CN108809467A - Monitor the method, apparatus and computer readable storage medium of picture certification - Google Patents
Monitor the method, apparatus and computer readable storage medium of picture certification Download PDFInfo
- Publication number
- CN108809467A CN108809467A CN201810491898.5A CN201810491898A CN108809467A CN 108809467 A CN108809467 A CN 108809467A CN 201810491898 A CN201810491898 A CN 201810491898A CN 108809467 A CN108809467 A CN 108809467A
- Authority
- CN
- China
- Prior art keywords
- monitoring picture
- picture
- monitoring
- time
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
- H04J3/0638—Clock or time synchronisation among nodes; Internode synchronisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/60—Type of objects
- G06V20/62—Text, e.g. of license plates, overlay texts or captions on TV images
- G06V20/625—License plates
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Television Signal Processing For Recording (AREA)
Abstract
The present invention provides a kind of method, apparatus and computer readable storage medium of monitoring picture certification, and the method for the monitoring picture certification includes the following steps:Long-range connection time service central server, and time synchronization is carried out to equipment task time by time service central server timing;Monitoring picture is shot according to the first preset rules, and corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting;By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload stored to time service central server;By cryptographic Hash compare identify monitoring picture whether be system authentication original image.The present invention from time service central server by directly obtaining equipment task time, it is ensured that the time of monitoring video equipment is accurate, reliable, while being compared by cryptographic Hash and identifying whether monitoring picture is tampered, deletes, it is ensured that every monitoring picture is true and reliable.
Description
Technical field
The present invention relates to the method, apparatus and computer of technical field of security and protection more particularly to a kind of monitoring picture certification can
Read storage medium.
Background technology
With the horizontal development of population, economy, society, people have higher consciousness, video monitoring skill to information security
Art plays increasingly important role in security fields, it is intuitive with it, conveniently, the information content is abundant and is widely used in city
The every field such as its net, traffic, civil safety, and in Video Surveillance Industry field, the time accuracy of video monitoring equipment,
Become the industry new issue to be faced at present therewith.Traditional video monitoring equipment can arbitrarily be changed the equipment time, and not have
There is timing function or use free NTP (Network Time Protocol, Network Time Protocol) server time service, leads
Video time and standard time deviation are larger after cause equipment long-play, when needing to inquire video recording because time inaccuracy causes
Workload increase, and when video monitoring equipment shooting picture as evidence in use, because the time itself be mistake or
Lack and the certification of the real effectiveness of the picture is difficult to become evidence.
Invention content
The technical problem to be solved in the present invention is to provide a kind of method, apparatus of monitoring picture certification and computer-readable deposit
Storage media is intended to by directly obtaining equipment task time from time service central server, it is ensured that the time of monitoring video equipment
Accurately, reliably, it while by cryptographic Hash compares and identifies whether monitoring picture is tampered, deletes, it is ensured that every monitoring picture is true
Reliably.
To achieve the above object, the present invention proposes a kind of method of monitoring picture certification, the side of the monitoring picture certification
Method includes the following steps:Long-range connection time service central server, and worked equipment by time service central server timing
Time carries out time synchronization;Monitoring picture is shot according to the first preset rules, and after the completion of each monitoring picture shooting
Generate corresponding cryptographic Hash;By after the completion of shooting the monitoring picture and corresponding cryptographic Hash synchronized upload to the time service in
Central server is stored;By cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image.
Optionally, the long-range connection time service central server, and by time service central server timing to system
It is further comprising the steps of before the step of working time progress time synchronization:Identification is carried out by digital certificate technique to test
Card, in the case of the identification is verified, to obtain and carry out time synchronization by the time service central server
Legal identity.
Optionally, first preset rules include capturing shooting style, timing shooting style, triggering alarm shooting style
And any one or a few in manual shooting style.
Optionally, the capture shooting style includes that face capture is taken pictures, car plate capture is taken pictures, behavior capture is taken pictures and moved
Dynamic detecting captures any one or a few in taking pictures.
Optionally, described to shoot monitoring picture according to the first preset rules, and completed in each monitoring picture shooting
After the step of generating corresponding cryptographic Hash specifically include:Monitoring picture is shot according to the first preset rules, while it includes working as to acquire
Parameter information including preceding time, current location, equipment Serial Number, picture size, pixel;In each monitoring picture shooting
Corresponding cryptographic Hash is generated after the completion, and the parameter information and the cryptographic Hash are embedded into the monitoring picture.
Optionally, it is described by cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image step
Suddenly it specifically includes:If identify it is described monitoring picture be nonsystematic certification original image, it is described monitoring picture picture just
In obvious place stamp the watermark of " non-primary picture ", while the face information detected to the monitoring picture carries out automatic code-printing
And the details look facility of the locking monitoring picture.
Optionally, it is described by cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image step
It is further comprising the steps of after rapid:According to the monitoring figure that default Second Rule downloads to high in the clouds or that equipment end copies to
Piece carries out validity period mandate.
Optionally, the monitoring picture that the basis is default that Second Rule downloads to high in the clouds or equipment end copies to
It is further comprising the steps of after the step of carrying out validity period mandate:Validity period identification is carried out to the monitoring picture, if identification institute
The current time for stating monitoring picture has exceeded the validity period, then hitting exactly obvious place in the picture of the monitoring picture stamps " figure
Piece is out of date " watermark, while automatic code-printing and the locking monitoring are carried out to the face information that detects of monitoring picture
The details look facility of picture.
In addition, to achieve the above object, the present invention also proposes a kind of device of monitoring picture certification, and described device includes depositing
Reservoir, processor, the program that is stored on the memory and can run on the processor and for realizing the place
The data/address bus of the connection communication between device and the memory is managed, described program is realized above-mentioned when being executed by the processor
The step of method.
In addition, to achieve the above object, the present invention also proposes a kind of computer readable storage medium, described computer-readable
Storage medium is stored with one or more program, and one or more of programs can be held by one or more processor
Row, the step of to realize above-mentioned method.
The method, apparatus and computer readable storage medium of monitoring picture certification provided by the invention, monitoring video are set
It is standby by remotely connecting time service central server, to carry out the time to equipment task time by time service central server timing
It is synchronous, and then ensure that the time of monitoring video equipment is accurate, reliable.Meanwhile monitoring video equipment is clapped according to the first preset rules
Monitoring picture is taken the photograph, generates corresponding cryptographic Hash after the completion of each monitoring picture shooting, and by the monitoring picture after the completion of shooting
And corresponding cryptographic Hash synchronized upload is stored to the time service central server, so that the later stage compares identification prison by cryptographic Hash
Whether control picture is tampered, deletes, it is ensured that every monitoring picture is true and reliable, is the original image of system authentication.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art
With obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow diagram of the method for the monitoring picture certification that the embodiment of the present invention one proposes.
Fig. 2 is the structure diagram of video monitoring system of the present invention.
Fig. 3 is the idiographic flow block diagram of the step S120 of the method for monitoring picture certification shown in Fig. 1.
Fig. 4 is the another flow diagram of the method for monitoring picture certification shown in Fig. 1.
Fig. 5 is the structure diagram of the device for the monitoring picture certification that the embodiment of the present invention two proposes.
Specific implementation mode
The specific implementation mode of the present invention is described further below in conjunction with the accompanying drawings.It should be noted that for
The explanation of these embodiments is used to help understand the present invention, but does not constitute limitation of the invention.In addition, disclosed below
The each embodiment of the present invention in involved technical characteristic can be combined with each other as long as they do not conflict with each other.
Embodiment one
As shown in Figure 1, the embodiment of the present invention one proposes a kind of method of monitoring picture certification, the side of the monitoring picture certification
Method specifically includes following steps:
Step S110:Long-range connection time service central server, and worked equipment by the time service central server timing
Time carries out time synchronization.
Specifically, the method for this monitoring picture certification is based primarily upon video monitoring system 100 as shown in Figure 2 to realize,
The video monitoring system 100 includes multiple monitoring video equipment 110 and time service central server 120.Wherein, which sets
Standby 110 concretely NVR (Network Video Recorder, network hard disk video recorder), DVR (Digital Video
Recorder, hard disk video recorder), XVR (coaxial hard disk video recorder), any one in the camera with store function.It is multiple
Monitoring video equipment 110 remotely connects time service central server 120 by network mode.The network mode can be wired network
Network can also be wireless network.Time service central server 120 is national time service center, carries the standard time in China
Generation, holding and broadcast task, time dissemination system are the indispensable basic engineerings of country, for Chinese national economy development etc.
All conglomeraties and department provide reliable high-precision time service service.
In general, common maintenance personnel can only obtain common time service service from time service central server 120, and the application
Monitoring video equipment 110 and time service central server 120 between by digital certificate technique carry out identification verification, with
In the case of identification is verified, the legal identity that time synchronization is carried out by time service center service 120 is obtained.At this point,
The time service center service 120 can be that the monitoring video equipment 110 of this video monitoring system 100 provides more advanced time service clothes
Business.So, the equipment task time of the monitoring video equipment 110 of this video monitoring system 100 is unable to manual amendment, can only
It is obtained from time service central server 120, is serviced by using the time calibration of time service central server 120, can precisely record thing
At the time of part occurs, it is accurate true to realize that video time and photo opporunity synchronize, error is controllable according to current network conditions
Between 1ms-100ms.Meanwhile time service central server 120 can record the time operating status of monitoring video equipment 110, protect
The time for demonstrate,proving monitoring video equipment 110 is accurate, and national time service center can provide the equipment time and accurately prove, it is ensured that prison
The time service of control video recording equipment 110 can be traceable to the standard time at national time service center, it is ensured that the monitoring of monitoring video equipment 110 regards
The recording time of frequency and the photo opporunity for monitoring picture are authoritative, reliable.
Thus, " time service central server is remotely connected, and by time service central server timing to equipment in this step
Working time carries out time synchronization ", further include that step " carries out identification verification, in the identity by digital certificate technique
In the case of identification is verified, the legal identity that time synchronization is carried out by the time service central server is obtained ".
Step S120:Monitoring picture is shot according to the first preset rules, and is generated after the completion of each monitoring picture shooting
Corresponding cryptographic Hash.
Specifically, video monitoring system 100 as shown in Figure 2, each monitoring video equipment 110 are provided with intelligent recognition
Algorithm, including recognition of face, Car license recognition, Activity recognition etc., meanwhile, each monitoring video equipment 110 it is included based on the Big Dipper,
The positioning function of the geographical location information service such as GPS, mobile base station, Wi-Fi.Thus, as shown in figure 3, according to the first default rule
Monitoring picture is then shot, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Step S121:According to the first preset rules shoot monitoring picture, while acquisition include current time, current location,
Parameter information including equipment Serial Number, picture size, pixel.
Specifically, first preset rules include capture shooting style, timing shooting style, triggering alarm shooting style and
Any one or a few in manual shooting style.The capture shooting style includes that face capture is taken pictures, car plate capture takes pictures, goes
For capture take pictures and mobile detection capture take pictures in any one or a few.I.e. the monitoring video equipment 110 can be by following
Mode triggers monitoring picture shooting:
1. intelligence is taken pictures, detect that face is taken pictures, car plate is taken pictures, behavior is taken pictures, mobile detection is taken pictures.
2. periodically taking pictures, taking pictures interval time for the monitoring video equipment 110 can customize.
3. triggering alarm is taken pictures, the external warning device monitoring video equipment 110 that links is taken pictures.
4. taking pictures manually, the manual manipulation monitoring video equipment 110 is taken pictures according to demand by operator or user.
While each monitoring picture shooting, acquisition include current time, current location, equipment Serial Number, picture size,
Parameter information including pixel.
Step S122:Corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting, and by the parameter information and is somebody's turn to do
Cryptographic Hash is embedded into the monitoring picture.
Specifically, corresponding cryptographic Hash can be generated after the completion of each monitoring picture shooting, the cryptographic Hash and corresponding monitoring
Picture uniquely corresponds to, and collected parameter information and the cryptographic Hash can be embedded into the monitoring together when above-mentioned monitoring picture shooting
In picture, identification and details inquiry are compared so that the later stage carries out cryptographic Hash to the monitoring picture.
Step S130:By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service center service
Device is stored.
Specifically, by after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service central server
It is stored so that, can be by with the time service center when later stage identifies whether the monitoring picture is the original image of system authentication
Server 120 communicates to carry out cryptographic Hash comparison.
Step S140:By cryptographic Hash compare identify the monitoring picture whether be system authentication original image.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software,
The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, to identify whether picture is to be
The original image of system certification.If cryptographic Hash comparison passes through, identify that the monitoring picture is the original image of system authentication, the i.e. prison
Control picture is not tampered with, deleted, and belongs to true and reliable monitoring picture, when can be used as evidence use.If cryptographic Hash compares
Do not pass through, then identify the original image (i.e. secondary duplication or the non-primary picture distorted) that the monitoring picture is nonsystematic certification,
Software can hit exactly the watermark that obvious place stamps " non-primary picture " in the picture of the monitoring picture.Meanwhile it can also be to the monitoring figure
The face information that piece detects carries out automatic code-printing and locks the details look facility of the monitoring picture.It is embodied as:
Face datection is carried out to the monitoring picture, if detecting, automatic code-printing is understood at face position when having face information in the monitoring picture,
Meanwhile cannot further check picture details using the other correlation functions of software under this state, and software can prompt user
Delete the picture.
Only when the monitoring picture is accredited as the original image of system authentication, the work(on ability normal use menu column
Can, there are the details of the picture on menu column, including original image, picture download time, photographing device sequence number are taken pictures
Information, these information such as time, position (longitude, latitude, height above sea level), picture size, pixel can choose watermark and be shown in the prison
Control the designated position of picture.
In addition, as shown in figure 4, the method for the monitoring picture certification can also include the steps of:
Step S150:Made according to monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to
It is authorized with the phase.
Specifically, further protection is carried out for the monitoring picture that downloaded to high in the clouds or equipment end copies to, when this
After monitoring picture is identified by original image, validity period identification need to be further carried out, there is and only have the monitoring picture while being passed through
In the case of original image identification and validity period identification, the function on ability normal use menu column checks that picture is detailed
Thin information, setting watermark show pictorial information.If picture is expired, original image and validity period mandate can only be reacquired.
Default Second Rule is time service central server 120 or each monitoring that monitoring video equipment 110 is pre-set
Picture is downloaded the effective time (i.e. validity period mandate) rear or after being copied consulted, when user download to beyond the clouds or
After equipment end copies the monitoring picture to, term of validity countdown, when countdown terminates, the monitoring figure just are carried out to the monitoring picture
Piece expired will fail.In addition, for high permission user, also can to the setting of opening effective time permission, be allowed to be arranged
High in the clouds download or equipment end copy the term of validity duration of the monitoring picture.
Step 160:Validity period identification is carried out to the monitoring picture, is somebody's turn to do if identifying that the current time of the monitoring picture has exceeded
Validity period then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to the monitoring picture
The face information detected carries out automatic code-printing and locks the details look facility of the monitoring picture.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software,
The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, whether to identify picture first
For the original image of system authentication, identification is by starting the identification of second step validity period, if identifying the current time of the monitoring picture
Exceed the validity period, then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to this
The face information that monitoring picture detects carries out automatic code-printing and locks the details look facility of the monitoring picture.Specific body
It is now:Face datection is carried out to the monitoring picture, face position can be automatic when having face information in the monitoring picture if detecting
Stamp, meanwhile, it cannot further check picture details using the other correlation functions of software under this state, and software can prompt
User deletes the expired picture.
So, only when the monitoring picture is accredited as the original image of system authentication and identifies working as the monitoring picture
When the preceding time is without departing from the validity period, the function on ability normal use menu column, there is the detailed of the picture on menu column
Thin information, including original image, Time Validity, picture download time, photographing device sequence number, photo opporunity, position (warp
Degree, latitude, height above sea level), picture size, the information such as pixel, these information can choose watermark and be shown in the specified of the monitoring picture
Position.
Embodiment two
As shown in figure 5, the embodiment of the present invention two proposes that the device 20 of monitoring picture certification, the device 20 include memory
21, processor 22, the program that is stored on the memory and can run on the processor and for realizing 21 and of processor
The data/address bus 23 of connection communication between memory 22, it is following as shown in Figure 1 to realize when which is executed by the processor
Specific steps:
Step S110:Long-range connection time service central server, and worked equipment by the time service central server timing
Time carries out time synchronization.
Specifically, the method for this monitoring picture certification is based primarily upon video monitoring system 100 as shown in Figure 2 to realize,
The video monitoring system 100 includes multiple monitoring video equipment 110 and time service central server 120.Wherein, which sets
Standby 110 concretely NVR (Network Video Recorder, network hard disk video recorder), DVR (Digital Video
Recorder, hard disk video recorder), XVR (coaxial hard disk video recorder), any one in the camera with store function.It is multiple
Monitoring video equipment 110 remotely connects time service central server 120 by network mode.The network mode can be wired network
Network can also be wireless network.Time service central server 120 is national time service center, carries the standard time in China
Generation, holding and broadcast task, time dissemination system are the indispensable basic engineerings of country, for Chinese national economy development etc.
All conglomeraties and department provide reliable high-precision time service service.
In general, common maintenance personnel can only obtain common time service service from time service central server 120, and the application
Monitoring video equipment 110 and time service central server 120 between by digital certificate technique carry out identification verification, with
In the case of identification is verified, the legal identity that time synchronization is carried out by time service center service 120 is obtained.At this point,
The time service center service 120 can be that the monitoring video equipment 110 of this video monitoring system 100 provides more advanced time service clothes
Business.So, the equipment task time of the monitoring video equipment 110 of this video monitoring system 100 is unable to manual amendment, can only
It is obtained from time service central server 120, is serviced by using the time calibration of time service central server 120, can precisely record thing
At the time of part occurs, it is accurate true to realize that video time and photo opporunity synchronize, error is controllable according to current network conditions
Between 1ms-100ms.Meanwhile time service central server 120 can record the time operating status of monitoring video equipment 110, protect
The time for demonstrate,proving monitoring video equipment 110 is accurate, and national time service center can provide the equipment time and accurately prove, it is ensured that prison
The time service of control video recording equipment 110 can be traceable to the standard time at national time service center, it is ensured that the monitoring of monitoring video equipment 110 regards
The recording time of frequency and the photo opporunity for monitoring picture are authoritative, reliable.
Thus, " time service central server is remotely connected, and by time service central server timing to equipment in this step
Working time carries out time synchronization ", further include that step " carries out identification verification, in the identity by digital certificate technique
In the case of identification is verified, the legal identity that time synchronization is carried out by the time service central server is obtained ".
Step S120:Monitoring picture is shot according to the first preset rules, and is generated after the completion of each monitoring picture shooting
Corresponding cryptographic Hash.
Specifically, video monitoring system 100 as shown in Figure 2, each monitoring video equipment 110 are provided with intelligent recognition
Algorithm, including recognition of face, Car license recognition, Activity recognition etc., meanwhile, each monitoring video equipment 110 it is included based on the Big Dipper,
The positioning function of the geographical location information service such as GPS, mobile base station, Wi-Fi.Thus, as shown in figure 3, according to the first default rule
Monitoring picture is then shot, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Step S121:According to the first preset rules shoot monitoring picture, while acquisition include current time, current location,
Parameter information including equipment Serial Number, picture size, pixel.
Specifically, first preset rules include capture shooting style, timing shooting style, triggering alarm shooting style and
Any one or a few in manual shooting style.The capture shooting style includes that face capture is taken pictures, car plate capture takes pictures, goes
For capture take pictures and mobile detection capture take pictures in any one or a few.I.e. the monitoring video equipment 110 can be by following
Mode triggers monitoring picture shooting:
1. intelligence is taken pictures, detect that face is taken pictures, car plate is taken pictures, behavior is taken pictures, mobile detection is taken pictures.
2. periodically taking pictures, taking pictures interval time for the monitoring video equipment 110 can customize.
3. triggering alarm is taken pictures, the external warning device monitoring video equipment 110 that links is taken pictures.
4. taking pictures manually, the manual manipulation monitoring video equipment 110 is taken pictures according to demand by operator or user.
While each monitoring picture shooting, acquisition include current time, current location, equipment Serial Number, picture size,
Parameter information including pixel.
Step S122:Corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting, and by the parameter information and is somebody's turn to do
Cryptographic Hash is embedded into the monitoring picture.
Specifically, corresponding cryptographic Hash can be generated after the completion of each monitoring picture shooting, the cryptographic Hash and corresponding monitoring
Picture uniquely corresponds to, and collected parameter information and the cryptographic Hash can be embedded into the monitoring together when above-mentioned monitoring picture shooting
In picture, identification and details inquiry are compared so that the later stage carries out cryptographic Hash to the monitoring picture.
Step S130:By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service center service
Device is stored.
Specifically, by after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service central server
It is stored so that, can be by with the time service center when later stage identifies whether the monitoring picture is the original image of system authentication
Server 120 communicates to carry out cryptographic Hash comparison.
Step S140:By cryptographic Hash compare identify the monitoring picture whether be system authentication original image.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software,
The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, to identify whether picture is to be
The original image of system certification.If cryptographic Hash comparison passes through, identify that the monitoring picture is the original image of system authentication, the i.e. prison
Control picture is not tampered with, deleted, and belongs to true and reliable monitoring picture, when can be used as evidence use.If cryptographic Hash compares
Do not pass through, then identify the original image (i.e. secondary duplication or the non-primary picture distorted) that the monitoring picture is nonsystematic certification,
Software can hit exactly the watermark that obvious place stamps " non-primary picture " in the picture of the monitoring picture.Meanwhile it can also be to the monitoring figure
The face information that piece detects carries out automatic code-printing and locks the details look facility of the monitoring picture.It is embodied as:
Face datection is carried out to the monitoring picture, if detecting, automatic code-printing is understood at face position when having face information in the monitoring picture,
Meanwhile cannot further check picture details using the other correlation functions of software under this state, and software can prompt user
Delete the picture.
Only when the monitoring picture is accredited as the original image of system authentication, the work(on ability normal use menu column
Can, there are the details of the picture on menu column, including original image, picture download time, photographing device sequence number are taken pictures
Information, these information such as time, position (longitude, latitude, height above sea level), picture size, pixel can choose watermark and be shown in the prison
Control the designated position of picture.
In addition, as shown in figure 4, the method for the monitoring picture certification can also include the steps of:
Step S150:Made according to monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to
It is authorized with the phase.
Specifically, further protection is carried out for the monitoring picture that downloaded to high in the clouds or equipment end copies to, when this
After monitoring picture is identified by original image, validity period identification need to be further carried out, there is and only have the monitoring picture while being passed through
In the case of original image identification and validity period identification, the function on ability normal use menu column checks that picture is detailed
Thin information, setting watermark show pictorial information.If picture is expired, original image and validity period mandate can only be reacquired.
Default Second Rule is time service central server 120 or each monitoring that monitoring video equipment 110 is pre-set
Picture is downloaded the effective time (i.e. validity period mandate) rear or after being copied consulted, when user download to beyond the clouds or
After equipment end copies the monitoring picture to, term of validity countdown, when countdown terminates, the monitoring figure just are carried out to the monitoring picture
Piece expired will fail.In addition, for high permission user, also can to the setting of opening effective time permission, be allowed to be arranged
High in the clouds download or equipment end copy the term of validity duration of the monitoring picture.
Step 160:Validity period identification is carried out to the monitoring picture, is somebody's turn to do if identifying that the current time of the monitoring picture has exceeded
Validity period then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to the monitoring picture
The face information detected carries out automatic code-printing and locks the details look facility of the monitoring picture.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software,
The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, whether to identify picture first
For the original image of system authentication, identification is by starting the identification of second step validity period, if identifying the current time of the monitoring picture
Exceed the validity period, then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to this
The face information that monitoring picture detects carries out automatic code-printing and locks the details look facility of the monitoring picture.Specific body
It is now:Face datection is carried out to the monitoring picture, face position can be automatic when having face information in the monitoring picture if detecting
Stamp, meanwhile, it cannot further check picture details using the other correlation functions of software under this state, and software can prompt
User deletes the expired picture.
So, only when the monitoring picture is accredited as the original image of system authentication and identifies working as the monitoring picture
When the preceding time is without departing from the validity period, the function on ability normal use menu column, there is the detailed of the picture on menu column
Thin information, including original image, Time Validity, picture download time, photographing device sequence number, photo opporunity, position (warp
Degree, latitude, height above sea level), picture size, the information such as pixel, these information can choose watermark and be shown in the specified of the monitoring picture
Position.
Embodiment three
The embodiment of the present invention three proposes a kind of computer readable storage medium, which has one
A or multiple programs, one or more program can be executed by one or more processor, following such as Fig. 1 institutes to realize
The specific steps shown:
Step S110:Long-range connection time service central server, and worked equipment by the time service central server timing
Time carries out time synchronization.
Specifically, the method for this monitoring picture certification is based primarily upon video monitoring system 100 as shown in Figure 2 to realize,
The video monitoring system 100 includes multiple monitoring video equipment 110 and time service central server 120.Wherein, which sets
Standby 110 concretely NVR (Network Video Recorder, network hard disk video recorder), DVR (Digital Video
Recorder, hard disk video recorder), XVR (coaxial hard disk video recorder), any one in the camera with store function.It is multiple
Monitoring video equipment 110 remotely connects time service central server 120 by network mode.The network mode can be wired network
Network can also be wireless network.Time service central server 120 is national time service center, carries the standard time in China
Generation, holding and broadcast task, time dissemination system are the indispensable basic engineerings of country, for Chinese national economy development etc.
All conglomeraties and department provide reliable high-precision time service service.
In general, common maintenance personnel can only obtain common time service service from time service central server 120, and the application
Monitoring video equipment 110 and time service central server 120 between by digital certificate technique carry out identification verification, with
In the case of identification is verified, the legal identity that time synchronization is carried out by time service center service 120 is obtained.At this point,
The time service center service 120 can be that the monitoring video equipment 110 of this video monitoring system 100 provides more advanced time service clothes
Business.So, the equipment task time of the monitoring video equipment 110 of this video monitoring system 100 is unable to manual amendment, can only
It is obtained from time service central server 120, is serviced by using the time calibration of time service central server 120, can precisely record thing
At the time of part occurs, it is accurate true to realize that video time and photo opporunity synchronize, error is controllable according to current network conditions
Between 1ms-100ms.Meanwhile time service central server 120 can record the time operating status of monitoring video equipment 110, protect
The time for demonstrate,proving monitoring video equipment 110 is accurate, and national time service center can provide the equipment time and accurately prove, it is ensured that prison
The time service of control video recording equipment 110 can be traceable to the standard time at national time service center, it is ensured that the monitoring of monitoring video equipment 110 regards
The recording time of frequency and the photo opporunity for monitoring picture are authoritative, reliable.
Thus, " time service central server is remotely connected, and by time service central server timing to equipment in this step
Working time carries out time synchronization ", further include that step " carries out identification verification, in the identity by digital certificate technique
In the case of identification is verified, the legal identity that time synchronization is carried out by the time service central server is obtained ".
Step S120:Monitoring picture is shot according to the first preset rules, and is generated after the completion of each monitoring picture shooting
Corresponding cryptographic Hash.
Specifically, video monitoring system 100 as shown in Figure 2, each monitoring video equipment 110 are provided with intelligent recognition
Algorithm, including recognition of face, Car license recognition, Activity recognition etc., meanwhile, each monitoring video equipment 110 it is included based on the Big Dipper,
The positioning function of the geographical location information service such as GPS, mobile base station, Wi-Fi.Thus, as shown in figure 3, according to the first default rule
Monitoring picture is then shot, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Step S121:According to the first preset rules shoot monitoring picture, while acquisition include current time, current location,
Parameter information including equipment Serial Number, picture size, pixel.
Specifically, first preset rules include capture shooting style, timing shooting style, triggering alarm shooting style and
Any one or a few in manual shooting style.The capture shooting style includes that face capture is taken pictures, car plate capture takes pictures, goes
For capture take pictures and mobile detection capture take pictures in any one or a few.I.e. the monitoring video equipment 110 can be by following
Mode triggers monitoring picture shooting:
1. intelligence is taken pictures, detect that face is taken pictures, car plate is taken pictures, behavior is taken pictures, mobile detection is taken pictures.
2. periodically taking pictures, taking pictures interval time for the monitoring video equipment 110 can customize.
3. triggering alarm is taken pictures, the external warning device monitoring video equipment 110 that links is taken pictures.
4. taking pictures manually, the manual manipulation monitoring video equipment 110 is taken pictures according to demand by operator or user.
While each monitoring picture shooting, acquisition include current time, current location, equipment Serial Number, picture size,
Parameter information including pixel.
Step S122:Corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting, and by the parameter information and is somebody's turn to do
Cryptographic Hash is embedded into the monitoring picture.
Specifically, corresponding cryptographic Hash can be generated after the completion of each monitoring picture shooting, the cryptographic Hash and corresponding monitoring
Picture uniquely corresponds to, and collected parameter information and the cryptographic Hash can be embedded into the monitoring together when above-mentioned monitoring picture shooting
In picture, identification and details inquiry are compared so that the later stage carries out cryptographic Hash to the monitoring picture.
Step S130:By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service center service
Device is stored.
Specifically, by after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service central server
It is stored so that, can be by with the time service center when later stage identifies whether the monitoring picture is the original image of system authentication
Server 120 communicates to carry out cryptographic Hash comparison.
Step S140:By cryptographic Hash compare identify the monitoring picture whether be system authentication original image.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software,
The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, to identify whether picture is to be
The original image of system certification.If cryptographic Hash comparison passes through, identify that the monitoring picture is the original image of system authentication, the i.e. prison
Control picture is not tampered with, deleted, and belongs to true and reliable monitoring picture, when can be used as evidence use.If cryptographic Hash compares
Do not pass through, then identify the original image (i.e. secondary duplication or the non-primary picture distorted) that the monitoring picture is nonsystematic certification,
Software can hit exactly the watermark that obvious place stamps " non-primary picture " in the picture of the monitoring picture.Meanwhile it can also be to the monitoring figure
The face information that piece detects carries out automatic code-printing and locks the details look facility of the monitoring picture.It is embodied as:
Face datection is carried out to the monitoring picture, if detecting, automatic code-printing is understood at face position when having face information in the monitoring picture,
Meanwhile cannot further check picture details using the other correlation functions of software under this state, and software can prompt user
Delete the picture.
Only when the monitoring picture is accredited as the original image of system authentication, the work(on ability normal use menu column
Can, there are the details of the picture on menu column, including original image, picture download time, photographing device sequence number are taken pictures
Information, these information such as time, position (longitude, latitude, height above sea level), picture size, pixel can choose watermark and be shown in the prison
Control the designated position of picture.
In addition, as shown in figure 4, the method for the monitoring picture certification can also include the steps of:
Step S150:Made according to monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to
It is authorized with the phase.
Specifically, further protection is carried out for the monitoring picture that downloaded to high in the clouds or equipment end copies to, when this
After monitoring picture is identified by original image, validity period identification need to be further carried out, there is and only have the monitoring picture while being passed through
In the case of original image identification and validity period identification, the function on ability normal use menu column checks that picture is detailed
Thin information, setting watermark show pictorial information.If picture is expired, original image and validity period mandate can only be reacquired.
Default Second Rule is time service central server 120 or each monitoring that monitoring video equipment 110 is pre-set
Picture is downloaded the effective time (i.e. validity period mandate) rear or after being copied consulted, when user download to beyond the clouds or
After equipment end copies the monitoring picture to, term of validity countdown, when countdown terminates, the monitoring figure just are carried out to the monitoring picture
Piece expired will fail.In addition, for high permission user, also can to the setting of opening effective time permission, be allowed to be arranged
High in the clouds download or equipment end copy the term of validity duration of the monitoring picture.
Step 160:Validity period identification is carried out to the monitoring picture, is somebody's turn to do if identifying that the current time of the monitoring picture has exceeded
Validity period then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to the monitoring picture
The face information detected carries out automatic code-printing and locks the details look facility of the monitoring picture.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software,
The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, whether to identify picture first
For the original image of system authentication, identification is by starting the identification of second step validity period, if identifying the current time of the monitoring picture
Exceed the validity period, then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to this
The face information that monitoring picture detects carries out automatic code-printing and locks the details look facility of the monitoring picture.Specific body
It is now:Face datection is carried out to the monitoring picture, face position can be automatic when having face information in the monitoring picture if detecting
Stamp, meanwhile, it cannot further check picture details using the other correlation functions of software under this state, and software can prompt
User deletes the expired picture.
So, only when the monitoring picture is accredited as the original image of system authentication and identifies working as the monitoring picture
When the preceding time is without departing from the validity period, the function on ability normal use menu column, there is the detailed of the picture on menu column
Thin information, including original image, Time Validity, picture download time, photographing device sequence number, photo opporunity, position (warp
Degree, latitude, height above sea level), picture size, the information such as pixel, these information can choose watermark and be shown in the specified of the monitoring picture
Position.
The method, apparatus and computer readable storage medium of monitoring picture certification provided in an embodiment of the present invention, monitoring
Video recording equipment by remotely connecting time service central server, with by the timing of time service central server to equipment task time into
Row time synchronization, and then ensure that the time of monitoring video equipment is accurate, reliable.Meanwhile monitoring video equipment is default according to first
Rule shooting monitoring picture, generates corresponding cryptographic Hash after the completion of each monitoring picture shooting, and by the prison after the completion of shooting
Control picture and corresponding cryptographic Hash synchronized upload are stored to the time service central server, so that the later stage is compared by cryptographic Hash
Whether identification monitoring picture is tampered, deletes, it is ensured that every monitoring picture is true and reliable, is the original image of system authentication.
Embodiments of the present invention are explained in detail above in association with attached drawing, but the present invention is not limited to described implementations
Mode.For a person skilled in the art, in the case where not departing from the principle of the invention and spirit, to these embodiments
A variety of change, modification, replacement and modification are carried out, are still fallen in protection scope of the present invention.
Claims (10)
1. a kind of method of monitoring picture certification, which is characterized in that the method for the monitoring picture certification includes the following steps:
Long-range connection time service central server, and the time is carried out to equipment task time by time service central server timing
It is synchronous;
Monitoring picture is shot according to the first preset rules, and corresponding Hash is generated after the completion of each monitoring picture shooting
Value;
By after the completion of shooting the monitoring picture and corresponding cryptographic Hash synchronized upload carried out to the time service central server
Storage;
By cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image.
2. the method for monitoring picture certification as described in claim 1, which is characterized in that the long-range connection time service center service
Device, and further include following before the step of carrying out time synchronization to System production time by time service central server timing
Step:Identification verification is carried out by digital certificate technique, in the case of the identification is verified, to be led to
Cross the legal identity that the time service central server carries out time synchronization.
3. the method for monitoring picture certification as described in claim 1, which is characterized in that first preset rules include capturing
Shooting style, timing shooting style, triggering alarm shooting style and manual shooting style in any one or a few.
4. the method for monitoring picture certification as described in claim 1, which is characterized in that the capture shooting style includes face
Capture take pictures, car plate capture take pictures, behavior capture take pictures and mobile detection capture take pictures in any one or a few.
5. the method for monitoring picture certification as described in claim 1, which is characterized in that described to be shot according to the first preset rules
Picture is monitored, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Monitoring picture is shot according to the first preset rules, while it includes current time, current location, equipment Serial Number, figure to acquire
Parameter information including piece size, pixel;
Generate corresponding cryptographic Hash after the completion of each monitoring picture shooting, and by the parameter information and the cryptographic Hash
It is embedded into the monitoring picture.
6. the method for monitoring picture certification as described in claim 1, which is characterized in that described to compare identification institute by cryptographic Hash
State that the step of whether monitoring picture is the original image of system authentication specifically includes:
If identifying, the monitoring picture is the original image of nonsystematic certification, and obvious place is hit exactly in the picture of the monitoring picture
The watermark of " non-primary picture " is stamped, while the face information detected to the monitoring picture carries out automatic code-printing and locking institute
State the details look facility of monitoring picture.
7. the method for monitoring picture certification as described in claim 1, which is characterized in that described to compare identification institute by cryptographic Hash
It states further comprising the steps of after monitoring the step of whether picture is the original image of system authentication:
Validity period mandate is carried out according to the monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to.
8. the method for monitoring picture certification as claimed in claim 7, which is characterized in that the basis presets Second Rule to cloud
It is further comprising the steps of after the step of holding the monitoring picture download to or that equipment end copies to carry out validity period mandate:
Validity period identification is carried out to the monitoring picture, if the current time of the identification monitoring picture has exceeded the use
Phase then hits exactly the watermark for stamping " picture is out of date " in obvious place in the picture of the monitoring picture, while to the monitoring picture
The face information detected carries out the details look facility of automatic code-printing and the locking monitoring picture.
9. a kind of device of monitoring picture certification, which is characterized in that described device includes memory, processor, it is described to be stored in
On memory and the program that can run on the processor and for realizing between the processor and the memory
The data/address bus of connection communication realizes the method as described in claim 1-8 is any when described program is executed by the processor
The step of.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or
Multiple programs, one or more of programs can be executed by one or more processor, to realize that claim 1-8 such as appoints
The step of method described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810491898.5A CN108809467A (en) | 2018-05-22 | 2018-05-22 | Monitor the method, apparatus and computer readable storage medium of picture certification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810491898.5A CN108809467A (en) | 2018-05-22 | 2018-05-22 | Monitor the method, apparatus and computer readable storage medium of picture certification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108809467A true CN108809467A (en) | 2018-11-13 |
Family
ID=64092775
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810491898.5A Pending CN108809467A (en) | 2018-05-22 | 2018-05-22 | Monitor the method, apparatus and computer readable storage medium of picture certification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108809467A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110347745A (en) * | 2019-06-03 | 2019-10-18 | 阿里巴巴集团控股有限公司 | Time service authentication method, device and the equipment of a kind of piece of chain type account book |
US10778452B2 (en) | 2019-06-03 | 2020-09-15 | Alibaba Group Holding Limited | Blockchain ledger authentication |
CN113037734A (en) * | 2021-03-02 | 2021-06-25 | 上海德易车信息科技有限公司 | Service state monitoring method and system for isolated network |
CN115208616A (en) * | 2022-05-20 | 2022-10-18 | 深圳铸泰科技有限公司 | Internet of things safety monitoring method and system based on double engines |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413313A (en) * | 2010-09-26 | 2012-04-11 | 索尼公司 | Data integrity authentication information generation method and device as well as data integrity authentication method and device |
CN103067466A (en) * | 2012-12-20 | 2013-04-24 | 北京奇虎科技有限公司 | Client-side and method capable of achieving synchronic file storage |
CN106156328A (en) * | 2016-07-06 | 2016-11-23 | 中国银行股份有限公司 | A kind of bank's running log data monitoring method and system |
CN107871063A (en) * | 2017-11-16 | 2018-04-03 | 王磊 | Anti-tamper video and audio recording digital signature method, device and storage medium |
-
2018
- 2018-05-22 CN CN201810491898.5A patent/CN108809467A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413313A (en) * | 2010-09-26 | 2012-04-11 | 索尼公司 | Data integrity authentication information generation method and device as well as data integrity authentication method and device |
CN103067466A (en) * | 2012-12-20 | 2013-04-24 | 北京奇虎科技有限公司 | Client-side and method capable of achieving synchronic file storage |
CN106156328A (en) * | 2016-07-06 | 2016-11-23 | 中国银行股份有限公司 | A kind of bank's running log data monitoring method and system |
CN107871063A (en) * | 2017-11-16 | 2018-04-03 | 王磊 | Anti-tamper video and audio recording digital signature method, device and storage medium |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110347745A (en) * | 2019-06-03 | 2019-10-18 | 阿里巴巴集团控股有限公司 | Time service authentication method, device and the equipment of a kind of piece of chain type account book |
US10778452B2 (en) | 2019-06-03 | 2020-09-15 | Alibaba Group Holding Limited | Blockchain ledger authentication |
US10911251B2 (en) | 2019-06-03 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Blockchain ledger authentication |
US11108573B2 (en) | 2019-06-03 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Blockchain ledger authentication |
CN113037734A (en) * | 2021-03-02 | 2021-06-25 | 上海德易车信息科技有限公司 | Service state monitoring method and system for isolated network |
CN113037734B (en) * | 2021-03-02 | 2022-11-04 | 上海德易车信息科技有限公司 | Service state monitoring method and system for isolated network |
CN115208616A (en) * | 2022-05-20 | 2022-10-18 | 深圳铸泰科技有限公司 | Internet of things safety monitoring method and system based on double engines |
CN115208616B (en) * | 2022-05-20 | 2023-06-23 | 深圳铸泰科技有限公司 | Internet of things safety monitoring method and system based on double engines |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108809467A (en) | Monitor the method, apparatus and computer readable storage medium of picture certification | |
US10019773B2 (en) | Authentication and validation of smartphone imagery | |
US9686514B2 (en) | Systems and methods for an automated cloud-based video surveillance system | |
WO2020024447A1 (en) | Traffic accident processing method and apparatus, and computer readable storage medium | |
WO2015157353A1 (en) | Systems and methods for automated cloud-based analytics for security and/or surveillance | |
US11995734B2 (en) | Auditing recorded data from a recording device | |
CN104581062A (en) | Video monitoring method and system capable of realizing identity information and video linkage | |
CN111510656B (en) | Law enforcement video intercepting method, device, electronic device and storage medium | |
CN103985230A (en) | Notification method, device and system based on image | |
JP4716744B2 (en) | Video surveillance and distribution device | |
CN105426869A (en) | Face recognition system and recognition method based on railway security check | |
US11769383B2 (en) | Remote video triggering and tagging | |
CN110022355B (en) | Storage method, verification method and equipment of environment data in specific scene | |
JP4812002B2 (en) | Recording apparatus, recording collection server, recording method, and recording collection method | |
TW201712592A (en) | Systems and methods for generating an audit trail for auditable devices | |
CN105574498A (en) | Face recognition system and recognition method based on customs security check | |
US11017240B2 (en) | System and method for image analysis based security system | |
TW202108412A (en) | Cooperative driving image collection method and system | |
CN111711777B (en) | Intelligent work recorder management system and method | |
CN108961098A (en) | Vehicle supervision method, apparatus, system and computer readable storage medium | |
KR102174611B1 (en) | Blackbox apparatus and video generation method using the same | |
CN110866017A (en) | Tax handling operation mark leaving system for visual retrieval and implementation method thereof | |
JP4303733B2 (en) | Recording apparatus and recording method | |
CN108337479A (en) | Video monitoring system and video frequency monitoring method | |
CN114418092A (en) | Block chain-based federal learning malicious node screening method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181113 |