CN106101100A - A kind of video content supervisory systems based on steganalysis and method - Google Patents

A kind of video content supervisory systems based on steganalysis and method Download PDF

Info

Publication number
CN106101100A
CN106101100A CN201610415213.XA CN201610415213A CN106101100A CN 106101100 A CN106101100 A CN 106101100A CN 201610415213 A CN201610415213 A CN 201610415213A CN 106101100 A CN106101100 A CN 106101100A
Authority
CN
China
Prior art keywords
video
steganalysis
supervision
video data
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610415213.XA
Other languages
Chinese (zh)
Other versions
CN106101100B (en
Inventor
张登银
李先阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201610415213.XA priority Critical patent/CN106101100B/en
Publication of CN106101100A publication Critical patent/CN106101100A/en
Application granted granted Critical
Publication of CN106101100B publication Critical patent/CN106101100B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention discloses a kind of video content supervisory systems based on steganalysis and method, this system realizes supervising the video data of certain unit integrated information platform.This system supervisory pattern is divided into two kinds: static supervision and dynamic supervision, video data is obtained respectively at the former video data center of unit integrated information platform and data access gateway, then steganalysis process is carried out, the result processed is analyzed and processes, thus realize the video data of certain unit integrated information platform is carried out static and dynamic dual effective supervision, ensure the secure dissemination of video data well.

Description

A kind of video content supervisory systems based on steganalysis and method
Technical field
The present invention relates to a kind of video content supervisory systems based on steganalysis and method, belong to information security technology neck Territory.
Background technology
Along with the fast development of the Internet, come into huge numbers of families, the network media particularly video contains much information by feat of it, Broad covered area and propagate the advantages such as information rate is fast, it has also become propagate the important medium of information.Internet era, the network media and Daily life is closely bound up, and rapid emergence has become the major way of Information Communication, also contributes to people's simultaneously Cultural life.CNNIC (CNNIC) issue " the 37th China Internet network state of development in 2016 Statistical report " middle display, by December, 2015, China's Internet video userbase reaches 5.04 hundred million, and Internet video user uses Rate is 73.2%, and the relatively end of the year 2014 add 6.5 percentage points.Wherein, mobile video userbase was 4.05 hundred million, with 2014 The end, is compared and increases 92,280,000, and rate of increase is 29.5%.Mobile phone network video utilization rate is 65.4%, compares and will increase for the end of the year 2014 9.2 percentage point.Online browse that video is widely used in network, the service such as download, communicate and share.
Video is double-edged sword equally, owing to its open and interactive information making video transmission the most more mixes, Often have bad information and cause bad impact.Moreover, the network media also relates to safety problem, as between some business Spy, terrorist etc. may utilize redundancy implicit in Internet video, propagate hidden flame, even plan certain A little terrorist activities.Having diversified steganography software in the Internet, oneself can be wanted that the information propagated is embedded into by steganography In media content, this technology is the most hidden, generally cannot distinguish and find information by naked eyes and audition, and only send out The person of sending and receiver know the transmission channel of this hidden information.Network security becomes more and more important, so at present in the urgent need to strengthening Supervision to Internet video content.
At present, the research for Internet video supervision is passive mode of operation mostly both at home and abroad, mainly at gateway Carrying out the supervision of filtering type, analysis and process to video content are the rarest.And video Steganalysis also immaturity, base Few the fewest of the research supervised in the video content of steganalysis.And the present invention can solve problem above well.
Summary of the invention
Present invention aim at for above-mentioned the deficiencies in the prior art, it is proposed that a kind of video content based on steganalysis Supervisory systems and method, the method gathers video data and carries out steganalysis, to static state from original video file center Video file is supervised.If user carries out real-time video alternately by unit integrated information platform, then can be at data access Gateway transmission RTP video data, so in data access gateway collection and identify RTP packet, and video data restoration is entered Row steganalysis processes, and dynamically supervises video content.Thus realize the video data content of integrated information platform is entered Row effectively supervision, ensures the secure dissemination of video data.
The present invention solves its technical problem and is adopted the technical scheme that: a kind of video content based on steganalysis is supervised The implementation method of system, the method comprises the steps:
Step 1: unified identity authentication.System manager logs into video content supervision by user name password authentification System;
Step 2: select the regulatory format of system.System support realizes static and dynamic supervision pattern;
Step 3: video data acquiring.According to the difference of regulatory format, the process gathering data is also different.
It is from the video file central store system of integrated information platform, obtain supervision video source under static regulatory format File;It is to capture from data access gateway to identify RTP packet under dynamic supervision pattern, and RTP video data restoration is become Video data is as the video source file of supervision;
Step 4: video steganalysis.The video data collected is carried out steganalysis, it is judged that whether video file has Steganography operates;
Step 5: analyzing and processing.According to the difference of regulatory format, the analyzing and processing process to supervision result is also different.
Static regulatory analysis processes: if video file supervision result is displayed without steganography operation, then explanation of marking regards Frequency file safety, otherwise removes the video file having steganography to operate to early warning storehouse, adds to blacklist, and this regards to cut off outer bound pair The access operation of frequency file.Later stage can be tracked investigation to being embedded in video file harmful classified information source.
Dynamic supervision analyzes and processes: if video file supervision result is displayed without steganography operation, the most do not make any process, The most just its source adds to data base.Information source is identified by IP and domain name, may select and adds black by this IP user List, cuts off and the network service of unit integrated information platform.
Present invention also offers a kind of video content supervisory systems based on steganalysis, this system include content monitoring and The big module of system administration two forms.Wherein content monitoring module includes video data acquiring, video steganalysis, analyzing and processing three Individual sub-function module forms.System management module includes that user manages and two sub-function module compositions of operational management.
The function of each module of present system includes:
Content monitoring module: major function is that the video data to integrated information platform is supervised.Including video data Collection, video steganalysis, three sub-function module of analyzing and processing.Video data acquiring sub-function module realizes video data and adopts The function of collection;Video steganalysis sub-function module realizes the video data collected is carried out feature selection and extraction, feature Merging, features training and strategy fusion etc. operate.Analyzing and processing sub-function module realizes entering the result of video steganalysis Row is analyzed and is processed, to the improvement after the video file supervision of integrated information platform.
System management module: major function be the user to system, run be managed, and to supervision data unite Meter is analyzed.Manage and two sub-function module of operational management including user.User manages sub-function module and mainly includes that user adds Add, subscriber information management, the function such as rights management and Role Management;Operational management sub-function module mainly include system configuration, The function such as log management and cache management.
Beneficial effect:
1, the present invention is applied to video content based on steganalysis supervision, it is possible to achieve to certain unit integrated information platform Video data carry out static and dynamic dual effective supervision, thus ensure the peace of the video file of unit integrated information platform Quan Xing.
2, the present invention achieves the video data content to integrated information platform well and effectively supervises, and ensures video The secure dissemination of data.
Accompanying drawing explanation
Fig. 1 is the video content supervisory systems schematic network structure of the present invention.
Fig. 2 is the video content supervisory systems high-level schematic functional block diagram of the present invention.
Fig. 3 is the static supervision schematic flow sheet of the present invention.
Fig. 4 is the dynamic supervision workflow schematic diagram of the present invention.
Fig. 5 is the RTP identification of data packets workflow schematic diagram of the present invention.
Fig. 6 is the RTP video data restoration schematic flow sheet of the present invention.
Fig. 7 is the video steganalysis workflow schematic diagram of the present invention.
Detailed description of the invention
Below in conjunction with Figure of description, the invention is described in further detail.
As shown in Figure 1 be the network structure of video content supervisory systems based on steganalysis of the present invention, describe The concrete application scenarios of native system and mode of operation.Detailed technical scheme is that video content supervisory systems is embedded in integrated information Platform, video data and user to video file central store carry out real-time, interactive communications by integrated information platform respectively Video data supervise.
As shown in Figure 2 be the video content supervisory systems functional module of the present invention.The present invention is originally by video content The functional requirement of supervisory systems enters after making thorough investigation and study for a long time, takes into full account application scenarios, designs the functional module of system It is divided into two main modular, is video content administration module and system management module respectively.Video content administration module includes regarding Frequently data acquisition, video steganalysis and three sub-function module compositions of analyzing and processing.System management module mainly includes user Management and two sub-function module compositions of operational management.
As shown in Figure 3 be the static supervision flow process of video content supervisory systems of the present invention.Detailed technical side Case is first to obtain video file from video data file storage system, then it is carried out video steganography process, the most right The video file being found to have steganography operation is analyzed processing, and is removed by this video file to early warning storehouse, adds to blacklist, cut The access operation of disconnected outer this video file of bound pair.Later stage can be tracked being embedded in video file harmful classified information source Investigation, thus reach the purpose of static supervision.
As shown in Figure 4 be the dynamic supervision workflow of video content supervisory systems of the present invention.Detailed technical side Case is first to capture packet from data access gateway, identifies RTP packet, and becomes to regard to RTP video data restoration Frequency file, then is analyzed processing to the video file being found to have steganography operation.Originated addition to data base.Information Source is identified by IP and domain name, the optional blacklist that this IP user added, cut-out and the net of unit integrated information platform Network communicates, thus reaches the purpose of dynamic supervision.
As shown in Figure 5 be the present invention video content supervisory systems video data acquiring module in RTP packet The idiographic flow identified.The PT territory in RTP packet header specifies load type, Real-time Transport Protocol allow in specific numerical range (96~ 127) it is the special data coding mode RTP bag of dynamically specifying PT value, given load of the present invention to be H.264 video data PT value in Tou is 97.When identifying RTP video bag, owing to the lower-layer protocols of RTP uses UDP (User Datagram Protocol: UDP), and the RTP bag only meeting RTPC3984 protocol encapsulation form is the most eligible, in detail Technical scheme be:
The first step: judge whether packet is UDP bag;
Second step: judge that UDP wraps whether layer one agreement is RTP;
3rd step: judge that whether the load format of RTP bag is any in NAL unit encapsulation, STAP-A encapsulation or FU-A A kind of.
Differentiate whether packet is UDP bag, only need to check a foot view thresholding in IP packet header in packet.If this territory 17, then Illustrate that this bag is UDP bag, the most not for UDP bag.
On the premise of this bag known is UDP bag, can judge in terms of six whether the bag received is RTP bag:
The first step: judge that whether the payload length of UDP bag is more than 12 bytes.Saved from 3.1.2, fixing of Rl, P packet header A length of 12 bytes, if therefore the payload length of UDP bag is less than 12 bytes, then this bag must not be for RTP bag;
Second step: judge in the load of UDP bag, whether corresponding v value is 2.Mountain is 2 in the v value of RTP bag, then observe UDP Whether two bits of the first character joint of bag load are 01, if then for RTP bag;
3rd step: judge in the load of UDP bag, whether corresponding PT value is 97.Owing to given load is H.264 video counts According to RTP packet header in PT value be 97, therefore can be judged by this condition;
4th step: in RTP packet header, CC represents the number in contribution source, in packet header, each contribution source CSRC accounts for 4 byte longs, then and one Individual RTP bag also can meet following restriction relation:
CC value × 4+12≤RTP packet header total length
If it is RTP that a UDP wraps layer, then its payload length at least otherwise is less than the length in a RTP packet header, the most again There is a following relation:
CC value × 4+12≤UDP payload length
Therefore the UDP bag of above-mentioned relation is not RTP bag;
5th step: in same session, the SSRC value of RTP bag should be identical.Therefore judge in the UDP bag load that detection is adjacent Corresponding SSRC value is the most identical;
6th step: judge continuously receive UDP bag load in correspondence position sequence number and The magnitude relationship of timestamp is the most identical.If finding the numerical value of these sequence number wrapped and timestarnp territory Corresponding relation with increase is identical, then may determine that this bag is RTP bag.The UDP bag that the most adjacent order receipt arrives need to be by certain big Little interim internal memory preserves.
Judge that whether RTP bag that oneself receives is any one in NAL unit encapsulation, STAP-A encapsulation or FU-A, only The type value in the load data head byte of this RTP bag need to be obtained.If this value scope is between 1-23, then this bag is NAL unit Bag;If value is 24, then this bag is STAP-A bag;If value is 28, then this bag is FU-A bag.This Bao Buwei video data is otherwise described Bag.
As shown in Figure 6 be the present invention video content supervisory systems video data acquiring module in RTP video counts According to carrying out the idiographic flow that reduces.The reduction of RTP video data to consider three aspects: first, and which kind of uses effectively store Structure preserves video data;Second, how to extract the H.264 video data in RTP bag;3rd, how by regarding of storing Frequency is according to synthesizing.Detailed technical scheme is:
The first step: the selection of storage organization
The selection of storage organization typically to consider in terms of two: asks complexity during a.;B. space complexity.Due to network On there is substantial amounts of packet, interception system must rapidly process data, otherwise one may because of processed slow and in causing Bag in depositing overflows.Now must use a kind of effective data store organisation, being quickly stored in and reading of video data can be supported Go out, and can be with the fewest memory storage video data as much as possible.Based on these two requirements, there is employed herein storage single Unit's size is 1500 bytes, and the circle queue of a length of 500 unit stores, and total size is about 50Ok.This structure Frequently inserting and deletion of support data, and it is made without the release of dynamic internal memory and distribution, the internal memory of fixed size is empty Between can Reusability.Data read-out is may wait for when queue full;The write of data is may wait for when queue empty.From time complexity Consider it is all optimal storage organization with space complexity.
Owing to the sequence number in RTP packet header and timestamp value indicate the transmission order of this bag, therefore Utilize this feature that the video data of RTP is ranked up herein.Test environment herein is in LAN, data during transmission Bag experienced interference is less.Its adjacent serial number of the RTP bag being captured continuously is spaced not over 10.Based on this premise, Wood literary composition uses direct insertion method, i.e. for block of video data to be sorted, first by its serial number and tail to the sequence of packet The serial number of indication compares, if more than the serial number of tail indication, then directly inserts data at tail of the queue, otherwise exchanges data, then Compare with the sequence one at tail-1, until the serial number of indication is less than the serial number treating deposit data at tail-n.Although inserting Enter the time complexity of sequence in the worst cases for O (n2), but the invariant in insertion sort make it when n is less, Come one relative to other sequences such as orderings by merging to say, ask more faster during operation.
Circle queue need to process queue empty and two kinds of situations of queue full.Herein when design system, tail pointer is by writing Data thread operates, and head pointer is to be operated by read data line journey.When the excessive velocities of read data line journey, may result in queue In data be empty, at this moment system can make reading thread time delay a period of time automatically so that in queue, the data of storage reach certain Reading thread is continued to run with during quantity;If the excessive velocities of write data line journey, then may result in data in queue and overflow, be at this moment System needs make to write thread and postpone a period of time, when making that in queue, data are read a part of, continue to run with and write threading operation.
Second step: the extraction of block of video data
The data being stored in circle queue are not simply to be stored in by RTP bag, but need to be by H.264 regarding in RTP bag Frequency is according to extracting, then is deposited into.For the bag that load format is NALU unit, remove RTP packet header, directly will residue Data are stored in circle queue unit;If RTP bag is STAP-A form, after removing RTP packet header, extract multiple NALU, then divide It is not stored in the unit of correspondence;If RTP bag encapsulates for FU-A, after removing RTP packet header, the data extracted are the burst of NALU. Need this burst of labelling in the position of whole NALU during storage.
3rd step: the synthesis of block of video data
Block of video data owing to being deposited in circle queue is the most sorted, then utilize head pointer to read data Time, only need to read in order.During reading, if data are burst NALU data, in addition it is also necessary to synthesized one Individual complete NALU;If a complete NALU, then can directly utilize decoder and be decoded or it is sequentially saved as one Video file.Data also need to consider whether adjacent orderly video data sequence number differs as l when reading, if not 1 explanation The sequence number of video data is the most orderly, also needs to wait for the data write of disappearance.As shown in Figure 7 be the present invention video in Hold the specific works flow process of the video steganalysis module of supervisory systems.Detailed technical scheme is summed up to get up mainly to include feature Selective extraction, Feature Fusion, features training and strategy merge.Due to the video file enormous amount of video website, to such an extent as to The video steganography method related to is a lot, the verification and measurement ratio wanting to reach higher just require as much as possible more options some be prone to steganography operation Feature, then extract.If feature comparison is many, so can serve impact by band, then then can first classify adds Enter in corresponding sub-classifier, carry out Feature Fusion training, reduce the dimension of feature, be unlikely to the biggest.Extraction feature is deposited Store up in feature database, along with the development of video steganalysis, new video steganography method also can constantly occur, thus special Levy storehouse and also can be continuously replenished new feature, the most perfect.Select the training learning method of support vector machine so that divide through each son Class device carries out steganalysis, then obtains a result, then carries out strategy fusion by majority voting method.The fusion results finally given Deposit to policy library.

Claims (3)

1. the implementation method of a video content supervisory systems based on steganalysis, it is characterised in that described method include as Lower step:
Step 1: unified identity authentication;System manager logs into video content supervisory systems by user name password authentification;
Step 2: select regulatory format;Described system support realizes static and dynamic supervision pattern;
Step 3: video data acquiring;According to the difference of regulatory format, the process gathering data is also different;
It is from the video file central store system of integrated information platform, obtain supervision video source file under static regulatory format; It is to capture from data access gateway to identify realtime transmission protocol RTP packet under dynamic supervision pattern, and by RTP video data It is reduced into the video data video source file as supervision;
Step 4: video steganalysis;The video data collected is carried out steganalysis, it is judged that whether video file has steganography Operation;
Step 5: analyzing and processing;According to the difference of regulatory format, the analyzing and processing process to supervision result is also different, bag Include:
Static regulatory analysis processes: if video file supervision result is displayed without steganography operation, then explanation video literary composition of marking Part safety, otherwise removes the video file having steganography to operate to early warning storehouse, adds to blacklist, cuts off this video literary composition of outer bound pair The access of part operates, and the later stage can be tracked investigation to being embedded in video file harmful classified information source;
Dynamic supervision analyzes and processes: if video file supervision result is displayed without steganography operation, the most do not make any process, otherwise Just its source adds to data base, and information source is identified by IP and domain name, may select and this IP user is added blacklist, Cut off and the network service of unit integrated information platform.
The implementation method of a kind of video content supervisory systems based on steganalysis the most according to claim 1, its feature Being, described method is applied to video content supervisory systems based on steganalysis.
3. a video content supervisory systems based on steganalysis, it is characterised in that described system includes content monitoring module And system management module;
Content monitoring module is that the video data to integrated information platform is supervised, including video data acquiring module, video Steganalysis module, analysis and processing module;Video data acquiring module is to video data acquiring;Video steganalysis module is The video data collected is carried out feature selection and extraction, Feature Fusion, features training and strategy mixing operation;At analysis Reason module is that the result to video steganalysis is analyzed and processes, to controlling after the video file supervision of integrated information platform Reason;
System management module be the user to system, run be managed, and to supervision data carry out statistical analysis;Including using Family management module and operational management module;User management module include user add, subscriber information management, rights management and role Management;Operational management module includes system configuration, log management and cache management.
CN201610415213.XA 2016-06-14 2016-06-14 A kind of implementation method of the video content supervisory systems based on steganalysis Active CN106101100B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610415213.XA CN106101100B (en) 2016-06-14 2016-06-14 A kind of implementation method of the video content supervisory systems based on steganalysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610415213.XA CN106101100B (en) 2016-06-14 2016-06-14 A kind of implementation method of the video content supervisory systems based on steganalysis

Publications (2)

Publication Number Publication Date
CN106101100A true CN106101100A (en) 2016-11-09
CN106101100B CN106101100B (en) 2019-08-02

Family

ID=57845394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610415213.XA Active CN106101100B (en) 2016-06-14 2016-06-14 A kind of implementation method of the video content supervisory systems based on steganalysis

Country Status (1)

Country Link
CN (1) CN106101100B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111246168A (en) * 2020-01-15 2020-06-05 深圳市网新新思软件有限公司 Video content batch supervision cluster system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005004493A1 (en) * 2003-06-25 2005-01-13 Thomson Licensing S.A. Decoding method and apparatus for detection of watermarks in a compressed video bitstream
CN104183244A (en) * 2014-08-18 2014-12-03 南京邮电大学 Steganography detection method based on evidence reasoning
CN104301733A (en) * 2014-09-06 2015-01-21 南京邮电大学 Video steganalysis method based on feature fusions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005004493A1 (en) * 2003-06-25 2005-01-13 Thomson Licensing S.A. Decoding method and apparatus for detection of watermarks in a compressed video bitstream
CN104183244A (en) * 2014-08-18 2014-12-03 南京邮电大学 Steganography detection method based on evidence reasoning
CN104301733A (en) * 2014-09-06 2015-01-21 南京邮电大学 Video steganalysis method based on feature fusions

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
施广帅: "面向网络媒体内容监管的视频隐写检测", 《中国优秀硕士学位论文全文数据库》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111246168A (en) * 2020-01-15 2020-06-05 深圳市网新新思软件有限公司 Video content batch supervision cluster system and method

Also Published As

Publication number Publication date
CN106101100B (en) 2019-08-02

Similar Documents

Publication Publication Date Title
CN109271793B (en) Internet of things cloud platform equipment category identification method and system
US20190222603A1 (en) Method and apparatus for network forensics compression and storage
CN105787366B (en) Android software visualization safety analytical method based on component relation
CN110401624A (en) The detection method and system of source net G system mutual message exception
CN103346912B (en) Method, device and system for conducting warning correlation analysis
CN100362805C (en) Multifunctional management system for detecting erotic images and unhealthy information in network
CN107623754A (en) WiFi acquisition systems and its method based on true and false MAC identifications
CN106656577B (en) The user behavior statistical method and intelligent router of a kind of APP and browser
CN107040405B (en) Passive type various dimensions host Fingerprint Model construction method and its device under network environment
CN103067218B (en) A kind of express network packet content analytical equipment
CN103401845B (en) A kind of detection method of website safety, device
CN107769992B (en) Message parsing and shunting method and device
CN105407096A (en) Message data detection method based on stream management
CN113111951B (en) Data processing method and device
CN106255082A (en) The recognition methods of a kind of refuse messages and system
CN110020161B (en) Data processing method, log processing method and terminal
CN107958154A (en) A kind of malware detection device and method
CN106209781A (en) A kind of based on the access recognition methods of statistical exceptional interface
CN110493302A (en) A kind of document transmission method, equipment and computer readable storage medium
CN107644161A (en) Safety detecting method, device and the equipment of sample
CN104182681A (en) Hook-based iOS (iPhone operating system) key behavior detection device and detection method thereof
CN102271331B (en) Method and system for detecting reliability of service provider (SP) site
CN106559498A (en) Air control data collection platform and its collection method
CN107426017A (en) A kind of method for carrying out data analysis by gathering switch network flow
CN107959696A (en) A kind of daily record bill processing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant