CN110324343B - Information monitoring and broadcasting method and device, electronic equipment and storage medium - Google Patents

Information monitoring and broadcasting method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110324343B
CN110324343B CN201910605348.6A CN201910605348A CN110324343B CN 110324343 B CN110324343 B CN 110324343B CN 201910605348 A CN201910605348 A CN 201910605348A CN 110324343 B CN110324343 B CN 110324343B
Authority
CN
China
Prior art keywords
information
mobile terminal
verified
standard
outdoor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910605348.6A
Other languages
Chinese (zh)
Other versions
CN110324343A (en
Inventor
兰颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miaozhen Information Technology Co Ltd
Original Assignee
Miaozhen Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miaozhen Information Technology Co Ltd filed Critical Miaozhen Information Technology Co Ltd
Priority to CN201910605348.6A priority Critical patent/CN110324343B/en
Publication of CN110324343A publication Critical patent/CN110324343A/en
Application granted granted Critical
Publication of CN110324343B publication Critical patent/CN110324343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The application provides an information monitoring and broadcasting method, an information monitoring and broadcasting device, electronic equipment and a storage medium, wherein the information monitoring and broadcasting method comprises the steps of receiving first to-be-verified information sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal; based on the standard information, verifying the first information to be verified to obtain a verification result; and sending the verification result to the user side. According to the method and the device, the first information to be verified sent by the first application program of the mobile terminal is compared with the standard information sent by the second application program, so that the monitoring and broadcasting efficiency of outdoor information is improved, the timeliness is high, the authenticity of the information to be verified is ensured, and the first information to be verified is prevented from being tampered.

Description

Information monitoring and broadcasting method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of information transmission technologies, and in particular, to an information monitoring method, an information monitoring device, an electronic device, and a storage medium.
Background
The outdoor information is neon lights, posters, screens and the like set up on the exterior of buildings or outdoor public places such as streets, squares and the like. In order to guarantee the benefit of the information provider, the information provider needs to know whether the outdoor information is played at the right time, place and content according to the requirement.
Since the screen plays information in turns according to the information bits, it is difficult to monitor the screen playing information. Generally, a sampling person is required to photograph a screen on which information is played by using a camera, and meanwhile, in order to ensure the reliability of place and time, buildings near the screen and newspapers of the day are required to be photographed to prove the place and time. The sampling personnel submits the photos corresponding to the screen for playing the information, the photos of the nearby buildings and the photos of the newspaper on the day to the information provider so as to prove that the screen is played at the correct time, place and content according to the requirements.
However, in the above method, the feedback time of the sampling person is long, and there is a possibility that the submitted photograph is tampered.
Disclosure of Invention
In view of this, an object of the embodiments of the present application is to provide an information monitoring and broadcasting method, an apparatus, an electronic device and a storage medium, which can improve monitoring and broadcasting efficiency for outdoor information, have high timeliness, ensure authenticity of information to be verified, and prevent the first information to be verified from being tampered.
In a first aspect, an embodiment of the present application provides an information monitoring method, including:
receiving first information to be verified sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal;
based on the standard information, verifying the first information to be verified to obtain a verification result;
and sending the verification result to the user side.
With reference to the first aspect, an embodiment of the present application provides a first possible implementation manner of the first aspect, where the standard information is obtained by copying, by the second application, second information to be verified when the mobile terminal obtains the second information to be verified.
With reference to the first aspect, this embodiment provides a second possible implementation manner of the first aspect, where the standard information is obtained by encrypting with a message digest algorithm, fifth version MD 5.
With reference to the second possible implementation manner of the first aspect, an embodiment of the present application provides a third possible implementation manner of the first aspect, where before the verifying the first to-be-verified information based on the standard information and obtaining a verification result, the method further includes:
decrypting the standard information to obtain decrypted standard information;
the verifying the first to-be-verified information based on the standard information to obtain a verification result, including:
matching the first outdoor information picture with the second outdoor information picture, the first identification information with the second identification information, and the first system information with the second system information respectively;
and if the first outdoor information picture is not matched with the second outdoor information picture, and/or the first identification information is not matched with the second identification information, and/or the first system information is not matched with the second system information, determining that the verification fails.
With reference to the third possible implementation manner of the first aspect, an embodiment of the present application provides a fourth possible implementation manner of the first aspect, where after determining that the verification result is a verification failure, the sending the verification result to the user side includes:
generating a failure analysis report corresponding to the verification failure;
and sending the failure analysis report and/or the verification result to the user side.
With reference to the fourth possible implementation manner of the first aspect, an embodiment of the present application provides a fifth possible implementation manner of the first aspect, where the method further includes:
and storing the failure analysis report.
In a second aspect, an embodiment of the present application further provides an information monitoring and broadcasting apparatus, including:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is used for receiving first information to be verified sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal;
the verification module is used for verifying the first information to be verified based on the standard information to obtain a verification result;
and the first sending module is used for sending the verification result to the user side.
With reference to the second aspect, an embodiment of the present application provides a first possible implementation manner of the second aspect, where the standard information is obtained by copying, by the second application, second information to be verified when the mobile terminal obtains the second information to be verified.
In a third aspect, an embodiment of the present application further provides an electronic device, where the electronic device includes: a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, the processor and the memory communicate with each other through the bus when the electronic device is running, and the machine-readable instructions are executed by the processor to perform the steps of the information monitoring method according to the first aspect, the first possible implementation manner of the first aspect, or the fifth possible implementation manner of the first aspect.
In a fourth aspect, this application further provides a computer-readable storage medium, where the computer-readable storage medium stores thereon a computer program, and the computer program is executed by a processor to perform the steps of the information monitoring and broadcasting method according to the first aspect, the first possible implementation manner of the first aspect, to the fifth possible implementation manner of the first aspect.
The information monitoring and broadcasting method comprises the steps of receiving first to-be-verified information sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal; based on the standard information, verifying the first information to be verified to obtain a verification result; and sending the verification result to the user side. According to the embodiment of the application, the first information to be verified sent by the first application program of the mobile terminal is compared with the standard information sent by the second application program, so that the monitoring and broadcasting efficiency of outdoor information is improved, the timeliness is high, the authenticity of the first information to be verified is ensured, and the first information to be verified is prevented from being tampered.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating an information monitoring method according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating another information monitoring method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram illustrating an information monitoring and broadcasting apparatus according to an embodiment of the present application;
fig. 4 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
At present, since the screen plays information in turns according to the information bits, it is difficult to monitor the screen playing information. Generally, a sampling person is required to photograph a screen on which information is played by using a camera, and meanwhile, in order to ensure the reliability of place and time, buildings near the screen and newspapers of the day are required to be photographed to prove the place and time. The sampling personnel submits the photos corresponding to the screen for playing the information, the photos of the nearby buildings and the photos of the newspaper on the day to the information provider so as to prove that the screen is played at the correct time, place and content according to the requirements. However, in the above method, the feedback time of the sampling person is long, and there is a possibility that the submitted photograph is tampered. In view of the above problems, the information monitoring and broadcasting method, the information monitoring and broadcasting device, the electronic device, and the storage medium provided in the embodiments of the present application can improve monitoring and broadcasting efficiency for outdoor information, have high timeliness, ensure authenticity of the first information to be verified, and prevent the first information to be verified from being tampered.
To facilitate understanding of the embodiments of the present application, a detailed description will be first provided for an information monitoring and broadcasting method disclosed in the embodiments of the present application.
As shown in fig. 1, a flowchart of an information monitoring method when a server is used as an execution subject according to an embodiment of the present application is shown, which includes the following specific steps:
s101, receiving first information to be verified sent by a first application program in the mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal.
Here, the mobile terminal according to the embodiment of the present application is provided with a first application program and a second application program, the first application program may be used to acquire an image, and the second application program may be another application program correlated with the first application program, or may be a Software Development Kit (SDK) or the like deployed in the mobile terminal.
In a specific implementation, a first application of the mobile terminal sends first information to be authenticated to the server, and a second application of the mobile terminal sends standard information to the server.
The first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; specifically, the first Identification information of the mobile terminal includes identity Identification Information (ID) and model information of the mobile terminal; the first system information of the mobile terminal comprises first system time of the mobile terminal, first position information of the mobile terminal, first network time corresponding to a network where the mobile terminal is located and the like.
The standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal. Here, the standard information is obtained by copying the second to-be-verified information when the second application program obtains the second to-be-verified information at the mobile terminal. It should be noted that the first information to be verified and the second information to be verified may be the same or different, specifically, the second verification information is acquired by the mobile terminal through the first application program and is not artificially changed or replaced, and the first information to be verified is sent to the server through the first application program by the mobile terminal and may be artificially changed or replaced or may not be artificially changed or replaced.
Further, before the second application program in the mobile terminal sends the standard information, the standard information is encrypted by using a fifth version of Message Digest Algorithm (MD 5) to ensure that the standard information is not changed or replaced.
And S102, verifying the first information to be verified based on the standard information to obtain a verification result.
In specific implementation, after receiving the first to-be-verified information and the standard information, the server compares the first to-be-verified information with the standard verification information to verify the first to-be-verified information.
Here, before verifying the information to be verified based on the standard information and obtaining the verification result, the standard information is decrypted to obtain the decrypted standard information.
After comparing the first verification information with the standard verification information, obtaining a verification result, namely, if the first verification information is matched with the standard verification information, the verification is successful; and if the first verification information is not matched with the standard verification information, the verification fails.
And S103, sending the verification result to the user side.
In a specific implementation, after the server determines the verification result, the verification result is sent to the user side, so that the user corresponding to the user side performs subsequent processing on the verification result.
According to the embodiment of the application, the first to-be-verified information sent by the first application program of the mobile terminal is compared with the standard information sent by the second application program, so that the monitoring and broadcasting efficiency of outdoor information is improved, and the timeliness is high; and the second information to be verified is encrypted by using the MD5, and the encrypted second information to be verified is sent to the server as standard information, so that the authenticity of the first information to be verified is ensured, and the first information to be verified is prevented from being tampered.
According to the method shown in fig. 2, based on the standard information, the first to-be-verified information is verified to obtain a verification result, wherein the method specifically comprises the following steps:
s201, matching a first outdoor information picture with a second outdoor information picture, first identification information with second identification information, and first system information with second system information respectively;
s202, if the first outdoor information picture is not matched with the second outdoor information picture, and/or the first identification information is not matched with the second identification information, and/or the first system information is not matched with the second system information, the verification is determined to be failed.
In an implementation, comparing the first verification information with the standard verification information specifically includes matching the first outdoor information picture with the second outdoor information picture, matching the first identification information with the second identification information, and matching the first system information with the second system information.
The matching of the first system information and the second system information specifically includes matching first system time of the mobile terminal with second system time included in the second system information, matching first location information of the mobile terminal currently located with second location information included in the second system information, and matching first network time corresponding to a network where the mobile terminal currently located with second network time included in the second system information.
And determining that the verification fails when the first outdoor information picture is not matched with the second outdoor information picture, and/or the first identification information is not matched with the second identification information, and/or the first system time is not matched with the second system time, and/or the first position information is not matched with the second position information, and/or the first network time is not matched with the second network time.
After the verification result is determined to be verification failure, the server generates a failure analysis report corresponding to the verification failure; the failure analysis report includes the verification result, the reason for the verification result (i.e., which item or items of the first information to be verified do not match the standard information), and the like.
And after the failure analysis report is generated, the failure analysis report and/or the verification result are/is sent to the user side. It should be noted that the failure analysis report may include a verification result, and therefore, it may be determined whether to send the failure analysis report to the user side, send the verification result to the user side, or send the failure analysis report and the verification result to the user side according to a requirement of a user corresponding to the user side.
After the server generates the failure analysis report, the failure analysis report can be stored, so that the user corresponding to the user side can perform subsequent analysis and evidence collection.
Based on the same inventive concept, the embodiment of the present application further provides an information monitoring and broadcasting device corresponding to the information monitoring and broadcasting method, and as the principle of solving the problem of the device in the embodiment of the present application is similar to that of the information monitoring and broadcasting method in the embodiment of the present application, the implementation of the device can refer to the implementation of the method, and repeated details are not repeated.
Referring to fig. 3, an information monitoring and broadcasting apparatus according to another embodiment of the present application includes:
a receiving module 301, configured to receive first information to be verified sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal;
a verification module 302, configured to verify the first to-be-verified information based on the standard information to obtain a verification result;
a first sending module 303, configured to send the verification result to the user side.
In an embodiment, in the information monitoring and broadcasting device, the standard information is obtained by copying second to-be-verified information when the second application program obtains the second to-be-verified information at the mobile terminal.
In another embodiment, in the information monitoring and broadcasting device, the standard information is obtained by encrypting the standard information by using a message digest algorithm, fifth version MD 5.
In another embodiment, the information monitoring device further includes:
the decryption module 304 is configured to decrypt the standard information to obtain decrypted standard information;
a checking module 302, configured to match the first outdoor information picture with the second outdoor information picture, the first identification information with the second identification information, and the first system information with the second system information, respectively;
and if the first outdoor information picture is not matched with the second outdoor information picture, and/or the first identification information is not matched with the second identification information, and/or the first system information is not matched with the second system information, determining that the verification fails.
In another embodiment, the information monitoring device further includes:
a second sending module 305, configured to generate a failure analysis report corresponding to the verification failure;
and sending the failure analysis report and/or the verification result to the user side.
In another embodiment, the information monitoring device further includes:
a storage module 306, configured to store the failure analysis report.
Fig. 4 illustrates a structure of an electronic device 400 according to an embodiment of the present invention, where the electronic device 400 includes: at least one processor 401, at least one network interface 404 or other user interface 403, memory 405, at least one communication bus 402. A communication bus 402 is used to enable connective communication between these components. The electronic device 400 optionally contains a user interface 403 including a display (e.g., touchscreen, LCD, CRT, Holographic (Holographic) or projection (Projector), etc.), a keyboard or a pointing device (e.g., mouse, trackball (trackball), touch pad or touchscreen, etc.).
Memory 405 may include both read-only memory and random-access memory and provides instructions and data to processor 401. A portion of the memory 405 may also include non-volatile random access memory (NVRAM).
In some embodiments, memory 405 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof:
an operating system 4051, which contains various system programs, for implementing various basic services and processing hardware-based tasks;
the application module 4052 contains various applications, such as a desktop (launcher), a Media Player (Media Player), a Browser (Browser), etc., for implementing various application services.
In an embodiment of the invention, processor 401, by invoking programs or instructions stored by memory 405, is configured to: receiving first information to be verified sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal;
based on the standard information, verifying the first information to be verified to obtain a verification result;
and sending the verification result to the user side.
Optionally, in the method executed by the processor 401, the standard information is obtained by copying, by the second application program, second information to be verified when the mobile terminal obtains the second information to be verified.
Optionally, in the method executed by the processor 401, the standard information is obtained by encrypting the standard information by using a message digest algorithm, fifth version MD 5.
Optionally, in the method executed by the processor 401, before the verifying the first information to be verified based on the standard information and obtaining a verification result, the method further includes:
decrypting the standard information to obtain decrypted standard information;
the verifying the first to-be-verified information based on the standard information to obtain a verification result, including:
matching the first outdoor information picture with the second outdoor information picture, the first identification information with the second identification information, and the first system information with the second system information respectively;
and if the first outdoor information picture is not matched with the second outdoor information picture, and/or the first identification information is not matched with the second identification information, and/or the first system information is not matched with the second system information, determining that the verification fails.
Optionally, in the method executed by the processor 401, after determining that the verification result is a verification failure, the sending the verification result to the user side includes:
generating a failure analysis report corresponding to the verification failure;
and sending the failure analysis report and/or the verification result to the user side.
Optionally, the processor 401 executes a method further including:
and storing the failure analysis report.
The computer program product of the information monitoring method and apparatus provided in the embodiment of the present application includes a computer readable storage medium storing a program code, and instructions included in the program code may be used to execute the method in the foregoing method embodiment.
Specifically, the storage medium can be a general-purpose storage medium, such as a removable disk, a hard disk, and the like, and when a computer program on the storage medium is executed, the information monitoring and broadcasting method can be executed, so that monitoring and broadcasting efficiency of outdoor information can be improved, timeliness is high, authenticity of information to be verified is ensured, and tampering of first information to be verified is prevented.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information monitoring method, comprising:
receiving first information to be verified sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal;
based on the standard information, verifying the first information to be verified to obtain a verification result;
and sending the verification result to the user side.
2. The information monitoring and broadcasting method of claim 1, wherein the standard information is obtained by copying second to-be-verified information when the second application program obtains the second to-be-verified information from the mobile terminal.
3. The method of claim 1, wherein the standard message is encrypted using a message digest algorithm version five MD 5.
4. The method according to claim 3, wherein the verifying the first to-be-verified information based on the standard information to obtain a verification result comprises:
matching the first outdoor information picture with the second outdoor information picture, the first identification information with the second identification information, and the first system information with the second system information respectively;
and if the first outdoor information picture is not matched with the second outdoor information picture, and/or the first identification information is not matched with the second identification information, and/or the first system information is not matched with the second system information, determining that the verification fails.
5. The method of claim 4, wherein after determining that the verification result is a verification failure, the sending the verification result to the user side comprises:
generating a failure analysis report corresponding to the verification failure;
and sending the failure analysis report and/or the verification result to the user side.
6. The information monitoring method as claimed in claim 5, further comprising:
and storing the failure analysis report.
7. An information monitoring and broadcasting device, comprising:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is used for receiving first information to be verified sent by a first application program in a mobile terminal and standard information sent by a second application program in the mobile terminal; the first information to be verified comprises a first outdoor information picture, first identification information of the mobile terminal and first system information of the mobile terminal; the standard information comprises a second outdoor information picture, second identification information of the mobile terminal and second system information of the mobile terminal;
the verification module is used for verifying the first information to be verified based on the standard information to obtain a verification result;
and the first sending module is used for sending the verification result to the user side.
8. The information monitoring and broadcasting device of claim 7, wherein the standard information is obtained by copying second to-be-verified information when the second application program obtains the second to-be-verified information from the mobile terminal.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating via the bus when the electronic device is operating, the machine-readable instructions when executed by the processor performing the steps of the information monitoring method according to any one of claims 1 to 6.
10. A computer-readable storage medium, having stored thereon a computer program for performing, when executed by a processor, the steps of the method according to any one of claims 1 to 6.
CN201910605348.6A 2019-07-05 2019-07-05 Information monitoring and broadcasting method and device, electronic equipment and storage medium Active CN110324343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910605348.6A CN110324343B (en) 2019-07-05 2019-07-05 Information monitoring and broadcasting method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910605348.6A CN110324343B (en) 2019-07-05 2019-07-05 Information monitoring and broadcasting method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110324343A CN110324343A (en) 2019-10-11
CN110324343B true CN110324343B (en) 2021-09-17

Family

ID=68122830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910605348.6A Active CN110324343B (en) 2019-07-05 2019-07-05 Information monitoring and broadcasting method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110324343B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046449B (en) * 2020-03-16 2021-01-26 杭州海康威视数字技术股份有限公司 Data display control method and device and electronic equipment
CN111737580B (en) * 2020-06-30 2021-01-29 深圳市中电网络技术有限公司 Information verification method and device, computer equipment and readable storage medium
CN112565922A (en) * 2020-11-30 2021-03-26 成都新潮传媒集团有限公司 Advertisement monitoring method, advertisement monitoring device and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546972A (en) * 2010-12-28 2012-07-04 中国移动通信集团公司 Effectiveness verification method, equipment and system for advertisement feedback information
CN106096996A (en) * 2016-05-31 2016-11-09 北京奇虎科技有限公司 The detection method of mobile terminal cheating and related device
CN106997544A (en) * 2016-01-25 2017-08-01 秒针信息技术有限公司 A kind of method and apparatus for monitoring outdoor advertising
WO2017216599A1 (en) * 2016-06-13 2017-12-21 Gulechha Manish Method and system for monitoring, tracking and auditing adertisement campaigns
CN108965950A (en) * 2018-06-13 2018-12-07 广州欢网科技有限责任公司 A kind of monitoring of the advertisement method and apparatus
CN109064222A (en) * 2018-07-24 2018-12-21 百度在线网络技术(北京)有限公司 Advertisement detecting method, apparatus, system, terminal and computer readable storage medium
CN109447676A (en) * 2018-09-10 2019-03-08 北京海逸风传媒股份有限公司 A kind of advertising media's monitoring system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110296009A1 (en) * 2010-05-27 2011-12-01 Victor Baranov System and method for wavelets-based adaptive mobile advertising fraud detection

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546972A (en) * 2010-12-28 2012-07-04 中国移动通信集团公司 Effectiveness verification method, equipment and system for advertisement feedback information
CN106997544A (en) * 2016-01-25 2017-08-01 秒针信息技术有限公司 A kind of method and apparatus for monitoring outdoor advertising
CN106096996A (en) * 2016-05-31 2016-11-09 北京奇虎科技有限公司 The detection method of mobile terminal cheating and related device
WO2017216599A1 (en) * 2016-06-13 2017-12-21 Gulechha Manish Method and system for monitoring, tracking and auditing adertisement campaigns
CN108965950A (en) * 2018-06-13 2018-12-07 广州欢网科技有限责任公司 A kind of monitoring of the advertisement method and apparatus
CN109064222A (en) * 2018-07-24 2018-12-21 百度在线网络技术(北京)有限公司 Advertisement detecting method, apparatus, system, terminal and computer readable storage medium
CN109447676A (en) * 2018-09-10 2019-03-08 北京海逸风传媒股份有限公司 A kind of advertising media's monitoring system and method

Also Published As

Publication number Publication date
CN110324343A (en) 2019-10-11

Similar Documents

Publication Publication Date Title
US10338946B1 (en) Composable machine image
CN110535660B (en) Evidence obtaining service system based on block chain
CN110324343B (en) Information monitoring and broadcasting method and device, electronic equipment and storage medium
CN110879903A (en) Evidence storage method, evidence verification method, evidence storage device, evidence verification device, evidence storage equipment and evidence verification medium
US20180198629A1 (en) Verified boot and key rotation
US20090070589A1 (en) Method and apparatus for verifying authenticity of digital data using trusted computing
CN109891907B (en) Validating rendering of video content at a client device using a trusted platform module
US20160323107A1 (en) Secure Optical Codes for Accessing Content
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
US11184174B2 (en) System and method for decentralized digital structured data storage, management, and authentication using blockchain
KR101523309B1 (en) A system and method for distributing application
US10992460B2 (en) Blockchain-based advertisement monitoring method and apparatus, and electronic device
CN108038388B (en) Method for realizing Web page seal, client and server
JP7077425B2 (en) Checking the display of third-party content on client devices
WO2023142957A1 (en) Method and apparatus for verifying display terminal, storage medium, and electronic device
CN109617694B (en) Application program publishing method and device
US20100223469A1 (en) Method, System and Computer Program Product for Certifying Software Origination
CN108900472B (en) Information transmission method and device
CN111445250B (en) Block chain key testing method and device
CN109818965B (en) Personal identity verification device and method
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
CN110807640A (en) Method and device for recording copyright information
CN106789088A (en) A kind of software version signature mechanism
CN106921644B (en) Client data file verification method and device
JP7438383B2 (en) Verifying the authenticity of web applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant