CN113141351B - Multi-department combined auditing and authenticating working method for government affair big data - Google Patents
Multi-department combined auditing and authenticating working method for government affair big data Download PDFInfo
- Publication number
- CN113141351B CN113141351B CN202110310148.5A CN202110310148A CN113141351B CN 113141351 B CN113141351 B CN 113141351B CN 202110310148 A CN202110310148 A CN 202110310148A CN 113141351 B CN113141351 B CN 113141351B
- Authority
- CN
- China
- Prior art keywords
- file
- authenticated
- video
- audio
- frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Television Signal Processing For Recording (AREA)
Abstract
The invention provides a government affair big data multi-department combined auditing and authenticating working method, which comprises the following steps: s1, acquiring a file to be authenticated, wherein the file to be authenticated comprises an audio file or/and a video file or/and an audio-video file, and putting the file to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication; and S2, the cloud platform of the united department authenticates the received file information. The method and the system can authenticate the file to be authenticated on the cloud platform of the joint department, and ensure the security and the transmission efficiency of the file information.
Description
Technical Field
The invention relates to the technical field of authentication, in particular to a government affair big data multi-department joint auditing and authenticating working method.
Background
With the development of mobile internet technology, data transmission is more and more frequent, and data security needs to be guaranteed. Patent application No. 201780020324.3 entitled "system and method for authenticating a user for secure data access using a multiparty authentication system," discloses receiving user credentials and authentication information associated with a user and storing the user credentials and authentication information in an authentication profile associated with the user. The method also includes receiving user credentials from the first data provider, detecting that the saved authentication profile includes user credentials that match the received user credentials, and transmitting a challenge message to a user device associated with the user. The challenge message prompts the user equipment for authentication information. The method additionally includes receiving a challenge response from the user device that includes the collected authentication information, authenticating the user according to the authentication profile and the collected authentication information, and notifying the first data provider that the user is authenticated.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a government affair big data multi-department combined auditing and authenticating working method.
In order to achieve the above purpose, the invention provides a government affair big data multi-department joint audit authentication working method, which comprises the following steps:
s1, obtaining files to be authenticated, wherein the files to be authenticated comprise audio files or/and video files or/and audio and video files, and putting the files to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication;
and S2, the cloud platform of the united department authenticates the received file information.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, numbering files to be authenticated in the file package to be authenticated, wherein the files to be authenticated are a 1 st file to be authenticated, a 2 nd file to be authenticated, a 3 rd file to be authenticated, … … nd file to be authenticated, and Q is a positive integer greater than or equal to 1 and is the total number of the files to be authenticated in the file package to be authenticated; making the circulation quantity q equal to 1;
s12, classifying the file types of the files to be authenticated in the file package to be authenticated:
if W q For audio files, W q If the q-th file to be authenticated is represented, establishing a file packet to be authenticated in the file packet to be authenticated, and establishing a file W to be authenticated in the q-th file to be authenticated q Putting the audio file into an established audio file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio file packet q ;
If W q For video files, W q If the q-th file to be authenticated is represented, establishing a video file packet to be authenticated in the file packet to be authenticated, and adding the q-th file W to be authenticated q Putting the video file into the established video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated video file packet q ;
If W q Being an audio-video file, W q If the q-th file to be authenticated is represented, establishing an audio/video file packet to be authenticated in the file packet to be authenticated, and enabling the q-th file W to be authenticated q Putting the audio/video file to be authenticated into the established audio/video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Is put intoScreening out the q < th > to-be-authenticated file W from the established to-be-authenticated audio/video file packet q ;
S13, judging the relation between the circulation quantity Q and the total number Q of the files to be authenticated in the file package to be authenticated:
if Q is greater than or equal to Q, executing step S14;
if Q is less than Q, Q is Q +1, and the process returns to step S12;
s14, comprising one or any combination of steps S141-S143:
s141, numbering video files to be authenticated in a video file package to be authenticated, sequentially and respectively including a 1 st video file to be authenticated, a 2 nd video file to be authenticated, a 3 rd video file to be authenticated, … … and an E th video file to be authenticated, wherein E is a positive integer greater than or equal to 1 and is the total number of the video files to be authenticated in the video file package to be authenticated; executing the following operations on all video files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e representing the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
represents the e-th video file R to be authenticated e Obtaining a unique video identification value through a hash algorithm of MD 5;
identifying a value for a unique videoAs its e-th to-be-authenticated video file R e The file name of (2);
s142, numbering the audio files to be authenticated in the audio file package to be authenticated, sequentially and respectively arranging a 1 st audio file to be authenticated, a 2 nd audio file to be authenticated, a 3 rd audio file to be authenticated, … … and a Tth audio file to be authenticated, wherein T is a positive integer greater than or equal to 1 and is the total number of the audio files to be authenticated in the audio file package to be authenticated; the following operations are executed on all audio files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
D t representing the tth audio file to be authenticated; t is 1, 2, 3, … …, T;
representing the tth audio file D to be authenticated t Obtaining a unique audio identification value through a hash algorithm of MD 5;
identify a value for a unique audioAs its t-th to-be-authenticated audio file D t The file name of (2);
s143, numbering audio and video files to be authenticated in the audio and video file package to be authenticated, wherein the audio and video files to be authenticated are a 1 st audio and video file to be authenticated, a 2 nd audio and video file to be authenticated, a 3 rd audio and video file to be authenticated, … … and a C th audio and video file to be authenticated, C is a positive integer greater than or equal to 1, and is the total number of the audio and video files to be authenticated in the audio and video file package to be authenticated; executing the following operations on all audio and video files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
F c representing the audio/video file to be authenticated; c is 1, 2, 3, … …, C;
is shown asc waiting authentication audio/video file F c Obtaining a unique audio/video identification value through a hash algorithm of MD 5;
unique audio and video identification valueAs the c-th audio/video file F to be authenticated c The file name of (2);
s15, compressing the file package to be authenticated to generate a compressed package, and executing the following operations on the compressed package:
U u =MD(u),
wherein, MD () represents a hashing algorithm for performing MD 5;
u represents a compressed packet;
U u representing the unique compressed packet identification value obtained by the compressed packet u through the hash algorithm of MD 5;
the unique compressed packet identification value U is added u As the file name of its compressed package u;
and S16, uploading the processed compressed packet to a cloud platform of the joint department.
In a preferred embodiment of the present invention, the step S141 includes the following steps:
s1410, using the unique video identification value in the video file package to be authenticatedEstablishing a video folder to be authenticated for the folder name;
s1411, the e-th video file R to be authenticated is added e Converting into frame video images in sequence from first to last according to playing timeIndicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,indicates that the e-th video file R to be authenticated is to be e The 2 nd frame video image after being converted into the frame video image,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image; p is the e-th video file R to be authenticated e Converting the frame video image into all the number of the frame video images;
s1412, perform the following operations on the frame video image:
wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e 2l frame video image after being converted into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
representing the operated 2l frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
the e-th video file R to be authenticated e 2l frame video image after being converted into frame video imageReplacement with 2l frame video image
S1413, in step S1412, the following result is obtained:
if p is a positive odd number, then the sequence isWherein, the first and the second end of the pipe are connected with each other,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,representing operationsThe later p frame video image;
s1414, storing the frame video image obtained in the step S1413 with a unique video identification valueThe video folder to be authenticated is the folder name and is marked with a unique video identification valueAs its e-th to-be-authenticated video file R e The file name of (2) is cut into the backup file.
In a preferred embodiment of the present invention, step S2 includes the following steps:
performing the following operations on the compressed packets it receives:
U u′ =MD(u′),
wherein, MD () represents a hashing algorithm for performing MD 5;
u' represents a received compressed packet;
U u′ the unique compressed packet check value obtained after the received compressed packet u' is subjected to the hash algorithm of MD5 is represented;
judging the file name of the received compressed packet U and the obtained unique compressed packet check value U u′ Whether it is consistent:
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the file names are not consistent with the file names of the compressed packets u, the compressed packets corresponding to the file names of the compressed packets u are received again;
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the two are consistent, decompressing the received compressed packet u; obtaining a decompressed video file packet, a decompressed audio file packet and a decompressed audio and video file packet;
the following operations are performed on the video files in the video file package to be decompressed:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e″ "indicates the e" video file in the decompressed video file packet; e ″, 1, 2, 3, … …, E ″; e' is the total number of video files in the decompressed video file packet;
denotes the e' video file R to be authenticated e″ "unique video check value obtained after hash algorithm of MD 5;
if the only video is verifiedAnd unique video verification valueIf the file names of the corresponding video files are consistent, the video verification value is uniqueThe corresponding video file is successfully authenticated and backed up to a database for storage;
if the only video is verifiedChecking value with unique videoIf the file names of the corresponding video files are not consistent, the unique video checking value is received againThe video file corresponding to the file name of the corresponding video file;
the following operations are performed on the audio files in the decompressed audio file package:
wherein, MD () represents a hashing algorithm for performing MD 5;
D t″ "represents the tth audio file to be authenticated in the decompressed audio file packet"; t ″, 1, 2, 3, … …, T ″; t' is the total number of audio files in the decompressed audio file packet;
denotes the t "Audio File to be authenticated D t″ "unique audio verification value obtained after hash algorithm of MD 5;
if the obtained unique audio checking valueWith a unique audio verification valueIf the file names of the corresponding audio files are consistent, the unique audio verification value is obtainedThe corresponding audio file is successfully authenticated and is backed up to a database for storage;
if the obtained unique audio checking valueWith a unique audio verification valueIf the file names of the corresponding audio files are not consistent, the unique audio checking value is received againThe audio file corresponding to the file name of the corresponding audio file;
the following operations are executed to the audio and video files in the audio and video file decompression package:
wherein, MD () represents a hashing algorithm for performing MD 5;
F c″ "denotes the c" audio-video file to be authenticated; c ″ -1, 2, 3, … …, C ″; c' is the total number of the audio and video files in the decompressed audio and video file packet;
indicates the c' audio/video file F to be authenticated c″ "unique audio-video verification value obtained after hash algorithm of MD 5;
if the obtained unique audio/video checking valueChecking value with unique audio and videoIf the corresponding audio and video file names are not consistent, the unique audio and video checking value is received againAudio and video files corresponding to the corresponding audio and video file names;
if the obtained unique audio/video checking valueChecking value with unique audio and videoIf the corresponding audio and video file names are consistent, the unique audio and video verification value is obtainedAnd if the corresponding audio and video authentication is successful, backing up the audio and video authentication to a database for storage.
In a preferred embodiment of the invention, the following operations are performed for each video file in its decompressed audio file package:
s21, if p is positive odd, the received sequence is: wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the received sequence is: wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,representing the operated p frame video image
S22, executing the following operations:
wherein the content of the first and second substances,representing the operated 2l frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
representing 2l frame video image after operation of joint department cloud platformAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
S23, obtaining the following result after the step S22:
if p is a positive odd number, then the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame of video image after the operation of the united department cloud platform,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame of video image after the operation of the united department cloud platform,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the order isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing clouds in a federationThe 2 nd frame video image after the platform operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame of video image after the operation of the united department cloud platform,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,representing a p frame video image after the operation of the joint department cloud platform;
synthesizing the video files into video files according to the sequence to obtain video synthesized files;
s24, performing the following operations on the video composition file:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e ' represents a video composition file corresponding to the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
representing a video composition file R e ' unique video check value obtained by the hash algorithm of MD 5; making the checking cycle value e' equal to 1;
s25, judging the unique video identification valueAnd the obtained unique video checking valueWhether it is consistent:
if the video identification value is uniqueAnd the obtained unique video checking valueIf yes, e '═ e' +1, go to step S153;
unique video identification valueAnd the obtained unique video verification valueIf the video identification value is inconsistent with the unique video identification value, e' +1 is received again, and the unique video identification value in the backup file is received againExecuting the step S26 for the corresponding video file;
s26, judging the relation between E' and E:
if E' is more than E, the execution is finished;
if E' is less than or equal to E, the process returns to step S25.
In conclusion, due to the adoption of the technical scheme, the file to be authenticated can be authenticated on the cloud platform of the joint department, and the security and the transmission efficiency of the file information are ensured.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a government affair big data multi-department combined auditing and authenticating working method, which comprises the following steps as shown in figure 1:
s1, acquiring a file to be authenticated, wherein the file to be authenticated comprises an audio file or/and a video file or/and an audio-video file, and putting the file to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication;
and S2, the cloud platform of the united department authenticates the received file information.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, numbering files to be authenticated in the file package to be authenticated, wherein the files to be authenticated are a 1 st file to be authenticated, a 2 nd file to be authenticated, a 3 rd file to be authenticated, … … nd file to be authenticated, and Q is a positive integer greater than or equal to 1 and is the total number of the files to be authenticated in the file package to be authenticated; making the circulation quantity q equal to 1;
s12, classifying the file types of the files to be authenticated in the file package to be authenticated:
if W q For audio files, W q If the q-th file to be authenticated is represented, establishing a file packet to be authenticated in the file packet to be authenticated, and establishing a file W to be authenticated in the q-th file to be authenticated q Putting the audio file into an established audio file packet to be authenticated through copying and pasting operations; to make it firstq document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio file packet q ;
If W q For video files, W q If the q-th file to be authenticated is represented, establishing a video file packet to be authenticated in the file packet to be authenticated, and adding the q-th file W to be authenticated q Putting the video file into the established video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated video file packet q ;
If W q As audio-video files, W q If the q-th file to be authenticated is represented, establishing an audio/video file packet to be authenticated in the file packet to be authenticated, and enabling the q-th file W to be authenticated q Putting the audio/video file to be authenticated into the established audio/video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio/video file packet q ;
S13, judging the relation between the circulation quantity Q and the total number Q of the files to be authenticated in the file package to be authenticated:
if Q is greater than or equal to Q, executing step S14;
if Q is less than Q, Q is Q +1, and the process returns to step S12;
s14, comprising one or any combination of steps S141-S143:
s141, numbering video files to be authenticated in a video file package to be authenticated, sequentially and respectively including a 1 st video file to be authenticated, a 2 nd video file to be authenticated, a 3 rd video file to be authenticated, … … and an E th video file to be authenticated, wherein E is a positive integer greater than or equal to 1 and is the total number of the video files to be authenticated in the video file package to be authenticated; executing the following operations on all video files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e indicating the e-th awaiting authentication viewA frequency file; e is 1, 2, 3, … …, E;
represents the e-th video file R to be authenticated e Obtaining a unique video identification value through the hash algorithm of MD 5;
identifying a value for a unique videoAs its e-th to-be-authenticated video file R e The file name of (2);
s142, numbering the audio files to be authenticated in the audio file package to be authenticated, sequentially and respectively arranging a 1 st audio file to be authenticated, a 2 nd audio file to be authenticated, a 3 rd audio file to be authenticated, … … and a Tth audio file to be authenticated, wherein T is a positive integer greater than or equal to 1 and is the total number of the audio files to be authenticated in the audio file package to be authenticated; the following operations are executed on all audio files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
D t representing the tth audio file to be authenticated; t is 1, 2, 3, … …, T;
represents the tth audio file D to be authenticated t Obtaining a unique audio identification value through the hash algorithm of MD 5;
identify a value for a unique audioAs its t-th to-be-authenticated audio file D t The file name of (2);
s143, numbering audio and video files to be authenticated in the audio and video file package to be authenticated, wherein the audio and video files to be authenticated are a 1 st audio and video file to be authenticated, a 2 nd audio and video file to be authenticated, a 3 rd audio and video file to be authenticated, … … and a C th audio and video file to be authenticated, C is a positive integer greater than or equal to 1, and is the total number of the audio and video files to be authenticated in the audio and video file package to be authenticated; the following operations are executed on all audio and video files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
F c representing the audio/video file to be authenticated; c is 1, 2, 3, … …, C;
representing the c audio and video file F to be authenticated c Obtaining a unique audio/video identification value through the MD5 hash algorithm;
unique audio and video identification valueAs the c-th audio/video file F to be authenticated c The file name of (2);
s15, compressing the file package to be authenticated to generate a compressed package, and executing the following operations on the compressed package:
U u =MD(u),
wherein, MD () represents a hashing algorithm for performing MD 5;
u represents a compressed packet;
U u representing the unique compressed packet identification value obtained after the compressed packet u is subjected to the hash algorithm of MD 5;
the unique compressed packet identification value U is added u As the file name of its compressed package u;
and S16, uploading the processed compressed packet to a joint department cloud platform.
In a preferred embodiment of the present invention, the step S141 includes the following steps:
s1410, looking at the authenticationUnique video identification value in frequency file packetEstablishing a video folder to be authenticated for the folder name;
s1411, the e-th video file R to be authenticated is added e Converting into frame video images in sequence from first to last according to playing timeIndicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,indicates that the e-th video file R to be authenticated is to be e The 2 nd frame video image after being converted into the frame video image,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image; p is the e-th video file R to be authenticated e Converting the frame video image into all the number of the frame video images;
s1412, perform the following operations on the frame video image:
wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e 2l frame video image after being converted into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
representing the operated 2l frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
the e-th video file R to be authenticated e 2l frame video image after being converted into frame video imageReplacement with 2l frame video image
S1413, in step S1412, the following result is obtained:
if p is a positive odd number, then the sequence isWherein the content of the first and second substances,indicates that the e is waitingAuthenticating video files R e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of frame 6, … …,representing the p frame video image after the operation;
s1414, storing the frame video image obtained in the step S1413 with a unique video identification valueThe video folder to be authenticated is the folder name and is marked with a unique video identification valueAs its e-th to-be-authenticated video file R e The file name of (2) is cut into the backup file. Through the operation, the files in the video folder to be authenticated are compressed, so that the compression rate is improved, and the transmission efficiency is improved.
In a preferred embodiment of the present invention, step S2 includes the following steps:
performing the following operations on the compressed packets it receives:
U u′ =MD(u′),
wherein, MD () represents a hashing algorithm for performing MD 5;
u' represents a received compressed packet;
U u′ representing received compressed packets u' via MD5Obtaining a unique compressed packet check value after the Hash algorithm;
judging the file name of the received compressed packet U and the obtained unique compressed packet check value U u′ Whether it is consistent:
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the file names are not consistent with the file names of the compressed packets u, the compressed packets corresponding to the file names of the compressed packets u are received again;
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the two are consistent, decompressing the received compressed packet u; obtaining a decompressed video file packet, a decompressed audio file packet and a decompressed audio and video file packet;
the following operations are performed on the video files in the video file package to be decompressed:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e″ "indicates the e" video file in the decompressed video file packet; e ″, 1, 2, 3, … …, E ″; e' is the total number of video files in the decompressed video file packet;
denotes the e' video file R to be authenticated e″ "unique video check value obtained after hash algorithm of MD 5;
if the only video is verifiedChecking value with unique videoIf the file names of the corresponding video files are consistent, the video verification value is uniqueThe corresponding video file is successfully authenticated and backed up to a database for storage;
if the only video checks the valueChecking value with unique videoIf the file names of the corresponding video files are not consistent, the unique video checking value is received againThe video file corresponding to the file name of the corresponding video file;
the following operations are performed on the audio files in the audio file package to be decompressed:
wherein, MD () represents a hashing algorithm for performing MD 5;
D t″ "represents the tth audio file to be authenticated in the decompressed audio file packet"; t ″, 1, 2, 3, … …, T ″; t' is the total number of audio files in the decompressed audio file packet;
represents the t' audio file D to be authenticated t″ "unique audio verification value obtained after hash algorithm of MD 5;
if the obtained unique audio checking valueWith a unique audio verification valueIf the corresponding audio files have consistent file names, the unique audio verification valueThe corresponding audio file is successfully authenticated and is backed up to a database for storage;
if the obtained unique audio checking valueWith a unique audio verification valueIf the file names of the corresponding audio files are not consistent, the unique audio checking value is received againThe audio file corresponding to the file name of the corresponding audio file;
the following operations are executed to the audio and video files in the audio and video file decompression package:
wherein, MD () represents a hashing algorithm for performing MD 5;
F c″ "denotes the c" audio-video file to be authenticated; c ″, 1, 2, 3, … …, C ″; c' is the total number of the audio and video files in the decompressed audio and video file packet;
indicates the c' audio/video file F to be authenticated c″ "unique audio-video verification value obtained after hash algorithm of MD 5;
if the obtained unique audio/video checking valueChecking value with unique audio and videoCorresponding file name of audio/videoIf the difference is not consistent, the unique audio/video checking value is received againAudio and video files corresponding to the file names of the corresponding audio and video;
if the obtained unique audio/video checking valueChecking value with unique audio and videoIf the corresponding audio and video file names are consistent, the unique audio and video verification value is obtainedAnd if the corresponding audio and video authentication is successful, backing up the audio and video authentication to a database for storage.
In a preferred embodiment of the invention, the following operations are performed for each video file in its decompressed audio file package:
s21, if p is positive odd, the received sequence is: wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the received sequence is: wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,representing the operated p frame video image
S22, executing the following operations:
wherein the content of the first and second substances,representing the operated 2l frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
representing the 2l frame video image after the operation of the united department cloud platformAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
S23, obtaining the following result after the step S22:
if p is a positive odd number, then the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame of video image after the operation of the united department cloud platform,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame of video image after the operation of the united department cloud platform,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame of video image after the operation of the united department cloud platform,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame of video image after the operation of the united department cloud platform,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,representing clouds in federated departmentsThe p frame video image after the platform operation;
synthesizing the video files into video files according to the sequence to obtain video synthesized files;
s24, performing the following operations on the video composition file:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e ' represents a video composition file corresponding to the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
representing a video composition file R e ' unique video check value obtained by the hash algorithm of MD 5; making the checking cycle value e' equal to 1;
s25, judging the unique video identification valueAnd the obtained unique video checking valueWhether it is consistent:
if the video identification value is uniqueAnd the obtained unique video checking valueIf yes, e '═ e' +1, go to step S153;
unique video identification valueAnd the obtained unique video checking valueIf the video identification value is inconsistent with the unique video identification value, e' +1 is received again, and the unique video identification value in the backup file is received againExecuting the step S26 for the corresponding video file;
s26, judging the relation between E' and E:
if E' is more than E, the execution is finished;
if E' is less than or equal to E, the process returns to step S25.
In a preferred embodiment of the present invention, the method further includes logging in the cloud platform of the joint department by using a mobile terminal (mobile phone) to view the authentication file stored in the cloud platform database of the joint department. In the embodiment, the method for logging in the cloud platform of the joint department by the mobile terminal comprises the following steps:
s61, if the joint department cloud platform receives the login trigger request, the mobile terminal serial number is obtained;
s62, the following operations are carried out to the obtained mobile terminal serial number:
wherein, MD () K A hashing algorithm representing performing MD 5K times; k is the total number of login times;
ID i indicating a mobile terminal serial number;
indicating a mobile terminal serial number ID i Obtaining a unique ID value after K times of MD5 hash algorithm;
s63, setting its unique ID valueConverting the decimal value into a decimal value, and extracting the number of each digit in the decimal value; when the number of each number is more than 9, capital letters A-Z are used for respectively representing 10-35 in sequence, and the capital letters are divided intoAnd respectively using lower case letters a-z to represent 36-61, arranging the lower case letters from big to small or from small to big, and intercepting the first four digits as registration codes to be sent to the mobile terminal. Assuming that its decimal value is 669785235454181302380, the number of digits is: 20, 21, 2, 3, 24, 3, 5, 2, 6, 1, 7, 3, 8, 1, 9; 3332222211 are arranged from large to small or in sequence, which sends a registration code of 3332. Assuming that its decimal value is 66978523545418130238088888888, the number of digits is: 20, 21, 2, 3, 2, 4, 3, 5, 2, 6, 1, 7, 11, 8, 1, 9; b332222211 is arranged from big to small or in sequence, and the transmitted registration code is B332.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (3)
1. A government affair big data multi-department combined auditing and authenticating working method is characterized by comprising the following steps:
s1, obtaining files to be authenticated, wherein the files to be authenticated comprise audio files or/and video files or/and audio and video files, and putting the files to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication;
s2, authenticating the received file information by the cloud platform of the united department; the step S2 includes the following steps:
performing the following operations on the compressed packets it receives:
U u′ =MD(u′),
wherein, MD () represents a hashing algorithm for performing MD 5;
u' represents a received compressed packet;
U u′ the unique compressed packet check value obtained after the received compressed packet u' is subjected to the hash algorithm of MD5 is represented;
determine it is connected toFile name of received compressed package U and obtained unique compressed package verification value U u′ Whether it is consistent:
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the file names are not consistent with the file names of the compressed packets u, the compressed packets corresponding to the file names of the compressed packets u are received again;
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the two are consistent, decompressing the received compressed packet u; obtaining a decompressed video file packet, a decompressed audio file packet and a decompressed audio and video file packet;
the following operations are performed on the video files in the video file package to be decompressed:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e "indicates the e" video file in the decompressed video file packet; e ″, 1, 2, 3, … …, E ″; e' is the total number of video files in the decompressed video file packet;
denotes the e' video file R to be authenticated e "" unique video check value obtained after hash algorithm of MD 5;
if the only video is verifiedChecking value with unique videoIf the file names of the corresponding video files are consistent, the video verification value is uniqueThe corresponding video file is successfully authenticated and preparedStoring the shares in a database;
if the only video is verifiedChecking value with unique videoIf the file names of the corresponding video files are not consistent, the unique video checking value is received againThe video file corresponding to the file name of the corresponding video file;
the following operations are performed on the audio files in the audio file package to be decompressed:
wherein, MD () represents a hash algorithm for performing MD 5;
D t "" indicates the t-th audio file to be authenticated in the decompressed audio file packet; t ″ -1, 2, 3, … …, T "; t' is the total number of audio files in the decompressed audio file packet;
denotes the t "Audio File to be authenticated D t "" unique audio verification value obtained by the hash algorithm of MD 5;
if the obtained unique audio checking valueWith a unique audio verification valueIf the file names of the corresponding audio files are consistent, the unique audio verification value is obtainedThe corresponding audio file is successfully authenticated and is backed up to a database for storage;
if the obtained unique audio checking valueWith a unique audio verification valueIf the file names of the corresponding audio files are not consistent, the unique audio checking value is received againThe audio file corresponding to the file name of the corresponding audio file;
the following operations are executed to the audio and video files in the audio and video file decompression package:
wherein, MD () represents a hashing algorithm for performing MD 5;
F c "indicates the c" audio and video file to be authenticated; c ″, 1, 2, 3, … …, C ″; c' is the total number of the audio and video files in the decompressed audio and video file packet;
indicates the c' audio/video file F to be authenticated c "" unique audio-video check value obtained by the hash algorithm of MD 5;
if the obtained unique audio/video checking valueChecking value with unique audio and videoIf the corresponding audio and video file names are not consistent, the unique audio and video checking value is received againAudio and video files corresponding to the corresponding audio and video file names;
if the obtained unique audio/video checking valueChecking value with unique audio and videoIf the corresponding audio and video file names are consistent, the unique audio and video check valueThe corresponding audio and video authentication is successful, and the corresponding audio and video authentication is backed up to a database for storage;
further, the following operations are performed for each video file in the video file package to be decompressed:
s21, if p is positive odd, the received sequence is: wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,the representation shows that the e-th video file R to be authenticated is e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the received sequence is: wherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the eVideo file R to be authenticated e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of frame 6, … …,representing the p frame video image after the operation;
s22, executing the following operations:
wherein the content of the first and second substances,representing the operated 2l frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
indicating that e-th to-be-authenticated video is to be usedFile R e 2l-1 frame video image after conversion into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
representing 2l frame video image after operation of joint department cloud platformAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
S23, obtaining the following result after the step S22:
if p is a positive odd number, then the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame of video image after the operation of the united department cloud platform,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame of video image after the operation of the united department cloud platform,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame of video image after the operation of the united department cloud platform,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame of video image after the operation of the united department cloud platform,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,representing a p frame video image after the operation of the joint department cloud platform;
synthesizing the video files into video files according to the sequence to obtain video synthesized files;
s24, performing the following operations on the video composition file:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e ' represents a video composition file corresponding to the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
representing a video composition file R e ' unique video check value obtained by the hash algorithm of MD 5; making the checking cycle value e' equal to 1;
s25, judging the unique video identification valueAnd the obtained unique video checking valueWhether it is consistent:
if the video identification value is uniqueAnd the obtained unique video checking valueIf yes, e '═ e' +1, go to step S153;
unique video identification valueAnd the obtained unique video checking valueIf the video identification value is inconsistent with the video identification value, e' +1, the backup file is received again and the unique video identification value is used for the backup fileExecuting the step S26 for the corresponding video file;
s26, judging the relation between E' and E:
if E' is more than E, the execution is finished;
if E' is less than or equal to E, the process returns to step S25.
2. The government affair big data multi-department joint audit certification working method according to claim 1, wherein the step S1 includes the steps of:
s11, numbering files to be authenticated in the file package to be authenticated, wherein the files to be authenticated are a 1 st file to be authenticated, a 2 nd file to be authenticated, a 3 rd file to be authenticated, … … nd file to be authenticated, and Q is a positive integer greater than or equal to 1 and is the total number of the files to be authenticated in the file package to be authenticated; making the circulation quantity q equal to 1;
s12, classifying the file types of the files to be authenticated in the file package to be authenticated:
if W q For audio files, W q If the q-th file to be authenticated is represented, establishing a file packet to be authenticated in the file packet to be authenticated, and establishing a file W to be authenticated in the q-th file to be authenticated q Putting the audio file into an established audio file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio file packet q ;
If W q For video files, W q If the q-th file to be authenticated is represented, a video file packet to be authenticated is established in the file packet to be authenticated, and the q-th file W to be authenticated is added q Putting the video file into the established video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated video file packet q ;
If W q Being an audio-video file, W q If the q-th file to be authenticated is represented, establishing an audio/video file packet to be authenticated in the file packet to be authenticated, and enabling the q-th file W to be authenticated q Putting the audio/video file to be authenticated into the established audio/video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio/video file packet q ;
S13, judging the relation between the circulation quantity Q and the total number Q of the files to be authenticated in the file package to be authenticated:
if Q is greater than or equal to Q, executing step S14;
if Q is less than Q, Q is Q +1, and the process returns to step S12;
s14, comprising one or any combination of steps S141-S143:
s141, numbering video files to be authenticated in a video file package to be authenticated, sequentially and respectively including a 1 st video file to be authenticated, a 2 nd video file to be authenticated, a 3 rd video file to be authenticated, … … and an E th video file to be authenticated, wherein E is a positive integer greater than or equal to 1 and is the total number of the video files to be authenticated in the video file package to be authenticated; executing the following operations on all video files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
R e representing the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
represents the e-th video file R to be authenticated e Obtaining a unique video identification value through the hash algorithm of MD 5;
identifying a value for a unique videoAs its e-th to-be-authenticated video file R e The file name of (2);
s142, numbering the audio files to be authenticated in the audio file package to be authenticated, sequentially and respectively arranging a 1 st audio file to be authenticated, a 2 nd audio file to be authenticated, a 3 rd audio file to be authenticated, … … and a Tth audio file to be authenticated, wherein T is a positive integer greater than or equal to 1 and is the total number of the audio files to be authenticated in the audio file package to be authenticated; the following operations are executed on all audio files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
D t representing the tth audio file to be authenticated; t is 1, 2, 3, … …, T;
representing the tth audio file D to be authenticated t Obtaining a unique audio identification value through the hash algorithm of MD 5;
identify a value for a unique audioAs its t-th to-be-authenticated audio file D t The file name of (2);
s143, numbering audio and video files to be authenticated in the audio and video file package to be authenticated, wherein the audio and video files to be authenticated are a 1 st audio and video file to be authenticated, a 2 nd audio and video file to be authenticated, a 3 rd audio and video file to be authenticated, … … and a C audio and video file to be authenticated respectively, C is a positive integer greater than or equal to 1, and is the total number of the audio and video files to be authenticated in the audio and video file package to be authenticated; the following operations are executed on all audio and video files to be authenticated:
wherein, MD () represents a hashing algorithm for performing MD 5;
F c representing the audio/video file to be authenticated; c is 1, 2, 3, … …, C;
showing the c audio and video file F to be authenticated c Obtaining a unique audio and video identification value through a hash algorithm of MD 5;
unique audio and video identification valueAs the c-th audio/video file F to be authenticated c The file name of (2);
s15, compressing the file package to be authenticated to generate a compressed package, and executing the following operations on the compressed package:
U u =MD(u),
wherein, MD () represents a hashing algorithm for performing MD 5;
u represents a compressed packet;
U u representing the unique compressed packet identification value obtained by the compressed packet u through the hash algorithm of MD 5;
the unique compressed packet identification value U is added u As compression thereofThe file name of package u;
and S16, uploading the processed compressed packet to a cloud platform of the joint department.
3. The government affair big data multi-department joint audit certification working method according to claim 1, wherein the step S141 comprises the steps of:
s1410, using the unique video identification value in the video file package to be authenticatedEstablishing a video folder to be authenticated for the folder name;
s1411, the e-th video file R to be authenticated is added e Converting into frame video images in sequence from first to last according to playing time Indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,indicates that the e-th video file R to be authenticated is to be e The 2 nd frame video image after being converted into the frame video image,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image; p is the e-th video file R to be authenticated e Converting the frame video image into all the number of the frame video images;
s1412, perform the following operations on the frame video image:
wherein, the first and the second end of the pipe are connected with each other,indicates that the e-th video file R to be authenticated is to be e The 2l frame video image after being converted into the frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
representing the operated 2l frame video imageAt the coordinate point (X) x ,Y y ) The corresponding pixel value;
the e-th video file R to be authenticated e 2l frame video image after being converted into frame video imageReplacement with 2l frame video image
S1413, in step S1412, the following result is obtained:
if p is a positive odd number, then the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence isWherein the content of the first and second substances,indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,representing the 2 nd frame video image after the operation,indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,representing the 4 th frame video image after the operation,indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,indicating the video image of the 6 th frame, … …,representing the p frame video image after operation;
s1414, storing the frame video image obtained in the step S1413 with a unique video identification valueThe video folder to be authenticated is the name of the folder, and the video folder is identified by a unique video identification valueAs its e-th to-be-authenticated video file R e The file name of (2) is cut into the backup file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110310148.5A CN113141351B (en) | 2021-03-23 | 2021-03-23 | Multi-department combined auditing and authenticating working method for government affair big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110310148.5A CN113141351B (en) | 2021-03-23 | 2021-03-23 | Multi-department combined auditing and authenticating working method for government affair big data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113141351A CN113141351A (en) | 2021-07-20 |
CN113141351B true CN113141351B (en) | 2022-09-20 |
Family
ID=76811606
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110310148.5A Active CN113141351B (en) | 2021-03-23 | 2021-03-23 | Multi-department combined auditing and authenticating working method for government affair big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113141351B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114205645B (en) * | 2021-12-10 | 2024-06-14 | 北京凯视达信息技术有限公司 | Distributed video content auditing method and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109788309A (en) * | 2018-12-25 | 2019-05-21 | 陕西优米数据技术有限公司 | Video file piracy detection method and system based on block chain technology |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IN2015KN00466A (en) * | 2012-08-03 | 2015-07-17 | Vasco Data Security Int Gmbh | |
CN109660822A (en) * | 2018-12-17 | 2019-04-19 | 深圳市睿智物联科技有限公司 | A kind of method and system that long-range control LED Architectural Media screen preview plays |
CN110113168B (en) * | 2019-04-03 | 2022-04-22 | 厦门历思科技服务有限公司 | Information authentication method, client, system and computer readable storage medium |
CN111309699A (en) * | 2020-01-15 | 2020-06-19 | 张文龙 | Content sharing method and system based on point-to-point distributed file system |
-
2021
- 2021-03-23 CN CN202110310148.5A patent/CN113141351B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109788309A (en) * | 2018-12-25 | 2019-05-21 | 陕西优米数据技术有限公司 | Video file piracy detection method and system based on block chain technology |
Also Published As
Publication number | Publication date |
---|---|
CN113141351A (en) | 2021-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111600720B (en) | Data processing method, device and equipment based on block chain and readable storage medium | |
US11418677B2 (en) | Method for preventing image modification, image capturing device and image verification method | |
CN1528052B (en) | Method and system for providing a context for message compression | |
KR20190130479A (en) | System for compressing and restoring picture based on AI | |
CN111885133B (en) | Block chain-based data processing method and device and computer storage medium | |
CN113141351B (en) | Multi-department combined auditing and authenticating working method for government affair big data | |
CN112788270B (en) | Video backtracking method, device, computer equipment and storage medium | |
CN113656661B (en) | Mobile government affair system based on natural language recognition | |
CN113645203A (en) | Real estate registration and bank deep fusion method | |
US20170034303A1 (en) | Methods and apparatus to create and transmit a condensed logging data file | |
CN113821536B (en) | Data processing method, device and equipment based on block chain and readable storage medium | |
CN115249276A (en) | Image compression method, image compression device, electronic equipment and storage medium | |
CN105518697A (en) | Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program | |
CN113179450B (en) | Working method for analyzing urban operation management in big data environment | |
CN103631675A (en) | Method of system recovery of client device, wireless connection device and computer program | |
CN112559546B (en) | Database synchronization method, database synchronization device, computer equipment and readable storage medium | |
CN109461201A (en) | Image processing method and device, electronic equipment, computer readable storage medium | |
CN115248940A (en) | Video evidence storing method, verification method and device based on block chain | |
CN113179249A (en) | Method for rapidly and safely mining government affair data in big data network | |
CN117240498B (en) | Intelligent big data platform interactive cloud control method | |
CN112669396B (en) | Lossless image compression method and device | |
CN113505137B (en) | Real estate space graph updating method | |
CN117742581A (en) | Lightweight data management method | |
CN115002079B (en) | Short address generation method, device, equipment and storage medium | |
CN108696528B (en) | Data transmission method, terminal, acquisition platform and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |