the second instruction message be used to indicate at least one Two nodes provide i-th section of video flowing corresponding proof of work respectively;It is corresponding that different second nodes calculates i-th section of video flowing The difficulty of proof of work is different.
The second node for successfully calculating the corresponding proof of work of i-th section of video flowing is determined as selected second node.
With reference to first aspect, the embodiment of the present application provides second of possible embodiment of first aspect, wherein choosing Determine second node, be also used to: recording selected second node and be directed to the historical operation that i-th section of video flowing is carried out, and generate log Information, log information include the historical operation information that i-th section of video flowing is carried out;Third node, is also used to: determining i-th After section video flowing is tampered, j-th of selected second node into selected second node sends third instruction message, and third refers to Show that message is used to indicate the i-th section of video flowing obtained from j-th of selected second node and is tampered;J-th of selected second node, It is also used to: when receiving third instruction message, when determining that i-th section of video flowing is tampered, i-th section of view being inquired according to log information The concrete operations that frequency stream is tampered.
With reference to first aspect, the embodiment of the present application provides the third possible embodiment of first aspect, wherein the Three nodes, are also used to: after determining that the i-th section of video flowing obtained from j-th of selected second node is tampered, from selected second Other selected second nodes in node in addition to j-th of selected second node obtain i-th section of video flowing.
With reference to first aspect, the embodiment of the present application provides the 4th kind of possible embodiment of first aspect, first segment Point is specifically used for when the N section video flowing obtained after for segmentation generates the first check value respectively: in N sections of video flowings i-th Section video flowing generates corresponding first check value of i-th section of video flowing according to specified hash function corresponding with i-th section of video flowing; Wherein, corresponding first check value of i-th section of video flowing is used for the unique identification whether being tampered as i-th section of video flowing of identification.
Second aspect, the embodiment of the present application also provide a kind of video anticounterfeiting method, wherein the described method includes:
First node obtains video flowing and is segmented to video flowing;First node is the N section video flowing obtained after being segmented The first check value is generated respectively, and N is positive integer;First node filters out selected second node from least one second node, And i-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings, i are sent to selected second node For any positive integer less than or equal to N, wherein selected second node be used to provide to third node i-th section of video flowing and Corresponding first check value, third node is that the second check value is generated based on i-th section of video flowing, and based on the first check value and the The node of two check values progress video anti-counterfeiting.
The third aspect, the embodiment of the present application also provide a kind of video anticounterfeiting method, wherein the described method includes: selected the Two nodes receive i-th section of video flowing and corresponding first verification of i-th section of video flowing in the N section video flowing that first node is sent Value;Other nodes of the selected second node into video anti-counterfeiting system send the first instruction message, and the first instruction message is for referring to Show that selected second node record has i-th section of video flowing and corresponding first check value;Selected second node receives third section After the acquisition request that point is sent, i-th section of video flowing and corresponding first check value are sent to third node;Third node is The second check value is generated based on i-th section of video flowing, and carries out the node of video anti-counterfeiting based on the first check value and the second check value.
Fourth aspect, the embodiment of the present application also provide a kind of video anticounterfeiting method, wherein the described method includes: third section Point is from obtaining i-th section of video flowing and corresponding the in N sections of video flowings from j-th of selected second node in selected second node One check value;Third node generates corresponding second check value of i-th section of video flowing;Third node, which is worked as, detects i-th section of video flowing When corresponding first check value the second check value corresponding with i-th section of video flowing is inconsistent, determine from j-th of selected second section The i-th section of video flowing obtained at point is tampered.
5th aspect, the embodiment of the present application also provide a kind of video anti-counterfeiting device, in which:
Module is obtained, for obtaining video flowing and being segmented to the video flowing;
Generation module, for generating the first check value respectively for obtained N section video flowing after segmentation, N is positive integer;
Sending module selectes second for filtering out selected second node from least one second node, and to described Node sends i-th section of video flowing and corresponding first check value of i-th section of video flowing in the N sections of video flowing, and i is small In or equal to N any positive integer, wherein the selected second node be used to provide to third node i-th section of video flowing, And corresponding first check value, the third node are the second check value to be generated based on i-th section of video flowing, and be based on institute It states the first check value and second check value carries out the node of video anti-counterfeiting.
6th aspect, the embodiment of the present application also provide a kind of video anti-counterfeiting device, in which:
Receiving module, for receiving i-th section of video flowing and i-th section of view in the N section video flowing that first node is sent Frequency flows corresponding first check value;
First sending module, for into video anti-counterfeiting system other nodes send the first instruction message, described first Instruction message, which is used to indicate the selected second node record, i-th section of video flowing and corresponding first check value;
Second sending module sends institute to the third node after receiving the acquisition request that third node is sent State i-th section of video flowing and corresponding first check value;The third node is to generate second based on i-th section of video flowing Check value, and the node based on first check value and second check value progress video anti-counterfeiting.
7th aspect, the embodiment of the present application also provide a kind of video anti-counterfeiting device, in which:
Module is obtained, for obtaining i-th in N sections of video flowings from from j-th of selected second node in selected second node Section video flowing and corresponding first check value;
Generation module, for generating corresponding second check value of i-th section of video flowing;
Determining module detects corresponding first check value of i-th section of video flowing and i-th section of video flowing for working as When corresponding second check value is inconsistent, the i-th section of video flowing obtained from described j-th selected second node is determined It is tampered.
Eighth aspect, the embodiment of the present application also provide a kind of electronic equipment, wherein processor, memory and bus, storage Device is stored with the executable machine readable instructions of processor, when electronic equipment operation, by total between processor and memory The step of line communicates, and the video anticounterfeiting method as described in second aspect is executed when machine readable instructions are executed by processor, alternatively, The step of video anticounterfeiting method as described in the third aspect, alternatively, the step of video anticounterfeiting method as described in fourth aspect.
A kind of video provided by the embodiments of the present application and the anti-fake method, apparatus and system of log, the system pass through first Node generates i-th section of video flowing and corresponding first check value, is received by selected second node and records i-th section of video flowing And corresponding first check value;Third node, that is, accessed node generates corresponding second check value of i-th section of video flowing;Third section It puts when it is inconsistent for detecting corresponding first check value of i-th section of video flowing the second check value corresponding with i-th section of video flowing, Determine that the i-th section of video flowing obtained is tampered.Whether the application unanimously judges to regard by the first check value and the second check value The true and false of frequency stream, and the specifying information that video flowing needs to analyze video flowing frame image in the prior art could judge the true of video flowing The problem of reality, present application addresses complex steps present in existing video flowing identification of means, also, can also be promoted to view Frequency flows the accuracy rate of authenticity.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of structure chart of video anti-counterfeiting system provided by the embodiment of the present application;
Fig. 2 shows a kind of signals of the process of video anti-counterfeiting system interaction process provided by the embodiment of the present application;
Fig. 3 shows a kind of flow diagram of video anticounterfeiting method provided by the embodiment of the present application;
Fig. 4 shows the flow diagram of another kind video anticounterfeiting method provided by the embodiment of the present application;
Fig. 5 shows the flow diagram of another kind video anticounterfeiting method provided by the embodiment of the present application;
Fig. 6 shows a kind of structural schematic diagram of video anti-counterfeiting device provided by the embodiment of the present application;
Fig. 7 shows the structural schematic diagram of another kind video anti-counterfeiting device provided by the embodiment of the present application;
Fig. 8 shows the structural schematic diagram of another kind video anti-counterfeiting device provided by the embodiment of the present application;
Fig. 9 shows the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present application.
It illustrates:
601- obtains module;602- generation module;603- sending module;701- receiving module;The first sending module of 702-; The second sending module of 703-;801- obtains module;802- generation module;803- determining module;901- processor;902- storage Device;903- bus.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall in the protection scope of this application.
Currently, popularizing with camera-shooting and recording device, digital video becomes people and protects stored means, but video is true at present The method of puppet judgement is relatively complicated.Based on this, a kind of video log anti-counterfeiting system provided by the present application, method and device can be with The problem of alleviating complex steps in video authenticity identification in the prior art.
For convenient for understanding the present embodiment, first to the anti-fake system of a kind of video log disclosed in the embodiment of the present application System describes in detail:
Embodiment one:
The embodiment of the present application provides a kind of video anti-counterfeiting system, and above-mentioned video anti-counterfeiting system uses block chain technology, leads to It crosses and builds meshed network composition block chain network on multiple servers in internet, node refers to the clothes in block chain network Business device.It can be communicated based on application layer protocol between node, the communication protocol used for example, hypertext transfer protocol (HyperText Transfer Protocol, HTTP), File Transfer Protocol (File Transfer Protocol, FTP) and Transmission control protocol (Transmission Control Protocol, TCP) etc..Pass through domain name system (Domain Name System, DNS) it seed, node seed and enumerates the mode of specified network segment and realizes bootstrapping and interconnection, so that each section built Message can be sent and received mutually between point.
It is a kind of structure chart of video anti-counterfeiting system provided by the embodiments of the present application, comprising: first segment shown in referring to Fig.1 Point, at least one second node and third node.Wherein, first node, at least one second node and third node be simultaneously Not limiting is fixed node, and each node in block chain network built all can serve as first node therein, Two nodes and third node.Specifically, first node is the server for obtaining Video stream information, first node can will be acquired Video flowing be segmented, the video flowing after segmentation and the Video stream information after segmentation can also be sent to second node; Second node can be as memory segment after video flowing and the Video stream information after corresponding segmentation server, second The storage information of video flowing after memory segment and the Video stream information after corresponding segmentation can be sent to entirely by node At other nodes in block chain network;Selected second section of the third node as access server, in access second node After putting and getting specified section video flowing and corresponding specified section Video stream information, it can be determined that specified section Video stream information The true and false, when judging that the specified section video information got from selected second node is tampered, third node is according to storage information Find the specified section Video stream information being not tampered in addition to selected second node.
In order to which the interactive process of video anti-counterfeiting system interior joint is better described, Fig. 2 shows a kind of video anti-counterfeiting systems The flow diagram of interactive process, wherein the following steps are included:
Step S202, first node obtain video flowing and are segmented to video flowing;For the N section video flowing obtained after segmentation The first check value is generated respectively, and N is positive integer.
The video flowing that first node obtains can be to be obtained from camera-shooting and recording device, is also possible to store video flowing from other Terminal in obtain.After first node obtains video flowing, by analyzing the information of video flowing, if acquired video flowing Size be more than preset value, just acquired video flowing is compressed, video flowing is segmented after compression, make every section view The size of frequency stream meets preset value, and every section of video flowing that size can be met preset value by first node generates corresponding first school Test value.
Specifically, first node can generate the first verification corresponding with i-th section of video flowing according to specified hash function Value, wherein the unique identification whether corresponding first check value of i-th section of video flowing is tampered as i-th section of video flowing of identification.
Wherein, hash function is the output by hashing algorithm by Input transformation at regular length, which is exactly to hash Value.Briefly hash function is exactly a kind of function of the message compression by random length to a certain regular length.First node Corresponding first check value of i-th section of video flowing is generated by specified hash function, this specifies hash function such as: MD5 (Message-Digest Algorithm, Message Digest 5), wherein the eap-message digest of MD5 file is exactly to pass through Hash letter What number was calculated.Regardless of file size, its hash function calculate the result is that the numerical value of a regular length, MD5 This hash function is an irreversible one-way function.Such as the byte serial of random length is mapped as a 128bit by MD5 Numerical value, be highly difficult by the anti-original character string that pushes away of the numerical value of this 128bit, even if obtaining source program and algorithm, also without The value of one MD5 is switched back to original character string by method.This specifies hash function for another example: SHA (Secure Hash Algorithm, secure hash algorithm), this secure hash algorithm, which can calculate, to be arrived corresponding to a digital massage, and length is solid Fixed eap-message digest, and if input message it is different, the probability of corresponding kinds of characters string is very high.
Using highly-safe hash algorithm, when such as MD5, SHA, two different files are almost impossible obtain it is identical Hash result.Therefore, video flowing is indicated using the first check value that above-mentioned hash function generates, once video flowing is modified, It will be detected.
Step S204, first node filter out selected second node from least one second node, and to selected second Node sends i-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings, and i is less than or equal to N Any positive integer.
Specifically, first node, when filtering out selected second node from least one second node, can first to At least one second node sends the second instruction message respectively, and the second instruction message indicates that at least one second node provides respectively The corresponding proof of work of i-th section of video flowing;Different second nodes calculates the difficulty of the corresponding proof of work of i-th section of video flowing Degree is different.The second node for successfully calculating the corresponding proof of work of i-th section of video flowing is determined as selected second node.
Wherein, proof of work refers to the proof of workload, and proof of work is that second node is required to carry out some time-consumings Complex calculation appropriate is simultaneously sent to first node, and answer can quickly be checked by first node, and first node can basis Second node amount of calculation proves the consumed time etc., and selected second node is selected from from second node and stores i-th section Video stream information and corresponding first check value.Time, equipment and the energy of consumption can be remembered as Cost of Guarantee, first node Recording second node amount of calculation proves the information of consumed time, equipment and the energy, to ensure that selected second node is to need I-th section of Video stream information and corresponding first check value are wanted, simultaneously because providing i-th section of Video stream information and corresponding first Be to the loss of equipment, time and the energy when proof of work of check value it is very big, first node can select equipment, the time and The loss of the energy all maximum selected second node stores i-th section of Video stream information and corresponding first check value, workload Proof ensure that selected second node will not distort i-th section of video flowing letter after obtaining i-th section of Video stream information from first node Breath, because in this case, the loss to equipment, time and the energy is huge, even if this selected second node is distorted I-th section of Video stream information, third node also can judge i-th section of video by the second check value of generation in access later Stream information is tampered.
Wherein, selected second node is at least two second node, in this way when selected second node corresponding one The video flowing that a server occurs in delay machine or one of them selected corresponding server of second node is tampered, and can also be protected The integrality and authenticity of the i-th section of Video stream information recorded in card block chain network.
The difficulty that different second nodes calculates the corresponding proof of work of i-th section of video flowing is different, proof of work What difficulty can be adjusted according to previous piece of time-consuming dynamic, the difficulty that proof of work generates can reflect in block chain network The quantity of second node adjusts the redundancy backup number of every section of video flowing according to the number of nodes in network, but should at least have one The node of backup, i.e., selected second node is at least two.Successfully calculate the of the corresponding proof of work of i-th section of video flowing Two nodes can be determined as selected second node by first node.
Step S206, selected second node receive and record i-th section of video flowing and corresponding first check value, and to view Other nodes in frequency anti-counterfeiting system send the first instruction message, and the first instruction message indicates that selected second node record has i-th Section video flowing and corresponding first check value.
Selected second node sends the first instruction message and stores information other nodes into block chain network, stores information The position of title including every section of video flowing, the size of every section of video and selected second node, so that its in block chain network His node can find corresponding selected second node when inquiring or accessing i-th section of video flowing.
Specifically, selected second node can also record selected second node and be directed to the history that i-th section of video flowing is carried out Operation, and log information is generated, log information includes the historical operation information that i-th section of video flowing is carried out.
Step S208, third node obtain in N sections of video flowings from from j-th of selected second node in selected second node I-th section of video flowing and corresponding first check value.
The first instruction message that third node is sent according to selected second node finds i-th section of video flowing of storage and the The selected second node of j-th of one check value, j-th of selected second node are any one storages i-th in selected second node The node of section video flowing and the first check value.
Step S210, third node generate corresponding second check value of i-th section of video flowing.
I-th section of video flowing that third node will acquire generates corresponding second check value of i-th section of video flowing, the second verification The principle of the generating process of value and the generating process of the first check value be it is identical, may refer to description above here.
Step S212, when third nodal test is corresponding with i-th section of video flowing to corresponding first check value of i-th section of video flowing The second check value be it is inconsistent when, determine from j-th of selected second node obtain i-th section of video flowing be tampered, j is positive Integer.
When third nodal test goes out corresponding first check value of i-th section of video flowing the second school corresponding with i-th section of video flowing It tests value to be consistent, then can determine acquisition is i-th section of video flowing being not tampered with.
When third nodal test goes out corresponding first check value of i-th section of video flowing the second school corresponding with i-th section of video flowing Test value be it is inconsistent, then can determine acquisition is i-th section of video flowing being tampered.Further, third node sends the Three instruction messages obtain i-th section of video at j-th of selected second node to other nodes in block chain network, other nodes The message that stream is tampered.
Further, when j-th of selected second node receives third instruction message, j-th of selected second node is also J-th of selected second node can be searched and be directed to the log information that i-th section of video flowing generates, log information includes i-th section of view Frequency flows carried out historical operation information, inquires the time and specific operation information that i-th section of video flowing is tampered.
Step S214, third node determine that the i-th section of video flowing obtained from j-th of selected second node is tampered it Afterwards, other selected second nodes from selected second node in addition to j-th of selected second node obtain i-th section of video flowing.
In the embodiment of the present application, the selected second node more than one of i-th section of video flowing is stored in second node due to selecting It is a, therefore the i-th section of video flowing obtained at j-th of selected second node, after be tampered, third node can also be from block chain Storage information in network, which inquires, is stored with the other of i-th section of video flowing and corresponding first check value of i-th section of video flowing Selected second node, so from except j-th of selected second node in addition to other selected second nodes obtain i-th section of video Stream, and the second new check value of corresponding i-th section of video flowing is generated again, third node compares new the second check value and first Check value, when detecting that the second new check value is consistent with the first check value, i-th section of video flowing is not tampered with, to guarantee Three nodes apply i-th section of video flowing.
Embodiment two:
The embodiment of the present application also provides a kind of video anticounterfeiting method, and in order to be better described, Fig. 3 shows a kind of video The flow diagram of method for anti-counterfeit, steps are as follows:
Step S302, first node obtain video flowing and are segmented to video flowing;First node is the N obtained after being segmented Section video flowing generates the first check value respectively, and N is positive integer.
Step S304, first node filter out selected second node from least one second node.
Step S306, first node send i-th section of video flowing and i-th section of view in N sections of video flowings to selected second node Frequency flows corresponding first check value, and i is any positive integer less than or equal to N, wherein selected second node is used for third section Point provides i-th section of video flowing and corresponding first check value, and third node is that the second verification is generated based on i-th section of video flowing Value, and the node based on the first check value and the second check value progress video anti-counterfeiting.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description method Specific work process, can be with reference to the corresponding process of system in previous embodiment, and details are not described herein.
Embodiment three:
The embodiment of the present application also provides a kind of video anticounterfeiting method, and in order to be better described, Fig. 4 shows another view The flow diagram of frequency method for anti-counterfeit, steps are as follows:
Step S402 selectes second node and receives i-th section of video flowing and i-th in the N section video flowing that first node is sent Corresponding first check value of section video flowing.
Step S404, other nodes transmission first instruction message of the selected second node into video anti-counterfeiting system, first Instruction message, which is used to indicate selected second node record, i-th section of video flowing and corresponding first check value.
Step S406 after selected second node receives the acquisition request of third node transmission, sends i-th to third node Section video flowing and corresponding first check value;Third node is to generate the second check value based on i-th section of video flowing, and be based on First check value and the second check value carry out the node of video anti-counterfeiting.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description method Specific work process, can be with reference to the corresponding process of system in previous embodiment, and details are not described herein.
Example IV:
The embodiment of the present application also provides another video anticounterfeiting method, and in order to be better described, Fig. 5 shows another kind The flow diagram of video anticounterfeiting method, steps are as follows:
Step S502, third node obtain in N sections of video flowings from from j-th of selected second node in selected second node I-th section of video flowing and corresponding first check value.
Step S504, third node generate corresponding second check value of i-th section of video flowing.
Step S506, third node, which is worked as, detects that corresponding first check value of i-th section of video flowing is corresponding with i-th section of video flowing The second check value be it is inconsistent when, determine from j-th of selected second node obtain i-th section of video flowing be tampered.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description method Specific work process, can be with reference to the corresponding process of system in previous embodiment, and details are not described herein.
Embodiment five:
The embodiment of the present application also provides a kind of video anti-counterfeiting device, is a kind of knot of video anti-counterfeiting device as shown in Figure 6 Structure schematic diagram is wherein:
Module 601 is obtained, for obtaining video flowing and being segmented to the video flowing;
Generation module 602, for generating the first check value respectively for obtained N section video flowing after segmentation, N is positive integer;
Sending module 603, for filtering out selected second node from least one second node, and to described selected the Two nodes send i-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings, and i is to be less than or wait In any positive integer of N, wherein selected second node provides i-th section of video flowing and corresponding first verification to third node Value, third node are the second check value to be generated based on i-th section of video flowing, and regarded based on the first check value and the second check value Frequently anti-fake node.
The embodiment of the present application is a kind of video anti-counterfeiting device based on the composition of server corresponding to first node, including is obtained Modulus block 601, generation module 602 and sending module 603, obtaining module 601 is that video anti-counterfeiting device is used to obtain video flowing Module, generation module 602 are mainly that video anti-counterfeiting device is each for generating correspondence for each section of video flowing in N sections of video flowings The module of first check value of section video flowing, sending module 603 are to send i-th section of video flowing and i-th section in N sections of video flowings Corresponding first check value of video flowing gives selected second node, selectes second node more than one, so corresponding send i-th section The movement of video flowing is more than one.
Embodiment six:
The embodiment of the present application also provides a kind of video anti-counterfeiting device, is a kind of knot of video anti-counterfeiting device as shown in Figure 7 Structure schematic diagram is wherein:
Receiving module 701, for receiving i-th section of video flowing and described i-th in the N section video flowing that first node is sent Corresponding first check value of section video flowing;
First sending module 702 sends the first instruction message for other nodes into video anti-counterfeiting system, and described the One instruction message, which is used to indicate the selected second node record, i-th section of video flowing and corresponding first check value;
Second sending module 703 is sent after receiving the acquisition request that third node is sent to the third node I-th section of video flowing and corresponding first check value;The third node is to generate the based on i-th section of video flowing Two check values, and the node based on first check value and second check value progress video anti-counterfeiting.
The embodiment of the present application is a kind of video anti-counterfeiting device based on the composition of server corresponding to selected second node, packet Include receiving module 701, the first sending module 702 and the second sending module 703.Since the device solution in the embodiment of the present application is asked The principle of topic is similar to the selected second node in video anti-counterfeiting system in the embodiment of the present application one, therefore the implementation of device can be with Referring to the implementation of system, overlaps will not be repeated.
Embodiment seven:
The embodiment of the present application also provides a kind of video anti-counterfeiting device, is a kind of knot of video anti-counterfeiting device as shown in Figure 8 Structure schematic diagram, in which:
Module 801 is obtained, for obtaining in N sections of video flowings from from j-th of selected second node in selected second node I-th section of video flowing and corresponding first check value.
Generation module 802, for generating corresponding second check value of i-th section of video flowing.
Determining module 803 detects corresponding first check value of i-th section of video flowing and described i-th section view for working as Frequency flow corresponding second check value be it is inconsistent when, determine from described j-th selected second node obtain it is described i-th section view Frequency stream is tampered.
Based on the same inventive concept, video anti-counterfeiting dress corresponding with video anticounterfeiting method is additionally provided in the embodiment of the present application It sets, since the principle that the device in the embodiment of the present application solves the problems, such as is similar to the above-mentioned video anticounterfeiting method of the embodiment of the present application, Therefore the implementation of device may refer to the implementation of method and system, and overlaps will not be repeated.
Embodiment eight:
The embodiment of the present application also provides a kind of electronic equipment, the structural schematic diagram of a kind of electronic equipment referring to shown in Fig. 9, Wherein, processor 901, memory 902 and bus 903, memory 902 are stored with the executable machine readable finger of processor 901 It enables, when electronic equipment operation, is communicated between processor 901 and memory 902 by bus 903, machine readable instructions are located The step of executing the video anticounterfeiting method as described in embodiment two when device executes is managed, alternatively, the video as described in embodiment three is anti- The step of the step of fake method, video anticounterfeiting method as described in example IV.
Wherein, memory 902 may include high-speed random access memory (RAM, Random Access Memory), It may further include non-labile memory (non-volatile memory), for example, at least a magnetic disk storage.Bus 903 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..
Wherein, memory 902 is for storing program, and the processor 901 executes the journey after receiving and executing instruction Sequence, method performed by the device that the flowchart process that aforementioned any embodiment of the embodiment of the present invention discloses defines can be applied to locate It manages in device 901, or realized by processor 901.
Processor 901 may be a kind of IC chip, the processing capacity with signal.It is above-mentioned during realization Each step of method can be completed by the integrated logic circuit of the hardware in processor 901 or the instruction of software form.On The processor 901 stated can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), specific integrated circuit (Application Specific Integrated Circuit, abbreviation ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or Person other programmable logic device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute sheet Disclosed each method, step and logic diagram in inventive embodiments.General processor can be microprocessor or the processing Device is also possible to any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in Hardware decoding processor executes completion, or in decoding processor hardware and software module combination execute completion.Software mould Block can be located at random access memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable storage In the storage medium of this fields such as device, register maturation.The storage medium is located at memory 902, and processor 901 reads memory Information in 902, in conjunction with the step of its hardware completion above method.
The computer program product of a kind of video log anti-counterfeiting system, method and device provided by the embodiment of the present application, Computer readable storage medium including storing program code, the instruction that said program code includes can be used for executing front side Method method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application In provided several embodiments, it should be understood that disclosed systems, devices and methods, it can be real by another way It is existing.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic function It can divide, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can collect At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling Conjunction or direct-coupling or communication connection can be the indirect coupling or communication connection by some communication interfaces, device or unit, It can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, those skilled in the art should understand that: anyone skilled in the art Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of video anti-counterfeiting system characterized by comprising first node, at least one second node and third section Point;Wherein,
The first node, for obtaining video flowing and being segmented to the video flowing;For the N section video flowing obtained after segmentation The first check value is generated respectively, and N is positive integer;Filter out selected second node from least one second node, and to described Selected second node sends i-th section of video flowing and corresponding first verification of i-th section of video flowing in the N sections of video flowing Value, i are any positive integer less than or equal to N;
The selected second node, for receiving and recording i-th section of video flowing and corresponding first check value, and to institute It states other nodes in video anti-counterfeiting system and sends the first instruction message, first instruction message is used to indicate described selected the Two nodes records have i-th section of video flowing and corresponding first check value;
The third node, for obtaining the N sections of video from j-th of selected second node in the selected second node I-th section of video flowing and corresponding first check value in stream;Generate corresponding second check value of i-th section of video flowing;Work as inspection It is inconsistent for measuring corresponding first check value of i-th section of video flowing the second check value corresponding with i-th section of video flowing When, determine that the i-th section of video flowing obtained from described j-th selected second node is tampered, j is positive integer.
2. system according to claim 1, which is characterized in that the first node, from least one second node When filtering out the selected second node, it is specifically used for:
The second instruction message is sent respectively at least one described second node, and second instruction message is used to indicate at least one A second node provides i-th section of video flowing corresponding proof of work respectively;Different second nodes calculates described i-th section The difficulty of the corresponding proof of work of video flowing is different.
The second node for successfully calculating the corresponding proof of work of i-th section of video flowing is determined as selected second section Point.
3. system according to claim 1, which is characterized in that the selected second node is also used to:
It records the selected second node and is directed to the historical operation that i-th section of video flowing is carried out, and generate log information, institute Stating log information includes the historical operation information that i-th section of video flowing is carried out;
The third node, is also used to:
Described j-th selected second section after determining that i-th section of video flowing is tampered, into the selected second node Point sends third instruction message, and the third instruction message is used to indicate the institute obtained from described j-th selected second node I-th section of video flowing is stated to be tampered;
J-th of selected second node, is also used to:
When receiving the third instruction message, when determining that i-th section of video flowing is tampered, inquired according to the log information The concrete operations being tampered to i-th section of video flowing.
4. system according to claim 1, which is characterized in that the third node is also used to:
After determining that the i-th section of video flowing obtained from described j-th selected second node is tampered, from described selected the Other selected second nodes in two nodes in addition to described j-th selected second node obtain i-th section of video flowing.
5. system according to claim 1, which is characterized in that the first node, the N section video obtained after for segmentation When stream generates the first check value respectively, it is specifically used for:
It is raw according to specified hash function corresponding with i-th section of video flowing for i-th section of video flowing in the N sections of video flowing At corresponding first check value of i-th section of video flowing;Wherein, corresponding first check value of i-th section of video flowing is for making The unique identification whether being tampered for identification i-th section of video flowing.
6. a kind of video anticounterfeiting method, which is characterized in that the described method includes:
First node obtains video flowing and is segmented to the video flowing;
First node is that the N section video flowing obtained after being segmented generates the first check value respectively, and N is positive integer;
First node filters out selected second node from least one second node, and sends institute to the selected second node I-th section of video flowing and corresponding first check value of i-th section of video flowing in N sections of video flowings are stated, i is less than or equal to N's Any positive integer, wherein the selected second node is used to provide i-th section of video flowing and corresponding to third node First check value, the third node are the second check value to be generated based on i-th section of video flowing, and verify based on described first Value and second check value carry out the node of video anti-counterfeiting.
7. a kind of video anticounterfeiting method, which is characterized in that the described method includes:
Selected second node receives i-th section of video flowing and i-th section of video flowing in the N section video flowing that first node is sent Corresponding first check value;
Other nodes of the selected second node into video anti-counterfeiting system send the first instruction message, and first instruction message is used There are i-th section of video flowing and corresponding first check value in the instruction selected second node record;
After selected second node receives the acquisition request of third node transmission, i-th section of view is sent to the third node Frequency stream and corresponding first check value;The third node be based on i-th section of video flowing generate the second check value, and The node of video anti-counterfeiting is carried out based on first check value and second check value.
8. a kind of video anticounterfeiting method, which is characterized in that the method also includes:
Third node from from j-th of selected second node in selected second node obtain N sections of video flowings in i-th section of video flowing with And corresponding first check value;
Third node generates corresponding second check value of i-th section of video flowing;
Third node is when detecting corresponding first check value of i-th section of video flowing corresponding with i-th section of video flowing the When two check values are inconsistent, determine that the i-th section of video flowing obtained from described j-th selected second node is tampered.
9. a kind of video anti-counterfeiting device, which is characterized in that described device includes:
Obtain module, for from from j-th of selected second node in selected second node obtain N section video flowings in i-th section regard Frequency stream and corresponding first check value;
Generation module, for generating corresponding second check value of i-th section of video flowing;
Determining module detects that corresponding first check value of i-th section of video flowing is corresponding with i-th section of video flowing for working as The second check value be it is inconsistent when, determine from described j-th selected second node obtain i-th section of video flowing usurped Change.
10. a kind of electronic equipment characterized by comprising processor, memory and bus, the memory are stored with described The executable machine readable instructions of processor, when electronic equipment operation, by total between the processor and the memory Line communication, the machine readable instructions execute video anticounterfeiting method as claimed in claim 6 when being executed by the processor Step, alternatively, the step of video anticounterfeiting method as claimed in claim 7, alternatively, video anti-counterfeiting as claimed in claim 8 The step of method.
CN201811057951.7A 2018-09-11 2018-09-11 A kind of video anti-counterfeiting system, method and device Pending CN109040783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811057951.7A CN109040783A (en) 2018-09-11 2018-09-11 A kind of video anti-counterfeiting system, method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811057951.7A CN109040783A (en) 2018-09-11 2018-09-11 A kind of video anti-counterfeiting system, method and device

Publications (1)

Publication Number Publication Date
CN109040783A true CN109040783A (en) 2018-12-18

Family

ID=64621080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811057951.7A Pending CN109040783A (en) 2018-09-11 2018-09-11 A kind of video anti-counterfeiting system, method and device

Country Status (1)

Country Link
CN (1) CN109040783A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109887046A (en) * 2019-01-18 2019-06-14 深圳壹账通智能科技有限公司 Image processing method, image authentication method, device, equipment and medium
CN113141542A (en) * 2020-01-20 2021-07-20 亦非云互联网技术(上海)有限公司 Video stream safe playing system, method, medium and server based on block chain
CN113938702A (en) * 2020-07-13 2022-01-14 富泰华工业(深圳)有限公司 Multimedia data stream tamper-proof device, method and medium based on block chain system
CN114760533A (en) * 2022-05-17 2022-07-15 北京达佳互联信息技术有限公司 Check value storage method, frame data check device and electronic equipment
CN115396344A (en) * 2021-05-08 2022-11-25 华为技术有限公司 Method, device and equipment for detecting link
CN115499138A (en) * 2022-11-16 2022-12-20 成都同步新创科技股份有限公司 High-performance storage tamper-proof verification method and storage system combined with block chain

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521818A (en) * 2009-04-08 2009-09-02 四川长虹电器股份有限公司 Encryption and decryption system based on medium security protection of IPTV platform
CN106534273A (en) * 2016-10-31 2017-03-22 中金云金融(北京)大数据科技股份有限公司 Block chain metadata storage system, and storage method and retrieval method thereof
CN106789908A (en) * 2016-11-23 2017-05-31 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain
CN107005574A (en) * 2016-12-23 2017-08-01 深圳前海达闼云端智能科技有限公司 Block generation method and device and block chain network
CN107018432A (en) * 2017-03-28 2017-08-04 华为技术有限公司 The Licensing Methods and equipment of media content
CN107135661A (en) * 2016-12-26 2017-09-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, system and information collecting device
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN107801059A (en) * 2017-09-26 2018-03-13 武汉斗鱼网络科技有限公司 A kind of method for authenticating and server
CN108243250A (en) * 2018-01-05 2018-07-03 无锡井通网络科技有限公司 A kind of fragment fast selecting method based on distributed network

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521818A (en) * 2009-04-08 2009-09-02 四川长虹电器股份有限公司 Encryption and decryption system based on medium security protection of IPTV platform
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN106534273A (en) * 2016-10-31 2017-03-22 中金云金融(北京)大数据科技股份有限公司 Block chain metadata storage system, and storage method and retrieval method thereof
CN106789908A (en) * 2016-11-23 2017-05-31 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain
CN107005574A (en) * 2016-12-23 2017-08-01 深圳前海达闼云端智能科技有限公司 Block generation method and device and block chain network
CN107135661A (en) * 2016-12-26 2017-09-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, system and information collecting device
CN107018432A (en) * 2017-03-28 2017-08-04 华为技术有限公司 The Licensing Methods and equipment of media content
CN107316239A (en) * 2017-07-14 2017-11-03 众安信息技术服务有限公司 A kind of authentification of message and source tracing method and system based on block chain
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
CN107801059A (en) * 2017-09-26 2018-03-13 武汉斗鱼网络科技有限公司 A kind of method for authenticating and server
CN108243250A (en) * 2018-01-05 2018-07-03 无锡井通网络科技有限公司 A kind of fragment fast selecting method based on distributed network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
凌峰: "《一本书读懂区块链》", 31 July 2018 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109887046A (en) * 2019-01-18 2019-06-14 深圳壹账通智能科技有限公司 Image processing method, image authentication method, device, equipment and medium
WO2020147439A1 (en) * 2019-01-18 2020-07-23 深圳壹账通智能科技有限公司 Image processing method, image verification method, apparatus, device and medium
CN113141542A (en) * 2020-01-20 2021-07-20 亦非云互联网技术(上海)有限公司 Video stream safe playing system, method, medium and server based on block chain
CN113938702A (en) * 2020-07-13 2022-01-14 富泰华工业(深圳)有限公司 Multimedia data stream tamper-proof device, method and medium based on block chain system
CN115396344A (en) * 2021-05-08 2022-11-25 华为技术有限公司 Method, device and equipment for detecting link
CN114760533A (en) * 2022-05-17 2022-07-15 北京达佳互联信息技术有限公司 Check value storage method, frame data check device and electronic equipment
CN114760533B (en) * 2022-05-17 2024-04-09 北京达佳互联信息技术有限公司 Check value storage method, frame data check method, device and electronic equipment
CN115499138A (en) * 2022-11-16 2022-12-20 成都同步新创科技股份有限公司 High-performance storage tamper-proof verification method and storage system combined with block chain

Similar Documents

Publication Publication Date Title
CN109040783A (en) A kind of video anti-counterfeiting system, method and device
CN109067541B (en) Data verification method and device based on block chain and electronic equipment
TWI715999B (en) Identification method and device of identity information
US20190163925A1 (en) System and method for monitoring and verifying software behavior
CN107395557A (en) A kind of processing method and processing device of service request
EP3652885B1 (en) Secure token passing via blockchains
US20020156724A1 (en) System and method for depicting on-line transactions
US11182873B2 (en) Multiple source watermarking for surveillance
CN105681380B (en) Client off-line method and its system
CN110213380B (en) Message pushing method and device, computer equipment and storage medium
CN107465660A (en) A kind of video flowing address method for authenticating and device
CN112163412B (en) Data verification method and device, electronic equipment and storage medium
CN107612877A (en) Verify the methods, devices and systems of multimedia file legitimacy
CN111177795A (en) Method, device and computer storage medium for identifying video tampering by using block chain
CN110796269B (en) Method and device for generating model, and method and device for processing information
CN109034135A (en) A kind of art work method for anti-counterfeit and device based on block chain
CN108875478A (en) The testimony of a witness unifies checking method, device and system and storage medium
CN112668453A (en) Video identification method and related equipment
CN108876405A (en) Product traceability records processing method, device and electronic equipment
CN107016043A (en) A kind of information processing method and device
CN107995167B (en) Equipment identification method and server
CN113872772B (en) Video segment shooting device and time recording method and corresponding verification method
CN110472128A (en) Webpage evidence collecting method, device, storage medium and server based on image recognition
CN106790160B (en) Security level identification and method of calibration and device
CN108595957A (en) Main browser page altering detecting method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218