CN106295967B - Method for guaranteeing authenticity of image information - Google Patents

Method for guaranteeing authenticity of image information Download PDF

Info

Publication number
CN106295967B
CN106295967B CN201610622683.3A CN201610622683A CN106295967B CN 106295967 B CN106295967 B CN 106295967B CN 201610622683 A CN201610622683 A CN 201610622683A CN 106295967 B CN106295967 B CN 106295967B
Authority
CN
China
Prior art keywords
photo
mobile terminal
client software
time
background system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610622683.3A
Other languages
Chinese (zh)
Other versions
CN106295967A (en
Inventor
黄仁国
黄仁姝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Huatai Outwit Engineering Project Management Co ltd
Original Assignee
Sichuan Huatai Outwit Engineering Project Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Huatai Outwit Engineering Project Management Co ltd filed Critical Sichuan Huatai Outwit Engineering Project Management Co ltd
Priority to CN201610622683.3A priority Critical patent/CN106295967B/en
Publication of CN106295967A publication Critical patent/CN106295967A/en
Application granted granted Critical
Publication of CN106295967B publication Critical patent/CN106295967B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/067Enterprise or organisation modelling

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method for guaranteeing the authenticity of image information. When the client software shoots, the geographic position and the global unique identification code of the mobile terminal, the time obtained from the background system or the time length recorded in real time from the time of shooting the picture to the time of uploading the picture to the background system and the like are recorded in the information of the shot picture, and the information can be respectively used for ensuring the authenticity of the geographic position where the mobile terminal is located, the authenticity of a person who shoots the picture and the authenticity of the time of shooting the picture when the picture is shot. Meanwhile, on the photo uploading entrance, only the photos shot by the client software can be selected, and the photos shot by the client software can be uploaded to the background system only through the client software, so that the authenticity of the uploading entrance and the photo source is ensured. After receiving the photo and the photo information, the background system can obtain the shooting time of the photo, the geographical position of the mobile terminal when the photo is shot, the photo shooting person and other related information according to the related information recorded in the photo information.

Description

Method for guaranteeing authenticity of image information
Technical Field
The invention relates to the technical field of image information transmission processing, in particular to a method for controlling 4 elements such as an entrance, time, position, account number and the like generated by an image through software so as to guarantee the authenticity of image information.
Background
The current construction of various projects often has the following problems, for example:
the following problems often exist in iron tower engineering:
1. less management personnel
The project manager is seriously insufficient, and the phenomenon that one project manager manages a plurality of districts exists. The existing information management support system is heavier in process management, few in management personnel, weak in field quality, safety and progress control, and weak in supervision and control force on field personnel, materials, pictures, documents and the like.
2. Large number of items
The single base station relates to a plurality of five sub-items of a tower footing, a tower body, a machine room, commercial power and power, and forms a plurality of engineering materials.
3. More participating units
The number of participating units is multiple, including iron tower companies, operators, construction units, supervision units, design units, geological survey units, and the like. The regulation of the supervision personnel is random and no personnel change records exist. And the tasks are issued through telephone notification or paper documents, circulation is not smooth, and recording is lost. It is cumbersome to transmit to everyone in paper documents, phone calls, short messages, etc.
4. Weak of field management and control
Based on that the number of managers is small, the project quantity is huge, the field management and control is weak, after the project is finished, the situation that data are additionally recorded afterwards is more, the possibility is provided for data counterfeiting, and the authenticity and timeliness of the information cannot be guaranteed. Live photos cannot be collected by who, when, where, and at what time in the GIS reaction. The field management personnel have different professional skills, service capabilities and technical levels, and need huge knowledge bases for real-time reference, study and use.
(II) the traffic industry often has the following problems:
1. paper approval-low efficiency and high cost
Paper transfer: various applications (such as a leave-request application from a chief deputy to an owner, a correction notice sent by a supervision to construction, a work order, a change application, a hidden project acceptance and examination and approval and the like from a construction unit to the supervision and the owner) of field personnel are reviewed through a paper approval sheet and the approval sheet is transmitted manually.
Manual tracking: when the signature and approval personnel are delivered, the approval personnel are often out of offices and cannot approve and process in time. After the examination and approval is finished, the next examination and approval personnel can not be automatically reminded, so that the efficiency is low and the cost is high.
2. Filing-making details
The engineering industry of 3-year construction and 4-year data has serious data lag construction and serious data supplement and record problems. Meanwhile, as the project is finished, the data is seriously damaged in 'catching up' and 'complementing' and 'compiling'.
In the construction process, the image data (such as image information and the like) of hidden projects, key projects and key parts cannot accurately reflect when, at what positions and at what positions, and cannot reflect the real situation of a site, and the phenomenon that the shogawa is worn sometimes is caused, so that the information tracing of the post-construction site is inconvenient.
3. Job-not capable of being mastered
In the actual progress situation of the construction site, a manager can feel realistic only when arriving at the construction site, but can waste a large amount of road time when arriving at the site, if the manager can interact with field personnel through a software system to know the actual construction situation of the site, a large amount of time can be saved, and problems can be found in time. The field personnel are not in place for performing, and sometimes the engineering personnel are in key parts, side stations of key working procedures and are not in place for inspection, and whether the engineering is qualified or not is not checked and the engineering is signed; the modification notice and the modification result are often not described in detail, and the modification approval is changed. Therefore, not only the reputation of the company but also the engineering quality are influenced, and potential safety and quality hazards are easily formed.
4. Quality safety- -incomplete preservation of evidence
The basis of the qualification responsibility during quality safety accidents is insufficient and complete, and after the quality and safety responsibility occurs, no complete and real data exist, so that the accident responsibility is defined by no good measures and means, the responsibility is not assumed, and the responsibility is taken carelessly.
5. Normative knowledge- -inconvenient for personnel to consult
The professional skills, the service capability and the technical level of engineers are different, the capabilities of finding and solving problems are poor, and a huge knowledge base is urgently needed for the engineers to look up, study and reference at any time and any place.
6. Person checking-in work-attendance with substitute strap
At the project department, the number of field engineers, the working time and the payroll are not completely consistent, and the operators in the area exist, so that the cost of the operators is increased.
7. Notice-notice-complicated and messy circulation
At present, information such as notification and announcement is transmitted to each engineering department in a company document (paper), telephone, short message, QQ, WeChat and other modes, and the procedures are complicated or messy, so that reading, archiving, counting, analyzing and summarizing among a plurality of engineering personnel are not facilitated. In particular some important notification messages, are not sent to the party at the correct time, let alone to know whether the party is reading.
8. Project information-islanding severity
The engineering projects are multiple and wide in distribution, difficulty is added to the control and management of project construction by company leaders, even some projects are in an island state, problems cannot be found in time, good interaction with high-level managers and owners of the companies cannot be achieved, illusion and misunderstanding are easily caused, and the intelligence and strength of rear management experts are not conveniently and fully utilized.
9. Assessment management- -unable to quantify
There is no unified assessment standard and quantization index among all project engineering departments, and the high-quality project engineering departments cannot be objectively and quantitatively assessed because digital speaking cannot be relied on. The detailed quantitative assessment process cannot be accurately shown in the front of each project part, and the fairness of the assessment are easily questioned.
Disclosure of Invention
In view of the above-mentioned defects in the prior art, the present invention provides a method for guaranteeing the authenticity of image information, so as to solve the problem that the image information (the time of taking a picture, the place of taking a picture, the person taking a picture) is easy to be counterfeited in the prior art. The invention is realized by the following technical scheme:
a method of securing the authenticity of image information, comprising:
step A: when photographing is carried out through client software installed on a mobile terminal, the client software records information of the photographed photos; if the mobile terminal and a background system are in a networking state when the photo is shot, the information of the photo comprises the time when the client software acquires the photo from the background system when the photo is shot, the geographic position of the mobile terminal when the photo is shot and the global unique identification code of the mobile terminal; if the mobile terminal and a background system are not in a networking state when the photo is shot, the information of the photo comprises the geographic position, the global unique identification code and the time length recorded in real time from the shooting of the photo to the uploading of the photo to the background system;
and B: after the background system receives a login request of a user account sent by the mobile terminal, detecting a global unique identification code of the mobile terminal, detecting whether a binding relationship between the user account and the global unique identification code exists in the background system, if so, allowing the user account to login, and otherwise, rejecting the user account to login;
and C: when the client software selects the photos needing to be uploaded to the background system, the photos can be selected only from the photos shot by the client software, and the photos can be uploaded to the background system only through the client software;
step D: after receiving the photo uploaded by the client software and the information of the photo, the background system records the information of the photo; meanwhile, determining the user account for taking the photo according to the global unique identification code recorded in the information of the photo and the one-to-one binding relationship between the user accounts prestored in the system and the global unique identification codes of the mobile terminals; meanwhile, when the time acquired by the client software from the background system when the photo is shot is recorded in the received photo information, the time is taken as the shooting time of the photo, and when the time length from the time of shooting the photo to the time of uploading the photo to the background system is recorded in the received photo information, the time length subtracted from the time of receiving the photo is taken as the shooting time of the photo.
Further, the method further comprises a step E, which comprises:
step E1: when shooting is carried out through client software installed on the mobile terminal, the client software prompts a user to shoot three pictures at different angles for the same shooting target, and the three pictures at different angles are as follows:
a front photograph of the object, a left 20-40 degree angle photograph of the object, a right 20-40 degree angle photograph of the object;
step E2: and comparing whether the focal positions of the three pictures are consistent, if not, keeping the front picture of the target as the picture of the target, and otherwise, discarding the three pictures.
Further, when the client software installed on the mobile terminal logs in the background system for the first time through the user account, the client software sends the user account and the global unique identification code of the mobile terminal to the background system, the background system allows the account to log in, and simultaneously, the account and the global unique identification code of the mobile terminal are bound and the binding relationship is stored in the background system.
Further, the geographic position is longitude and latitude, and the longitude and latitude are automatically collected by client software on the mobile terminal and are stored in a local database of the mobile terminal in an encrypted manner.
Further, the photos taken by the client software are stored and transmitted in an encrypted manner.
Further, the information of the photo also comprises anti-counterfeiting information of the photo.
Further, when the mobile terminal is provided with a rear camera and a front camera at the same time, the client software calls the rear camera to take a picture, calls the front camera to take a face portrait of a photographer when taking the picture, and takes the face portrait as anti-counterfeiting information of the shot picture.
Further, the mobile terminal is any one of a mobile phone, a tablet computer and a notebook computer.
The method for guaranteeing the authenticity of the image information comprises the following steps: when the client software shoots, the geographic position and the global unique identification code of the mobile terminal are automatically recorded, and meanwhile, the time when the client software obtains from the background system during shooting or the time from the shooting of the picture to the uploading of the picture to the background system, which is recorded in real time, is also recorded according to the networking state of the mobile terminal and the background system; when client software logs in, a background system determines whether to allow the user account to log in according to whether a binding relationship between the user account and a global unique identification code of the mobile terminal exists in the system; when the client software selects the photos needing to be uploaded to the background system, the photos can be selected from the photos shot by the client software only, and the photos shot by the client software can be uploaded to the background system only through the client software, so that the authenticity of an uploading entrance and a photo source is ensured; the background system receives the photo and the information of the photo, the information comprises the geographical position information of the mobile terminal when the photo is shot, so that the authenticity of the geographical position of the mobile terminal when the photo is shot is ensured, meanwhile, the user account for shooting the photo is confirmed from the pre-stored binding relationship according to the global unique identification code of the mobile terminal for shooting the photo recorded in the information, the authenticity of a photo shooter (the user account for shooting the photo) is ensured, meanwhile, the shooting time of the photo is determined according to the time of the client software for obtaining the photo from the background system when the photo is shot or the time of uploading the photo to the background system from the time of shooting the photo recorded in the information, and the authenticity of the photo shooting time is ensured. The invention not only reduces the trouble of receiving and looking up the image data, but also reduces the trouble of modifying the image information for a plurality of times when the image information is incomplete and the waste of time resources when the image information is submitted, and simultaneously fully ensures the authenticity of the image information.
Drawings
FIG. 1: the embodiment of the invention provides a flow diagram of a method for guaranteeing the authenticity of image information.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments.
As shown in fig. 1, the method for guaranteeing the authenticity of image information provided by the present invention comprises the following steps:
step A: when the shooting is carried out through the client software installed on the mobile terminal, the client software records the information of the shot photos. If the mobile terminal and the background system are in a networking state when the photo is shot, the information of the photo comprises the time when the client software acquires the photo from the background system when the photo is shot, the geographic position of the mobile terminal when the photo is shot and the global unique identification code of the mobile terminal. If the mobile terminal and the background system are in an unconnected state when the photo is shot, the information of the photo comprises the geographic position, the global unique identification code and the time length recorded in real time from the time of shooting the photo to the time of uploading the photo to the background system. When the photo is shot, the geographic position of the mobile terminal can be automatically acquired through positioning functions of GPS/Beidou satellite positioning, network positioning or LBS base station positioning and the like of the mobile terminal. The mobile terminal can be a mobile phone, a tablet computer, a notebook computer and the like.
And B: after receiving a login request of a user account sent by the mobile terminal, the background system detects the global unique identification code of the mobile terminal, detects whether a binding relationship between the user account and the global unique identification code exists in the background system, allows the user account to login if the binding relationship exists, and refuses the user account to login if the binding relationship does not exist. In this embodiment, when logging in the background system for the first time from the client software installed on the mobile terminal through the user account, the client software sends the user account and the global unique identifier of the mobile terminal to the background system, and the background system allows the account to log in, and at the same time, binds the account with the global unique identifier of the mobile terminal and stores the binding relationship thereof in the background system. When the client software of the mobile terminal logs in the background system subsequently, the user account bound with the global unique identification code of the mobile terminal is required to log in the background system, generally speaking, one account corresponds to one mobile terminal, and one account can only log in the background system on a specific mobile terminal, so that the authenticity of a login person is improved, and the condition that others log in instead of other mobile terminals is reduced.
And C: when the photos needing to be uploaded to the background system are selected through the client software, the photos can be selected only from the photos shot by the client software, and the photos can be uploaded to the background system only through the client software. Thus, the authenticity of the photo upload portal and the photo source is ensured. Therefore, other channels (such as downloading images on the internet, and historical images left by taking pictures with the mobile phone) are avoided being selected. The pictures taken by the client software are stored and transmitted in an encrypted manner.
In this embodiment, the information of the photo may further include anti-counterfeit information of the photo, so that, once the photo taken by the client software is replaced by another photo due to some factors, the replaced photo may be immediately identified because the replaced photo does not have the anti-counterfeit information, thereby further ensuring the authenticity of the photo source. Here, when the mobile terminal has both a rear camera and a front camera, the client software calls the rear camera to take a picture, calls the front camera to take a face portrait of a photographer when taking a picture, and uses the face portrait as anti-counterfeiting information of the picture taken this time. The anti-counterfeiting information is recorded in the photographed photo and the database of the background system to prevent counterfeiting.
Step D: and after receiving the photo uploaded by the client software and the information of the photo, the background system records the information of the photo. In this embodiment, the geographic location is longitude and latitude, and the longitude and latitude are automatically collected and stored in a local database of the mobile terminal in an encrypted manner by client software on the mobile terminal. The geographical position information is not influenced by the user and has objective authenticity, so that the authenticity of the geographical position of the mobile terminal when the picture is taken is ensured. Meanwhile, the background system determines the user account for taking the photo according to the global unique identification code recorded in the information of the photo and the one-to-one binding relationship between the user accounts prestored in the system and the global unique identification codes of the mobile terminals, so that the authenticity of a photo photographer (the user account for taking the photo) is ensured. When the time acquired by the client software from the background system when the photo is shot is recorded in the received photo information, the background system takes the time as the shooting time of the photo, and when the time length from the time of shooting the photo to the time of uploading the photo to the background system is recorded in the received photo information, the time length subtracted by the background system from the time of receiving the photo is taken as the shooting time of the photo, so that the authenticity of the photo shooting time is ensured.
In this embodiment, a step E of determining whether the photo is taken against a real target or another photo is added, which specifically includes:
step E1: when shooting is carried out through client software installed on a mobile terminal, for the same shooting target, the client software prompts a user to shoot three pictures at different angles, and the three pictures at different angles are as follows:
the front photo of the target, the left 20-40 degree angle photo of the target and the right 20-40 degree angle photo of the target;
step E2: and comparing whether the focal positions of the three photos are consistent, if not, keeping the front photo of the target as the photo of the target, and otherwise, discarding the three photos.
This step is based on the principle that if a picture is taken against a real object, the focus of pictures taken at different angles should be different, and if a picture is taken against other pictures, the focus of pictures taken at different angles against the picture should be identical. It is thus possible in this way to determine whether a picture has been taken against a real object or against another picture. If the picture is shot against other pictures, discarding all three pictures, if the picture is shot against the real target, explaining the authenticity of the shot target, further explaining the authenticity of the shot picture, and selecting the picture shot against the target for storage.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (8)

1. A method of securing authenticity of image information, comprising:
step A: when photographing is carried out through client software installed on a mobile terminal, the client software records information of the photographed photos; if the mobile terminal and a background system are in a networking state when the photo is shot, the information of the photo comprises the time when the client software acquires the photo from the background system when the photo is shot, the geographic position of the mobile terminal when the photo is shot and the global unique identification code of the mobile terminal; if the mobile terminal and a background system are not in a networking state when the photo is shot, the information of the photo comprises the geographic position, the global unique identification code and the time length recorded in real time from the shooting of the photo to the uploading of the photo to the background system;
and B: after the background system receives a login request of a user account sent by the mobile terminal, detecting a global unique identification code of the mobile terminal, detecting whether a binding relationship between the user account and the global unique identification code exists in the background system, if so, allowing the user account to login, and otherwise, rejecting the user account to login;
and C: when the client software selects the photos needing to be uploaded to the background system, the photos can be selected only from the photos shot by the client software, and the photos can be uploaded to the background system only through the client software;
step D: after receiving the photo uploaded by the client software and the information of the photo, the background system records the information of the photo; meanwhile, determining the user account for taking the photo according to the global unique identification code recorded in the information of the photo and the one-to-one binding relationship between the user accounts prestored in the system and the global unique identification codes of the mobile terminals; meanwhile, when the time acquired by the client software from the background system when the photo is shot is recorded in the received photo information, the time is taken as the shooting time of the photo, and when the time length from the time of shooting the photo to the time of uploading the photo to the background system is recorded in the received photo information, the time length subtracted from the time of receiving the photo is taken as the shooting time of the photo.
2. The method for guaranteeing the authenticity of image information according to claim 1, further comprising a step E comprising:
step E1: when shooting is carried out through client software installed on the mobile terminal, the client software prompts a user to shoot three pictures at different angles for the same shooting target, and the three pictures at different angles are as follows:
a front photograph of the object, a left 20-40 degree angle photograph of the object, a right 20-40 degree angle photograph of the object;
step E2: and comparing whether the focal positions of the three pictures are consistent, if not, keeping the front picture of the target as the picture of the target, and otherwise, discarding the three pictures.
3. The method for guaranteeing the authenticity of image information according to claim 1, wherein when logging in the backend system for the first time from a client software installed on the mobile terminal through the user account, the client software sends the user account and the globally unique identifier of the mobile terminal to the backend system, the backend system allows the account to log in, and at the same time, binds the account with the globally unique identifier of the mobile terminal and stores the binding relationship thereof in the backend system.
4. The method for guaranteeing the authenticity of image information according to claim 1, wherein the geographic location is a longitude and a latitude, the longitude and the latitude being automatically collected by client software on the mobile terminal and stored in a local database of the mobile terminal in an encrypted manner.
5. The method for guaranteeing the authenticity of image information according to claim 1, wherein the photos taken by the client software are stored and transmitted in an encrypted manner.
6. The method for ensuring the authenticity of image information according to claim 1, wherein the information of the photograph further includes anti-counterfeiting information of the photograph.
7. The method for guaranteeing the authenticity of image information according to claim 6, wherein when the mobile terminal has a rear camera and a front camera at the same time, the client software calls the rear camera to take a picture, calls the front camera to take a face portrait of a photographer when taking a picture, and uses the face portrait as the anti-counterfeiting information of the picture taken this time.
8. The method for guaranteeing the authenticity of image information according to claim 1, wherein the mobile terminal is any one of a mobile phone, a tablet computer and a notebook computer.
CN201610622683.3A 2016-08-01 2016-08-01 Method for guaranteeing authenticity of image information Expired - Fee Related CN106295967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610622683.3A CN106295967B (en) 2016-08-01 2016-08-01 Method for guaranteeing authenticity of image information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610622683.3A CN106295967B (en) 2016-08-01 2016-08-01 Method for guaranteeing authenticity of image information

Publications (2)

Publication Number Publication Date
CN106295967A CN106295967A (en) 2017-01-04
CN106295967B true CN106295967B (en) 2020-06-26

Family

ID=57664045

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610622683.3A Expired - Fee Related CN106295967B (en) 2016-08-01 2016-08-01 Method for guaranteeing authenticity of image information

Country Status (1)

Country Link
CN (1) CN106295967B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107818264B (en) * 2017-10-16 2020-04-14 深圳市英尔科技有限公司 Environment-friendly public welfare activity monitoring method and device and computer readable storage medium
CN108109188B (en) * 2018-01-12 2022-02-08 维沃移动通信有限公司 Image processing method and mobile terminal
CN109166193B (en) * 2018-07-26 2021-07-20 饶四强 Photographing card-punching or evidence-obtaining method based on time, position, random number and bar code
CN108989725A (en) * 2018-08-17 2018-12-11 北京金和网络股份有限公司 Ensure information authenticity method
CN109889725B (en) * 2019-02-27 2021-06-04 青岛骐一企业管理有限公司 System and method for avoiding photo reproduction
CN110147969A (en) * 2019-05-30 2019-08-20 北京金和网络股份有限公司 The online training method and training terminal for determining technology based on five
CN110189239A (en) * 2019-05-30 2019-08-30 北京金和网络股份有限公司 Five fixed online testing method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160087284A (en) * 2015-01-13 2016-07-21 한국전자통신연구원 Image processing apparatus, the image processing apparatus for performing image storage method and image search method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303761A (en) * 2008-06-10 2008-11-12 裘炅 Integrated system for claim settlement of vehicle insurance capable of shooting and uploading evidence-obtaining photograph or video by mobile phone
CN102750332B (en) * 2012-05-31 2016-12-14 北京城市网邻信息技术有限公司 Information issuing method, Apparatus and system
CN103152402A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Method and system for logging in through mobile terminal and cloud server
CN104519267A (en) * 2013-09-30 2015-04-15 北京三星通信技术研究有限公司 Shooting control method and terminal equipment
CN104301387B (en) * 2014-07-22 2017-08-08 浙江电力建设监理有限公司 A kind of engineering digital photograph anti-counterfeit method and device
CN104463469A (en) * 2014-12-09 2015-03-25 国家电网公司 Grid infrastructural project digital photo management method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160087284A (en) * 2015-01-13 2016-07-21 한국전자통신연구원 Image processing apparatus, the image processing apparatus for performing image storage method and image search method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于地理位置信息的数码照片在输电线路信息管理中的应用;陈忠华;《通信电源技术》;20120125;第29卷(第1期);第86-88页 *

Also Published As

Publication number Publication date
CN106295967A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN106295967B (en) Method for guaranteeing authenticity of image information
CN104202396B (en) A kind of information sharing method, device, server, terminal device and system
EP2981063B1 (en) Method of modifying image including photographing restricted element, and device for performing the method
US20180025458A1 (en) Self-customizing, multi-tenanted mobile system and method for digitally gathering and disseminating real-time visual intelligence on utility asset damage enabling automated priority analysis and enhanced utility outage response
CN107609765A (en) A kind of factory's hidden troubles removing method and system
Ludwig et al. What you see is what I need: Mobile reporting practices in emergencies
JP2012141831A (en) Management system for job site picture and progress of construction work
CN103647791B (en) Remote online investigation and evidence collection method and system
CN106600421A (en) Intelligent car insurance loss assessment method and system based on image recognition
CN111126826A (en) Conference management platform based on government affair work
CN101303761A (en) Integrated system for claim settlement of vehicle insurance capable of shooting and uploading evidence-obtaining photograph or video by mobile phone
CN102917037A (en) Mobile terminal-based site survey system and method thereof
US20110158469A1 (en) Methods and apparatus for management of field operations, projects and/or collected samples
CN104299286A (en) Attendance method and system for public security inspection tour
CN112465309A (en) Visual construction management and control system and implementation method thereof
CN108495096B (en) Mobile law enforcement system and method
CN111696016A (en) Natural resource investigation management system based on internet + online checking
Dette Do no digital harm: mitigating technology risks in humanitarian contexts
CN111951457A (en) Electronic voting method, device, terminal equipment and storage medium
Desourdis Emerging public safety wireless communication systems
CN110186923A (en) A kind of pollution of river monitoring method, device and storage medium
KR102202114B1 (en) Smart construction management system
JP3186775U (en) Building construction site photo / progress management system
US11196810B2 (en) System and method for dynamically generating a site survey
CN105512863A (en) Marketing management method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200626

Termination date: 20200801

CF01 Termination of patent right due to non-payment of annual fee