CN114826744A - Information processing method, device, equipment and storage medium - Google Patents
Information processing method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN114826744A CN114826744A CN202210459873.3A CN202210459873A CN114826744A CN 114826744 A CN114826744 A CN 114826744A CN 202210459873 A CN202210459873 A CN 202210459873A CN 114826744 A CN114826744 A CN 114826744A
- Authority
- CN
- China
- Prior art keywords
- information
- verification video
- spectrum data
- audio track
- frequency spectrum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 48
- 238000003672 processing method Methods 0.000 title claims abstract description 19
- 238000012795 verification Methods 0.000 claims abstract description 126
- 238000001228 spectrum Methods 0.000 claims abstract description 86
- 238000000034 method Methods 0.000 claims abstract description 48
- 230000005540 biological transmission Effects 0.000 claims abstract description 17
- 238000004590 computer program Methods 0.000 claims description 24
- 230000015654 memory Effects 0.000 claims description 23
- 238000005516 engineering process Methods 0.000 claims description 13
- 238000000605 extraction Methods 0.000 claims description 7
- 230000003595 spectral effect Effects 0.000 claims description 7
- 238000004458 analytical method Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 15
- 230000006870 function Effects 0.000 description 13
- 230000008569 process Effects 0.000 description 11
- 238000012545 processing Methods 0.000 description 11
- 238000012015 optical character recognition Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000033228 biological regulation Effects 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/439—Processing of audio elementary streams
- H04N21/4394—Processing of audio elementary streams involving operations for analysing the audio stream, e.g. detecting features or characteristics in audio streams
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Biomedical Technology (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The embodiment of the specification provides an information processing method, an information processing device, information processing equipment and a storage medium, and can be used in the technical field of network security. The method comprises the steps of obtaining verification video and privacy information input by a client; extracting audio track information from the verification video; determining spectrum data of the privacy information; writing the frequency spectrum data into the audio track information to obtain a target verification video; and transmitting the target verification video to a target system. By utilizing the embodiment of the specification, the privacy of the client can be effectively protected, and the safety of information transmission is improved.
Description
Technical Field
The present application relates to the field of network security technologies, and in particular, to an information processing method, apparatus, device, and storage medium.
Background
At present, when a customer carries out online transaction at a bank, information is mainly transmitted through a traditional HTTP/HTTPS message. However, with this way of transmitting information, a password field exists regardless of whether the information is encrypted or not. Therefore, if the transmission information is intercepted, the privacy of the client can be leaked, and great risk is brought to the privacy security of the client.
Therefore, there is a need for a solution to the above technical problems.
Disclosure of Invention
The embodiment of the specification provides an information processing method, an information processing device, information processing equipment and a storage medium, which can effectively protect the privacy of a client and improve the safety of transmitted information.
The information processing method, device, equipment and storage medium provided by the specification are realized in the following modes.
An information processing method comprising: acquiring verification video and privacy information input by a client; extracting audio track information from the verification video; determining spectrum data of the privacy information; writing the frequency spectrum data into the audio track information to obtain a target verification video; and transmitting the target verification video to a target system.
In some embodiments, determining spectral data of the private information comprises: calculating a hash value of the private information; determining frequency spectrum data corresponding to each character in the hash value; and determining the spectrum data of the privacy information based on the spectrum data corresponding to each character in the hash value.
In some embodiments, the determining the spectrum data corresponding to each character in the hash value includes: acquiring a preset character set from a block chain; the preset character set comprises a corresponding relation between characters and frequency spectrum data; and determining the frequency spectrum data corresponding to each character in the hash value according to the corresponding relation between the character and the frequency spectrum data.
In some embodiments, further comprising: storing the hash value of the private information into a blockchain.
An information processing method comprising: receiving a target verification video; the target verification video is obtained according to the verification video and the privacy information input by the client; extracting audio track information from the target verification video; acquiring frequency spectrum data corresponding to the audio track information; and analyzing the frequency spectrum data to obtain privacy information included in the target verification video.
In some embodiments, the analyzing the spectrum data to obtain the privacy information included in the target verification video includes: analyzing the spectrum data by using an OCR technology to obtain a hash value corresponding to the privacy information; and obtaining privacy information according to the hash value.
In some embodiments, further comprising: judging whether a hash value corresponding to the privacy information exists in a block chain; and if so, performing business transaction.
An information processing apparatus comprising: the acquisition module is used for acquiring the verification video and the privacy information input by the client; the extraction module is used for extracting the audio track information from the verification video; the determining module is used for determining the frequency spectrum data of the privacy information; the obtaining module is used for writing the frequency spectrum data into the audio track information to obtain a target verification video; and the transmission module is used for transmitting the target verification video to a target system.
An information processing apparatus includes: the receiving module is used for receiving the target verification video; the target verification video is obtained according to the verification video and the privacy information input by the client; the extraction module is used for extracting the audio track information from the target verification video; the acquisition module is used for acquiring the frequency spectrum data corresponding to the audio track information; and the analysis module is used for analyzing the frequency spectrum data to obtain privacy information included in the target verification video.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any one of the method embodiments of the present description when executing the computer program.
A computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any one of the method embodiments in the present specification.
A computer program product comprising a computer program that, when executed by a processor, performs the steps of any one of the method embodiments in the present specification.
The specification provides an information processing method, an information processing device, information processing equipment and a storage medium. Some embodiments can obtain verification video and privacy information input by a client, extract audio track information from the verification video, and determine frequency spectrum data of the privacy information; the frequency spectrum data can be written into the audio track information to obtain a target verification video, and the target verification video is transmitted to a target system. In the information processing process, the privacy information is transmitted by combining the audio frequency domain steganography technology, so that even if the verification information is intercepted in the information transmission process, the password trace cannot be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a schematic diagram of a scenario of an information handling system provided herein;
FIG. 2 is a flow diagram illustrating one embodiment of an information processing method provided herein;
FIG. 3 is a schematic flow chart diagram illustrating one embodiment of another information handling method provided herein;
FIG. 4 is a block diagram of an embodiment of an information processing apparatus provided in the present specification;
FIG. 5 is a block diagram of another embodiment of an information processing apparatus provided in the present specification;
fig. 6 is a block diagram of a hardware configuration of an embodiment of an information processing server provided in the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments in the present specification, and not all of the embodiments. All other embodiments that can be obtained by a person skilled in the art based on one or more embodiments of the present disclosure without making any creative effort shall fall within the protection scope of the embodiments of the present disclosure.
As will be appreciated by one skilled in the art, implementations of the embodiments of the present description may be embodied as a system, an apparatus, a method, or a computer program product. Therefore, the disclosure of the embodiments of the present specification can be embodied in the following forms: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
Although the flow described below includes operations that occur in a particular order, it should be appreciated that the processes may include more or less operations that are performed sequentially or in parallel (e.g., using parallel processors or a multi-threaded environment).
As shown in fig. 1, which is a schematic view of a scenario of an information processing system provided in this specification, the information processing system may include: a terminal device 101 and a server 102. In particular, the client may initiate an information processing request to the terminal device 101. After receiving the information processing request, the terminal device 101 may acquire the verification video and the privacy information input by the client, extract the audio track information from the verification video, and determine the spectrum data of the privacy information. Further, the spectrum data may be written into the audio track information, a target verification video is obtained, and the target verification video is transmitted to the server 102. Upon receiving the target verification video, the server 102 may extract the audio track information from the target verification video. Then, spectrum data corresponding to the audio track information may be obtained, and the spectrum data is analyzed to obtain privacy information included in the target verification video. In the information processing process, the privacy information is transmitted by combining the audio frequency domain steganography technology, so that even if the verification information is intercepted in the information transmission process, the password trace cannot be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
The terminal device 101 may be a terminal device or software used for a client operation. Specifically, the terminal device may be a terminal device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart watch, or other wearable devices, or may be a robot device. Of course, the terminal apparatus 101 may be software that can be run in the above terminal apparatus. For example: system applications, payment applications, browsers, wechat applets, and the like.
The server 102 may be a single server or a server cluster, and certainly, the functions of the server may also be implemented by a cloud computing technology. The server 102 may be connected to a plurality of terminal devices, or may be a server having a powerful information repository.
The following describes an embodiment of the present disclosure with a specific application scenario as an example. Specifically, fig. 2 is a schematic flowchart of an embodiment of an information processing method provided in this specification. Although the present specification provides the method steps or apparatus structures as shown in the following examples or figures, more or less steps or modules may be included in the method or apparatus structures based on conventional or non-inventive efforts.
It should be noted that, in the technical solution of the present application, the acquisition, storage, use, processing, etc. of data all conform to the relevant regulations of the national laws and regulations. The following embodiments are described from the perspective of a terminal device, and do not limit other technical solutions in the extensible application scenario based on the present specification. Specifically, as shown in fig. 2, an information processing method provided in the present specification may include the following steps.
S20: and acquiring the verification video and the privacy information input by the client.
The verification video may be a lip language identification video, and may also be other videos used for verification, which is not limited in this specification. Audio track information may be included in the verification video. Private information may also be referred to as sensitive information. Some sensitive characters, such as passwords, identification marks, etc., may be included in the private information.
In some embodiments, the terminal device may prompt the customer to record a verification video and then obtain the verification video entered by the customer. In other embodiments, the terminal device may obtain the verification video prerecorded by the client from the local, and may also obtain the verification video prerecorded by the client from a third-party organization, which is not limited in this specification. Wherein the third party authority may be a device communicating with the terminal device.
In some embodiments, the client may enter the private information based on a prompt from the terminal device. The client can input the privacy information in the modes of voice, keyboard, touch screen, card swiping and the like. In some implementation scenarios, if the user inputs the private information in a voice manner, the private information can be converted into a text form after being acquired, which is convenient for subsequent processing.
S22: extracting audio track information from the verification video.
In the embodiment of the present specification, after the verification video input by the client is acquired, the audio track information may be extracted from the verification video. The tracks can be understood as parallel "tracks" of one strip as seen in sequencer software. The soundtrack information may be understood as an audio file extracted from the verification video. One or more audio tracks may be extracted from the verification video, each corresponding to audio track information. The track information for each track may include attributes of the track such as the timbre, the timbre library, the number of channels, the input/output ports, the volume, etc. of the track.
In some embodiments, pre-set software may be utilized to extract the soundtrack information from the verification video. Therein, preset software may be used to extract tracks from the video, for example, racoon track extraction software, authacy, etc. Audacity is a free piece of audio processing software. Of course, the above description is only exemplary, and the way of extracting the audio track information from the verification video is not limited to the above examples, and other modifications are possible for those skilled in the art in light of the technical spirit of the present application, but all that can be achieved by the method and the device are covered by the scope of the present application as long as the functions and effects are the same as or similar to those of the present application.
S24: and determining the spectrum data of the privacy information.
In this embodiment of the present specification, after obtaining the private information input by the client, spectrum data of the private information may be determined.
In some embodiments, determining the spectrum data of the private information may include: calculating a hash value of the private information; determining frequency spectrum data corresponding to each character in the hash value; and determining the spectrum data of the privacy information based on the spectrum data corresponding to each character in the hash value.
In some embodiments, the determining the spectrum data corresponding to each character in the hash value may include: acquiring a preset character set from a block chain; the preset character set comprises a corresponding relation between characters and frequency spectrum data; and determining the frequency spectrum data corresponding to each character in the hash value according to the corresponding relation between the character and the frequency spectrum data. The blockchain is a decentralized, non-falsifiable and credible distributed account book and has the characteristics of non-falsification, whole-course trace retention, traceability, public transparency, collective maintenance and the like.
Specifically, for example, in some implementation scenarios, a large number of characters may be collected first, spectrum data corresponding to each character may be determined, then a preset character set may be generated according to a correspondence between the characters and the spectrum data, and finally, the collected characters and the preset character set may be stored in a block chain for subsequent query.
Further, after the private information input by the client is obtained, a hash value of the private information can be calculated, then characters corresponding to the hash value are inquired in the block chain, and then, according to a preset character set, spectrum data corresponding to each character in the hash value is determined, so that the spectrum data corresponding to the private information is determined.
In some embodiments, after obtaining the hash value of the private information, the hash value of the private information may also be stored in the blockchain for subsequent verification, thereby improving data security.
In the embodiment of the specification, the block chain is used for storing the character spectrum data, the hash value and the like, so that tampering can be prevented, and the security is improved.
S26: and writing the frequency spectrum data into the audio track information to obtain a target verification video.
In this embodiment of the present specification, after extracting audio track information from a verification video and determining spectrum data of privacy information, the spectrum data may be steganographically written into the audio track information to obtain a target verification video. Wherein the target verification video may be understood as a video to be transmitted to the target system. Sensitive information of a client is hidden in the target verification video. When the target verification video is intercepted, the password field is not displayed, and only one common data packet for transmitting the video is displayed. Steganography is a way of hiding information, which is understood to be the delivery of events or content of information that do not let anyone other than the intended recipient know the information.
In some embodiments, writing the spectrum data into the audio track information to obtain a target verification video may include: acquiring a spectrogram corresponding to the audio track information; writing the frequency spectrum data of the privacy information into the frequency spectrum graph to obtain a target frequency spectrum graph; and obtaining a target verification video according to the target spectrogram. The spectrogram of an audio file can be understood as a graph describing the frequency and energy of a signal. Visible characters or patterns can be formed by modifying the spectrogram of the audio file, the influence of the modification result on the audio file is very weak, and people cannot recognize information on the spectrogram only by playing the audio file.
S28: and transmitting the target verification video to a target system.
In this embodiment of the present description, after a target verification video is obtained, the target verification video may be uploaded to a target system. The target system can be a background system, a server and the like.
In some embodiments, the manner of transmitting the target verification video to the target system may be one or more of wired, wireless, and the like, which is not limited in this specification.
In some embodiments, the target system may extract audio track information from the target verification video after obtaining the target verification video. Further, spectrum data corresponding to the audio track information can be obtained, the spectrum data are analyzed, privacy information included in the target verification video is obtained, and therefore secret transmission of the sensitive information is completed.
The embodiment of the specification can transmit the sensitive information of the client in a concealed mode when the verification video is transmitted, and even if the sensitive information is intercepted, the sensitive information such as the password input by the client is difficult to obtain.
The embodiment of the specification can be applied to the fields of finance, information transmission and the like. For example, a spectrogram of an audio file may be used to hide sensitive information transmissions in a financial transaction scenario.
In the embodiment of the specification, the hash value corresponding to the private information is stored by using the block chain, and multiple times of verification are performed, so that data can be effectively prevented from being tampered, and the data security is improved.
In the embodiment of the specification, the privacy information is transmitted by combining an OCR technology with an audio frequency domain steganography technology, so that if the transmitted information is intercepted, the transmitted information is unknown due to the fact that no password field exists, the security of the transmitted information can be improved, and the privacy of a client can be effectively protected.
It is to be understood that the foregoing is only exemplary, and the embodiments of the present disclosure are not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the present disclosure, and the scope of the present disclosure is intended to be covered by the claims as long as the functions and effects achieved by the embodiments are the same as or similar to the present disclosure.
The above embodiments describe the implementation of the information processing method from the terminal device perspective. Based on the description of the above embodiments, the present specification also provides an information processing method described from the server perspective. Fig. 3 is a schematic flow chart of an embodiment of another information processing method provided in this specification. Specifically, in one embodiment, the method may include the following steps.
S30: receiving a target verification video; the target verification video is obtained according to the verification video and the privacy information input by the client;
s32: extracting audio track information from the target verification video;
s34: acquiring frequency spectrum data corresponding to the audio track information;
s36: and analyzing the frequency spectrum data to obtain privacy information included in the target verification video.
The target verification video may be obtained based on the foregoing steps S20-S26, which are not described herein again. The way of extracting the audio track information from the target verification video is similar to the way of extracting the audio track information from the verification video in step S22, and may refer to each other, which is not described herein again.
In some embodiments, after extracting the audio track information from the target verification video, the spectral data corresponding to the audio track information may be obtained. The spectral data corresponding to the audio track information may be understood as a spectrogram corresponding to the audio track information.
In some embodiments, the analyzing the spectrum data to obtain the privacy information included in the target verification video may include: analyzing the spectrum data by using an OCR technology to obtain a hash value corresponding to the privacy information; and obtaining privacy information according to the hash value. Among them, OCR (Optical Character Recognition) refers to a process in which an electronic device (e.g., a scanner or a digital camera) checks a Character printed on paper, determines its shape by detecting dark and light patterns, and then translates the shape into a computer text by a Character Recognition method.
For example, in some implementation scenarios, after obtaining a spectrogram corresponding to audio track information, the spectrogram may be analyzed by using an OCR technique to obtain a hash value of sensitive information hidden in the spectrogram. Further, the hidden sensitive information in the spectrogram can be determined according to the hash value.
In some embodiments, after the hash value corresponding to the privacy information is obtained, it may be further determined whether the hash value corresponding to the privacy information exists in the block chain, and in the presence, a service transaction may be performed. In some implementation scenarios, if the hash value corresponding to the private information does not exist in the blockchain, it indicates that the data is tampered, and at this time, the service transaction may be denied.
Specifically, for example, after the lip language verification video is sent to the background system, the background system may extract the audio track information, analyze a spectrogram corresponding to the audio track information by using an OCR technology, and obtain a hash value of the sensitive information. Further, the obtained hash value may be compared with the hash values stored in the block chain, and if the results are consistent, the service processing is performed, and if the results are inconsistent, it is described that the data is tampered, and at this time, the service transaction may be rejected.
It should be noted that, in the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. For the relevant points, reference may be made to some descriptions of other method embodiments, which are not described in detail herein.
From the above description, it can be seen that, in the embodiment of the application, the verification video and the privacy information input by the client can be obtained, the audio track information is extracted from the verification video, and the spectrum data of the privacy information is determined; the frequency spectrum data can be written into the audio track information to obtain a target verification video, and the target verification video is transmitted to a target system. In the information processing process, the privacy information is transmitted by combining the audio frequency domain steganography technology, so that even if the verification information is intercepted in the information transmission process, the password trace cannot be seen due to the absence of the password field, the privacy of the client can be effectively protected, and the privacy safety of the client is greatly guaranteed.
It is to be understood that the foregoing is only exemplary, and the embodiments of the present disclosure are not limited to the above examples, and other modifications may be made by those skilled in the art within the spirit of the present disclosure, and the scope of the present disclosure is intended to be covered by the claims as long as the functions and effects achieved by the embodiments are the same as or similar to the present disclosure. The above-described terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded. Furthermore, the references to "first" and "second" above are intended merely to distinguish between different results and have no actual meaning.
Based on the information processing method, an embodiment of the present specification further provides an information processing apparatus. As shown in fig. 4, in a software level, the information processing apparatus provided in the present specification may include: the system comprises an acquisition module 400, an extraction module 402, a determination module 404, an acquisition module 406 and a transmission module 408.
The obtaining module 400 may be configured to obtain a verification video and privacy information input by a client;
an extraction module 402, which may be configured to extract audio track information from the verification video;
a determining module 404, which may be configured to determine spectrum data of the privacy information;
an obtaining module 406, configured to write the spectrum data into the audio track information, so as to obtain a target verification video;
a transmission module 408 may be configured to transmit the target verification video to a target system.
In some embodiments, the determining module 404 may include:
a calculation unit operable to calculate a hash value of the private information;
a first determining unit, configured to determine spectral data corresponding to each character in the hash value;
the second determining unit may be configured to determine the spectrum data of the privacy information based on the spectrum data corresponding to each character in the hash value.
In some embodiments, the first determining unit may include:
an obtaining unit, configured to obtain a preset character set from a block chain; the preset character set comprises a corresponding relation between characters and frequency spectrum data;
the third determining unit may be configured to determine, according to a correspondence between a character and spectrum data, spectrum data corresponding to each character in the hash value.
In some embodiments, it may further include:
a storage unit, which may be configured to store the hash value of the privacy information into a blockchain.
As shown in fig. 5, in a software level, another information processing apparatus provided in the present specification may include: the system comprises a receiving module 500, an extracting module 502, an obtaining module 504 and an analyzing module 506.
A receiving module 500, which may be configured to receive a target verification video; the target verification video is obtained according to the verification video and the privacy information input by the client;
an extraction module 502, which may be configured to extract audio track information from the target verification video;
an obtaining module 504, configured to obtain frequency spectrum data corresponding to the audio track information;
an analysis module 506, configured to analyze the spectrum data to obtain privacy information included in the target verification video.
In some embodiments, the analysis module 506 may include:
the analysis unit may be configured to analyze the spectrum data by using an OCR technology to obtain a hash value corresponding to the privacy information;
an obtaining unit, configured to obtain the privacy information according to the hash value.
In some embodiments, it may further include:
the judging unit may be configured to judge whether a hash value corresponding to the privacy information exists in a block chain;
and the transaction unit can be used for performing business transaction under the existing condition.
It should be noted that the above-mentioned apparatus may also include other embodiments according to the description of the method embodiment. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
As can be seen from the above, according to the information processing apparatus provided in the embodiments of the present specification, in the information processing process, the audio frequency domain steganography technology is combined to transmit the private information, so that even if the verification information is intercepted, no password trace can be seen due to the absence of the password field in the information transmission process, the privacy of the client can be effectively protected, and great guarantee is brought to the privacy security of the client.
It should be noted that, the units, devices, modules, etc. illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. It is to be understood that, in implementing the present specification, functions of each module may be implemented in one or more pieces of software and/or hardware, or a module that implements the same function may be implemented by a combination of a plurality of sub-modules or sub-units, or the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The embodiments of the present specification further provide an information processing apparatus, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the steps of any one of the method embodiments in the embodiments of the present specification may be implemented. For example, the following steps may be included: acquiring verification video and privacy information input by a client; extracting audio track information from the verification video; determining spectrum data of the privacy information; writing the frequency spectrum data into the audio track information to obtain a target verification video; and transmitting the target verification video to a target system.
In order to more accurately complete the above instructions, the present specification further provides a server, which may be the information processing apparatus or the information processing device in the above embodiments. As shown in fig. 6, which is a block diagram of a hardware structure of an embodiment of an information processing server provided in the present specification, the server 10 may include one or more (only one shown in the figure) processors 100 (the processors 100 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory 200 for storing data, and a transmission module 300 for a communication function. It will be understood by those skilled in the art that the structure shown in fig. 6 is only an illustration and is not intended to limit the structure of the electronic device. For example, the server 10 may also include more or fewer components than shown in FIG. 6, and may also include other processing hardware, such as a database or multi-level cache, a GPU, or have a different configuration than shown in FIG. 6, for example.
The memory 200 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the information processing method in the embodiments of the present specification, and the processor 100 executes various functional applications and data processing by executing the software programs and modules stored in the memory 200. Memory 200 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 200 may further include memory located remotely from processor 100, which may be connected to a computer terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 300 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal. In one example, the transmission module 300 includes a Network adapter (NIC) that can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission module 300 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
The present specification also provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of any one of the method embodiments of the specification. For example, the following steps may be included: acquiring verification video and privacy information input by a client; extracting audio track information from the verification video; determining spectrum data of the privacy information; writing the frequency spectrum data into the audio track information to obtain a target verification video; and transmitting the target verification video to a target system.
In this embodiment, the storage medium may include a physical device for storing information, and the information is usually digitized and stored in a medium using an electric, magnetic, or optical method. The storage medium may include: devices that store information using electrical energy, such as: various memories, such as Random Access Memory (RAM), Read-Only Memory (ROM), etc.; devices that store information using magnetic energy, such as: hard disks, floppy disks, tapes, core memory, bubble memory, U disks, etc.; devices for storing information optically, such as: CD or DVD, etc. Of course, there are other ways of storing media that can be read, e.g., quantum memory, graphene memory, etc.
The embodiments of the present specification also provide a computer program product comprising a computer program that, when executed by a processor, can implement the steps of any one of the method embodiments of the present specification. For example, the following steps may be included: acquiring verification video and privacy information input by a client; extracting audio track information from the verification video; determining spectrum data of the privacy information; writing the frequency spectrum data into the audio track information to obtain a target verification video; transmitting the target verification video to a target system.
It should be noted that the above-mentioned apparatuses, devices, computer-readable storage media, computer program products and descriptions of embodiments according to methods or apparatuses may also include other embodiments. The specific implementation manner may refer to the description of the related method embodiment, and is not described in detail herein.
Because embodiments of the present invention may be provided as a method, apparatus (system), computer program product, or the like, it will be apparent to those skilled in the art that the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects.
It is apparent that specific embodiments of the present specification have been described above. It is to be understood that the above description is intended to be illustrative, and not restrictive. Many embodiments and many applications other than the examples provided will be apparent to those of skill in the art upon reading the above description. The scope of embodiments of the present specification should, therefore, be determined not with reference to the above description, but should instead be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Furthermore, the present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (12)
1. An information processing method characterized by comprising:
acquiring verification video and privacy information input by a client;
extracting audio track information from the verification video;
determining spectrum data of the privacy information;
writing the frequency spectrum data into the audio track information to obtain a target verification video;
and transmitting the target verification video to a target system.
2. The method of claim 1, wherein determining spectral data of the private information comprises:
calculating a hash value of the private information;
determining frequency spectrum data corresponding to each character in the hash value;
and determining the spectrum data of the privacy information based on the spectrum data corresponding to each character in the hash value.
3. The method of claim 2, wherein the determining spectral data corresponding to each character of the hash value comprises:
acquiring a preset character set from a block chain; the preset character set comprises a corresponding relation between characters and frequency spectrum data;
and determining the frequency spectrum data corresponding to each character in the hash value according to the corresponding relation between the character and the frequency spectrum data.
4. The method of claim 2, further comprising:
storing the hash value of the private information into a blockchain.
5. An information processing method characterized by comprising:
receiving a target verification video; the target verification video is obtained according to the verification video and the privacy information input by the client;
extracting audio track information from the target verification video;
acquiring frequency spectrum data corresponding to the audio track information;
and analyzing the frequency spectrum data to obtain privacy information included in the target verification video.
6. The method of claim 5, wherein the analyzing the spectral data to obtain the privacy information included in the target verification video comprises:
analyzing the spectrum data by using an OCR technology to obtain a hash value corresponding to the privacy information;
and obtaining privacy information according to the hash value.
7. The method of claim 6, further comprising:
judging whether a hash value corresponding to the private information exists in a block chain or not;
and if so, performing the business transaction.
8. An information processing apparatus characterized by comprising:
the acquisition module is used for acquiring the verification video and the privacy information input by the client;
the extraction module is used for extracting the audio track information from the verification video;
the determining module is used for determining the frequency spectrum data of the privacy information;
the obtaining module is used for writing the frequency spectrum data into the audio track information to obtain a target verification video;
and the transmission module is used for transmitting the target verification video to a target system.
9. An information processing apparatus characterized by comprising:
the receiving module is used for receiving the target verification video; the target verification video is obtained according to the verification video and the privacy information input by the client;
the extraction module is used for extracting audio track information from the target verification video;
the acquisition module is used for acquiring the frequency spectrum data corresponding to the audio track information;
and the analysis module is used for analyzing the frequency spectrum data to obtain privacy information included in the target verification video.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when executing the computer program.
11. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 7.
12. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210459873.3A CN114826744B (en) | 2022-04-28 | Information processing method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210459873.3A CN114826744B (en) | 2022-04-28 | Information processing method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114826744A true CN114826744A (en) | 2022-07-29 |
CN114826744B CN114826744B (en) | 2024-10-25 |
Family
ID=
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003304445A (en) * | 2002-04-12 | 2003-10-24 | Yokogawa Electric Corp | Superimposing apparatus |
CN105141615A (en) * | 2015-09-07 | 2015-12-09 | 天地融科技股份有限公司 | Method and system for opening account remotely, authentication method and system |
CN105378830A (en) * | 2013-05-31 | 2016-03-02 | 朗桑有限公司 | Processing of audio data |
CN105897428A (en) * | 2016-04-28 | 2016-08-24 | 武汉大学 | Real-time video safety communication system and method based on iris recognition |
CN106652270A (en) * | 2015-10-29 | 2017-05-10 | 意美森公司 | Ambient triggered notifications |
US20210089634A1 (en) * | 2019-09-24 | 2021-03-25 | Bank Of America Corporation | Spectrum Authentication in Edge Devices |
US20210203803A1 (en) * | 2019-12-31 | 2021-07-01 | Boris Goldberg | Methods and systems for tagged-signal verification |
CN113453039A (en) * | 2020-03-24 | 2021-09-28 | 阿里巴巴集团控股有限公司 | Method and device for processing video file and extracting watermark |
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003304445A (en) * | 2002-04-12 | 2003-10-24 | Yokogawa Electric Corp | Superimposing apparatus |
CN105378830A (en) * | 2013-05-31 | 2016-03-02 | 朗桑有限公司 | Processing of audio data |
CN105141615A (en) * | 2015-09-07 | 2015-12-09 | 天地融科技股份有限公司 | Method and system for opening account remotely, authentication method and system |
CN106652270A (en) * | 2015-10-29 | 2017-05-10 | 意美森公司 | Ambient triggered notifications |
CN105897428A (en) * | 2016-04-28 | 2016-08-24 | 武汉大学 | Real-time video safety communication system and method based on iris recognition |
US20210089634A1 (en) * | 2019-09-24 | 2021-03-25 | Bank Of America Corporation | Spectrum Authentication in Edge Devices |
US20210203803A1 (en) * | 2019-12-31 | 2021-07-01 | Boris Goldberg | Methods and systems for tagged-signal verification |
CN113453039A (en) * | 2020-03-24 | 2021-09-28 | 阿里巴巴集团控股有限公司 | Method and device for processing video file and extracting watermark |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190163925A1 (en) | System and method for monitoring and verifying software behavior | |
CN105337928B (en) | Method for identifying ID, safety protection problem generation method and device | |
CN110442712B (en) | Risk determination method, risk determination device, server and text examination system | |
US20110161232A1 (en) | Virtualization of authentication token for secure applications | |
CN107230066B (en) | Payment method and device, computer device and readable storage medium | |
US10135830B2 (en) | Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems | |
CN110532165B (en) | Application program installation package characteristic detection method, device, equipment and storage medium | |
CN111275416A (en) | Digital currency abnormal transaction detection method and device, electronic equipment and medium | |
CN110458662A (en) | Anti- fraud air control method and device | |
CN107958215A (en) | A kind of antifraud recognition methods, device, server and storage medium | |
CN104168117A (en) | Voice digital signature method | |
CN107944871A (en) | Identity identifying method, device, computer equipment and computer-readable recording medium | |
CN114826744B (en) | Information processing method, device, equipment and storage medium | |
CN114780932B (en) | Cross-block chain data interaction verification method, system and equipment for management three-mode platform | |
CN114826744A (en) | Information processing method, device, equipment and storage medium | |
CN116030820A (en) | Audio verification method and device and audio evidence obtaining method and device | |
Revenkov et al. | Research on brute force and black box attacks on ATMs | |
CN110209880A (en) | Video content retrieval method, Video content retrieval device and storage medium | |
Khubrani | Mobile Device Forensics, challenges and Blockchain-based Solution | |
CN112819486B (en) | Method and system for identity certification | |
CN115099799A (en) | Transaction processing method and system for digital RMB | |
KR102133902B1 (en) | Secure input device | |
CN109522737B (en) | Method and device for determining resource access rights | |
US20220004608A1 (en) | Intelligent real time resource instrument activation using electroencephalogram signals | |
CN114357524A (en) | Electronic document processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |