CN109214425B - Picture verification method, picture processing method, equipment and system - Google Patents

Picture verification method, picture processing method, equipment and system Download PDF

Info

Publication number
CN109214425B
CN109214425B CN201810893051.XA CN201810893051A CN109214425B CN 109214425 B CN109214425 B CN 109214425B CN 201810893051 A CN201810893051 A CN 201810893051A CN 109214425 B CN109214425 B CN 109214425B
Authority
CN
China
Prior art keywords
time
picture
verified
information
time information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810893051.XA
Other languages
Chinese (zh)
Other versions
CN109214425A (en
Inventor
李川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Inc
Original Assignee
Goertek Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Inc filed Critical Goertek Inc
Priority to CN201810893051.XA priority Critical patent/CN109214425B/en
Publication of CN109214425A publication Critical patent/CN109214425A/en
Application granted granted Critical
Publication of CN109214425B publication Critical patent/CN109214425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/758Involving statistics of pixels or of feature values, e.g. histogram matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/29Graphical models, e.g. Bayesian networks

Abstract

The embodiment of the application provides a picture verification method, a picture processing method, equipment and a system. The method comprises the following steps: receiving picture information to be verified sent by a terminal; the time information to be verified contained in the picture information to be verified is forwarded to the time service equipment, so that the time service equipment verifies the authenticity of the time information to be verified; receiving a time authenticity verification result fed back by the time service equipment, and locally searching corresponding target characteristic data according to time information to be verified when the time authenticity verification result is true; and verifying whether the picture information to be verified is true or not according to the searching condition of the target characteristic data. According to the technical scheme provided by the embodiment of the application, the pictures and the generation time of the pictures are subjected to double verification, the safety of the whole verification system can be improved, and the target characteristic data for verification is stored in the authentication equipment in advance, so that the verification error caused by falsification of the pictures and complete replacement of the target characteristic data for verification by a counterfeiter in the prior art can be avoided.

Description

Picture verification method, picture processing method, equipment and system
Technical Field
The invention relates to the technical field of internet, in particular to a picture verification method, a picture processing method, equipment and a system.
Background
With the development of artificial intelligence technology, the technology of image processing is rapidly developed. The new technology represented by GAN (generic adaptive Networks) technology can modify the content of the picture conveniently. For example: new tools such as CycleGAN are developed in recent years. These new tools can modify the photo pixel by pixel based on deep learning, and as long as the modification of the content in the photo does not involve deformation of the object, the modification result cannot be found out as a failure. When a photograph needs to be made legal proof, it needs to be proven that the photograph is authentic and has not been tampered with. In a legal sense, any photograph that cannot be certified as not being tampered with cannot be used as evidence for forensic adoption.
In the prior art, a sender and a receiver usually agree a hash algorithm in advance, before sending a picture, the sender calculates the picture by adopting the agreed hash algorithm to obtain a hash value, and sends the hash value and the picture to the receiver at the same time, after receiving the picture and the hash value, the receiver calculates the picture by adopting the agreed hash algorithm to obtain the hash value, and if the calculated hash value is the same as the received hash value, the picture is determined to be real.
Because the whole existing scheme is based on the open hash algorithm, a counterfeiter can completely tamper the picture, and then complete flow of one time by using the open hash algorithm can cheat the receiver. Therefore, the verification method in the prior art is poor in safety and difficult to ensure the authenticity of the picture.
Disclosure of Invention
In view of the above, the present application is proposed to provide a picture verification method, a picture processing method, a device and a system that solve the above problems, or at least partially solve the above problems.
Thus, in one embodiment of the present application, a picture verification method is provided. The method comprises the following steps:
receiving picture information to be verified sent by a terminal;
the time information to be verified contained in the picture information to be verified is forwarded to the time service equipment, so that the time service equipment verifies the authenticity of the time information to be verified;
receiving a time authenticity verification result fed back by the time service equipment, and locally searching corresponding target characteristic data according to time information to be verified when the time authenticity verification result is true;
and verifying whether the picture information to be verified is true or not according to the searching condition of the target characteristic data.
In yet another embodiment of the present application, a picture verification method is provided. The method comprises the following steps:
receiving to-be-verified time information in to-be-verified picture information forwarded by an authentication device, wherein the to-be-verified picture information is sent to the authentication device by a terminal;
verifying the authenticity of the time information to be verified;
and feeding back the time authenticity verification result to the identification equipment so that the identification equipment locally searches the corresponding target characteristic data according to the time information to be verified when the time authenticity verification result is true, and verifies whether the picture information to be verified is true according to the searching condition of the target characteristic data.
In yet another embodiment of the present application, a picture processing method is provided. The method comprises the following steps:
receiving characteristic data generated by a terminal for a picture;
sending a time information acquisition request to the time service equipment, and receiving time information which is fed back by the time service equipment and is generated for the picture;
the characteristic data and the time information are stored locally in a correlated manner;
and forwarding the time information to the terminal so that the terminal adds the time information to the picture information corresponding to the picture.
In yet another embodiment of the present application, a picture processing method is provided. The method comprises the following steps:
receiving a time information acquisition request sent by an authentication device when receiving characteristic data generated by a terminal for a picture;
generating time information for the picture;
and sending the time information to the authentication equipment so that the authentication equipment locally stores the characteristic data and the time information in an associated manner, and forwarding the time information to the terminal so that the terminal stores the time information into the picture information corresponding to the picture.
In yet another embodiment of the present application, an authentication apparatus is provided. The apparatus, comprising: a first memory and a first processor; the first memory is used for storing one or more computer instructions, and the one or more computer instructions can realize the steps of any one of the above picture verification methods when being executed by the first processor; and/or the first memory is used for storing one or more computer instructions, and the one or more computer instructions can realize the steps of any one of the above-mentioned picture processing methods when being executed by the first processor.
In yet another embodiment of the present application, a time service device is provided. The apparatus, comprising: a second memory and a second processor; the second memory is used for storing one or more computer instructions, and the one or more computer instructions can realize the steps of any one of the above picture verification methods when being executed by the second processor; and/or the second memory is used for storing one or more computer instructions, and the one or more computer instructions can realize the steps of any one of the above-mentioned picture processing methods when being executed by the second processor.
In yet another embodiment of the present application, a picture verification system is provided. The system, comprising: the authentication device and the time service device.
According to the technical scheme provided by the embodiment of the application, the picture and the generation time of the picture are verified doubly, and the verification of the picture and the verification of the generation time of the picture are respectively executed by the authentication device and the time service device, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of a picture verification method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a picture verification method according to another embodiment of the present application;
fig. 3 is a schematic flowchart of a picture processing method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a picture processing method according to another embodiment of the present application;
fig. 5 is a block diagram of a picture verification apparatus according to an embodiment of the present application;
FIG. 6 is a block diagram of a picture verification apparatus according to another embodiment of the present application;
fig. 7 is a block diagram of a picture processing apparatus according to an embodiment of the present application;
FIG. 8 is a block diagram of a picture processing apparatus according to another embodiment of the present application;
fig. 9 is a block diagram of an authentication apparatus according to an embodiment of the present application;
fig. 10 is a block diagram of a time service device according to an embodiment of the present application;
fig. 11 is a block diagram of a picture verification system according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
In some of the flows described in the specification, claims, and above-described figures of the present invention, a number of operations are included that occur in a particular order, which operations may be performed out of order or in parallel as they occur herein. The sequence numbers of the operations, such as S101, S102, etc., are merely used to distinguish between the various operations, and the sequence numbers themselves do not represent any execution order. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows a schematic flow chart of a picture verification method according to an embodiment of the present application. The execution subject of the method provided by the embodiment of the application can be an authentication device. The authentication device may be a general server, a cloud, or a virtual server, and the like, which is not specifically limited in this embodiment of the present application. As shown in fig. 1, the method includes:
s101, receiving picture information to be verified sent by a terminal.
S102, the time information to be verified contained in the picture information to be verified is forwarded to the time service equipment, so that the time service equipment verifies the authenticity of the time information to be verified.
S103, receiving a time authenticity verification result fed back by the time service equipment, and locally searching corresponding target characteristic data according to the time information to be verified when the time authenticity verification result is true.
And S104, verifying whether the picture information to be verified is true or not according to the searching condition of the target characteristic data.
In S101, the terminal may be a mobile phone, a computer, an MP4, a camera, or the like. The picture information to be verified comprises a picture to be verified and time information to be verified. The time information to be verified can be stored at the tail of the picture file to be verified and used as additional information of the picture to be verified.
In the step S102, the time information to be verified is forwarded to the time service device, and the time service device performs the authenticity verification on the time information to be verified after receiving the time information to be verified. If the time information to be verified passes the verification, the time authenticity verification result is true; and if the time information to be verified is not verified, the time authenticity verification result is false.
In one implementation, the time information to be verified may include a timestamp and a time cipher text. The time ciphertext can be generated for the picture to be verified by the time service equipment when the picture to be verified is generated by photographing. Specifically, when receiving characteristic data generated by a picture obtained by photographing by a terminal, an authentication device sends a time information acquisition request to a time service device, the time service device generates a time plaintext based on the time information acquisition request, encrypts the time plaintext to obtain a time ciphertext, sends the time plaintext and the time ciphertext as time information to the authentication device, and forwards the time information to the terminal by the authentication device. Correspondingly, the process of verifying the authenticity of the time information to be verified by the time service equipment can comprise the following steps: decrypting the time ciphertext to obtain a time plaintext; comparing the time plaintext with the time stamp; if the time is consistent with the time, the time authenticity verification result is true; if not, the time authenticity verification result is false.
It should be added that, when the time stamp in the time information to be verified is not tampered with, the time stamp is the time plaintext generated by the time service device.
In S103, the association relationship between the time information and the feature data may be stored locally (for example, in an internal storage space of the authentication device). The characteristic data can be obtained by processing a corresponding picture by the terminal and sent to the identification equipment for storage; the time information can be generated in advance for the corresponding picture by the time service equipment and sent to the identification equipment for storage. And when storing, associating and storing the time information and the characteristic data of the same picture so as to obtain the association relation between the time information and the characteristic data.
And if the time authenticity verification result fed back by the time service equipment is true, searching target characteristic data corresponding to the time information to be verified locally according to the incidence relation between the time information and the characteristic data.
In addition, if the time authenticity verification result fed back by the time service equipment is false, the picture information to be verified can be judged to be false.
In the above S104, if the target feature data corresponding to the time information to be verified is not found, which indicates that the time information to be verified is forged and not true, it may be determined that the picture information to be verified is false. If the target characteristic data corresponding to the time information to be verified is found, it is indicated that the time information to be verified is not forged and is real, and therefore whether the picture information to be verified is true or not needs to be further verified according to the target characteristic data.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
In an implementation scheme, the step S104 of "verifying whether the picture information to be verified is true according to the search condition of the target feature data" may specifically be implemented by the following steps:
s1041, when the target characteristic data corresponding to the time information to be verified cannot be found, judging that the picture information to be verified is false.
S1042, when the target characteristic data corresponding to the time information to be verified is found, calculating the picture to be verified in the picture information to be verified by adopting a preset algorithm to obtain the characteristic data to be verified.
And S1043, comparing the target characteristic data with the characteristic data to be checked.
And S1044, if the picture information to be verified is true, judging the picture information to be verified to be true.
And S1045, if the picture information to be verified is not consistent, judging that the picture information to be verified is false.
The preset algorithm is a hash algorithm agreed by the authentication device and the terminal in advance, and the target characteristic data and the characteristic data to be verified are hash values. The preset algorithm can adopt a SHA-256 algorithm with better safety.
In the above S1042, hash calculation may be performed on the picture to be verified by using an SHA-256 algorithm, so as to obtain feature data to be verified.
When the target characteristic data is consistent with the characteristic data to be verified, the picture to be verified is not tampered and is a real picture. When the target characteristic data is inconsistent with the characteristic data to be verified, the picture to be verified is a tampered picture and is not a real picture.
In this embodiment, the time information to be verified can be confirmed again by searching the target feature data, which is beneficial to improving the validity of the verification result. Moreover, when the picture to be verified is verified, the target feature data for verification is also stored in the authentication device in advance. When verification is carried out, the terminal only needs to send the picture to be verified and the time information to be verified, and does not need to send target feature data for verification, so that the defect that the picture to be verified and the target feature data are completely replaced when verification is carried out completely according to the picture to be verified and the target feature data sent by the terminal in the prior art is avoided.
Furthermore, in order to further improve the communication safety between the authentication device and the time service device, the identity of the time service device can be verified, so that other devices can be prevented from being falsely used as the time service device. Specifically, the method may further include:
and S105, before the communication with the time service equipment, carrying out identity verification on the time service equipment.
And S106, after the identity authentication is passed, establishing communication connection or encryption communication connection with the time service equipment.
In the above S105, before forwarding the time information to be verified to the time service device, a first identity verification request may be sent to the time service device; and after receiving the first identity authentication request, the time service equipment returns the local first digital certificate to the authentication equipment, so that the authentication equipment performs identity authentication on the time service equipment according to the received first digital certificate. The specific process of performing identity verification based on the first digital certificate can be referred to in the prior art, and is not described in detail herein.
In the above S106, after the authentication of the time service device is passed, the authentication device may establish a communication connection or an encrypted communication connection with the time service device. And subsequently, sending and receiving the time information to be verified and the time authenticity verification result through the established communication connection or the encrypted communication connection.
In the above S106, "after the authentication passes, an encrypted communication connection is established with the time service device", the specific process is as follows: after the identity authentication is passed, the authentication equipment and the time service equipment agree on a symmetric encryption key; and subsequently, during data transmission, the authentication equipment and the time service equipment adopt the symmetric encryption key for encryption transmission.
For example: the authentication equipment encrypts the time information to be verified by adopting an agreed symmetric encryption key and then forwards the encrypted time information to the time service equipment, and the time service equipment decrypts the encrypted time information to be verified by adopting the agreed symmetric encryption key after receiving the encrypted time information to be verified to obtain the time information to be verified. The time service equipment encrypts the time authenticity verification result by adopting an agreed symmetric encryption key and then sends the time authenticity verification result to the identification equipment, and the identification equipment decrypts the encrypted time authenticity verification result by adopting the agreed symmetric encryption key to obtain the time authenticity verification result.
Specifically, the authentication device and the time service device can communicate in an HTTPS communication mode, so that communication content is prevented from being eavesdropped or tampered. Specific implementations can be found in the prior art and will not be described in detail herein.
Further, the method may further include:
s107, when characteristic data generated by the terminal for the photographed picture are received, a time information acquisition request is sent to the time service equipment, and time information generated for the picture and fed back by the time service equipment is received.
And S108, forwarding the time information to the terminal so that the terminal adds the time information to the picture information corresponding to the picture.
And S109, storing the time information and the characteristic data in a local correlation mode.
In S107, when the terminal obtains the picture by taking a picture, the terminal may calculate the picture by using a preset algorithm agreed with the authentication device in advance to obtain the feature data, and when the preset algorithm is a hash algorithm (for example, SHA-256 algorithm), the feature data may be understood as a hash value. And when the characteristic data sent by the terminal is received, a time information acquisition request can be sent to the time service equipment. And when receiving the time information acquisition request, the time service equipment generates time information for the picture. The time service device may generate the time information based on the time of receipt of the time information acquisition request. The specific process of generating the time information by the time service device will be described in detail in the following embodiments.
In the above S108, after receiving the time information generated for the picture fed back by the time service device, the time information is forwarded to the terminal, so that the terminal adds the time information to the picture information corresponding to the picture, for example: and adding the picture file tail part as the additional information of the picture.
In S109, the time information is stored locally in association with the feature data transmitted from the terminal.
Fig. 2 is a schematic flowchart illustrating a picture verification method according to another embodiment of the present application. The execution main body of the method provided by the embodiment of the application can be time service equipment. The time service device may be a general server, a cloud end or a virtual server, etc., which is approved by an industry organization or provided by a government organization for time service and time verification, and this is not particularly limited in this embodiment of the application. As shown in fig. 2, the method includes:
s201, receiving to-be-verified time information in to-be-verified picture information forwarded by an authentication device, wherein the to-be-verified picture information is sent to the authentication device by a terminal.
S202, verifying the authenticity of the time information to be verified.
S203, feeding back the time authenticity verification result to the identification device so that the identification device locally searches the corresponding target characteristic data according to the time information to be verified when the time authenticity verification result is true, and verifying whether the picture information to be verified is true according to the search condition of the target characteristic data.
The above S201 to S203 refer to the corresponding contents in the above embodiments, and are not described herein again.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
In an implementation scheme, the time information to be verified comprises a time stamp and a time ciphertext; the time ciphertext is forwarded to the terminal through the authentication device after being encrypted, the time plaintext is generated based on a time information acquisition request sent by the authentication device, and the time information acquisition request is sent by the authentication device when the authentication device receives characteristic data generated by a picture obtained by photographing for the terminal. Correspondingly, in the above S202, "verifying the authenticity of the time information to be verified" may specifically be implemented by the following steps:
s2021, the time ciphertext is decrypted to obtain a time plaintext.
S2022, comparing the time plaintext with the time stamp.
And S2023, if the time authenticity is consistent, the time authenticity verification result is true.
And S2024, if the time authenticity is not consistent, the time authenticity verification result is false.
In the above S2021, the time service device may use a static password or a dynamic password to encrypt and decrypt the time plaintext, which is not specifically limited in this embodiment of the present application. The static password refers to that the same password is adopted for encryption and decryption aiming at all time plaintexts; dynamic encryption refers to encryption and decryption of plaintext using different passwords at different times. Compared with the static password, the dynamic password is adopted to encrypt and decrypt the time plaintext, so that the difficulty of guessing the password by a counterfeiter can be increased.
If the dynamic password is used to encrypt and decrypt the plaintext, the step S2021 may specifically include:
and S11, acquiring the target password corresponding to the time interval of the timestamp.
And S12, decrypting the time ciphertext by using the target password to obtain the time plaintext.
For example: each day is divided into 24 time intervals in advance, and different passwords are correspondingly set in different time intervals, for example: the point 0-1 corresponds to the password A, the point 1-2 corresponds to the password B, the point 2-3 corresponds to the password C, and the like. And the time stamp is 1 point 04 points on 30 days of 7 months and 7 months in 2018, the time interval of the time stamp is determined to be 1 point-2 points, and the target password is B. And decrypting the time ciphertext by adopting the target password B to obtain a time plaintext.
Further, in order to avoid the imposition of someone as an authentication device, the authentication device may be authenticated. Specifically, the method may further include:
and S204, before communicating with the authentication equipment, authenticating the authentication equipment.
And S205, after the identity authentication is passed, establishing communication connection or encryption communication connection with the authentication equipment.
In the above S204, before receiving the time information to be authenticated, a second authentication request may be sent to the authentication device; and after receiving the second identity authentication request, the authentication equipment returns the local second digital certificate to the time service equipment, and the time service equipment performs identity authentication on the authentication equipment according to the received second digital certificate. The specific process of performing identity verification based on the second digital certificate can be referred to in the prior art, and is not described in detail herein.
In S205, after the authentication of the authentication device is passed, the time service device may establish a communication connection or an encrypted communication connection with the authentication device. And subsequently, sending and receiving the time information to be verified and the time authenticity verification result through the established communication connection or the encrypted communication connection.
In the above S205, "after the authentication passes, an encrypted communication connection is established with the authentication device", which includes the specific processes: after the identity authentication is passed, the authentication equipment and the time service equipment agree on a symmetric encryption key; and subsequently, during data transmission, the authentication equipment and the time service equipment adopt the symmetric encryption key for encryption transmission.
For example: the authentication equipment encrypts the time information to be verified by adopting an agreed symmetric encryption key and then forwards the encrypted time information to the time service equipment, and the time service equipment decrypts the encrypted time information to be verified by adopting the agreed symmetric encryption key after receiving the encrypted time information to be verified to obtain the time information to be verified. The time service equipment encrypts the time authenticity verification result by adopting an agreed symmetric encryption key and then sends the time authenticity verification result to the identification equipment, and the identification equipment decrypts the encrypted time authenticity verification result by adopting the agreed symmetric encryption key to obtain the time authenticity verification result.
Specifically, the authentication device and the time service device can communicate in an HTTPS communication mode, so that communication content is prevented from being eavesdropped or tampered. Specific implementations can be found in the prior art and will not be described in detail herein.
Further, the method may further include:
s206, receiving a time information acquisition request sent by the authentication device, wherein the time information acquisition request is sent when the authentication device receives characteristic data generated by the terminal for the photographed picture.
And S207, acquiring a time plaintext corresponding to the current time.
And S208, encrypting the time plaintext to obtain a time ciphertext.
S209, combining the time plaintext and the time ciphertext into time information, returning the time information to the identification equipment, enabling the identification equipment to store the time information and the characteristic data in a local mode in an associated mode, and forwarding the time information to the terminal so that the terminal can add the time information to the picture information corresponding to the picture.
In the above S206, when the terminal obtains the picture by taking a picture, the terminal may calculate the picture by using a preset algorithm agreed with the authentication device in advance to obtain the feature data, and when the preset algorithm is a hash algorithm (for example, SHA-256 algorithm), the feature data may be understood as a hash value. When the identification equipment receives the characteristic data sent by the terminal, the identification equipment can send a time information acquisition request to the time service equipment.
In S207, the current time may be a receiving time when the time service device receives the time information acquisition request or a processing time when the time service device processes the time information acquisition request. The embodiment of the present application is not particularly limited to this. The current time can be regarded as the picture generation time provided by the time service device for the picture. The time plaintext corresponding to the current time is also the timestamp corresponding to the current time.
In the above S208, the time service device may use a static password or a dynamic password to encrypt and decrypt the time plaintext, which is not specifically limited in this embodiment of the present application. The static password refers to that the same password is adopted for encryption and decryption aiming at all time plaintexts; dynamic encryption refers to encryption and decryption of plaintext using different passwords at different times. Compared with the static password, the dynamic password is adopted to encrypt and decrypt the time plaintext, so that the difficulty of guessing the password by a counterfeiter can be increased.
If the dynamic password is used to encrypt and decrypt the plaintext, step S208 may specifically include:
s2081, obtaining the target password corresponding to the time interval where the plain text of the time is located.
S2082, encrypting the time plaintext by adopting the target password to obtain a time ciphertext.
For example: each day is divided into 24 time intervals in advance, and different passwords are correspondingly set in different time intervals, for example: the point 0-1 corresponds to the password A, the point 1-2 corresponds to the password B, the point 2-3 corresponds to the password C, and the like. And the time plaintext is 1 point 04 minutes in 7 and 30 months in 2018, the time interval in which the time plaintext is located is determined to be 1 point-2 points, and the target password is B. And encrypting the time plain text by adopting the target password B to obtain a time ciphertext.
In S209, the authentication device may store the time ciphertext in the time information and the feature data in a local association, and then search for corresponding feature data according to the time ciphertext.
Here, it should be noted that: for specific implementation of each step in the embodiments of the present application, parts that are not elaborated in this embodiment may refer to relevant contents in the above embodiments, and details are not described here.
Fig. 3 is a schematic flowchart illustrating a picture processing method according to another embodiment of the present application. The execution subject of the method provided by the embodiment of the application can be an authentication device. The authentication device may be a general server, a cloud, or a virtual server, and the like, which is not specifically limited in this embodiment of the present application. As shown in fig. 3, the method includes:
s301, receiving characteristic data generated by the terminal for the picture.
S302, sending a time information acquisition request to the time service equipment, and receiving time information which is generated for the picture and fed back by the time service equipment.
And S303, associating and storing the characteristic data and the time information to the local.
S304, the time information is forwarded to the terminal, so that the terminal adds the time information to the picture information corresponding to the picture.
The above S301 to S304 can refer to the corresponding contents in the above embodiments, and are not described herein again.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
And the characteristic data and the time information are stored locally in an associated manner, so that a foundation is laid for verifying the authenticity of the picture in the future.
Further, in order to improve the communication security between the terminal and the authentication device, the terminal and the authentication device may use public and private keys for data encryption transmission. The authentication device may generate a pair of a public key and a private key in advance, the public key being sent to the terminal, the private key being stored locally. That is, the feature data in S301 is public key encrypted data. Specifically, the method may further include:
s305, decrypting the public key encrypted data by using a private key to obtain decrypted characteristic data;
correspondingly, the step S303 of associating and storing the feature data and the time information to the local may specifically include: and storing the decrypted characteristic data and the time information to the local in an associated manner. For example: and performing associated storage on the decrypted characteristic data and the time ciphertext in the time information.
In an implementation scheme, the "forwarding time information to the terminal" in S304 above may be implemented by the following steps:
s3041, encrypting the time information with a private key.
S3042, the encrypted time information is forwarded to the terminal.
The authentication device encrypts the time information by adopting a private key and then sends the time information to the terminal, and the terminal decrypts the time information by adopting a public key of the authentication device which is locally stored after receiving the encrypted time information to obtain the time information.
Here, it should be noted that: for specific implementation of each step in the embodiments of the present application, parts that are not elaborated in this embodiment may refer to relevant contents in the above embodiments, and details are not described here.
Fig. 4 is a flowchart illustrating a picture processing method according to another embodiment of the present application. The execution main body of the method provided by the embodiment of the application can be time service equipment. The time service device may be a general server, a cloud end or a virtual server, etc., which is approved by an industry organization or provided by a government organization for time service and time verification, and this is not particularly limited in this embodiment of the application. As shown in fig. 4, the method includes:
s401, receiving a time information acquisition request sent by the authentication device when the characteristic data generated by the terminal for the picture is received.
And S402, generating time information for the picture.
And S403, sending the time information to the authentication equipment so that the authentication equipment stores the characteristic data and the time information in a local association mode, and forwarding the time information to the terminal so that the terminal stores the time information into the picture information corresponding to the picture.
The above S401 to S403 can refer to corresponding contents in the above embodiments, and are not described herein again.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
In an implementation scheme, the above-mentioned "generating time information for the picture" in 402 can be implemented by the following steps:
s4021, acquiring a time plaintext corresponding to the current time.
S4022, encrypting the time plaintext to obtain a time ciphertext.
S4023, combining the time plaintext and the time ciphertext into time information.
For the above S4021 to S4023, reference may be made to the corresponding contents in the above embodiments, which are not described herein again.
Specifically, the step of "encrypting the time plaintext to obtain the time ciphertext" in S4022 includes:
and S41, acquiring the target password corresponding to the time interval where the time plaintext is located.
And S42, encrypting the time plaintext by adopting the target password to obtain a time ciphertext.
The above-mentioned S41 and S42 can also refer to the corresponding contents in the above-mentioned embodiments, and are not described herein again.
The time service equipment directly generates time information without external input, so that a counterfeiter can be prevented from modifying the equipment time to deceive the time service equipment. Because the time has irreversibility, the method for generating the time information by the time service equipment is completely secret, i.e. the time information is difficult to forge. And by verifying the time information, the possibility that the picture is replaced integrally is avoided.
Here, it should be noted that: for specific implementation of each step in the embodiments of the present application, parts that are not elaborated in this embodiment may refer to relevant contents in the above embodiments, and details are not described here.
Fig. 5 shows a block diagram of a picture verification apparatus according to an embodiment of the present application. As shown in fig. 5, the apparatus includes: a first receiving module 501, a first forwarding module 502, a second receiving module 503, and a first verifying module 504. Wherein the content of the first and second substances,
a first receiving module 501, configured to receive picture information to be verified, where the picture information is sent by a terminal;
the first forwarding module 502 is configured to forward the to-be-verified time information included in the to-be-verified picture information to the time service device, so that the time service device verifies whether the to-be-verified time information is true or false;
the second receiving module 503 is configured to receive a time authenticity verification result fed back by the time service device, and locally search corresponding target characteristic data according to time information to be verified when the time authenticity verification result is true;
the first verification module 504 is configured to verify whether the picture information to be verified is true according to the search condition of the target feature data.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
Further, the first verification module 504 may include:
the first judging unit is used for judging that the picture information to be verified is false when the target characteristic data corresponding to the time information to be verified cannot be searched;
the first calculating unit is used for calculating the picture to be verified in the picture information to be verified by adopting a preset algorithm when the target characteristic data corresponding to the time information to be verified is found, so as to obtain the characteristic data to be verified, wherein the target characteristic data and the characteristic data to be verified are hash values;
the first comparison unit is used for comparing the target characteristic data with the characteristic data to be checked;
the first judging unit is also used for judging the picture information to be verified to be true if the picture information is consistent with the picture information to be verified; and if the picture information to be verified is not consistent, judging that the picture information to be verified is false.
Further, the above apparatus may further include: the system comprises a second verification module and a first establishment module. Wherein the content of the first and second substances,
the second verification module is used for verifying the identity of the time service equipment before communicating with the time service equipment;
and the first establishing module is used for establishing communication connection or encrypted communication connection with the time service equipment after the identity authentication is passed.
Further, the above apparatus may further include: and the first judgment module is used for judging that the picture information to be verified is false when the time authenticity verification result fed back by the time service equipment is received as false.
Further, the above apparatus may further include: the device comprises a third receiving module, a second forwarding module and a first storage module.
The third receiving module is used for sending a time information acquisition request to the time service equipment when receiving the characteristic data generated by the terminal for the picture obtained by photographing, and receiving the time information generated for the picture fed back by the time service equipment;
the second forwarding module is used for forwarding the time information to the terminal so that the terminal adds the time information to the picture information corresponding to the picture;
and the first storage module is used for storing the time information and the characteristic data to the local in an associated manner.
Here, it should be noted that: the image verification apparatus provided in the above embodiments may implement the technical solutions described in the above method embodiments, and the specific implementation principle of each module or unit may refer to the corresponding content in the above method embodiments, and is not described herein again.
Fig. 6 shows a block diagram of a picture verification apparatus according to another embodiment of the present application. As shown in fig. 6, the apparatus includes: a fourth receiving module 601, a third verifying module 602 and a first feedback module 603. Wherein the content of the first and second substances,
the fourth receiving module 601 is configured to receive to-be-verified time information in to-be-verified picture information forwarded by the authentication device, where the to-be-verified picture information is sent to the authentication device by the terminal;
a third verifying module 602, configured to verify authenticity of the time information to be verified;
the first feedback module 603 is configured to feed back the time authenticity verification result to the authentication device, so that when the time authenticity verification result is true, the authentication device locally searches for corresponding target feature data according to the to-be-verified time information, and verifies whether the to-be-verified picture information is true according to a search condition of the target feature data.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
Further, the time information to be verified comprises a timestamp and a time ciphertext; the time ciphertext is generated based on a time information acquisition request sent by the authentication device when the authentication device receives characteristic data generated by the terminal for a picture obtained by photographing, and the time plaintext is encrypted and then forwarded to the terminal through the authentication device. Accordingly, the third verification module 602 may include:
the first decryption unit is used for decrypting the time ciphertext to obtain a time plaintext;
the second comparison unit is used for comparing the time plaintext with the time stamp; if the time is consistent with the time, the time authenticity verification result is true; if not, the time authenticity verification result is false.
Further, the first decryption unit is specifically configured to:
acquiring a target password corresponding to a time interval in which the timestamp is positioned;
and decrypting the time ciphertext by adopting the target password to obtain a time plaintext.
Further, the above apparatus may further include:
and the fourth verification module is used for verifying the identity of the authentication equipment before communicating with the authentication equipment.
And the second establishing module is used for establishing communication connection or encrypted communication connection with the authentication equipment after the authentication is passed.
And/or the presence of a gas in the gas,
the fifth receiving module is used for receiving a time information acquisition request sent by the authentication device, wherein the time information acquisition request is sent by the authentication device when the authentication device receives characteristic data generated by a picture obtained by photographing;
the first acquisition module is used for acquiring a time plaintext corresponding to the current time;
the first encryption module is used for encrypting a time plaintext to obtain a time ciphertext;
the first returning module is used for combining the time plaintext and the time ciphertext into time information and returning the time information to the identification equipment, so that the identification equipment stores the time information and the characteristic data in a local association mode, and forwards the time information to the terminal so that the terminal can add the time information to the picture information corresponding to the picture.
Here, it should be noted that: the image verification apparatus provided in the above embodiments may implement the technical solutions described in the above method embodiments, and the specific implementation principle of each module or unit may refer to the corresponding content in the above method embodiments, and is not described herein again.
Fig. 7 shows a block diagram of a picture processing apparatus according to another embodiment of the present application. As shown in fig. 7, the apparatus includes: a sixth receiving module 701, a first sending module 702, a second storing module 703 and a third forwarding module 704. Wherein the content of the first and second substances,
a sixth receiving module 701, configured to receive feature data generated by the terminal for the picture;
the first sending module 702 is configured to send a time information obtaining request to the time service device, and the sixth receiving module 701 is further configured to receive time information, which is generated for the picture and fed back by the time service device;
the second storage module 703 is configured to store the feature data and the time information in a local association manner;
and a third forwarding module 704, configured to forward the time information to the terminal, so that the terminal adds the time information to the picture information corresponding to the picture.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
Further, the characteristic data is public key encrypted data. The above apparatus may further include:
the first decryption module is used for decrypting the public key encrypted data by adopting a private key to obtain decrypted characteristic data;
the second storage module 703 is specifically configured to: and storing the decrypted characteristic data and the time information to the local in an associated manner.
Further, the third forwarding module 704 may include:
the first encryption unit is used for encrypting the time information by adopting a private key;
and the first forwarding unit is used for forwarding the encrypted time information to the terminal.
Here, it should be noted that: the image processing apparatus provided in the above embodiments may implement the technical solutions described in the above method embodiments, and the specific implementation principle of each module or unit may refer to the corresponding content in the above method embodiments, which is not described herein again.
Fig. 8 shows a block diagram of a picture processing apparatus according to another embodiment of the present application. As shown in fig. 8, the apparatus includes:
a seventh receiving module 801, configured to receive a time information obtaining request sent by the authentication device when receiving the feature data generated by the terminal for a picture.
A first generating module 802, configured to generate time information for the picture.
The second sending module 803 is configured to send the time information to the authentication device, so that the authentication device locally stores the feature data and the time information in an associated manner, and forwards the time information to the terminal, so that the terminal stores the time information in the picture information corresponding to the picture.
In the technical scheme provided by the embodiment of the application, the process of verifying the picture not only comprises the verification of the picture, but also comprises the verification of the picture generation time, and the verification of the picture generation time are respectively executed by the authentication equipment and the time service equipment, so that the safety of the whole verification system can be effectively improved; in addition, the target characteristic data used for verifying the picture is stored in the authentication device in advance, and is not sent together when the terminal sends the picture information to be verified, so that the verification error caused by falsifier tampering the picture and completely replacing the target characteristic data used for verification in the prior art can be effectively avoided.
Further, the first generating module 802 may include:
the first acquisition unit is used for acquiring a time plaintext corresponding to the current time;
the second encryption unit is used for encrypting the time plaintext to obtain a time ciphertext;
and the combining unit is used for combining the time plaintext and the time ciphertext into the time information.
Further, the second encryption unit is specifically configured to:
acquiring a target password corresponding to a time interval in which a time plaintext is located;
and encrypting the time plaintext by adopting the target password to obtain a time ciphertext.
Here, it should be noted that: the image processing apparatus provided in the above embodiments may implement the technical solutions described in the above method embodiments, and the specific implementation principle of each module or unit may refer to the corresponding content in the above method embodiments, which is not described herein again.
Fig. 9 is a block diagram showing a structure of an authentication apparatus according to still another embodiment of the present application. As shown in fig. 9, the authentication apparatus includes a first processor 1101 and a first memory 1102, the first memory 1102 is used for storing a program that enables the first processor 1101 to execute the picture verification method and/or the picture processing method provided by the above-described embodiments, and the first processor 1101 is configured to execute the program stored in the first memory 1102.
The program includes one or more computer instructions, where the one or more computer instructions are invoked for execution by the first processor 1101. One or more computer instructions, when executed by the first processor 1101, can implement the steps in the picture verification method and/or the picture processing method provided by the above-mentioned embodiments.
The first memory 1102, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the picture verification method and/or the picture processing method in the embodiment of the present invention (for example, the first receiving module 501, the first forwarding module 502, the second receiving module 503, and the first verifying module 504 shown in fig. 5). The first processor 1101 executes various functional applications and data processing of the authentication apparatus, that is, implements the picture authentication method and/or the picture processing method of the above-described method embodiments, by executing the nonvolatile software programs, instructions, and modules stored in the first memory 1102.
The first processor 1101 is configured to: receiving picture information to be verified sent by a terminal; the time information to be verified contained in the picture information to be verified is forwarded to the time service equipment, so that the time service equipment verifies the authenticity of the time information to be verified; receiving a time authenticity verification result fed back by the time service equipment, and locally searching corresponding target characteristic data according to time information to be verified when the time authenticity verification result is true; and verifying whether the picture information to be verified is true or not according to the searching condition of the target characteristic data.
And/or, the first processor 1101 is configured to: receiving characteristic data generated by a terminal for a picture; sending a time information acquisition request to the time service equipment, and receiving time information which is fed back by the time service equipment and is generated for the picture; the characteristic data and the time information are stored locally in a correlated manner; and forwarding the time information to the terminal so that the terminal adds the time information to the picture information corresponding to the picture.
The first processor 1101 may execute the method provided by the embodiment of the present invention, and has corresponding functional modules and beneficial effects of the execution method, and reference may be made to the method provided by the embodiment of the present application for technical details that are not described in detail in the embodiment.
Fig. 10 shows a block diagram of a time service device according to another embodiment of the present application. As shown in fig. 10, the time service device includes a second processor 1201 and a second memory 1202, where the second memory 1202 is used to store a program that supports the second processor 1201 to execute the picture verification method and/or the picture processing method provided in the foregoing embodiments, and the second processor 1201 is configured to execute the program stored in the second memory 1202.
The program comprises one or more computer instructions, wherein the one or more computer instructions are invoked for execution by the second processor 1201. One or more computer instructions, when executed by the second processor 1201, can implement the steps in the picture verification method and/or the picture processing method provided by the embodiments described above.
The second memory 1202 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the picture verification method and/or the picture processing method in the embodiment of the present invention (for example, the fourth receiving module 601, the third verification module 602, and the first feedback module 603 shown in fig. 6). The second processor 1201 executes various functional applications and data processing of the time service device by running the nonvolatile software program, instructions and modules stored in the second memory 1202, that is, implements the picture verification method and/or the picture processing method of the above method embodiments.
The second processor 1201 is configured to: receiving to-be-verified time information in to-be-verified picture information forwarded by an authentication device, wherein the to-be-verified picture information is sent to the authentication device by a terminal; verifying the authenticity of the time information to be verified; and feeding back the time authenticity verification result to the identification equipment so that the identification equipment locally searches the corresponding target characteristic data according to the time information to be verified when the time authenticity verification result is true, and verifies whether the picture information to be verified is true according to the searching condition of the target characteristic data.
And/or the second processor 1201 is configured to: receiving a time information acquisition request sent by an authentication device when receiving characteristic data generated by a terminal for a picture; generating time information for the picture; and sending the time information to the authentication equipment so that the authentication equipment locally stores the characteristic data and the time information in an associated manner, and forwarding the time information to the terminal so that the terminal stores the time information into the picture information corresponding to the picture.
The second processor 1201 can execute the method provided by the embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method, and reference may be made to the method provided by the embodiment of the present application for technical details that are not described in detail in the embodiment.
Fig. 11 shows a block diagram of a picture verification system according to another embodiment of the present application. As shown in fig. 11, the authentication device 1 in any of the above embodiments of the picture verification system and the time service device 2 provided in any of the above embodiments of the picture verification system.
The authentication device 1 is understood to be, among other things, a server of a manufacturer that produces terminals with camera functions. There may be a plurality of authentication devices 1 in the picture verification system, that is, each manufacturer corresponds to one authentication device 1, and the authentication devices 1 corresponding to each manufacturer are provided with a uniform external interface. The time service equipment 2 can be a time service center and is used for time service and time verification.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (12)

1. A picture verification method applied to an authentication device, the method comprising:
receiving picture information to be verified sent by a terminal;
forwarding the time information to be verified contained in the picture information to be verified to time service equipment so that the time service equipment can verify the authenticity of the time information to be verified;
receiving a time authenticity verification result fed back by the time service equipment, and locally searching corresponding target characteristic data according to the time information to be verified when the time authenticity verification result is true;
and verifying whether the picture information to be verified is true or not according to the searching condition of the target characteristic data.
2. The method according to claim 1, wherein verifying whether the picture information to be verified is true according to the search condition of the target feature data comprises:
when the target characteristic data corresponding to the time information to be verified cannot be searched, judging that the picture information to be verified is false;
when the target characteristic data corresponding to the time information to be verified is found, calculating a picture to be verified in the picture information to be verified by adopting a preset algorithm to obtain characteristic data to be verified, wherein the target characteristic data and the characteristic data to be verified are both hash values;
comparing the target characteristic data with the characteristic data to be checked;
if the picture information to be verified is consistent with the picture information to be verified, judging that the picture information to be verified is true;
and if the picture information to be verified is not consistent, judging that the picture information to be verified is false.
3. The method of claim 1, further comprising:
before communicating with the time service equipment, carrying out identity verification on the time service equipment;
and after the identity authentication is passed, establishing communication connection or encryption communication connection with the time service equipment.
4. The method according to any one of claims 1-3, further comprising:
and when the time authenticity verification result fed back by the time service equipment is received to be false, judging that the picture information to be verified is false.
5. The method according to any one of claims 1-3, further comprising:
when receiving characteristic data generated by the terminal for a picture obtained by photographing, sending a time information acquisition request to the time service equipment, and receiving time information which is fed back by the time service equipment and is generated for the picture;
forwarding the time information to the terminal so that the terminal adds the time information to the picture information corresponding to the picture;
and storing the time information and the characteristic data in a local mode in an associated mode.
6. A picture verification method is applied to time service equipment, and the method comprises the following steps:
receiving to-be-verified time information in to-be-verified picture information forwarded by an authentication device, wherein the to-be-verified picture information is sent to the authentication device by a terminal;
verifying the authenticity of the time information to be verified;
and feeding back the time authenticity verification result to the identification equipment so that the identification equipment locally searches corresponding target characteristic data according to the time information to be verified when the time authenticity verification result is true, and verifies whether the picture information to be verified is true according to the search condition of the target characteristic data.
7. The method according to claim 6, wherein the time information to be verified comprises a time stamp and a time ciphertext; the time ciphertext is forwarded to the terminal through the authentication device after being encrypted, the time plaintext is generated based on a time information acquisition request sent by the authentication device, and the time information acquisition request is sent by the authentication device when the authentication device receives characteristic data generated by a picture obtained by photographing for the terminal;
the verifying the authenticity of the time information to be verified comprises the following steps:
decrypting the time ciphertext to obtain a time plaintext;
comparing the time plaintext with the time stamp;
if the time is consistent with the time, the time authenticity verification result is true;
if not, the time authenticity verification result is false.
8. The method of claim 7, wherein decrypting the temporal ciphertext to obtain a temporal plaintext comprises:
acquiring a target password corresponding to a time interval where the timestamp is located;
and decrypting the time ciphertext by adopting the target password to obtain the time plaintext.
9. The method according to any one of claims 6-8, further comprising: authenticating the authentication device prior to communicating with the authentication device;
after the identity authentication is passed, establishing communication connection or encryption communication connection with the authentication equipment;
and/or the presence of a gas in the gas,
the method further comprises the following steps: receiving a time information acquisition request sent by the authentication device, wherein the time information acquisition request is sent by the authentication device when receiving characteristic data generated by the terminal for a picture obtained by photographing;
acquiring a time plaintext corresponding to the current time;
encrypting the time plaintext to obtain a time ciphertext;
combining the time plaintext and the time ciphertext into time information, returning the time information to the authentication equipment, enabling the authentication equipment to store the time information and the feature data in a local mode in an associated mode, and forwarding the time information to the terminal so that the terminal can add the time information to picture information corresponding to the picture.
10. An authentication apparatus comprising a first memory and a first processor; the first memory is used for storing one or more computer instructions, which when executed by the first processor are capable of implementing the steps of the picture verification method according to any of the preceding claims 1-5.
11. The time service equipment is characterized by comprising a second memory and a second processor; the second memory is used for storing one or more computer instructions, which when executed by the second processor are capable of implementing the steps of the picture verification method according to any of the preceding claims 6-9.
12. A picture verification system, comprising: an authentication device as claimed in claim 10 and a time service device as claimed in claim 11.
CN201810893051.XA 2018-08-07 2018-08-07 Picture verification method, picture processing method, equipment and system Active CN109214425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810893051.XA CN109214425B (en) 2018-08-07 2018-08-07 Picture verification method, picture processing method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810893051.XA CN109214425B (en) 2018-08-07 2018-08-07 Picture verification method, picture processing method, equipment and system

Publications (2)

Publication Number Publication Date
CN109214425A CN109214425A (en) 2019-01-15
CN109214425B true CN109214425B (en) 2022-04-12

Family

ID=64988159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810893051.XA Active CN109214425B (en) 2018-08-07 2018-08-07 Picture verification method, picture processing method, equipment and system

Country Status (1)

Country Link
CN (1) CN109214425B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109992683A (en) * 2019-04-09 2019-07-09 百度在线网络技术(北京)有限公司 Image information storage method, acquisition methods, terminal, server and medium

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4280439B2 (en) * 2000-11-17 2009-06-17 キヤノン株式会社 Image verification system, verification data conversion apparatus, program, and recording medium
US20030070075A1 (en) * 2001-10-04 2003-04-10 Frederic Deguillaume Secure hybrid robust watermarking resistant against tampering and copy-attack
JP2003244139A (en) * 2002-02-20 2003-08-29 Amano Corp Time stamp imprinting system to electronic document, and program medium thereof
CN100349168C (en) * 2003-06-23 2007-11-14 中国科学院研究生院 False proof bill, false proof method of bill and system thereof
CN102255894A (en) * 2011-06-28 2011-11-23 北龙中网(北京)科技有限责任公司 Website information verification method, system and resolution server
CN104995635B (en) * 2013-05-21 2018-03-06 华为技术有限公司 Picture sending method and device and terminal device
CN103310164B (en) * 2013-06-18 2016-03-09 齐宇庆 The verification method of E-seal figure and the verification method containing E-seal file
CN105989318A (en) * 2015-02-13 2016-10-05 福建新大陆电脑股份有限公司 Anti-counterfeit bill, and anti-counterfeit device and method thereof
CN106257483B (en) * 2015-06-16 2018-08-07 北京源创云网络科技有限公司 Processing method, equipment and the system of electronic data
CN105447642A (en) * 2015-11-27 2016-03-30 国网重庆市电力公司江津供电分公司 Engineering digital photograph verification system based on two-dimension code and verification method
CN105897428B (en) * 2016-04-28 2019-06-25 武汉大学 A kind of real-time video safety communication system and method based on iris recognition
CN107979467B (en) * 2016-10-21 2020-07-21 中国移动通信有限公司研究院 Verification method and device

Also Published As

Publication number Publication date
CN109214425A (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN109672539B (en) SM2 algorithm collaborative signature and decryption method, device and system
CN108199835B (en) Multi-party combined private key decryption method
CN110011958B (en) Information encryption method and device, computer equipment and storage medium
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
JP2007049708A (en) System and method for updating keys used for public key cryptography
CN110958209B (en) Bidirectional authentication method, system and terminal based on shared secret key
CN113472793B (en) Personal data protection system based on hardware password equipment
JP6167990B2 (en) Signature verification system, verification device, and signature verification method
US11888832B2 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
CN109905384B (en) Data migration method and system
CN110690969B (en) Method and system for achieving bidirectional SSL/TLS authentication through multiparty cooperation
CN113347143A (en) Identity authentication method, device, equipment and storage medium
CN114520726A (en) Processing method and device based on block chain data, processor and electronic equipment
US20240106633A1 (en) Account opening methods, systems, and apparatuses
CN113868684A (en) Signature method, device, server, medium and signature system
CN113918970A (en) Data processing method, communication device and storage medium
CN111565108B (en) Signature processing method, device and system
CN109214425B (en) Picture verification method, picture processing method, equipment and system
CN114760046A (en) Identity authentication method and device
CN115604034A (en) Encryption and decryption method and system for communication connection and electronic equipment
CN115766119A (en) Communication method, communication apparatus, communication system, and storage medium
CN114826659A (en) Encryption communication method and system
CN114944921A (en) Login authentication method and device, electronic equipment and storage medium
CN110572257B (en) Identity-based data source identification method and system
CN114598464B (en) Data updating method and controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant