CN112966042A - Law enforcement recorder information processing method and system based on block chain - Google Patents
Law enforcement recorder information processing method and system based on block chain Download PDFInfo
- Publication number
- CN112966042A CN112966042A CN201911272564.XA CN201911272564A CN112966042A CN 112966042 A CN112966042 A CN 112966042A CN 201911272564 A CN201911272564 A CN 201911272564A CN 112966042 A CN112966042 A CN 112966042A
- Authority
- CN
- China
- Prior art keywords
- data
- law enforcement
- information
- fingerprint information
- audio
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 7
- 238000003672 processing method Methods 0.000 title claims abstract description 7
- 238000000034 method Methods 0.000 claims abstract description 20
- 239000000284 extract Substances 0.000 claims abstract description 5
- 238000000605 extraction Methods 0.000 claims description 13
- 230000006399 behavior Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/71—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Development Economics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Educational Administration (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Signal Processing (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
The application discloses a law enforcement recorder information processing method based on a block chain, which comprises the following steps: the law enforcement recorder collects law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data; the law enforcement recorder extracts fingerprint information from the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data; the law enforcement recorder uploads the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the operation behavior log data of an operator to a blockchain system in a wireless mode and/or a wired mode. Corresponding to the method, the application also discloses a law enforcement recorder. By applying the technical scheme disclosed by the application, the safety of the data recorded by the law enforcement recorder can be improved, and the data is prevented from being tampered.
Description
Technical Field
The application relates to the technical field of data security, in particular to a method and a system for processing law enforcement recorder information based on a block chain.
Background
At present, the situations of complex public security law enforcement environment, violence resistance, refusal after law violation, law enforcement irreconcilability of law enforcement departments, law enforcement disputes and the like become a difficult problem which troubles the law enforcement departments at home and abroad. The problems not only seriously affect the authenticity, fairness and authority of law enforcement, but also have great negative impact on the image of law enforcement departments.
At present, the single-police law enforcement audio and video recorder is in large-scale commercial use and has the standard specification of the police department, but the data information safety is not perfect.
Disclosure of Invention
The application provides a block chain-based law enforcement recorder information processing method and system to improve the safety of data recorded by a law enforcement recorder and prevent the data from being tampered.
The application discloses a law enforcement recorder information processing method based on a block chain, which comprises the following steps:
the law enforcement recorder collects law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the law enforcement recorder extracts fingerprint information from the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the law enforcement recorder uploads the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the operation behavior log data of an operator to a blockchain system in a wireless mode and/or a wired mode.
Preferably, the fingerprint information extraction processing on the video data specifically includes:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
Preferably, extracting key frames from the video data specifically includes;
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
Preferably, the fingerprint information extraction processing on the audio data specifically includes:
and carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as the fingerprint information of the audio data.
Preferably, the fingerprint information extraction processing on the audio data specifically includes:
extracting an audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
Preferably, the law enforcement recorder encrypts and signs the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data by using an asymmetric cryptographic method, and uploads the encrypted and signed fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data to the block chain system.
The application also discloses law enforcement record appearance includes: collection module, data processing module and upload module, wherein:
the acquisition module is used for acquiring law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the data processing module is used for extracting and processing the fingerprint information of the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the uploading module is used for uploading the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator to the block chain system in a wireless mode and/or a wired mode.
Preferably, the data processing module is specifically configured to:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
Preferably, when the data processing module extracts the key frame from the video data, the data processing module is specifically configured to:
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
Preferably, the data processing module is specifically configured to:
carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as fingerprint information of the audio data;
or, extracting one audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
According to the technical scheme, the fingerprint information of the audio and video data with large data volume is extracted, and the fingerprint information of the audio and video data, the information data of the law enforcement recorder, the operation behavior log data of the operator and other law enforcement data are uploaded to the block chain system, so that after the law enforcement data are recorded into the block chain, the information of each link can be transparently seen by the whole entity participating in the block chain, and the information cannot be artificially tampered; in addition, information is easy to backtrack to each logged transaction point, and the threat that single-point data is damaged without backup is avoided, so that the authenticity and the integrity of law enforcement and evidence storage data are effectively protected by chaining the law enforcement and evidence storage data information collected by the law enforcement recorder. Specifically, the method comprises the following steps:
1. the fingerprint information of the audio and video data is chained and stored, and when the audio and video data is used as evidence storage data subsequently, the fingerprint information of the audio and video data file is compared with the fingerprint information stored in the block chain, so that whether the audio and video data file is tampered or not can be judged; if the fingerprint information of the audio and video data file is consistent with the fingerprint information of the audio and video data file, the audio and video data file is not tampered.
2. According to the method and the device, the data operation logs are subjected to chain storage, and distributed storage of the block chain shared accounts book is adopted, so that the completeness and the tampering of the operation logs are guaranteed, and each operation on the data files can be guaranteed through block chain backtracking.
Drawings
FIG. 1 is a schematic diagram of a law enforcement recorder information processing method for online and offline scenarios according to the present application;
FIG. 2 is a schematic diagram of the construction of a law enforcement recorder according to the present application;
FIG. 3 is a schematic diagram of a deployment scenario in accordance with a first embodiment of the present application;
fig. 4 is a schematic deployment scenario diagram according to a second embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below by referring to the accompanying drawings and examples.
In order to improve the safety of data recorded by the law enforcement recorder and prevent the data from being tampered, the data evidence management system of the law enforcement recorder is built based on the block chain technology, so that the integrity of data such as audio and video data, photos and personnel operation logs recorded by the law enforcement recorder can be protected, and the public trust of law enforcement departments is improved.
The main idea of the application is that: deploying block chain service in a data evidence management system, and ensuring the authenticity and integrity of data by using data such as audio, video, photos, operation records, personal information and the like collected by a block chain record and tracing law enforcement recorder; the law enforcement recorder and the acquisition equipment process the data to form fingerprint information of the data, and the fingerprint information of the data and information such as file names and operation records of the corresponding data are used as block chaining, so that the law enforcement data and the operation records can not be tampered, audited and traceable.
There are two application scenarios for law enforcement recorders: an online scenario and an offline scenario, wherein:
the online scene is that the law enforcement recorder is in a networking state, acquires law enforcement data such as audio, video, photos, operation records, personal information and the like, and then directly uploads the law enforcement data to the data evidence management system through a public network or a private network;
the off-line scene is that the law enforcement recorder is in an off-line state, and after the law enforcement recorder collects law enforcement data such as audio, video, photos, operation records, personal information and the like in the off-line state, the law enforcement recorder is stored locally in the law enforcement recorder; when the law enforcement recorder accesses the acquisition equipment (also called an acquisition station) through the USB interface or other interfaces, the acquired law enforcement data is uploaded to the data evidence management system through the acquisition equipment.
Referring to fig. 1, the solutions proposed by the present application for the online scenario and the offline scenario are described in detail below:
1. online scenario, as shown in the right half of fig. 1:
important data such as audio, video, pictures, operation information and the like are recorded in the law enforcement recorder. For the audio and video data, the data volume is small, and for the data with small data volume, the application directly calls the uplink remotely to store the related data on the shared account book; for the audio and video, because the audio and video files are large, a large amount of time and storage cost are consumed for chain-linking storage of the whole audio and video files, and therefore the problem that the audio and video files are large is solved by extracting the fingerprint information of the audio and video and carrying out chain-linking on the fingerprint information with small data volume. The specific process is as follows:
first, key frames are extracted from a video.
The number of the extracted key frames can be adjusted according to the computing capability of the equipment, and if the equipment capability is enough, all the key frames can be extracted; if the device capability is insufficient, extraction according to a set rule can be considered, for example: one key frame is extracted at intervals of M seconds or N key frames (where M and N may be adjusted according to the computing power of the device). Even for a scene with particularly poor processing capability, a part of a fixed region (such as the upper left corner fixed size region or the center fixed size region) of one key frame may be extracted at intervals of M seconds or N key frames.
And secondly, extracting the feature points of the key frames to obtain the feature point description of the key frames.
For example, feature point extraction may be performed by using a feature point extraction algorithm such as Harris feature points, FAST feature points, SIFT feature points, and the like. The feature point descriptions of the frames are used as feature information of the whole video, namely: and describing the characteristic points of the frames as fingerprint information of the video, so that the problem of fingerprint information of the video data is converted into a picture characteristic extraction problem.
Feature extraction is a concept in computer vision and image processing, and refers to extracting image information using a computer to decide whether a point of each image belongs to an image feature. The result of feature extraction is to divide the points on the image into different subsets, which often belong to isolated points, continuous curves or continuous regions. Common image features include color features, texture features, shape features, and spatial relationship features.
In video compression, each frame represents a still image. In actual compression, various algorithms are typically employed to reduce the volume of data, with IPB being the most common. Frames are divided into three different types: i-frames, P-frames, and B-frames, wherein:
i frame: intra frames (intra frames), also called key frames, can be decompressed into a single complete picture by video decompression algorithm;
p frame: a forward predictive coded frame (predictive frame), which needs to be referred to an I frame or B frame before it to generate a complete picture;
b frame: bi-directionally interpolated prediction frame (bi-directionally interpolated prediction frame), a complete picture needs to be generated with reference to the previous I frame or P frame and a P frame following it.
And thirdly, carrying out Hash (HASH) operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video.
Preferably, the hash operation may be performed by using a hash algorithm over SHA256 or a secret SM 3.
And fourthly, carrying out Hash operation on the audio to generate abstract information, and taking the generated abstract information as the fingerprint information of the audio.
Since the amount of audio data is small compared to the amount of video data, HASH digest generation can be directly performed on audio when fingerprint information extraction is performed on audio.
Similar to the above-mentioned first step of processing, if the device capability is insufficient, it can be considered to extract audio frames according to a set rule, for example: one frame is extracted at intervals of M1 seconds or at intervals of N1 frames (M1 and N1 may be adjusted according to the computing power of the device), and then HASH digest generation is performed on the extracted audio frame data, using the digest information as fingerprint information of the audio.
The first step to the third step are processes for generating video fingerprint information, the fourth step is a process for generating audio fingerprint information, the two processes can be carried out in series or in parallel, and the execution sequence of the two processes is not required.
And fifthly, uniformly linking and storing the fingerprint information of the audio and the video and the corresponding associated data such as file names, time, recorder numbers, log data of operator operation behaviors and the like.
Preferably, the law enforcement recorder can encrypt and sign the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator by using an asymmetric password method, and upload the encrypted and signed data to the block chain system, so that the effects of preventing tampering and ensuring the data security are further enhanced.
2. Offline scenario, as shown in the left half of fig. 1:
the law enforcement recorder generates fingerprint information of audio and video data by adopting the method, and stores the fingerprint information to the local in a mode of isolation (such as TEE and the like) or high-strength encryption, and after the acquisition equipment is accessed, the acquisition equipment can judge whether the data acquired by the law enforcement recorder is subjected to chain transmission through chain transmission inquiry or according to the mode of judging whether the local of the law enforcement recorder has a chain transmission mark and the like; if not, the law enforcement recorder operates data chaining.
Meanwhile, the acquisition station also needs to perform uplink processing on operation records of data modification, deletion, query and the like, and corresponding key operation log information such as operators, operation time, acquisition station information and the like.
Corresponding to the method, the application also provides a law enforcement recorder, the composition structure of which is shown in fig. 2, and the law enforcement recorder comprises: collection module, data processing module and upload module, wherein:
the acquisition module is used for acquiring law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the data processing module is used for extracting and processing the fingerprint information of the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the uploading module is used for uploading the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator to the block chain system in a wireless mode and/or a wired mode.
Preferably, the data processing module is specifically configured to:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
Preferably, when the data processing module extracts the key frame from the video data, the data processing module is specifically configured to:
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
Preferably, the data processing module is specifically configured to:
carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as fingerprint information of the audio data;
or, extracting one audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
The technical solution of the present application is illustrated by combining two embodiments with a specific deployment scenario.
The first embodiment is as follows:
the deployment scenario of this embodiment is: a private block chain is deployed in the evidence management system, and is mainly deployed on equipment such as an evidence management system background and an acquisition station to form a private chain, as shown in fig. 3.
Example two:
the deployment scenario of this embodiment is: the block chain nodes are deployed in an evidence management system and an evidence using system, and each node forms a private chain or a federation chain, as shown in fig. 4.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. A law enforcement recorder information processing method based on a block chain is characterized by comprising the following steps:
the law enforcement recorder collects law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the law enforcement recorder extracts fingerprint information from the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the law enforcement recorder uploads the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the operation behavior log data of an operator to a blockchain system in a wireless mode and/or a wired mode.
2. The method according to claim 1, wherein the fingerprint information extraction processing on the video data specifically comprises:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
3. The method of claim 2, wherein extracting key frames from the video data specifically comprises;
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
4. The method according to claim 1, wherein the fingerprint information extraction processing on the audio data specifically includes:
and carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as the fingerprint information of the audio data.
5. The method according to claim 1, wherein the fingerprint information extraction processing on the audio data specifically includes:
extracting an audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
6. The method according to any one of claims 1 to 5, wherein:
and the law enforcement recorder encrypts and signs the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data by adopting an asymmetric password method, and uploads the encrypted and signed fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data to the block chain system.
7. A law enforcement recorder, comprising: collection module, data processing module and upload module, wherein:
the acquisition module is used for acquiring law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the data processing module is used for extracting and processing the fingerprint information of the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the uploading module is used for uploading the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator to the block chain system in a wireless mode and/or a wired mode.
8. The law enforcement recorder of claim 7, wherein the data processing module is specifically configured to:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
9. Law enforcement recorder according to claim 7, characterized in that the data processing module, when extracting key frames from the video data, is specifically configured to:
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
10. Law enforcement recorder according to any one of claims 7 to 9, characterized in that the data processing module is specifically configured to:
carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as fingerprint information of the audio data;
or, extracting one audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911272564.XA CN112966042A (en) | 2019-12-12 | 2019-12-12 | Law enforcement recorder information processing method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911272564.XA CN112966042A (en) | 2019-12-12 | 2019-12-12 | Law enforcement recorder information processing method and system based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112966042A true CN112966042A (en) | 2021-06-15 |
Family
ID=76270762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911272564.XA Pending CN112966042A (en) | 2019-12-12 | 2019-12-12 | Law enforcement recorder information processing method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112966042A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113595741A (en) * | 2021-08-02 | 2021-11-02 | 杭州叙简科技股份有限公司 | Credible data chain generation system and method based on 5G law enforcement recorder |
CN113704707A (en) * | 2021-08-26 | 2021-11-26 | 湖南天河国云科技有限公司 | Block chain-based audio tamper-proof method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583230A (en) * | 2018-10-31 | 2019-04-05 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN109657618A (en) * | 2018-12-20 | 2019-04-19 | 高新兴国迈科技有限公司 | A kind of fingerprint recognition law-enforcing recorder |
CN109660350A (en) * | 2018-10-31 | 2019-04-19 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN110033259A (en) * | 2018-11-28 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN110232645A (en) * | 2019-06-14 | 2019-09-13 | 山东省计算中心(国家超级计算济南中心) | The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory |
-
2019
- 2019-12-12 CN CN201911272564.XA patent/CN112966042A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109583230A (en) * | 2018-10-31 | 2019-04-05 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN109660350A (en) * | 2018-10-31 | 2019-04-19 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN110033259A (en) * | 2018-11-28 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN109657618A (en) * | 2018-12-20 | 2019-04-19 | 高新兴国迈科技有限公司 | A kind of fingerprint recognition law-enforcing recorder |
CN110232645A (en) * | 2019-06-14 | 2019-09-13 | 山东省计算中心(国家超级计算济南中心) | The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113595741A (en) * | 2021-08-02 | 2021-11-02 | 杭州叙简科技股份有限公司 | Credible data chain generation system and method based on 5G law enforcement recorder |
CN113595741B (en) * | 2021-08-02 | 2023-04-07 | 杭州叙简科技股份有限公司 | Credible data chain generation system and method based on 5G law enforcement recorder |
CN113704707A (en) * | 2021-08-26 | 2021-11-26 | 湖南天河国云科技有限公司 | Block chain-based audio tamper-proof method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170373859A1 (en) | Cryptographic Signature System and Related Systems and Methods | |
US10284885B1 (en) | Method and apparatus for redacting video for compression and identification of releasing party | |
Rajpoot et al. | Security and privacy in video surveillance: requirements and challenges | |
Hamza et al. | An efficient cryptosystem for video surveillance in the internet of things environment | |
CN112003888B (en) | Blockchain-based certificate management method, device, equipment and readable medium | |
CN106603561A (en) | Block level encryption method in cloud storage and multi-granularity deduplication method | |
KR102213120B1 (en) | System and method for providing smart contract of content sharing for integrity verification based on blockchain | |
JP7236042B2 (en) | Face Recognition Application Using Homomorphic Encryption | |
CN112866990A (en) | Conditional identity anonymous privacy protection public auditing method with incentive mechanism | |
CN112966042A (en) | Law enforcement recorder information processing method and system based on block chain | |
Danko et al. | Assuring the integrity of videos from wireless-based IoT devices using blockchain | |
CN111581659A (en) | Method and device for calling electronic evidence | |
CA2919749A1 (en) | Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program | |
Zhao et al. | Heterogeneous and customized cost-efficient reversible image degradation for green IoT | |
Myneni et al. | SCVS: On AI and edge clouds enabled privacy-preserved smart-city video surveillance services | |
Rabieh et al. | Privacy-preserving and efficient sharing of drone videos in public safety scenarios using proxy re-encryption | |
EP3361708B1 (en) | Decentralised data storage | |
CN213122985U (en) | PIS authentication system | |
CN115114677B (en) | Network crime service platform based on block chain evidence obtaining and storing technology and application method | |
CN111682955A (en) | Tool arrangement device for criminal scene electronic data evidence obtaining | |
CN110992219A (en) | Intellectual property protection method and system based on block chain technology | |
Agarwala et al. | Client side secure image deduplication using DICE protocol | |
CN109271811B (en) | Group signature-based electronic material evidence tamper-proof storage method | |
Bexheti et al. | Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach | |
JP2022013298A (en) | Information processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210615 |
|
RJ01 | Rejection of invention patent application after publication |