CN108809467A - Monitor the method, apparatus and computer readable storage medium of picture certification - Google Patents

Monitor the method, apparatus and computer readable storage medium of picture certification Download PDF

Info

Publication number
CN108809467A
CN108809467A CN201810491898.5A CN201810491898A CN108809467A CN 108809467 A CN108809467 A CN 108809467A CN 201810491898 A CN201810491898 A CN 201810491898A CN 108809467 A CN108809467 A CN 108809467A
Authority
CN
China
Prior art keywords
monitoring picture
picture
monitoring
time
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810491898.5A
Other languages
Chinese (zh)
Inventor
胡梓楷
林程博
胡高价
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd
Original Assignee
Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd filed Critical Shenzhen Hua Bo High-Tech Photoelectricity Technology Corp Ltd
Priority to CN201810491898.5A priority Critical patent/CN108809467A/en
Publication of CN108809467A publication Critical patent/CN108809467A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0635Clock or time synchronisation in a network
    • H04J3/0638Clock or time synchronisation among nodes; Internode synchronisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images
    • G06V20/625License plates

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

The present invention provides a kind of method, apparatus and computer readable storage medium of monitoring picture certification, and the method for the monitoring picture certification includes the following steps:Long-range connection time service central server, and time synchronization is carried out to equipment task time by time service central server timing;Monitoring picture is shot according to the first preset rules, and corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting;By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload stored to time service central server;By cryptographic Hash compare identify monitoring picture whether be system authentication original image.The present invention from time service central server by directly obtaining equipment task time, it is ensured that the time of monitoring video equipment is accurate, reliable, while being compared by cryptographic Hash and identifying whether monitoring picture is tampered, deletes, it is ensured that every monitoring picture is true and reliable.

Description

Monitor the method, apparatus and computer readable storage medium of picture certification
Technical field
The present invention relates to the method, apparatus and computer of technical field of security and protection more particularly to a kind of monitoring picture certification can Read storage medium.
Background technology
With the horizontal development of population, economy, society, people have higher consciousness, video monitoring skill to information security Art plays increasingly important role in security fields, it is intuitive with it, conveniently, the information content is abundant and is widely used in city The every field such as its net, traffic, civil safety, and in Video Surveillance Industry field, the time accuracy of video monitoring equipment, Become the industry new issue to be faced at present therewith.Traditional video monitoring equipment can arbitrarily be changed the equipment time, and not have There is timing function or use free NTP (Network Time Protocol, Network Time Protocol) server time service, leads Video time and standard time deviation are larger after cause equipment long-play, when needing to inquire video recording because time inaccuracy causes Workload increase, and when video monitoring equipment shooting picture as evidence in use, because the time itself be mistake or Lack and the certification of the real effectiveness of the picture is difficult to become evidence.
Invention content
The technical problem to be solved in the present invention is to provide a kind of method, apparatus of monitoring picture certification and computer-readable deposit Storage media is intended to by directly obtaining equipment task time from time service central server, it is ensured that the time of monitoring video equipment Accurately, reliably, it while by cryptographic Hash compares and identifies whether monitoring picture is tampered, deletes, it is ensured that every monitoring picture is true Reliably.
To achieve the above object, the present invention proposes a kind of method of monitoring picture certification, the side of the monitoring picture certification Method includes the following steps:Long-range connection time service central server, and worked equipment by time service central server timing Time carries out time synchronization;Monitoring picture is shot according to the first preset rules, and after the completion of each monitoring picture shooting Generate corresponding cryptographic Hash;By after the completion of shooting the monitoring picture and corresponding cryptographic Hash synchronized upload to the time service in Central server is stored;By cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image.
Optionally, the long-range connection time service central server, and by time service central server timing to system It is further comprising the steps of before the step of working time progress time synchronization:Identification is carried out by digital certificate technique to test Card, in the case of the identification is verified, to obtain and carry out time synchronization by the time service central server Legal identity.
Optionally, first preset rules include capturing shooting style, timing shooting style, triggering alarm shooting style And any one or a few in manual shooting style.
Optionally, the capture shooting style includes that face capture is taken pictures, car plate capture is taken pictures, behavior capture is taken pictures and moved Dynamic detecting captures any one or a few in taking pictures.
Optionally, described to shoot monitoring picture according to the first preset rules, and completed in each monitoring picture shooting After the step of generating corresponding cryptographic Hash specifically include:Monitoring picture is shot according to the first preset rules, while it includes working as to acquire Parameter information including preceding time, current location, equipment Serial Number, picture size, pixel;In each monitoring picture shooting Corresponding cryptographic Hash is generated after the completion, and the parameter information and the cryptographic Hash are embedded into the monitoring picture.
Optionally, it is described by cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image step Suddenly it specifically includes:If identify it is described monitoring picture be nonsystematic certification original image, it is described monitoring picture picture just In obvious place stamp the watermark of " non-primary picture ", while the face information detected to the monitoring picture carries out automatic code-printing And the details look facility of the locking monitoring picture.
Optionally, it is described by cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image step It is further comprising the steps of after rapid:According to the monitoring figure that default Second Rule downloads to high in the clouds or that equipment end copies to Piece carries out validity period mandate.
Optionally, the monitoring picture that the basis is default that Second Rule downloads to high in the clouds or equipment end copies to It is further comprising the steps of after the step of carrying out validity period mandate:Validity period identification is carried out to the monitoring picture, if identification institute The current time for stating monitoring picture has exceeded the validity period, then hitting exactly obvious place in the picture of the monitoring picture stamps " figure Piece is out of date " watermark, while automatic code-printing and the locking monitoring are carried out to the face information that detects of monitoring picture The details look facility of picture.
In addition, to achieve the above object, the present invention also proposes a kind of device of monitoring picture certification, and described device includes depositing Reservoir, processor, the program that is stored on the memory and can run on the processor and for realizing the place The data/address bus of the connection communication between device and the memory is managed, described program is realized above-mentioned when being executed by the processor The step of method.
In addition, to achieve the above object, the present invention also proposes a kind of computer readable storage medium, described computer-readable Storage medium is stored with one or more program, and one or more of programs can be held by one or more processor Row, the step of to realize above-mentioned method.
The method, apparatus and computer readable storage medium of monitoring picture certification provided by the invention, monitoring video are set It is standby by remotely connecting time service central server, to carry out the time to equipment task time by time service central server timing It is synchronous, and then ensure that the time of monitoring video equipment is accurate, reliable.Meanwhile monitoring video equipment is clapped according to the first preset rules Monitoring picture is taken the photograph, generates corresponding cryptographic Hash after the completion of each monitoring picture shooting, and by the monitoring picture after the completion of shooting And corresponding cryptographic Hash synchronized upload is stored to the time service central server, so that the later stage compares identification prison by cryptographic Hash Whether control picture is tampered, deletes, it is ensured that every monitoring picture is true and reliable, is the original image of system authentication.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without having to pay creative labor, may be used also for those of ordinary skill in the art With obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow diagram of the method for the monitoring picture certification that the embodiment of the present invention one proposes.
Fig. 2 is the structure diagram of video monitoring system of the present invention.
Fig. 3 is the idiographic flow block diagram of the step S120 of the method for monitoring picture certification shown in Fig. 1.
Fig. 4 is the another flow diagram of the method for monitoring picture certification shown in Fig. 1.
Fig. 5 is the structure diagram of the device for the monitoring picture certification that the embodiment of the present invention two proposes.
Specific implementation mode
The specific implementation mode of the present invention is described further below in conjunction with the accompanying drawings.It should be noted that for The explanation of these embodiments is used to help understand the present invention, but does not constitute limitation of the invention.In addition, disclosed below The each embodiment of the present invention in involved technical characteristic can be combined with each other as long as they do not conflict with each other.
Embodiment one
As shown in Figure 1, the embodiment of the present invention one proposes a kind of method of monitoring picture certification, the side of the monitoring picture certification Method specifically includes following steps:
Step S110:Long-range connection time service central server, and worked equipment by the time service central server timing Time carries out time synchronization.
Specifically, the method for this monitoring picture certification is based primarily upon video monitoring system 100 as shown in Figure 2 to realize, The video monitoring system 100 includes multiple monitoring video equipment 110 and time service central server 120.Wherein, which sets Standby 110 concretely NVR (Network Video Recorder, network hard disk video recorder), DVR (Digital Video Recorder, hard disk video recorder), XVR (coaxial hard disk video recorder), any one in the camera with store function.It is multiple Monitoring video equipment 110 remotely connects time service central server 120 by network mode.The network mode can be wired network Network can also be wireless network.Time service central server 120 is national time service center, carries the standard time in China Generation, holding and broadcast task, time dissemination system are the indispensable basic engineerings of country, for Chinese national economy development etc. All conglomeraties and department provide reliable high-precision time service service.
In general, common maintenance personnel can only obtain common time service service from time service central server 120, and the application Monitoring video equipment 110 and time service central server 120 between by digital certificate technique carry out identification verification, with In the case of identification is verified, the legal identity that time synchronization is carried out by time service center service 120 is obtained.At this point, The time service center service 120 can be that the monitoring video equipment 110 of this video monitoring system 100 provides more advanced time service clothes Business.So, the equipment task time of the monitoring video equipment 110 of this video monitoring system 100 is unable to manual amendment, can only It is obtained from time service central server 120, is serviced by using the time calibration of time service central server 120, can precisely record thing At the time of part occurs, it is accurate true to realize that video time and photo opporunity synchronize, error is controllable according to current network conditions Between 1ms-100ms.Meanwhile time service central server 120 can record the time operating status of monitoring video equipment 110, protect The time for demonstrate,proving monitoring video equipment 110 is accurate, and national time service center can provide the equipment time and accurately prove, it is ensured that prison The time service of control video recording equipment 110 can be traceable to the standard time at national time service center, it is ensured that the monitoring of monitoring video equipment 110 regards The recording time of frequency and the photo opporunity for monitoring picture are authoritative, reliable.
Thus, " time service central server is remotely connected, and by time service central server timing to equipment in this step Working time carries out time synchronization ", further include that step " carries out identification verification, in the identity by digital certificate technique In the case of identification is verified, the legal identity that time synchronization is carried out by the time service central server is obtained ".
Step S120:Monitoring picture is shot according to the first preset rules, and is generated after the completion of each monitoring picture shooting Corresponding cryptographic Hash.
Specifically, video monitoring system 100 as shown in Figure 2, each monitoring video equipment 110 are provided with intelligent recognition Algorithm, including recognition of face, Car license recognition, Activity recognition etc., meanwhile, each monitoring video equipment 110 it is included based on the Big Dipper, The positioning function of the geographical location information service such as GPS, mobile base station, Wi-Fi.Thus, as shown in figure 3, according to the first default rule Monitoring picture is then shot, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Step S121:According to the first preset rules shoot monitoring picture, while acquisition include current time, current location, Parameter information including equipment Serial Number, picture size, pixel.
Specifically, first preset rules include capture shooting style, timing shooting style, triggering alarm shooting style and Any one or a few in manual shooting style.The capture shooting style includes that face capture is taken pictures, car plate capture takes pictures, goes For capture take pictures and mobile detection capture take pictures in any one or a few.I.e. the monitoring video equipment 110 can be by following Mode triggers monitoring picture shooting:
1. intelligence is taken pictures, detect that face is taken pictures, car plate is taken pictures, behavior is taken pictures, mobile detection is taken pictures.
2. periodically taking pictures, taking pictures interval time for the monitoring video equipment 110 can customize.
3. triggering alarm is taken pictures, the external warning device monitoring video equipment 110 that links is taken pictures.
4. taking pictures manually, the manual manipulation monitoring video equipment 110 is taken pictures according to demand by operator or user.
While each monitoring picture shooting, acquisition include current time, current location, equipment Serial Number, picture size, Parameter information including pixel.
Step S122:Corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting, and by the parameter information and is somebody's turn to do Cryptographic Hash is embedded into the monitoring picture.
Specifically, corresponding cryptographic Hash can be generated after the completion of each monitoring picture shooting, the cryptographic Hash and corresponding monitoring Picture uniquely corresponds to, and collected parameter information and the cryptographic Hash can be embedded into the monitoring together when above-mentioned monitoring picture shooting In picture, identification and details inquiry are compared so that the later stage carries out cryptographic Hash to the monitoring picture.
Step S130:By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service center service Device is stored.
Specifically, by after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service central server It is stored so that, can be by with the time service center when later stage identifies whether the monitoring picture is the original image of system authentication Server 120 communicates to carry out cryptographic Hash comparison.
Step S140:By cryptographic Hash compare identify the monitoring picture whether be system authentication original image.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software, The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, to identify whether picture is to be The original image of system certification.If cryptographic Hash comparison passes through, identify that the monitoring picture is the original image of system authentication, the i.e. prison Control picture is not tampered with, deleted, and belongs to true and reliable monitoring picture, when can be used as evidence use.If cryptographic Hash compares Do not pass through, then identify the original image (i.e. secondary duplication or the non-primary picture distorted) that the monitoring picture is nonsystematic certification, Software can hit exactly the watermark that obvious place stamps " non-primary picture " in the picture of the monitoring picture.Meanwhile it can also be to the monitoring figure The face information that piece detects carries out automatic code-printing and locks the details look facility of the monitoring picture.It is embodied as: Face datection is carried out to the monitoring picture, if detecting, automatic code-printing is understood at face position when having face information in the monitoring picture, Meanwhile cannot further check picture details using the other correlation functions of software under this state, and software can prompt user Delete the picture.
Only when the monitoring picture is accredited as the original image of system authentication, the work(on ability normal use menu column Can, there are the details of the picture on menu column, including original image, picture download time, photographing device sequence number are taken pictures Information, these information such as time, position (longitude, latitude, height above sea level), picture size, pixel can choose watermark and be shown in the prison Control the designated position of picture.
In addition, as shown in figure 4, the method for the monitoring picture certification can also include the steps of:
Step S150:Made according to monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to It is authorized with the phase.
Specifically, further protection is carried out for the monitoring picture that downloaded to high in the clouds or equipment end copies to, when this After monitoring picture is identified by original image, validity period identification need to be further carried out, there is and only have the monitoring picture while being passed through In the case of original image identification and validity period identification, the function on ability normal use menu column checks that picture is detailed Thin information, setting watermark show pictorial information.If picture is expired, original image and validity period mandate can only be reacquired.
Default Second Rule is time service central server 120 or each monitoring that monitoring video equipment 110 is pre-set Picture is downloaded the effective time (i.e. validity period mandate) rear or after being copied consulted, when user download to beyond the clouds or After equipment end copies the monitoring picture to, term of validity countdown, when countdown terminates, the monitoring figure just are carried out to the monitoring picture Piece expired will fail.In addition, for high permission user, also can to the setting of opening effective time permission, be allowed to be arranged High in the clouds download or equipment end copy the term of validity duration of the monitoring picture.
Step 160:Validity period identification is carried out to the monitoring picture, is somebody's turn to do if identifying that the current time of the monitoring picture has exceeded Validity period then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to the monitoring picture The face information detected carries out automatic code-printing and locks the details look facility of the monitoring picture.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software, The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, whether to identify picture first For the original image of system authentication, identification is by starting the identification of second step validity period, if identifying the current time of the monitoring picture Exceed the validity period, then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to this The face information that monitoring picture detects carries out automatic code-printing and locks the details look facility of the monitoring picture.Specific body It is now:Face datection is carried out to the monitoring picture, face position can be automatic when having face information in the monitoring picture if detecting Stamp, meanwhile, it cannot further check picture details using the other correlation functions of software under this state, and software can prompt User deletes the expired picture.
So, only when the monitoring picture is accredited as the original image of system authentication and identifies working as the monitoring picture When the preceding time is without departing from the validity period, the function on ability normal use menu column, there is the detailed of the picture on menu column Thin information, including original image, Time Validity, picture download time, photographing device sequence number, photo opporunity, position (warp Degree, latitude, height above sea level), picture size, the information such as pixel, these information can choose watermark and be shown in the specified of the monitoring picture Position.
Embodiment two
As shown in figure 5, the embodiment of the present invention two proposes that the device 20 of monitoring picture certification, the device 20 include memory 21, processor 22, the program that is stored on the memory and can run on the processor and for realizing 21 and of processor The data/address bus 23 of connection communication between memory 22, it is following as shown in Figure 1 to realize when which is executed by the processor Specific steps:
Step S110:Long-range connection time service central server, and worked equipment by the time service central server timing Time carries out time synchronization.
Specifically, the method for this monitoring picture certification is based primarily upon video monitoring system 100 as shown in Figure 2 to realize, The video monitoring system 100 includes multiple monitoring video equipment 110 and time service central server 120.Wherein, which sets Standby 110 concretely NVR (Network Video Recorder, network hard disk video recorder), DVR (Digital Video Recorder, hard disk video recorder), XVR (coaxial hard disk video recorder), any one in the camera with store function.It is multiple Monitoring video equipment 110 remotely connects time service central server 120 by network mode.The network mode can be wired network Network can also be wireless network.Time service central server 120 is national time service center, carries the standard time in China Generation, holding and broadcast task, time dissemination system are the indispensable basic engineerings of country, for Chinese national economy development etc. All conglomeraties and department provide reliable high-precision time service service.
In general, common maintenance personnel can only obtain common time service service from time service central server 120, and the application Monitoring video equipment 110 and time service central server 120 between by digital certificate technique carry out identification verification, with In the case of identification is verified, the legal identity that time synchronization is carried out by time service center service 120 is obtained.At this point, The time service center service 120 can be that the monitoring video equipment 110 of this video monitoring system 100 provides more advanced time service clothes Business.So, the equipment task time of the monitoring video equipment 110 of this video monitoring system 100 is unable to manual amendment, can only It is obtained from time service central server 120, is serviced by using the time calibration of time service central server 120, can precisely record thing At the time of part occurs, it is accurate true to realize that video time and photo opporunity synchronize, error is controllable according to current network conditions Between 1ms-100ms.Meanwhile time service central server 120 can record the time operating status of monitoring video equipment 110, protect The time for demonstrate,proving monitoring video equipment 110 is accurate, and national time service center can provide the equipment time and accurately prove, it is ensured that prison The time service of control video recording equipment 110 can be traceable to the standard time at national time service center, it is ensured that the monitoring of monitoring video equipment 110 regards The recording time of frequency and the photo opporunity for monitoring picture are authoritative, reliable.
Thus, " time service central server is remotely connected, and by time service central server timing to equipment in this step Working time carries out time synchronization ", further include that step " carries out identification verification, in the identity by digital certificate technique In the case of identification is verified, the legal identity that time synchronization is carried out by the time service central server is obtained ".
Step S120:Monitoring picture is shot according to the first preset rules, and is generated after the completion of each monitoring picture shooting Corresponding cryptographic Hash.
Specifically, video monitoring system 100 as shown in Figure 2, each monitoring video equipment 110 are provided with intelligent recognition Algorithm, including recognition of face, Car license recognition, Activity recognition etc., meanwhile, each monitoring video equipment 110 it is included based on the Big Dipper, The positioning function of the geographical location information service such as GPS, mobile base station, Wi-Fi.Thus, as shown in figure 3, according to the first default rule Monitoring picture is then shot, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Step S121:According to the first preset rules shoot monitoring picture, while acquisition include current time, current location, Parameter information including equipment Serial Number, picture size, pixel.
Specifically, first preset rules include capture shooting style, timing shooting style, triggering alarm shooting style and Any one or a few in manual shooting style.The capture shooting style includes that face capture is taken pictures, car plate capture takes pictures, goes For capture take pictures and mobile detection capture take pictures in any one or a few.I.e. the monitoring video equipment 110 can be by following Mode triggers monitoring picture shooting:
1. intelligence is taken pictures, detect that face is taken pictures, car plate is taken pictures, behavior is taken pictures, mobile detection is taken pictures.
2. periodically taking pictures, taking pictures interval time for the monitoring video equipment 110 can customize.
3. triggering alarm is taken pictures, the external warning device monitoring video equipment 110 that links is taken pictures.
4. taking pictures manually, the manual manipulation monitoring video equipment 110 is taken pictures according to demand by operator or user.
While each monitoring picture shooting, acquisition include current time, current location, equipment Serial Number, picture size, Parameter information including pixel.
Step S122:Corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting, and by the parameter information and is somebody's turn to do Cryptographic Hash is embedded into the monitoring picture.
Specifically, corresponding cryptographic Hash can be generated after the completion of each monitoring picture shooting, the cryptographic Hash and corresponding monitoring Picture uniquely corresponds to, and collected parameter information and the cryptographic Hash can be embedded into the monitoring together when above-mentioned monitoring picture shooting In picture, identification and details inquiry are compared so that the later stage carries out cryptographic Hash to the monitoring picture.
Step S130:By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service center service Device is stored.
Specifically, by after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service central server It is stored so that, can be by with the time service center when later stage identifies whether the monitoring picture is the original image of system authentication Server 120 communicates to carry out cryptographic Hash comparison.
Step S140:By cryptographic Hash compare identify the monitoring picture whether be system authentication original image.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software, The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, to identify whether picture is to be The original image of system certification.If cryptographic Hash comparison passes through, identify that the monitoring picture is the original image of system authentication, the i.e. prison Control picture is not tampered with, deleted, and belongs to true and reliable monitoring picture, when can be used as evidence use.If cryptographic Hash compares Do not pass through, then identify the original image (i.e. secondary duplication or the non-primary picture distorted) that the monitoring picture is nonsystematic certification, Software can hit exactly the watermark that obvious place stamps " non-primary picture " in the picture of the monitoring picture.Meanwhile it can also be to the monitoring figure The face information that piece detects carries out automatic code-printing and locks the details look facility of the monitoring picture.It is embodied as: Face datection is carried out to the monitoring picture, if detecting, automatic code-printing is understood at face position when having face information in the monitoring picture, Meanwhile cannot further check picture details using the other correlation functions of software under this state, and software can prompt user Delete the picture.
Only when the monitoring picture is accredited as the original image of system authentication, the work(on ability normal use menu column Can, there are the details of the picture on menu column, including original image, picture download time, photographing device sequence number are taken pictures Information, these information such as time, position (longitude, latitude, height above sea level), picture size, pixel can choose watermark and be shown in the prison Control the designated position of picture.
In addition, as shown in figure 4, the method for the monitoring picture certification can also include the steps of:
Step S150:Made according to monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to It is authorized with the phase.
Specifically, further protection is carried out for the monitoring picture that downloaded to high in the clouds or equipment end copies to, when this After monitoring picture is identified by original image, validity period identification need to be further carried out, there is and only have the monitoring picture while being passed through In the case of original image identification and validity period identification, the function on ability normal use menu column checks that picture is detailed Thin information, setting watermark show pictorial information.If picture is expired, original image and validity period mandate can only be reacquired.
Default Second Rule is time service central server 120 or each monitoring that monitoring video equipment 110 is pre-set Picture is downloaded the effective time (i.e. validity period mandate) rear or after being copied consulted, when user download to beyond the clouds or After equipment end copies the monitoring picture to, term of validity countdown, when countdown terminates, the monitoring figure just are carried out to the monitoring picture Piece expired will fail.In addition, for high permission user, also can to the setting of opening effective time permission, be allowed to be arranged High in the clouds download or equipment end copy the term of validity duration of the monitoring picture.
Step 160:Validity period identification is carried out to the monitoring picture, is somebody's turn to do if identifying that the current time of the monitoring picture has exceeded Validity period then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to the monitoring picture The face information detected carries out automatic code-printing and locks the details look facility of the monitoring picture.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software, The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, whether to identify picture first For the original image of system authentication, identification is by starting the identification of second step validity period, if identifying the current time of the monitoring picture Exceed the validity period, then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to this The face information that monitoring picture detects carries out automatic code-printing and locks the details look facility of the monitoring picture.Specific body It is now:Face datection is carried out to the monitoring picture, face position can be automatic when having face information in the monitoring picture if detecting Stamp, meanwhile, it cannot further check picture details using the other correlation functions of software under this state, and software can prompt User deletes the expired picture.
So, only when the monitoring picture is accredited as the original image of system authentication and identifies working as the monitoring picture When the preceding time is without departing from the validity period, the function on ability normal use menu column, there is the detailed of the picture on menu column Thin information, including original image, Time Validity, picture download time, photographing device sequence number, photo opporunity, position (warp Degree, latitude, height above sea level), picture size, the information such as pixel, these information can choose watermark and be shown in the specified of the monitoring picture Position.
Embodiment three
The embodiment of the present invention three proposes a kind of computer readable storage medium, which has one A or multiple programs, one or more program can be executed by one or more processor, following such as Fig. 1 institutes to realize The specific steps shown:
Step S110:Long-range connection time service central server, and worked equipment by the time service central server timing Time carries out time synchronization.
Specifically, the method for this monitoring picture certification is based primarily upon video monitoring system 100 as shown in Figure 2 to realize, The video monitoring system 100 includes multiple monitoring video equipment 110 and time service central server 120.Wherein, which sets Standby 110 concretely NVR (Network Video Recorder, network hard disk video recorder), DVR (Digital Video Recorder, hard disk video recorder), XVR (coaxial hard disk video recorder), any one in the camera with store function.It is multiple Monitoring video equipment 110 remotely connects time service central server 120 by network mode.The network mode can be wired network Network can also be wireless network.Time service central server 120 is national time service center, carries the standard time in China Generation, holding and broadcast task, time dissemination system are the indispensable basic engineerings of country, for Chinese national economy development etc. All conglomeraties and department provide reliable high-precision time service service.
In general, common maintenance personnel can only obtain common time service service from time service central server 120, and the application Monitoring video equipment 110 and time service central server 120 between by digital certificate technique carry out identification verification, with In the case of identification is verified, the legal identity that time synchronization is carried out by time service center service 120 is obtained.At this point, The time service center service 120 can be that the monitoring video equipment 110 of this video monitoring system 100 provides more advanced time service clothes Business.So, the equipment task time of the monitoring video equipment 110 of this video monitoring system 100 is unable to manual amendment, can only It is obtained from time service central server 120, is serviced by using the time calibration of time service central server 120, can precisely record thing At the time of part occurs, it is accurate true to realize that video time and photo opporunity synchronize, error is controllable according to current network conditions Between 1ms-100ms.Meanwhile time service central server 120 can record the time operating status of monitoring video equipment 110, protect The time for demonstrate,proving monitoring video equipment 110 is accurate, and national time service center can provide the equipment time and accurately prove, it is ensured that prison The time service of control video recording equipment 110 can be traceable to the standard time at national time service center, it is ensured that the monitoring of monitoring video equipment 110 regards The recording time of frequency and the photo opporunity for monitoring picture are authoritative, reliable.
Thus, " time service central server is remotely connected, and by time service central server timing to equipment in this step Working time carries out time synchronization ", further include that step " carries out identification verification, in the identity by digital certificate technique In the case of identification is verified, the legal identity that time synchronization is carried out by the time service central server is obtained ".
Step S120:Monitoring picture is shot according to the first preset rules, and is generated after the completion of each monitoring picture shooting Corresponding cryptographic Hash.
Specifically, video monitoring system 100 as shown in Figure 2, each monitoring video equipment 110 are provided with intelligent recognition Algorithm, including recognition of face, Car license recognition, Activity recognition etc., meanwhile, each monitoring video equipment 110 it is included based on the Big Dipper, The positioning function of the geographical location information service such as GPS, mobile base station, Wi-Fi.Thus, as shown in figure 3, according to the first default rule Monitoring picture is then shot, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Step S121:According to the first preset rules shoot monitoring picture, while acquisition include current time, current location, Parameter information including equipment Serial Number, picture size, pixel.
Specifically, first preset rules include capture shooting style, timing shooting style, triggering alarm shooting style and Any one or a few in manual shooting style.The capture shooting style includes that face capture is taken pictures, car plate capture takes pictures, goes For capture take pictures and mobile detection capture take pictures in any one or a few.I.e. the monitoring video equipment 110 can be by following Mode triggers monitoring picture shooting:
1. intelligence is taken pictures, detect that face is taken pictures, car plate is taken pictures, behavior is taken pictures, mobile detection is taken pictures.
2. periodically taking pictures, taking pictures interval time for the monitoring video equipment 110 can customize.
3. triggering alarm is taken pictures, the external warning device monitoring video equipment 110 that links is taken pictures.
4. taking pictures manually, the manual manipulation monitoring video equipment 110 is taken pictures according to demand by operator or user.
While each monitoring picture shooting, acquisition include current time, current location, equipment Serial Number, picture size, Parameter information including pixel.
Step S122:Corresponding cryptographic Hash is generated after the completion of each monitoring picture shooting, and by the parameter information and is somebody's turn to do Cryptographic Hash is embedded into the monitoring picture.
Specifically, corresponding cryptographic Hash can be generated after the completion of each monitoring picture shooting, the cryptographic Hash and corresponding monitoring Picture uniquely corresponds to, and collected parameter information and the cryptographic Hash can be embedded into the monitoring together when above-mentioned monitoring picture shooting In picture, identification and details inquiry are compared so that the later stage carries out cryptographic Hash to the monitoring picture.
Step S130:By after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service center service Device is stored.
Specifically, by after the completion of shooting monitoring picture and corresponding cryptographic Hash synchronized upload to the time service central server It is stored so that, can be by with the time service center when later stage identifies whether the monitoring picture is the original image of system authentication Server 120 communicates to carry out cryptographic Hash comparison.
Step S140:By cryptographic Hash compare identify the monitoring picture whether be system authentication original image.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software, The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, to identify whether picture is to be The original image of system certification.If cryptographic Hash comparison passes through, identify that the monitoring picture is the original image of system authentication, the i.e. prison Control picture is not tampered with, deleted, and belongs to true and reliable monitoring picture, when can be used as evidence use.If cryptographic Hash compares Do not pass through, then identify the original image (i.e. secondary duplication or the non-primary picture distorted) that the monitoring picture is nonsystematic certification, Software can hit exactly the watermark that obvious place stamps " non-primary picture " in the picture of the monitoring picture.Meanwhile it can also be to the monitoring figure The face information that piece detects carries out automatic code-printing and locks the details look facility of the monitoring picture.It is embodied as: Face datection is carried out to the monitoring picture, if detecting, automatic code-printing is understood at face position when having face information in the monitoring picture, Meanwhile cannot further check picture details using the other correlation functions of software under this state, and software can prompt user Delete the picture.
Only when the monitoring picture is accredited as the original image of system authentication, the work(on ability normal use menu column Can, there are the details of the picture on menu column, including original image, picture download time, photographing device sequence number are taken pictures Information, these information such as time, position (longitude, latitude, height above sea level), picture size, pixel can choose watermark and be shown in the prison Control the designated position of picture.
In addition, as shown in figure 4, the method for the monitoring picture certification can also include the steps of:
Step S150:Made according to monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to It is authorized with the phase.
Specifically, further protection is carried out for the monitoring picture that downloaded to high in the clouds or equipment end copies to, when this After monitoring picture is identified by original image, validity period identification need to be further carried out, there is and only have the monitoring picture while being passed through In the case of original image identification and validity period identification, the function on ability normal use menu column checks that picture is detailed Thin information, setting watermark show pictorial information.If picture is expired, original image and validity period mandate can only be reacquired.
Default Second Rule is time service central server 120 or each monitoring that monitoring video equipment 110 is pre-set Picture is downloaded the effective time (i.e. validity period mandate) rear or after being copied consulted, when user download to beyond the clouds or After equipment end copies the monitoring picture to, term of validity countdown, when countdown terminates, the monitoring figure just are carried out to the monitoring picture Piece expired will fail.In addition, for high permission user, also can to the setting of opening effective time permission, be allowed to be arranged High in the clouds download or equipment end copy the term of validity duration of the monitoring picture.
Step 160:Validity period identification is carried out to the monitoring picture, is somebody's turn to do if identifying that the current time of the monitoring picture has exceeded Validity period then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to the monitoring picture The face information detected carries out automatic code-printing and locks the details look facility of the monitoring picture.
Specifically, which can only be opened by special-purpose software, and when opening the monitoring picture by special-purpose software, The special-purpose software can be communicated with the time service central server 120 automatically to carry out cryptographic Hash comparison, whether to identify picture first For the original image of system authentication, identification is by starting the identification of second step validity period, if identifying the current time of the monitoring picture Exceed the validity period, then hits exactly the watermark that obvious place stamps " picture is out of date " in the picture of the monitoring picture, while to this The face information that monitoring picture detects carries out automatic code-printing and locks the details look facility of the monitoring picture.Specific body It is now:Face datection is carried out to the monitoring picture, face position can be automatic when having face information in the monitoring picture if detecting Stamp, meanwhile, it cannot further check picture details using the other correlation functions of software under this state, and software can prompt User deletes the expired picture.
So, only when the monitoring picture is accredited as the original image of system authentication and identifies working as the monitoring picture When the preceding time is without departing from the validity period, the function on ability normal use menu column, there is the detailed of the picture on menu column Thin information, including original image, Time Validity, picture download time, photographing device sequence number, photo opporunity, position (warp Degree, latitude, height above sea level), picture size, the information such as pixel, these information can choose watermark and be shown in the specified of the monitoring picture Position.
The method, apparatus and computer readable storage medium of monitoring picture certification provided in an embodiment of the present invention, monitoring Video recording equipment by remotely connecting time service central server, with by the timing of time service central server to equipment task time into Row time synchronization, and then ensure that the time of monitoring video equipment is accurate, reliable.Meanwhile monitoring video equipment is default according to first Rule shooting monitoring picture, generates corresponding cryptographic Hash after the completion of each monitoring picture shooting, and by the prison after the completion of shooting Control picture and corresponding cryptographic Hash synchronized upload are stored to the time service central server, so that the later stage is compared by cryptographic Hash Whether identification monitoring picture is tampered, deletes, it is ensured that every monitoring picture is true and reliable, is the original image of system authentication.
Embodiments of the present invention are explained in detail above in association with attached drawing, but the present invention is not limited to described implementations Mode.For a person skilled in the art, in the case where not departing from the principle of the invention and spirit, to these embodiments A variety of change, modification, replacement and modification are carried out, are still fallen in protection scope of the present invention.

Claims (10)

1. a kind of method of monitoring picture certification, which is characterized in that the method for the monitoring picture certification includes the following steps:
Long-range connection time service central server, and the time is carried out to equipment task time by time service central server timing It is synchronous;
Monitoring picture is shot according to the first preset rules, and corresponding Hash is generated after the completion of each monitoring picture shooting Value;
By after the completion of shooting the monitoring picture and corresponding cryptographic Hash synchronized upload carried out to the time service central server Storage;
By cryptographic Hash compare identify it is described monitoring picture whether be system authentication original image.
2. the method for monitoring picture certification as described in claim 1, which is characterized in that the long-range connection time service center service Device, and further include following before the step of carrying out time synchronization to System production time by time service central server timing Step:Identification verification is carried out by digital certificate technique, in the case of the identification is verified, to be led to Cross the legal identity that the time service central server carries out time synchronization.
3. the method for monitoring picture certification as described in claim 1, which is characterized in that first preset rules include capturing Shooting style, timing shooting style, triggering alarm shooting style and manual shooting style in any one or a few.
4. the method for monitoring picture certification as described in claim 1, which is characterized in that the capture shooting style includes face Capture take pictures, car plate capture take pictures, behavior capture take pictures and mobile detection capture take pictures in any one or a few.
5. the method for monitoring picture certification as described in claim 1, which is characterized in that described to be shot according to the first preset rules Picture is monitored, and the step of generating corresponding cryptographic Hash after the completion of each monitoring picture shooting specifically includes:
Monitoring picture is shot according to the first preset rules, while it includes current time, current location, equipment Serial Number, figure to acquire Parameter information including piece size, pixel;
Generate corresponding cryptographic Hash after the completion of each monitoring picture shooting, and by the parameter information and the cryptographic Hash It is embedded into the monitoring picture.
6. the method for monitoring picture certification as described in claim 1, which is characterized in that described to compare identification institute by cryptographic Hash State that the step of whether monitoring picture is the original image of system authentication specifically includes:
If identifying, the monitoring picture is the original image of nonsystematic certification, and obvious place is hit exactly in the picture of the monitoring picture The watermark of " non-primary picture " is stamped, while the face information detected to the monitoring picture carries out automatic code-printing and locking institute State the details look facility of monitoring picture.
7. the method for monitoring picture certification as described in claim 1, which is characterized in that described to compare identification institute by cryptographic Hash It states further comprising the steps of after monitoring the step of whether picture is the original image of system authentication:
Validity period mandate is carried out according to the monitoring picture that default Second Rule downloads to high in the clouds or that equipment end copies to.
8. the method for monitoring picture certification as claimed in claim 7, which is characterized in that the basis presets Second Rule to cloud It is further comprising the steps of after the step of holding the monitoring picture download to or that equipment end copies to carry out validity period mandate:
Validity period identification is carried out to the monitoring picture, if the current time of the identification monitoring picture has exceeded the use Phase then hits exactly the watermark for stamping " picture is out of date " in obvious place in the picture of the monitoring picture, while to the monitoring picture The face information detected carries out the details look facility of automatic code-printing and the locking monitoring picture.
9. a kind of device of monitoring picture certification, which is characterized in that described device includes memory, processor, it is described to be stored in On memory and the program that can run on the processor and for realizing between the processor and the memory The data/address bus of connection communication realizes the method as described in claim 1-8 is any when described program is executed by the processor The step of.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or Multiple programs, one or more of programs can be executed by one or more processor, to realize that claim 1-8 such as appoints The step of method described in one.
CN201810491898.5A 2018-05-22 2018-05-22 Monitor the method, apparatus and computer readable storage medium of picture certification Pending CN108809467A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810491898.5A CN108809467A (en) 2018-05-22 2018-05-22 Monitor the method, apparatus and computer readable storage medium of picture certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810491898.5A CN108809467A (en) 2018-05-22 2018-05-22 Monitor the method, apparatus and computer readable storage medium of picture certification

Publications (1)

Publication Number Publication Date
CN108809467A true CN108809467A (en) 2018-11-13

Family

ID=64092775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810491898.5A Pending CN108809467A (en) 2018-05-22 2018-05-22 Monitor the method, apparatus and computer readable storage medium of picture certification

Country Status (1)

Country Link
CN (1) CN108809467A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110347745A (en) * 2019-06-03 2019-10-18 阿里巴巴集团控股有限公司 Time service authentication method, device and the equipment of a kind of piece of chain type account book
US10778452B2 (en) 2019-06-03 2020-09-15 Alibaba Group Holding Limited Blockchain ledger authentication
CN113037734A (en) * 2021-03-02 2021-06-25 上海德易车信息科技有限公司 Service state monitoring method and system for isolated network
CN115208616A (en) * 2022-05-20 2022-10-18 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413313A (en) * 2010-09-26 2012-04-11 索尼公司 Data integrity authentication information generation method and device as well as data integrity authentication method and device
CN103067466A (en) * 2012-12-20 2013-04-24 北京奇虎科技有限公司 Client-side and method capable of achieving synchronic file storage
CN106156328A (en) * 2016-07-06 2016-11-23 中国银行股份有限公司 A kind of bank's running log data monitoring method and system
CN107871063A (en) * 2017-11-16 2018-04-03 王磊 Anti-tamper video and audio recording digital signature method, device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413313A (en) * 2010-09-26 2012-04-11 索尼公司 Data integrity authentication information generation method and device as well as data integrity authentication method and device
CN103067466A (en) * 2012-12-20 2013-04-24 北京奇虎科技有限公司 Client-side and method capable of achieving synchronic file storage
CN106156328A (en) * 2016-07-06 2016-11-23 中国银行股份有限公司 A kind of bank's running log data monitoring method and system
CN107871063A (en) * 2017-11-16 2018-04-03 王磊 Anti-tamper video and audio recording digital signature method, device and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110347745A (en) * 2019-06-03 2019-10-18 阿里巴巴集团控股有限公司 Time service authentication method, device and the equipment of a kind of piece of chain type account book
US10778452B2 (en) 2019-06-03 2020-09-15 Alibaba Group Holding Limited Blockchain ledger authentication
US10911251B2 (en) 2019-06-03 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain ledger authentication
US11108573B2 (en) 2019-06-03 2021-08-31 Advanced New Technologies Co., Ltd. Blockchain ledger authentication
CN113037734A (en) * 2021-03-02 2021-06-25 上海德易车信息科技有限公司 Service state monitoring method and system for isolated network
CN113037734B (en) * 2021-03-02 2022-11-04 上海德易车信息科技有限公司 Service state monitoring method and system for isolated network
CN115208616A (en) * 2022-05-20 2022-10-18 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines
CN115208616B (en) * 2022-05-20 2023-06-23 深圳铸泰科技有限公司 Internet of things safety monitoring method and system based on double engines

Similar Documents

Publication Publication Date Title
CN108809467A (en) Monitor the method, apparatus and computer readable storage medium of picture certification
US10019773B2 (en) Authentication and validation of smartphone imagery
US9686514B2 (en) Systems and methods for an automated cloud-based video surveillance system
WO2020024447A1 (en) Traffic accident processing method and apparatus, and computer readable storage medium
WO2015157353A1 (en) Systems and methods for automated cloud-based analytics for security and/or surveillance
US11995734B2 (en) Auditing recorded data from a recording device
CN104581062A (en) Video monitoring method and system capable of realizing identity information and video linkage
CN111510656B (en) Law enforcement video intercepting method, device, electronic device and storage medium
CN103985230A (en) Notification method, device and system based on image
JP4716744B2 (en) Video surveillance and distribution device
CN105426869A (en) Face recognition system and recognition method based on railway security check
US11769383B2 (en) Remote video triggering and tagging
CN110022355B (en) Storage method, verification method and equipment of environment data in specific scene
JP4812002B2 (en) Recording apparatus, recording collection server, recording method, and recording collection method
TW201712592A (en) Systems and methods for generating an audit trail for auditable devices
CN105574498A (en) Face recognition system and recognition method based on customs security check
US11017240B2 (en) System and method for image analysis based security system
TW202108412A (en) Cooperative driving image collection method and system
CN111711777B (en) Intelligent work recorder management system and method
CN108961098A (en) Vehicle supervision method, apparatus, system and computer readable storage medium
KR102174611B1 (en) Blackbox apparatus and video generation method using the same
CN110866017A (en) Tax handling operation mark leaving system for visual retrieval and implementation method thereof
JP4303733B2 (en) Recording apparatus and recording method
CN108337479A (en) Video monitoring system and video frequency monitoring method
CN114418092A (en) Block chain-based federal learning malicious node screening method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181113