CN112966042A - Law enforcement recorder information processing method and system based on block chain - Google Patents

Law enforcement recorder information processing method and system based on block chain Download PDF

Info

Publication number
CN112966042A
CN112966042A CN201911272564.XA CN201911272564A CN112966042A CN 112966042 A CN112966042 A CN 112966042A CN 201911272564 A CN201911272564 A CN 201911272564A CN 112966042 A CN112966042 A CN 112966042A
Authority
CN
China
Prior art keywords
data
law enforcement
information
fingerprint information
audio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911272564.XA
Other languages
Chinese (zh)
Inventor
郭岩海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TD Tech Chengdu Co Ltd
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN201911272564.XA priority Critical patent/CN112966042A/en
Publication of CN112966042A publication Critical patent/CN112966042A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Development Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Educational Administration (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The application discloses a law enforcement recorder information processing method based on a block chain, which comprises the following steps: the law enforcement recorder collects law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data; the law enforcement recorder extracts fingerprint information from the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data; the law enforcement recorder uploads the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the operation behavior log data of an operator to a blockchain system in a wireless mode and/or a wired mode. Corresponding to the method, the application also discloses a law enforcement recorder. By applying the technical scheme disclosed by the application, the safety of the data recorded by the law enforcement recorder can be improved, and the data is prevented from being tampered.

Description

Law enforcement recorder information processing method and system based on block chain
Technical Field
The application relates to the technical field of data security, in particular to a method and a system for processing law enforcement recorder information based on a block chain.
Background
At present, the situations of complex public security law enforcement environment, violence resistance, refusal after law violation, law enforcement irreconcilability of law enforcement departments, law enforcement disputes and the like become a difficult problem which troubles the law enforcement departments at home and abroad. The problems not only seriously affect the authenticity, fairness and authority of law enforcement, but also have great negative impact on the image of law enforcement departments.
At present, the single-police law enforcement audio and video recorder is in large-scale commercial use and has the standard specification of the police department, but the data information safety is not perfect.
Disclosure of Invention
The application provides a block chain-based law enforcement recorder information processing method and system to improve the safety of data recorded by a law enforcement recorder and prevent the data from being tampered.
The application discloses a law enforcement recorder information processing method based on a block chain, which comprises the following steps:
the law enforcement recorder collects law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the law enforcement recorder extracts fingerprint information from the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the law enforcement recorder uploads the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the operation behavior log data of an operator to a blockchain system in a wireless mode and/or a wired mode.
Preferably, the fingerprint information extraction processing on the video data specifically includes:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
Preferably, extracting key frames from the video data specifically includes;
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
Preferably, the fingerprint information extraction processing on the audio data specifically includes:
and carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as the fingerprint information of the audio data.
Preferably, the fingerprint information extraction processing on the audio data specifically includes:
extracting an audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
Preferably, the law enforcement recorder encrypts and signs the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data by using an asymmetric cryptographic method, and uploads the encrypted and signed fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data to the block chain system.
The application also discloses law enforcement record appearance includes: collection module, data processing module and upload module, wherein:
the acquisition module is used for acquiring law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the data processing module is used for extracting and processing the fingerprint information of the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the uploading module is used for uploading the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator to the block chain system in a wireless mode and/or a wired mode.
Preferably, the data processing module is specifically configured to:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
Preferably, when the data processing module extracts the key frame from the video data, the data processing module is specifically configured to:
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
Preferably, the data processing module is specifically configured to:
carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as fingerprint information of the audio data;
or, extracting one audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
According to the technical scheme, the fingerprint information of the audio and video data with large data volume is extracted, and the fingerprint information of the audio and video data, the information data of the law enforcement recorder, the operation behavior log data of the operator and other law enforcement data are uploaded to the block chain system, so that after the law enforcement data are recorded into the block chain, the information of each link can be transparently seen by the whole entity participating in the block chain, and the information cannot be artificially tampered; in addition, information is easy to backtrack to each logged transaction point, and the threat that single-point data is damaged without backup is avoided, so that the authenticity and the integrity of law enforcement and evidence storage data are effectively protected by chaining the law enforcement and evidence storage data information collected by the law enforcement recorder. Specifically, the method comprises the following steps:
1. the fingerprint information of the audio and video data is chained and stored, and when the audio and video data is used as evidence storage data subsequently, the fingerprint information of the audio and video data file is compared with the fingerprint information stored in the block chain, so that whether the audio and video data file is tampered or not can be judged; if the fingerprint information of the audio and video data file is consistent with the fingerprint information of the audio and video data file, the audio and video data file is not tampered.
2. According to the method and the device, the data operation logs are subjected to chain storage, and distributed storage of the block chain shared accounts book is adopted, so that the completeness and the tampering of the operation logs are guaranteed, and each operation on the data files can be guaranteed through block chain backtracking.
Drawings
FIG. 1 is a schematic diagram of a law enforcement recorder information processing method for online and offline scenarios according to the present application;
FIG. 2 is a schematic diagram of the construction of a law enforcement recorder according to the present application;
FIG. 3 is a schematic diagram of a deployment scenario in accordance with a first embodiment of the present application;
fig. 4 is a schematic deployment scenario diagram according to a second embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below by referring to the accompanying drawings and examples.
In order to improve the safety of data recorded by the law enforcement recorder and prevent the data from being tampered, the data evidence management system of the law enforcement recorder is built based on the block chain technology, so that the integrity of data such as audio and video data, photos and personnel operation logs recorded by the law enforcement recorder can be protected, and the public trust of law enforcement departments is improved.
The main idea of the application is that: deploying block chain service in a data evidence management system, and ensuring the authenticity and integrity of data by using data such as audio, video, photos, operation records, personal information and the like collected by a block chain record and tracing law enforcement recorder; the law enforcement recorder and the acquisition equipment process the data to form fingerprint information of the data, and the fingerprint information of the data and information such as file names and operation records of the corresponding data are used as block chaining, so that the law enforcement data and the operation records can not be tampered, audited and traceable.
There are two application scenarios for law enforcement recorders: an online scenario and an offline scenario, wherein:
the online scene is that the law enforcement recorder is in a networking state, acquires law enforcement data such as audio, video, photos, operation records, personal information and the like, and then directly uploads the law enforcement data to the data evidence management system through a public network or a private network;
the off-line scene is that the law enforcement recorder is in an off-line state, and after the law enforcement recorder collects law enforcement data such as audio, video, photos, operation records, personal information and the like in the off-line state, the law enforcement recorder is stored locally in the law enforcement recorder; when the law enforcement recorder accesses the acquisition equipment (also called an acquisition station) through the USB interface or other interfaces, the acquired law enforcement data is uploaded to the data evidence management system through the acquisition equipment.
Referring to fig. 1, the solutions proposed by the present application for the online scenario and the offline scenario are described in detail below:
1. online scenario, as shown in the right half of fig. 1:
important data such as audio, video, pictures, operation information and the like are recorded in the law enforcement recorder. For the audio and video data, the data volume is small, and for the data with small data volume, the application directly calls the uplink remotely to store the related data on the shared account book; for the audio and video, because the audio and video files are large, a large amount of time and storage cost are consumed for chain-linking storage of the whole audio and video files, and therefore the problem that the audio and video files are large is solved by extracting the fingerprint information of the audio and video and carrying out chain-linking on the fingerprint information with small data volume. The specific process is as follows:
first, key frames are extracted from a video.
The number of the extracted key frames can be adjusted according to the computing capability of the equipment, and if the equipment capability is enough, all the key frames can be extracted; if the device capability is insufficient, extraction according to a set rule can be considered, for example: one key frame is extracted at intervals of M seconds or N key frames (where M and N may be adjusted according to the computing power of the device). Even for a scene with particularly poor processing capability, a part of a fixed region (such as the upper left corner fixed size region or the center fixed size region) of one key frame may be extracted at intervals of M seconds or N key frames.
And secondly, extracting the feature points of the key frames to obtain the feature point description of the key frames.
For example, feature point extraction may be performed by using a feature point extraction algorithm such as Harris feature points, FAST feature points, SIFT feature points, and the like. The feature point descriptions of the frames are used as feature information of the whole video, namely: and describing the characteristic points of the frames as fingerprint information of the video, so that the problem of fingerprint information of the video data is converted into a picture characteristic extraction problem.
Feature extraction is a concept in computer vision and image processing, and refers to extracting image information using a computer to decide whether a point of each image belongs to an image feature. The result of feature extraction is to divide the points on the image into different subsets, which often belong to isolated points, continuous curves or continuous regions. Common image features include color features, texture features, shape features, and spatial relationship features.
In video compression, each frame represents a still image. In actual compression, various algorithms are typically employed to reduce the volume of data, with IPB being the most common. Frames are divided into three different types: i-frames, P-frames, and B-frames, wherein:
i frame: intra frames (intra frames), also called key frames, can be decompressed into a single complete picture by video decompression algorithm;
p frame: a forward predictive coded frame (predictive frame), which needs to be referred to an I frame or B frame before it to generate a complete picture;
b frame: bi-directionally interpolated prediction frame (bi-directionally interpolated prediction frame), a complete picture needs to be generated with reference to the previous I frame or P frame and a P frame following it.
And thirdly, carrying out Hash (HASH) operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video.
Preferably, the hash operation may be performed by using a hash algorithm over SHA256 or a secret SM 3.
And fourthly, carrying out Hash operation on the audio to generate abstract information, and taking the generated abstract information as the fingerprint information of the audio.
Since the amount of audio data is small compared to the amount of video data, HASH digest generation can be directly performed on audio when fingerprint information extraction is performed on audio.
Similar to the above-mentioned first step of processing, if the device capability is insufficient, it can be considered to extract audio frames according to a set rule, for example: one frame is extracted at intervals of M1 seconds or at intervals of N1 frames (M1 and N1 may be adjusted according to the computing power of the device), and then HASH digest generation is performed on the extracted audio frame data, using the digest information as fingerprint information of the audio.
The first step to the third step are processes for generating video fingerprint information, the fourth step is a process for generating audio fingerprint information, the two processes can be carried out in series or in parallel, and the execution sequence of the two processes is not required.
And fifthly, uniformly linking and storing the fingerprint information of the audio and the video and the corresponding associated data such as file names, time, recorder numbers, log data of operator operation behaviors and the like.
Preferably, the law enforcement recorder can encrypt and sign the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator by using an asymmetric password method, and upload the encrypted and signed data to the block chain system, so that the effects of preventing tampering and ensuring the data security are further enhanced.
2. Offline scenario, as shown in the left half of fig. 1:
the law enforcement recorder generates fingerprint information of audio and video data by adopting the method, and stores the fingerprint information to the local in a mode of isolation (such as TEE and the like) or high-strength encryption, and after the acquisition equipment is accessed, the acquisition equipment can judge whether the data acquired by the law enforcement recorder is subjected to chain transmission through chain transmission inquiry or according to the mode of judging whether the local of the law enforcement recorder has a chain transmission mark and the like; if not, the law enforcement recorder operates data chaining.
Meanwhile, the acquisition station also needs to perform uplink processing on operation records of data modification, deletion, query and the like, and corresponding key operation log information such as operators, operation time, acquisition station information and the like.
Corresponding to the method, the application also provides a law enforcement recorder, the composition structure of which is shown in fig. 2, and the law enforcement recorder comprises: collection module, data processing module and upload module, wherein:
the acquisition module is used for acquiring law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the data processing module is used for extracting and processing the fingerprint information of the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the uploading module is used for uploading the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator to the block chain system in a wireless mode and/or a wired mode.
Preferably, the data processing module is specifically configured to:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
Preferably, when the data processing module extracts the key frame from the video data, the data processing module is specifically configured to:
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
Preferably, the data processing module is specifically configured to:
carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as fingerprint information of the audio data;
or, extracting one audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
The technical solution of the present application is illustrated by combining two embodiments with a specific deployment scenario.
The first embodiment is as follows:
the deployment scenario of this embodiment is: a private block chain is deployed in the evidence management system, and is mainly deployed on equipment such as an evidence management system background and an acquisition station to form a private chain, as shown in fig. 3.
Example two:
the deployment scenario of this embodiment is: the block chain nodes are deployed in an evidence management system and an evidence using system, and each node forms a private chain or a federation chain, as shown in fig. 4.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A law enforcement recorder information processing method based on a block chain is characterized by comprising the following steps:
the law enforcement recorder collects law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the law enforcement recorder extracts fingerprint information from the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the law enforcement recorder uploads the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the operation behavior log data of an operator to a blockchain system in a wireless mode and/or a wired mode.
2. The method according to claim 1, wherein the fingerprint information extraction processing on the video data specifically comprises:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
3. The method of claim 2, wherein extracting key frames from the video data specifically comprises;
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
4. The method according to claim 1, wherein the fingerprint information extraction processing on the audio data specifically includes:
and carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as the fingerprint information of the audio data.
5. The method according to claim 1, wherein the fingerprint information extraction processing on the audio data specifically includes:
extracting an audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
6. The method according to any one of claims 1 to 5, wherein:
and the law enforcement recorder encrypts and signs the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data by adopting an asymmetric password method, and uploads the encrypted and signed fingerprint information of the audio data, the fingerprint information of the video data, the picture, the law enforcement recorder information data and the operator operation behavior log data to the block chain system.
7. A law enforcement recorder, comprising: collection module, data processing module and upload module, wherein:
the acquisition module is used for acquiring law enforcement data in real time, and the law enforcement data comprises: audio data, video data, pictures, law enforcement recorder information data and operator operation behavior log data;
the data processing module is used for extracting and processing the fingerprint information of the audio data and/or the video data to obtain the fingerprint information of the audio data and/or the fingerprint information of the video data;
the uploading module is used for uploading the fingerprint information of the audio data, the fingerprint information of the video data, the picture, the information data of the law enforcement recorder and the log data of the operation behavior of the operator to the block chain system in a wireless mode and/or a wired mode.
8. The law enforcement recorder of claim 7, wherein the data processing module is specifically configured to:
extracting key frames from the video data;
extracting feature points of the key frames to obtain feature point descriptions of the key frames;
and carrying out Hash operation on the feature point description to generate summary information, and taking the generated summary information as fingerprint information of the video data.
9. Law enforcement recorder according to claim 7, characterized in that the data processing module, when extracting key frames from the video data, is specifically configured to:
extracting all key frames in the video data;
or extracting a key frame at intervals of M seconds or N key frames according to a set rule, wherein M and N are integers larger than 1;
or, according to a set rule, extracting a part of fixed region of a key frame at intervals of M seconds or N key frames.
10. Law enforcement recorder according to any one of claims 7 to 9, characterized in that the data processing module is specifically configured to:
carrying out Hash operation on the audio data to generate abstract information, and taking the generated abstract information as fingerprint information of the audio data;
or, extracting one audio frame from the audio data at an interval of M1 seconds or at an interval of N1 frames, performing a hash operation on the extracted audio frame to generate digest information, and using the generated digest information as fingerprint information of the audio data.
CN201911272564.XA 2019-12-12 2019-12-12 Law enforcement recorder information processing method and system based on block chain Pending CN112966042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911272564.XA CN112966042A (en) 2019-12-12 2019-12-12 Law enforcement recorder information processing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911272564.XA CN112966042A (en) 2019-12-12 2019-12-12 Law enforcement recorder information processing method and system based on block chain

Publications (1)

Publication Number Publication Date
CN112966042A true CN112966042A (en) 2021-06-15

Family

ID=76270762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911272564.XA Pending CN112966042A (en) 2019-12-12 2019-12-12 Law enforcement recorder information processing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN112966042A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113595741A (en) * 2021-08-02 2021-11-02 杭州叙简科技股份有限公司 Credible data chain generation system and method based on 5G law enforcement recorder
CN113704707A (en) * 2021-08-26 2021-11-26 湖南天河国云科技有限公司 Block chain-based audio tamper-proof method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583230A (en) * 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109657618A (en) * 2018-12-20 2019-04-19 高新兴国迈科技有限公司 A kind of fingerprint recognition law-enforcing recorder
CN109660350A (en) * 2018-10-31 2019-04-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN110033259A (en) * 2018-11-28 2019-07-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN110232645A (en) * 2019-06-14 2019-09-13 山东省计算中心(国家超级计算济南中心) The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583230A (en) * 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109660350A (en) * 2018-10-31 2019-04-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN110033259A (en) * 2018-11-28 2019-07-19 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment
CN109657618A (en) * 2018-12-20 2019-04-19 高新兴国迈科技有限公司 A kind of fingerprint recognition law-enforcing recorder
CN110232645A (en) * 2019-06-14 2019-09-13 山东省计算中心(国家超级计算济南中心) The electronic evidence of evidence obtaining and block chain is fixed and network forensics method and system based on memory

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113595741A (en) * 2021-08-02 2021-11-02 杭州叙简科技股份有限公司 Credible data chain generation system and method based on 5G law enforcement recorder
CN113595741B (en) * 2021-08-02 2023-04-07 杭州叙简科技股份有限公司 Credible data chain generation system and method based on 5G law enforcement recorder
CN113704707A (en) * 2021-08-26 2021-11-26 湖南天河国云科技有限公司 Block chain-based audio tamper-proof method and device

Similar Documents

Publication Publication Date Title
US20170373859A1 (en) Cryptographic Signature System and Related Systems and Methods
US10284885B1 (en) Method and apparatus for redacting video for compression and identification of releasing party
Rajpoot et al. Security and privacy in video surveillance: requirements and challenges
Hamza et al. An efficient cryptosystem for video surveillance in the internet of things environment
CN112003888B (en) Blockchain-based certificate management method, device, equipment and readable medium
CN106603561A (en) Block level encryption method in cloud storage and multi-granularity deduplication method
KR102213120B1 (en) System and method for providing smart contract of content sharing for integrity verification based on blockchain
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
CN112866990A (en) Conditional identity anonymous privacy protection public auditing method with incentive mechanism
CN112966042A (en) Law enforcement recorder information processing method and system based on block chain
Danko et al. Assuring the integrity of videos from wireless-based IoT devices using blockchain
CN111581659A (en) Method and device for calling electronic evidence
CA2919749A1 (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
Zhao et al. Heterogeneous and customized cost-efficient reversible image degradation for green IoT
Myneni et al. SCVS: On AI and edge clouds enabled privacy-preserved smart-city video surveillance services
Rabieh et al. Privacy-preserving and efficient sharing of drone videos in public safety scenarios using proxy re-encryption
EP3361708B1 (en) Decentralised data storage
CN213122985U (en) PIS authentication system
CN115114677B (en) Network crime service platform based on block chain evidence obtaining and storing technology and application method
CN111682955A (en) Tool arrangement device for criminal scene electronic data evidence obtaining
CN110992219A (en) Intellectual property protection method and system based on block chain technology
Agarwala et al. Client side secure image deduplication using DICE protocol
CN109271811B (en) Group signature-based electronic material evidence tamper-proof storage method
Bexheti et al. Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach
JP2022013298A (en) Information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210615

RJ01 Rejection of invention patent application after publication