CN113141351B - Multi-department combined auditing and authenticating working method for government affair big data - Google Patents

Multi-department combined auditing and authenticating working method for government affair big data Download PDF

Info

Publication number
CN113141351B
CN113141351B CN202110310148.5A CN202110310148A CN113141351B CN 113141351 B CN113141351 B CN 113141351B CN 202110310148 A CN202110310148 A CN 202110310148A CN 113141351 B CN113141351 B CN 113141351B
Authority
CN
China
Prior art keywords
file
authenticated
video
audio
frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110310148.5A
Other languages
Chinese (zh)
Other versions
CN113141351A (en
Inventor
杨琴
师铭
姚平波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Yangcheng Big Data Technology Co ltd
Original Assignee
Chongqing Yangcheng Big Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Yangcheng Big Data Technology Co ltd filed Critical Chongqing Yangcheng Big Data Technology Co ltd
Priority to CN202110310148.5A priority Critical patent/CN113141351B/en
Publication of CN113141351A publication Critical patent/CN113141351A/en
Application granted granted Critical
Publication of CN113141351B publication Critical patent/CN113141351B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

The invention provides a government affair big data multi-department combined auditing and authenticating working method, which comprises the following steps: s1, acquiring a file to be authenticated, wherein the file to be authenticated comprises an audio file or/and a video file or/and an audio-video file, and putting the file to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication; and S2, the cloud platform of the united department authenticates the received file information. The method and the system can authenticate the file to be authenticated on the cloud platform of the joint department, and ensure the security and the transmission efficiency of the file information.

Description

Multi-department combined auditing and authenticating working method for government affair big data
Technical Field
The invention relates to the technical field of authentication, in particular to a government affair big data multi-department joint auditing and authenticating working method.
Background
With the development of mobile internet technology, data transmission is more and more frequent, and data security needs to be guaranteed. Patent application No. 201780020324.3 entitled "system and method for authenticating a user for secure data access using a multiparty authentication system," discloses receiving user credentials and authentication information associated with a user and storing the user credentials and authentication information in an authentication profile associated with the user. The method also includes receiving user credentials from the first data provider, detecting that the saved authentication profile includes user credentials that match the received user credentials, and transmitting a challenge message to a user device associated with the user. The challenge message prompts the user equipment for authentication information. The method additionally includes receiving a challenge response from the user device that includes the collected authentication information, authenticating the user according to the authentication profile and the collected authentication information, and notifying the first data provider that the user is authenticated.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a government affair big data multi-department combined auditing and authenticating working method.
In order to achieve the above purpose, the invention provides a government affair big data multi-department joint audit authentication working method, which comprises the following steps:
s1, obtaining files to be authenticated, wherein the files to be authenticated comprise audio files or/and video files or/and audio and video files, and putting the files to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication;
and S2, the cloud platform of the united department authenticates the received file information.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, numbering files to be authenticated in the file package to be authenticated, wherein the files to be authenticated are a 1 st file to be authenticated, a 2 nd file to be authenticated, a 3 rd file to be authenticated, … … nd file to be authenticated, and Q is a positive integer greater than or equal to 1 and is the total number of the files to be authenticated in the file package to be authenticated; making the circulation quantity q equal to 1;
s12, classifying the file types of the files to be authenticated in the file package to be authenticated:
if W q For audio files, W q If the q-th file to be authenticated is represented, establishing a file packet to be authenticated in the file packet to be authenticated, and establishing a file W to be authenticated in the q-th file to be authenticated q Putting the audio file into an established audio file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio file packet q
If W q For video files, W q If the q-th file to be authenticated is represented, establishing a video file packet to be authenticated in the file packet to be authenticated, and adding the q-th file W to be authenticated q Putting the video file into the established video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated video file packet q
If W q Being an audio-video file, W q If the q-th file to be authenticated is represented, establishing an audio/video file packet to be authenticated in the file packet to be authenticated, and enabling the q-th file W to be authenticated q Putting the audio/video file to be authenticated into the established audio/video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Is put intoScreening out the q < th > to-be-authenticated file W from the established to-be-authenticated audio/video file packet q
S13, judging the relation between the circulation quantity Q and the total number Q of the files to be authenticated in the file package to be authenticated:
if Q is greater than or equal to Q, executing step S14;
if Q is less than Q, Q is Q +1, and the process returns to step S12;
s14, comprising one or any combination of steps S141-S143:
s141, numbering video files to be authenticated in a video file package to be authenticated, sequentially and respectively including a 1 st video file to be authenticated, a 2 nd video file to be authenticated, a 3 rd video file to be authenticated, … … and an E th video file to be authenticated, wherein E is a positive integer greater than or equal to 1 and is the total number of the video files to be authenticated in the video file package to be authenticated; executing the following operations on all video files to be authenticated:
Figure BDA0002989372570000031
wherein, MD () represents a hashing algorithm for performing MD 5;
R e representing the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
Figure BDA0002989372570000032
represents the e-th video file R to be authenticated e Obtaining a unique video identification value through a hash algorithm of MD 5;
identifying a value for a unique video
Figure BDA0002989372570000033
As its e-th to-be-authenticated video file R e The file name of (2);
s142, numbering the audio files to be authenticated in the audio file package to be authenticated, sequentially and respectively arranging a 1 st audio file to be authenticated, a 2 nd audio file to be authenticated, a 3 rd audio file to be authenticated, … … and a Tth audio file to be authenticated, wherein T is a positive integer greater than or equal to 1 and is the total number of the audio files to be authenticated in the audio file package to be authenticated; the following operations are executed on all audio files to be authenticated:
Figure BDA0002989372570000034
wherein, MD () represents a hashing algorithm for performing MD 5;
D t representing the tth audio file to be authenticated; t is 1, 2, 3, … …, T;
Figure BDA0002989372570000035
representing the tth audio file D to be authenticated t Obtaining a unique audio identification value through a hash algorithm of MD 5;
identify a value for a unique audio
Figure BDA0002989372570000036
As its t-th to-be-authenticated audio file D t The file name of (2);
s143, numbering audio and video files to be authenticated in the audio and video file package to be authenticated, wherein the audio and video files to be authenticated are a 1 st audio and video file to be authenticated, a 2 nd audio and video file to be authenticated, a 3 rd audio and video file to be authenticated, … … and a C th audio and video file to be authenticated, C is a positive integer greater than or equal to 1, and is the total number of the audio and video files to be authenticated in the audio and video file package to be authenticated; executing the following operations on all audio and video files to be authenticated:
Figure BDA0002989372570000037
wherein, MD () represents a hashing algorithm for performing MD 5;
F c representing the audio/video file to be authenticated; c is 1, 2, 3, … …, C;
Figure BDA0002989372570000038
is shown asc waiting authentication audio/video file F c Obtaining a unique audio/video identification value through a hash algorithm of MD 5;
unique audio and video identification value
Figure BDA0002989372570000041
As the c-th audio/video file F to be authenticated c The file name of (2);
s15, compressing the file package to be authenticated to generate a compressed package, and executing the following operations on the compressed package:
U u =MD(u),
wherein, MD () represents a hashing algorithm for performing MD 5;
u represents a compressed packet;
U u representing the unique compressed packet identification value obtained by the compressed packet u through the hash algorithm of MD 5;
the unique compressed packet identification value U is added u As the file name of its compressed package u;
and S16, uploading the processed compressed packet to a cloud platform of the joint department.
In a preferred embodiment of the present invention, the step S141 includes the following steps:
s1410, using the unique video identification value in the video file package to be authenticated
Figure BDA0002989372570000042
Establishing a video folder to be authenticated for the folder name;
s1411, the e-th video file R to be authenticated is added e Converting into frame video images in sequence from first to last according to playing time
Figure BDA0002989372570000043
Indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000044
indicates that the e-th video file R to be authenticated is to be e The 2 nd frame video image after being converted into the frame video image,
Figure BDA0002989372570000045
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image, … …,
Figure BDA0002989372570000046
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image; p is the e-th video file R to be authenticated e Converting the frame video image into all the number of the frame video images;
s1412, perform the following operations on the frame video image:
Figure BDA0002989372570000047
l is greater than or equal to 1 and less than or equal to
Figure BDA0002989372570000048
Int () represents a rounding function;
wherein the content of the first and second substances,
Figure BDA0002989372570000049
indicates that the e-th video file R to be authenticated is to be e 2l frame video image after being converted into frame video image
Figure BDA00029893725700000410
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA0002989372570000051
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video image
Figure BDA0002989372570000052
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA0002989372570000053
representing the operated 2l frame video image
Figure BDA0002989372570000054
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
the e-th video file R to be authenticated e 2l frame video image after being converted into frame video image
Figure BDA0002989372570000055
Replacement with 2l frame video image
Figure BDA0002989372570000056
S1413, in step S1412, the following result is obtained:
if p is a positive odd number, then the sequence is
Figure BDA0002989372570000057
Wherein, the first and the second end of the pipe are connected with each other,
Figure BDA0002989372570000058
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000059
representing the 2 nd frame video image after the operation,
Figure BDA00029893725700000510
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700000511
representing the 4 th frame video image after the operation,
Figure BDA00029893725700000512
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700000513
indicating the video image of the 6 th frame, … …,
Figure BDA00029893725700000514
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence is
Figure BDA00029893725700000515
Wherein the content of the first and second substances,
Figure BDA00029893725700000516
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA00029893725700000517
representing the 2 nd frame video image after the operation,
Figure BDA00029893725700000518
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700000519
representing the 4 th frame video image after the operation,
Figure BDA00029893725700000520
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700000521
indicating the video image of the 6 th frame, … …,
Figure BDA00029893725700000522
representing operationsThe later p frame video image;
s1414, storing the frame video image obtained in the step S1413 with a unique video identification value
Figure BDA00029893725700000523
The video folder to be authenticated is the folder name and is marked with a unique video identification value
Figure BDA00029893725700000524
As its e-th to-be-authenticated video file R e The file name of (2) is cut into the backup file.
In a preferred embodiment of the present invention, step S2 includes the following steps:
performing the following operations on the compressed packets it receives:
U u′ =MD(u′),
wherein, MD () represents a hashing algorithm for performing MD 5;
u' represents a received compressed packet;
U u′ the unique compressed packet check value obtained after the received compressed packet u' is subjected to the hash algorithm of MD5 is represented;
judging the file name of the received compressed packet U and the obtained unique compressed packet check value U u′ Whether it is consistent:
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the file names are not consistent with the file names of the compressed packets u, the compressed packets corresponding to the file names of the compressed packets u are received again;
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the two are consistent, decompressing the received compressed packet u; obtaining a decompressed video file packet, a decompressed audio file packet and a decompressed audio and video file packet;
the following operations are performed on the video files in the video file package to be decompressed:
Figure BDA0002989372570000061
wherein, MD () represents a hashing algorithm for performing MD 5;
R e″ "indicates the e" video file in the decompressed video file packet; e ″, 1, 2, 3, … …, E ″; e' is the total number of video files in the decompressed video file packet;
Figure BDA0002989372570000062
denotes the e' video file R to be authenticated e″ "unique video check value obtained after hash algorithm of MD 5;
if the only video is verified
Figure BDA0002989372570000063
And unique video verification value
Figure BDA0002989372570000064
If the file names of the corresponding video files are consistent, the video verification value is unique
Figure BDA0002989372570000065
The corresponding video file is successfully authenticated and backed up to a database for storage;
if the only video is verified
Figure BDA0002989372570000066
Checking value with unique video
Figure BDA0002989372570000067
If the file names of the corresponding video files are not consistent, the unique video checking value is received again
Figure BDA0002989372570000068
The video file corresponding to the file name of the corresponding video file;
the following operations are performed on the audio files in the decompressed audio file package:
Figure BDA0002989372570000069
wherein, MD () represents a hashing algorithm for performing MD 5;
D t″ "represents the tth audio file to be authenticated in the decompressed audio file packet"; t ″, 1, 2, 3, … …, T ″; t' is the total number of audio files in the decompressed audio file packet;
Figure BDA0002989372570000071
denotes the t "Audio File to be authenticated D t″ "unique audio verification value obtained after hash algorithm of MD 5;
if the obtained unique audio checking value
Figure BDA0002989372570000072
With a unique audio verification value
Figure BDA0002989372570000073
If the file names of the corresponding audio files are consistent, the unique audio verification value is obtained
Figure BDA0002989372570000074
The corresponding audio file is successfully authenticated and is backed up to a database for storage;
if the obtained unique audio checking value
Figure BDA0002989372570000075
With a unique audio verification value
Figure BDA0002989372570000076
If the file names of the corresponding audio files are not consistent, the unique audio checking value is received again
Figure BDA0002989372570000077
The audio file corresponding to the file name of the corresponding audio file;
the following operations are executed to the audio and video files in the audio and video file decompression package:
Figure BDA0002989372570000078
wherein, MD () represents a hashing algorithm for performing MD 5;
F c″ "denotes the c" audio-video file to be authenticated; c ″ -1, 2, 3, … …, C ″; c' is the total number of the audio and video files in the decompressed audio and video file packet;
Figure BDA0002989372570000079
indicates the c' audio/video file F to be authenticated c″ "unique audio-video verification value obtained after hash algorithm of MD 5;
if the obtained unique audio/video checking value
Figure BDA00029893725700000710
Checking value with unique audio and video
Figure BDA00029893725700000711
If the corresponding audio and video file names are not consistent, the unique audio and video checking value is received again
Figure BDA00029893725700000712
Audio and video files corresponding to the corresponding audio and video file names;
if the obtained unique audio/video checking value
Figure BDA00029893725700000713
Checking value with unique audio and video
Figure BDA00029893725700000714
If the corresponding audio and video file names are consistent, the unique audio and video verification value is obtained
Figure BDA00029893725700000715
And if the corresponding audio and video authentication is successful, backing up the audio and video authentication to a database for storage.
In a preferred embodiment of the invention, the following operations are performed for each video file in its decompressed audio file package:
s21, if p is positive odd, the received sequence is:
Figure BDA00029893725700000716
Figure BDA0002989372570000081
wherein the content of the first and second substances,
Figure BDA0002989372570000082
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000083
representing the 2 nd frame video image after the operation,
Figure BDA0002989372570000084
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA0002989372570000085
representing the 4 th frame video image after the operation,
Figure BDA0002989372570000086
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA0002989372570000087
indicating the video image of the 6 th frame, … …,
Figure BDA0002989372570000088
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the received sequence is:
Figure BDA0002989372570000089
Figure BDA00029893725700000810
wherein the content of the first and second substances,
Figure BDA00029893725700000811
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA00029893725700000812
representing the 2 nd frame video image after the operation,
Figure BDA00029893725700000813
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700000814
representing the 4 th frame video image after the operation,
Figure BDA00029893725700000815
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700000816
indicating the video image of the 6 th frame, … …,
Figure BDA00029893725700000817
representing the operated p frame video image
S22, executing the following operations:
Figure BDA00029893725700000818
l is greater than or equal to 1 and less than or equal to
Figure BDA00029893725700000819
Int () represents a rounding function;
wherein the content of the first and second substances,
Figure BDA00029893725700000820
representing the operated 2l frame video image
Figure BDA00029893725700000821
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA00029893725700000822
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video image
Figure BDA00029893725700000823
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA00029893725700000824
representing 2l frame video image after operation of joint department cloud platform
Figure BDA00029893725700000825
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
the 2l frame video image is processed
Figure BDA00029893725700000826
Replacement with 2l frame video image
Figure BDA00029893725700000827
S23, obtaining the following result after the step S22:
if p is a positive odd number, then the sequence is
Figure BDA0002989372570000091
Wherein the content of the first and second substances,
Figure BDA0002989372570000092
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000093
representing the 2 nd frame of video image after the operation of the united department cloud platform,
Figure BDA0002989372570000094
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA0002989372570000095
representing the 4 th frame of video image after the operation of the united department cloud platform,
Figure BDA0002989372570000096
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA0002989372570000097
a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,
Figure BDA0002989372570000098
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the order is
Figure BDA0002989372570000099
Wherein the content of the first and second substances,
Figure BDA00029893725700000910
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA00029893725700000911
representing clouds in a federationThe 2 nd frame video image after the platform operation,
Figure BDA00029893725700000912
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700000913
representing the 4 th frame of video image after the operation of the united department cloud platform,
Figure BDA00029893725700000914
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700000915
a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,
Figure BDA00029893725700000916
representing a p frame video image after the operation of the joint department cloud platform;
synthesizing the video files into video files according to the sequence to obtain video synthesized files;
s24, performing the following operations on the video composition file:
Figure BDA00029893725700000917
wherein, MD () represents a hashing algorithm for performing MD 5;
R e ' represents a video composition file corresponding to the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
Figure BDA00029893725700000918
representing a video composition file R e ' unique video check value obtained by the hash algorithm of MD 5; making the checking cycle value e' equal to 1;
s25, judging the unique video identification value
Figure BDA00029893725700000919
And the obtained unique video checking value
Figure BDA00029893725700000920
Whether it is consistent:
if the video identification value is unique
Figure BDA00029893725700000921
And the obtained unique video checking value
Figure BDA00029893725700000922
If yes, e '═ e' +1, go to step S153;
unique video identification value
Figure BDA0002989372570000101
And the obtained unique video verification value
Figure BDA0002989372570000102
If the video identification value is inconsistent with the unique video identification value, e' +1 is received again, and the unique video identification value in the backup file is received again
Figure BDA0002989372570000103
Executing the step S26 for the corresponding video file;
s26, judging the relation between E' and E:
if E' is more than E, the execution is finished;
if E' is less than or equal to E, the process returns to step S25.
In conclusion, due to the adoption of the technical scheme, the file to be authenticated can be authenticated on the cloud platform of the joint department, and the security and the transmission efficiency of the file information are ensured.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a government affair big data multi-department combined auditing and authenticating working method, which comprises the following steps as shown in figure 1:
s1, acquiring a file to be authenticated, wherein the file to be authenticated comprises an audio file or/and a video file or/and an audio-video file, and putting the file to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication;
and S2, the cloud platform of the united department authenticates the received file information.
In a preferred embodiment of the present invention, step S1 includes the following steps:
s11, numbering files to be authenticated in the file package to be authenticated, wherein the files to be authenticated are a 1 st file to be authenticated, a 2 nd file to be authenticated, a 3 rd file to be authenticated, … … nd file to be authenticated, and Q is a positive integer greater than or equal to 1 and is the total number of the files to be authenticated in the file package to be authenticated; making the circulation quantity q equal to 1;
s12, classifying the file types of the files to be authenticated in the file package to be authenticated:
if W q For audio files, W q If the q-th file to be authenticated is represented, establishing a file packet to be authenticated in the file packet to be authenticated, and establishing a file W to be authenticated in the q-th file to be authenticated q Putting the audio file into an established audio file packet to be authenticated through copying and pasting operations; to make it firstq document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio file packet q
If W q For video files, W q If the q-th file to be authenticated is represented, establishing a video file packet to be authenticated in the file packet to be authenticated, and adding the q-th file W to be authenticated q Putting the video file into the established video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated video file packet q
If W q As audio-video files, W q If the q-th file to be authenticated is represented, establishing an audio/video file packet to be authenticated in the file packet to be authenticated, and enabling the q-th file W to be authenticated q Putting the audio/video file to be authenticated into the established audio/video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio/video file packet q
S13, judging the relation between the circulation quantity Q and the total number Q of the files to be authenticated in the file package to be authenticated:
if Q is greater than or equal to Q, executing step S14;
if Q is less than Q, Q is Q +1, and the process returns to step S12;
s14, comprising one or any combination of steps S141-S143:
s141, numbering video files to be authenticated in a video file package to be authenticated, sequentially and respectively including a 1 st video file to be authenticated, a 2 nd video file to be authenticated, a 3 rd video file to be authenticated, … … and an E th video file to be authenticated, wherein E is a positive integer greater than or equal to 1 and is the total number of the video files to be authenticated in the video file package to be authenticated; executing the following operations on all video files to be authenticated:
Figure BDA0002989372570000121
wherein, MD () represents a hashing algorithm for performing MD 5;
R e indicating the e-th awaiting authentication viewA frequency file; e is 1, 2, 3, … …, E;
Figure BDA0002989372570000122
represents the e-th video file R to be authenticated e Obtaining a unique video identification value through the hash algorithm of MD 5;
identifying a value for a unique video
Figure BDA0002989372570000123
As its e-th to-be-authenticated video file R e The file name of (2);
s142, numbering the audio files to be authenticated in the audio file package to be authenticated, sequentially and respectively arranging a 1 st audio file to be authenticated, a 2 nd audio file to be authenticated, a 3 rd audio file to be authenticated, … … and a Tth audio file to be authenticated, wherein T is a positive integer greater than or equal to 1 and is the total number of the audio files to be authenticated in the audio file package to be authenticated; the following operations are executed on all audio files to be authenticated:
Figure BDA0002989372570000124
wherein, MD () represents a hashing algorithm for performing MD 5;
D t representing the tth audio file to be authenticated; t is 1, 2, 3, … …, T;
Figure BDA0002989372570000125
represents the tth audio file D to be authenticated t Obtaining a unique audio identification value through the hash algorithm of MD 5;
identify a value for a unique audio
Figure BDA0002989372570000126
As its t-th to-be-authenticated audio file D t The file name of (2);
s143, numbering audio and video files to be authenticated in the audio and video file package to be authenticated, wherein the audio and video files to be authenticated are a 1 st audio and video file to be authenticated, a 2 nd audio and video file to be authenticated, a 3 rd audio and video file to be authenticated, … … and a C th audio and video file to be authenticated, C is a positive integer greater than or equal to 1, and is the total number of the audio and video files to be authenticated in the audio and video file package to be authenticated; the following operations are executed on all audio and video files to be authenticated:
Figure BDA0002989372570000127
wherein, MD () represents a hashing algorithm for performing MD 5;
F c representing the audio/video file to be authenticated; c is 1, 2, 3, … …, C;
Figure BDA0002989372570000128
representing the c audio and video file F to be authenticated c Obtaining a unique audio/video identification value through the MD5 hash algorithm;
unique audio and video identification value
Figure BDA0002989372570000131
As the c-th audio/video file F to be authenticated c The file name of (2);
s15, compressing the file package to be authenticated to generate a compressed package, and executing the following operations on the compressed package:
U u =MD(u),
wherein, MD () represents a hashing algorithm for performing MD 5;
u represents a compressed packet;
U u representing the unique compressed packet identification value obtained after the compressed packet u is subjected to the hash algorithm of MD 5;
the unique compressed packet identification value U is added u As the file name of its compressed package u;
and S16, uploading the processed compressed packet to a joint department cloud platform.
In a preferred embodiment of the present invention, the step S141 includes the following steps:
s1410, looking at the authenticationUnique video identification value in frequency file packet
Figure BDA0002989372570000132
Establishing a video folder to be authenticated for the folder name;
s1411, the e-th video file R to be authenticated is added e Converting into frame video images in sequence from first to last according to playing time
Figure BDA0002989372570000133
Indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000134
indicates that the e-th video file R to be authenticated is to be e The 2 nd frame video image after being converted into the frame video image,
Figure BDA0002989372570000135
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image, … …,
Figure BDA0002989372570000136
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image; p is the e-th video file R to be authenticated e Converting the frame video image into all the number of the frame video images;
s1412, perform the following operations on the frame video image:
Figure BDA0002989372570000137
l is greater than or equal to 1 and less than or equal to
Figure BDA0002989372570000138
Int () represents a rounding function;
wherein the content of the first and second substances,
Figure BDA0002989372570000139
indicates that the e-th video file R to be authenticated is to be e 2l frame video image after being converted into frame video image
Figure BDA00029893725700001310
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA0002989372570000141
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video image
Figure BDA0002989372570000142
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA0002989372570000143
representing the operated 2l frame video image
Figure BDA0002989372570000144
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
the e-th video file R to be authenticated e 2l frame video image after being converted into frame video image
Figure BDA0002989372570000145
Replacement with 2l frame video image
Figure BDA0002989372570000146
S1413, in step S1412, the following result is obtained:
if p is a positive odd number, then the sequence is
Figure BDA0002989372570000147
Wherein the content of the first and second substances,
Figure BDA0002989372570000148
indicates that the e is waitingAuthenticating video files R e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000149
representing the 2 nd frame video image after the operation,
Figure BDA00029893725700001410
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700001411
representing the 4 th frame video image after the operation,
Figure BDA00029893725700001412
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700001413
indicating the video image of the 6 th frame, … …,
Figure BDA00029893725700001414
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence is
Figure BDA00029893725700001415
Wherein the content of the first and second substances,
Figure BDA00029893725700001416
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA00029893725700001417
representing the 2 nd frame video image after the operation,
Figure BDA00029893725700001418
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700001419
representing the 4 th frame video image after the operation,
Figure BDA00029893725700001420
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700001421
indicating the video image of frame 6, … …,
Figure BDA00029893725700001422
representing the p frame video image after the operation;
s1414, storing the frame video image obtained in the step S1413 with a unique video identification value
Figure BDA00029893725700001423
The video folder to be authenticated is the folder name and is marked with a unique video identification value
Figure BDA00029893725700001424
As its e-th to-be-authenticated video file R e The file name of (2) is cut into the backup file. Through the operation, the files in the video folder to be authenticated are compressed, so that the compression rate is improved, and the transmission efficiency is improved.
In a preferred embodiment of the present invention, step S2 includes the following steps:
performing the following operations on the compressed packets it receives:
U u′ =MD(u′),
wherein, MD () represents a hashing algorithm for performing MD 5;
u' represents a received compressed packet;
U u′ representing received compressed packets u' via MD5Obtaining a unique compressed packet check value after the Hash algorithm;
judging the file name of the received compressed packet U and the obtained unique compressed packet check value U u′ Whether it is consistent:
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the file names are not consistent with the file names of the compressed packets u, the compressed packets corresponding to the file names of the compressed packets u are received again;
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the two are consistent, decompressing the received compressed packet u; obtaining a decompressed video file packet, a decompressed audio file packet and a decompressed audio and video file packet;
the following operations are performed on the video files in the video file package to be decompressed:
Figure BDA0002989372570000151
wherein, MD () represents a hashing algorithm for performing MD 5;
R e″ "indicates the e" video file in the decompressed video file packet; e ″, 1, 2, 3, … …, E ″; e' is the total number of video files in the decompressed video file packet;
Figure BDA0002989372570000152
denotes the e' video file R to be authenticated e″ "unique video check value obtained after hash algorithm of MD 5;
if the only video is verified
Figure BDA0002989372570000153
Checking value with unique video
Figure BDA0002989372570000154
If the file names of the corresponding video files are consistent, the video verification value is unique
Figure BDA0002989372570000155
The corresponding video file is successfully authenticated and backed up to a database for storage;
if the only video checks the value
Figure BDA0002989372570000156
Checking value with unique video
Figure BDA0002989372570000157
If the file names of the corresponding video files are not consistent, the unique video checking value is received again
Figure BDA0002989372570000158
The video file corresponding to the file name of the corresponding video file;
the following operations are performed on the audio files in the audio file package to be decompressed:
Figure BDA0002989372570000159
wherein, MD () represents a hashing algorithm for performing MD 5;
D t″ "represents the tth audio file to be authenticated in the decompressed audio file packet"; t ″, 1, 2, 3, … …, T ″; t' is the total number of audio files in the decompressed audio file packet;
Figure BDA0002989372570000161
represents the t' audio file D to be authenticated t″ "unique audio verification value obtained after hash algorithm of MD 5;
if the obtained unique audio checking value
Figure BDA0002989372570000162
With a unique audio verification value
Figure BDA0002989372570000163
If the corresponding audio files have consistent file names, the unique audio verification value
Figure BDA0002989372570000164
The corresponding audio file is successfully authenticated and is backed up to a database for storage;
if the obtained unique audio checking value
Figure BDA0002989372570000165
With a unique audio verification value
Figure BDA0002989372570000166
If the file names of the corresponding audio files are not consistent, the unique audio checking value is received again
Figure BDA0002989372570000167
The audio file corresponding to the file name of the corresponding audio file;
the following operations are executed to the audio and video files in the audio and video file decompression package:
Figure BDA0002989372570000168
wherein, MD () represents a hashing algorithm for performing MD 5;
F c″ "denotes the c" audio-video file to be authenticated; c ″, 1, 2, 3, … …, C ″; c' is the total number of the audio and video files in the decompressed audio and video file packet;
Figure BDA0002989372570000169
indicates the c' audio/video file F to be authenticated c″ "unique audio-video verification value obtained after hash algorithm of MD 5;
if the obtained unique audio/video checking value
Figure BDA00029893725700001610
Checking value with unique audio and video
Figure BDA00029893725700001611
Corresponding file name of audio/videoIf the difference is not consistent, the unique audio/video checking value is received again
Figure BDA00029893725700001612
Audio and video files corresponding to the file names of the corresponding audio and video;
if the obtained unique audio/video checking value
Figure BDA00029893725700001613
Checking value with unique audio and video
Figure BDA00029893725700001614
If the corresponding audio and video file names are consistent, the unique audio and video verification value is obtained
Figure BDA00029893725700001615
And if the corresponding audio and video authentication is successful, backing up the audio and video authentication to a database for storage.
In a preferred embodiment of the invention, the following operations are performed for each video file in its decompressed audio file package:
s21, if p is positive odd, the received sequence is:
Figure BDA0002989372570000171
Figure BDA0002989372570000172
wherein the content of the first and second substances,
Figure BDA0002989372570000173
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000174
representing the 2 nd frame video image after the operation,
Figure BDA0002989372570000175
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA0002989372570000176
representing the 4 th frame video image after the operation,
Figure BDA0002989372570000177
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA0002989372570000178
indicating the video image of the 6 th frame, … …,
Figure BDA0002989372570000179
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the received sequence is:
Figure BDA00029893725700001710
Figure BDA00029893725700001711
wherein the content of the first and second substances,
Figure BDA00029893725700001712
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA00029893725700001713
representing the 2 nd frame video image after the operation,
Figure BDA00029893725700001714
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700001715
representing the 4 th frame video image after the operation,
Figure BDA00029893725700001716
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700001717
indicating the video image of the 6 th frame, … …,
Figure BDA00029893725700001718
representing the operated p frame video image
S22, executing the following operations:
Figure BDA00029893725700001719
l is greater than or equal to 1 and less than or equal to
Figure BDA00029893725700001720
Int () represents a rounding function;
wherein the content of the first and second substances,
Figure BDA00029893725700001721
representing the operated 2l frame video image
Figure BDA00029893725700001722
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA00029893725700001723
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video image
Figure BDA00029893725700001724
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure BDA00029893725700001725
representing the 2l frame video image after the operation of the united department cloud platform
Figure BDA00029893725700001726
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
the 2l frame video image is processed
Figure BDA00029893725700001727
Replacement with 2l frame video image
Figure BDA00029893725700001728
S23, obtaining the following result after the step S22:
if p is a positive odd number, then the sequence is
Figure BDA0002989372570000181
Wherein the content of the first and second substances,
Figure BDA0002989372570000182
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA0002989372570000183
representing the 2 nd frame of video image after the operation of the united department cloud platform,
Figure BDA0002989372570000184
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA0002989372570000185
representing the 4 th frame of video image after the operation of the united department cloud platform,
Figure BDA0002989372570000186
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA0002989372570000187
a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,
Figure BDA0002989372570000188
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence is
Figure BDA0002989372570000189
Wherein the content of the first and second substances,
Figure BDA00029893725700001810
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure BDA00029893725700001811
representing the 2 nd frame of video image after the operation of the united department cloud platform,
Figure BDA00029893725700001812
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure BDA00029893725700001813
representing the 4 th frame of video image after the operation of the united department cloud platform,
Figure BDA00029893725700001814
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure BDA00029893725700001815
a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,
Figure BDA00029893725700001816
representing clouds in federated departmentsThe p frame video image after the platform operation;
synthesizing the video files into video files according to the sequence to obtain video synthesized files;
s24, performing the following operations on the video composition file:
Figure BDA00029893725700001817
wherein, MD () represents a hashing algorithm for performing MD 5;
R e ' represents a video composition file corresponding to the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
Figure BDA00029893725700001818
representing a video composition file R e ' unique video check value obtained by the hash algorithm of MD 5; making the checking cycle value e' equal to 1;
s25, judging the unique video identification value
Figure BDA00029893725700001819
And the obtained unique video checking value
Figure BDA00029893725700001820
Whether it is consistent:
if the video identification value is unique
Figure BDA00029893725700001821
And the obtained unique video checking value
Figure BDA00029893725700001822
If yes, e '═ e' +1, go to step S153;
unique video identification value
Figure BDA0002989372570000191
And the obtained unique video checking value
Figure BDA0002989372570000192
If the video identification value is inconsistent with the unique video identification value, e' +1 is received again, and the unique video identification value in the backup file is received again
Figure BDA0002989372570000193
Executing the step S26 for the corresponding video file;
s26, judging the relation between E' and E:
if E' is more than E, the execution is finished;
if E' is less than or equal to E, the process returns to step S25.
In a preferred embodiment of the present invention, the method further includes logging in the cloud platform of the joint department by using a mobile terminal (mobile phone) to view the authentication file stored in the cloud platform database of the joint department. In the embodiment, the method for logging in the cloud platform of the joint department by the mobile terminal comprises the following steps:
s61, if the joint department cloud platform receives the login trigger request, the mobile terminal serial number is obtained;
s62, the following operations are carried out to the obtained mobile terminal serial number:
Figure BDA0002989372570000194
wherein, MD () K A hashing algorithm representing performing MD 5K times; k is the total number of login times;
ID i indicating a mobile terminal serial number;
Figure BDA0002989372570000195
indicating a mobile terminal serial number ID i Obtaining a unique ID value after K times of MD5 hash algorithm;
s63, setting its unique ID value
Figure BDA0002989372570000196
Converting the decimal value into a decimal value, and extracting the number of each digit in the decimal value; when the number of each number is more than 9, capital letters A-Z are used for respectively representing 10-35 in sequence, and the capital letters are divided intoAnd respectively using lower case letters a-z to represent 36-61, arranging the lower case letters from big to small or from small to big, and intercepting the first four digits as registration codes to be sent to the mobile terminal. Assuming that its decimal value is 669785235454181302380, the number of digits is: 20, 21, 2, 3, 24, 3, 5, 2, 6, 1, 7, 3, 8, 1, 9; 3332222211 are arranged from large to small or in sequence, which sends a registration code of 3332. Assuming that its decimal value is 66978523545418130238088888888, the number of digits is: 20, 21, 2, 3, 2, 4, 3, 5, 2, 6, 1, 7, 11, 8, 1, 9; b332222211 is arranged from big to small or in sequence, and the transmitted registration code is B332.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (3)

1. A government affair big data multi-department combined auditing and authenticating working method is characterized by comprising the following steps:
s1, obtaining files to be authenticated, wherein the files to be authenticated comprise audio files or/and video files or/and audio and video files, and putting the files to be authenticated into the same file package to form a file package to be authenticated; processing a file to be authenticated in a file packet to be authenticated and uploading the processed file to a cloud platform of a joint department for authentication;
s2, authenticating the received file information by the cloud platform of the united department; the step S2 includes the following steps:
performing the following operations on the compressed packets it receives:
U u′ =MD(u′),
wherein, MD () represents a hashing algorithm for performing MD 5;
u' represents a received compressed packet;
U u′ the unique compressed packet check value obtained after the received compressed packet u' is subjected to the hash algorithm of MD5 is represented;
determine it is connected toFile name of received compressed package U and obtained unique compressed package verification value U u′ Whether it is consistent:
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the file names are not consistent with the file names of the compressed packets u, the compressed packets corresponding to the file names of the compressed packets u are received again;
if the file name of the received compressed packet U and the obtained unique compressed packet verification value U u′ If the two are consistent, decompressing the received compressed packet u; obtaining a decompressed video file packet, a decompressed audio file packet and a decompressed audio and video file packet;
the following operations are performed on the video files in the video file package to be decompressed:
Figure FDA0003771528590000011
wherein, MD () represents a hashing algorithm for performing MD 5;
R e "indicates the e" video file in the decompressed video file packet; e ″, 1, 2, 3, … …, E ″; e' is the total number of video files in the decompressed video file packet;
Figure FDA0003771528590000012
denotes the e' video file R to be authenticated e "" unique video check value obtained after hash algorithm of MD 5;
if the only video is verified
Figure FDA0003771528590000013
Checking value with unique video
Figure FDA0003771528590000014
If the file names of the corresponding video files are consistent, the video verification value is unique
Figure FDA0003771528590000015
The corresponding video file is successfully authenticated and preparedStoring the shares in a database;
if the only video is verified
Figure FDA0003771528590000021
Checking value with unique video
Figure FDA0003771528590000022
If the file names of the corresponding video files are not consistent, the unique video checking value is received again
Figure FDA0003771528590000023
The video file corresponding to the file name of the corresponding video file;
the following operations are performed on the audio files in the audio file package to be decompressed:
Figure FDA0003771528590000024
wherein, MD () represents a hash algorithm for performing MD 5;
D t "" indicates the t-th audio file to be authenticated in the decompressed audio file packet; t ″ -1, 2, 3, … …, T "; t' is the total number of audio files in the decompressed audio file packet;
Figure FDA0003771528590000025
denotes the t "Audio File to be authenticated D t "" unique audio verification value obtained by the hash algorithm of MD 5;
if the obtained unique audio checking value
Figure FDA0003771528590000026
With a unique audio verification value
Figure FDA0003771528590000027
If the file names of the corresponding audio files are consistent, the unique audio verification value is obtained
Figure FDA0003771528590000028
The corresponding audio file is successfully authenticated and is backed up to a database for storage;
if the obtained unique audio checking value
Figure FDA0003771528590000029
With a unique audio verification value
Figure FDA00037715285900000210
If the file names of the corresponding audio files are not consistent, the unique audio checking value is received again
Figure FDA00037715285900000211
The audio file corresponding to the file name of the corresponding audio file;
the following operations are executed to the audio and video files in the audio and video file decompression package:
Figure FDA00037715285900000212
wherein, MD () represents a hashing algorithm for performing MD 5;
F c "indicates the c" audio and video file to be authenticated; c ″, 1, 2, 3, … …, C ″; c' is the total number of the audio and video files in the decompressed audio and video file packet;
Figure FDA00037715285900000213
indicates the c' audio/video file F to be authenticated c "" unique audio-video check value obtained by the hash algorithm of MD 5;
if the obtained unique audio/video checking value
Figure FDA00037715285900000214
Checking value with unique audio and video
Figure FDA00037715285900000215
If the corresponding audio and video file names are not consistent, the unique audio and video checking value is received again
Figure FDA00037715285900000216
Audio and video files corresponding to the corresponding audio and video file names;
if the obtained unique audio/video checking value
Figure FDA0003771528590000031
Checking value with unique audio and video
Figure FDA0003771528590000032
If the corresponding audio and video file names are consistent, the unique audio and video check value
Figure FDA0003771528590000033
The corresponding audio and video authentication is successful, and the corresponding audio and video authentication is backed up to a database for storage;
further, the following operations are performed for each video file in the video file package to be decompressed:
s21, if p is positive odd, the received sequence is:
Figure FDA0003771528590000034
Figure FDA0003771528590000035
wherein the content of the first and second substances,
Figure FDA0003771528590000036
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA0003771528590000037
representing the 2 nd frame video image after the operation,
Figure FDA0003771528590000038
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure FDA0003771528590000039
representing the 4 th frame video image after the operation,
Figure FDA00037715285900000310
the representation shows that the e-th video file R to be authenticated is e The 5 th frame video image after being converted into the frame video image,
Figure FDA00037715285900000311
indicating the video image of the 6 th frame, … …,
Figure FDA00037715285900000312
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the received sequence is:
Figure FDA00037715285900000313
Figure FDA00037715285900000314
wherein the content of the first and second substances,
Figure FDA00037715285900000315
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA00037715285900000316
representing the 2 nd frame video image after the operation,
Figure FDA00037715285900000317
indicates that the eVideo file R to be authenticated e The 3 rd frame video image after being converted into the frame video image,
Figure FDA00037715285900000318
representing the 4 th frame video image after the operation,
Figure FDA00037715285900000319
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure FDA00037715285900000320
indicating the video image of frame 6, … …,
Figure FDA00037715285900000321
representing the p frame video image after the operation;
s22, executing the following operations:
Figure FDA00037715285900000322
l is greater than or equal to 1 and less than or equal to
Figure FDA00037715285900000323
Int () represents a rounding function;
wherein the content of the first and second substances,
Figure FDA00037715285900000324
representing the operated 2l frame video image
Figure FDA00037715285900000325
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure FDA00037715285900000326
indicating that e-th to-be-authenticated video is to be usedFile R e 2l-1 frame video image after conversion into frame video image
Figure FDA0003771528590000041
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure FDA0003771528590000042
representing 2l frame video image after operation of joint department cloud platform
Figure FDA0003771528590000043
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
the 2l frame video image is processed
Figure FDA0003771528590000044
Replacement with 2l frame video image
Figure FDA0003771528590000045
S23, obtaining the following result after the step S22:
if p is a positive odd number, then the sequence is
Figure FDA0003771528590000046
Wherein the content of the first and second substances,
Figure FDA0003771528590000047
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA0003771528590000048
representing the 2 nd frame of video image after the operation of the united department cloud platform,
Figure FDA0003771528590000049
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure FDA00037715285900000410
representing the 4 th frame of video image after the operation of the united department cloud platform,
Figure FDA00037715285900000411
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure FDA00037715285900000412
a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,
Figure FDA00037715285900000413
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence is
Figure FDA00037715285900000414
Wherein the content of the first and second substances,
Figure FDA00037715285900000415
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA00037715285900000416
representing the 2 nd frame of video image after the operation of the united department cloud platform,
Figure FDA00037715285900000417
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure FDA00037715285900000418
representing the 4 th frame of video image after the operation of the united department cloud platform,
Figure FDA00037715285900000419
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure FDA00037715285900000420
a video image representing the 6 th frame after the operations of the department of association cloud platform, … …,
Figure FDA00037715285900000421
representing a p frame video image after the operation of the joint department cloud platform;
synthesizing the video files into video files according to the sequence to obtain video synthesized files;
s24, performing the following operations on the video composition file:
Figure FDA00037715285900000422
wherein, MD () represents a hashing algorithm for performing MD 5;
R e ' represents a video composition file corresponding to the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
Figure FDA0003771528590000051
representing a video composition file R e ' unique video check value obtained by the hash algorithm of MD 5; making the checking cycle value e' equal to 1;
s25, judging the unique video identification value
Figure FDA0003771528590000052
And the obtained unique video checking value
Figure FDA0003771528590000053
Whether it is consistent:
if the video identification value is unique
Figure FDA0003771528590000054
And the obtained unique video checking value
Figure FDA0003771528590000055
If yes, e '═ e' +1, go to step S153;
unique video identification value
Figure FDA0003771528590000056
And the obtained unique video checking value
Figure FDA0003771528590000057
If the video identification value is inconsistent with the video identification value, e' +1, the backup file is received again and the unique video identification value is used for the backup file
Figure FDA0003771528590000058
Executing the step S26 for the corresponding video file;
s26, judging the relation between E' and E:
if E' is more than E, the execution is finished;
if E' is less than or equal to E, the process returns to step S25.
2. The government affair big data multi-department joint audit certification working method according to claim 1, wherein the step S1 includes the steps of:
s11, numbering files to be authenticated in the file package to be authenticated, wherein the files to be authenticated are a 1 st file to be authenticated, a 2 nd file to be authenticated, a 3 rd file to be authenticated, … … nd file to be authenticated, and Q is a positive integer greater than or equal to 1 and is the total number of the files to be authenticated in the file package to be authenticated; making the circulation quantity q equal to 1;
s12, classifying the file types of the files to be authenticated in the file package to be authenticated:
if W q For audio files, W q If the q-th file to be authenticated is represented, establishing a file packet to be authenticated in the file packet to be authenticated, and establishing a file W to be authenticated in the q-th file to be authenticated q Putting the audio file into an established audio file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio file packet q
If W q For video files, W q If the q-th file to be authenticated is represented, a video file packet to be authenticated is established in the file packet to be authenticated, and the q-th file W to be authenticated is added q Putting the video file into the established video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated video file packet q
If W q Being an audio-video file, W q If the q-th file to be authenticated is represented, establishing an audio/video file packet to be authenticated in the file packet to be authenticated, and enabling the q-th file W to be authenticated q Putting the audio/video file to be authenticated into the established audio/video file packet to be authenticated through copying and pasting operations; the q-th document W to be authenticated q Screening out the q < th > to-be-authenticated file W after being put into the established to-be-authenticated audio/video file packet q
S13, judging the relation between the circulation quantity Q and the total number Q of the files to be authenticated in the file package to be authenticated:
if Q is greater than or equal to Q, executing step S14;
if Q is less than Q, Q is Q +1, and the process returns to step S12;
s14, comprising one or any combination of steps S141-S143:
s141, numbering video files to be authenticated in a video file package to be authenticated, sequentially and respectively including a 1 st video file to be authenticated, a 2 nd video file to be authenticated, a 3 rd video file to be authenticated, … … and an E th video file to be authenticated, wherein E is a positive integer greater than or equal to 1 and is the total number of the video files to be authenticated in the video file package to be authenticated; executing the following operations on all video files to be authenticated:
Figure FDA0003771528590000061
wherein, MD () represents a hashing algorithm for performing MD 5;
R e representing the e-th video file to be authenticated; e is 1, 2, 3, … …, E;
Figure FDA0003771528590000062
represents the e-th video file R to be authenticated e Obtaining a unique video identification value through the hash algorithm of MD 5;
identifying a value for a unique video
Figure FDA0003771528590000063
As its e-th to-be-authenticated video file R e The file name of (2);
s142, numbering the audio files to be authenticated in the audio file package to be authenticated, sequentially and respectively arranging a 1 st audio file to be authenticated, a 2 nd audio file to be authenticated, a 3 rd audio file to be authenticated, … … and a Tth audio file to be authenticated, wherein T is a positive integer greater than or equal to 1 and is the total number of the audio files to be authenticated in the audio file package to be authenticated; the following operations are executed on all audio files to be authenticated:
Figure FDA0003771528590000064
wherein, MD () represents a hashing algorithm for performing MD 5;
D t representing the tth audio file to be authenticated; t is 1, 2, 3, … …, T;
Figure FDA0003771528590000071
representing the tth audio file D to be authenticated t Obtaining a unique audio identification value through the hash algorithm of MD 5;
identify a value for a unique audio
Figure FDA0003771528590000072
As its t-th to-be-authenticated audio file D t The file name of (2);
s143, numbering audio and video files to be authenticated in the audio and video file package to be authenticated, wherein the audio and video files to be authenticated are a 1 st audio and video file to be authenticated, a 2 nd audio and video file to be authenticated, a 3 rd audio and video file to be authenticated, … … and a C audio and video file to be authenticated respectively, C is a positive integer greater than or equal to 1, and is the total number of the audio and video files to be authenticated in the audio and video file package to be authenticated; the following operations are executed on all audio and video files to be authenticated:
Figure FDA0003771528590000073
wherein, MD () represents a hashing algorithm for performing MD 5;
F c representing the audio/video file to be authenticated; c is 1, 2, 3, … …, C;
Figure FDA0003771528590000074
showing the c audio and video file F to be authenticated c Obtaining a unique audio and video identification value through a hash algorithm of MD 5;
unique audio and video identification value
Figure FDA0003771528590000075
As the c-th audio/video file F to be authenticated c The file name of (2);
s15, compressing the file package to be authenticated to generate a compressed package, and executing the following operations on the compressed package:
U u =MD(u),
wherein, MD () represents a hashing algorithm for performing MD 5;
u represents a compressed packet;
U u representing the unique compressed packet identification value obtained by the compressed packet u through the hash algorithm of MD 5;
the unique compressed packet identification value U is added u As compression thereofThe file name of package u;
and S16, uploading the processed compressed packet to a cloud platform of the joint department.
3. The government affair big data multi-department joint audit certification working method according to claim 1, wherein the step S141 comprises the steps of:
s1410, using the unique video identification value in the video file package to be authenticated
Figure FDA0003771528590000076
Establishing a video folder to be authenticated for the folder name;
s1411, the e-th video file R to be authenticated is added e Converting into frame video images in sequence from first to last according to playing time
Figure FDA0003771528590000081
Figure FDA0003771528590000082
Indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA0003771528590000083
indicates that the e-th video file R to be authenticated is to be e The 2 nd frame video image after being converted into the frame video image,
Figure FDA0003771528590000084
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image, … …,
Figure FDA0003771528590000085
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image; p is the e-th video file R to be authenticated e Converting the frame video image into all the number of the frame video images;
s1412, perform the following operations on the frame video image:
Figure FDA0003771528590000086
l is greater than or equal to 1 and less than or equal to
Figure FDA0003771528590000087
Int () represents a rounding function;
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0003771528590000088
indicates that the e-th video file R to be authenticated is to be e The 2l frame video image after being converted into the frame video image
Figure FDA0003771528590000089
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure FDA00037715285900000810
indicates that the e-th video file R to be authenticated is to be e 2l-1 frame video image after conversion into frame video image
Figure FDA00037715285900000811
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
Figure FDA00037715285900000812
representing the operated 2l frame video image
Figure FDA00037715285900000813
At the coordinate point (X) x ,Y y ) The corresponding pixel value;
the e-th video file R to be authenticated e 2l frame video image after being converted into frame video image
Figure FDA00037715285900000814
Replacement with 2l frame video image
Figure FDA00037715285900000815
S1413, in step S1412, the following result is obtained:
if p is a positive odd number, then the sequence is
Figure FDA00037715285900000816
Wherein the content of the first and second substances,
Figure FDA00037715285900000817
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA00037715285900000818
representing the 2 nd frame video image after the operation,
Figure FDA00037715285900000819
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure FDA00037715285900000820
representing the 4 th frame video image after the operation,
Figure FDA00037715285900000821
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure FDA00037715285900000822
indicating the video image of the 6 th frame, … …,
Figure FDA00037715285900000823
indicates that the e-th video file R to be authenticated is to be e The video image of the p frame after being converted into the frame video image;
if p is a positive even number, the sequence is
Figure FDA0003771528590000091
Wherein the content of the first and second substances,
Figure FDA0003771528590000092
indicates that the e-th video file R to be authenticated is to be e The 1 st frame video image after being converted into the frame video image,
Figure FDA0003771528590000093
representing the 2 nd frame video image after the operation,
Figure FDA0003771528590000094
indicates that the e-th video file R to be authenticated is to be e The 3 rd frame video image after being converted into the frame video image,
Figure FDA0003771528590000095
representing the 4 th frame video image after the operation,
Figure FDA0003771528590000096
indicating that e-th video file R to be authenticated is to be e The 5 th frame video image after being converted into the frame video image,
Figure FDA0003771528590000097
indicating the video image of the 6 th frame, … …,
Figure FDA0003771528590000098
representing the p frame video image after operation;
s1414, storing the frame video image obtained in the step S1413 with a unique video identification value
Figure FDA0003771528590000099
The video folder to be authenticated is the name of the folder, and the video folder is identified by a unique video identification value
Figure FDA00037715285900000910
As its e-th to-be-authenticated video file R e The file name of (2) is cut into the backup file.
CN202110310148.5A 2021-03-23 2021-03-23 Multi-department combined auditing and authenticating working method for government affair big data Active CN113141351B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110310148.5A CN113141351B (en) 2021-03-23 2021-03-23 Multi-department combined auditing and authenticating working method for government affair big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110310148.5A CN113141351B (en) 2021-03-23 2021-03-23 Multi-department combined auditing and authenticating working method for government affair big data

Publications (2)

Publication Number Publication Date
CN113141351A CN113141351A (en) 2021-07-20
CN113141351B true CN113141351B (en) 2022-09-20

Family

ID=76811606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110310148.5A Active CN113141351B (en) 2021-03-23 2021-03-23 Multi-department combined auditing and authenticating working method for government affair big data

Country Status (1)

Country Link
CN (1) CN113141351B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205645B (en) * 2021-12-10 2024-06-14 北京凯视达信息技术有限公司 Distributed video content auditing method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788309A (en) * 2018-12-25 2019-05-21 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IN2015KN00466A (en) * 2012-08-03 2015-07-17 Vasco Data Security Int Gmbh
CN109660822A (en) * 2018-12-17 2019-04-19 深圳市睿智物联科技有限公司 A kind of method and system that long-range control LED Architectural Media screen preview plays
CN110113168B (en) * 2019-04-03 2022-04-22 厦门历思科技服务有限公司 Information authentication method, client, system and computer readable storage medium
CN111309699A (en) * 2020-01-15 2020-06-19 张文龙 Content sharing method and system based on point-to-point distributed file system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788309A (en) * 2018-12-25 2019-05-21 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology

Also Published As

Publication number Publication date
CN113141351A (en) 2021-07-20

Similar Documents

Publication Publication Date Title
CN111600720B (en) Data processing method, device and equipment based on block chain and readable storage medium
US11418677B2 (en) Method for preventing image modification, image capturing device and image verification method
CN1528052B (en) Method and system for providing a context for message compression
KR20190130479A (en) System for compressing and restoring picture based on AI
CN111885133B (en) Block chain-based data processing method and device and computer storage medium
CN113141351B (en) Multi-department combined auditing and authenticating working method for government affair big data
CN112788270B (en) Video backtracking method, device, computer equipment and storage medium
CN113656661B (en) Mobile government affair system based on natural language recognition
CN113645203A (en) Real estate registration and bank deep fusion method
US20170034303A1 (en) Methods and apparatus to create and transmit a condensed logging data file
CN113821536B (en) Data processing method, device and equipment based on block chain and readable storage medium
CN115249276A (en) Image compression method, image compression device, electronic equipment and storage medium
CN105518697A (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
CN113179450B (en) Working method for analyzing urban operation management in big data environment
CN103631675A (en) Method of system recovery of client device, wireless connection device and computer program
CN112559546B (en) Database synchronization method, database synchronization device, computer equipment and readable storage medium
CN109461201A (en) Image processing method and device, electronic equipment, computer readable storage medium
CN115248940A (en) Video evidence storing method, verification method and device based on block chain
CN113179249A (en) Method for rapidly and safely mining government affair data in big data network
CN117240498B (en) Intelligent big data platform interactive cloud control method
CN112669396B (en) Lossless image compression method and device
CN113505137B (en) Real estate space graph updating method
CN117742581A (en) Lightweight data management method
CN115002079B (en) Short address generation method, device, equipment and storage medium
CN108696528B (en) Data transmission method, terminal, acquisition platform and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant