CN115633195A - Data security protection method and device, computer equipment and storage medium - Google Patents

Data security protection method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115633195A
CN115633195A CN202211244980.0A CN202211244980A CN115633195A CN 115633195 A CN115633195 A CN 115633195A CN 202211244980 A CN202211244980 A CN 202211244980A CN 115633195 A CN115633195 A CN 115633195A
Authority
CN
China
Prior art keywords
video
audio
recording
tamper
storage platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211244980.0A
Other languages
Chinese (zh)
Inventor
叶云娴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202211244980.0A priority Critical patent/CN115633195A/en
Publication of CN115633195A publication Critical patent/CN115633195A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2389Multiplex stream processing, e.g. multiplex stream encrypting
    • H04N21/23892Multiplex stream processing, e.g. multiplex stream encrypting involving embedding information at multiplex stream level, e.g. embedding a watermark at packet level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/231Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application discloses a data security protection method, a device, computer equipment and a storage medium, wherein a double-recording instruction is obtained, video recording and audio recording are simultaneously carried out on a current service scene according to the double-recording instruction, and time watermarks are generated on all recorded video frames in the video recording process; when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio; when the sound tracks between the videos and the audios are consistent, the videos are sent to a preset storage platform through a file transmission interface; and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark, so that the safety of the data recorded in the banking transaction process is improved.

Description

Data security protection method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of data security protection technologies, and in particular, to a data security protection method and apparatus, a computer device, and a storage medium.
Background
With the development of society, banks provide more and more banking businesses for people to handle, for example, sales-type banking businesses such as selling financial products, selling insurance products by bank agent insurance companies, and the like.
In the process of banking business handling, the whole business handling process needs to be recorded, so that important sales links such as marketing recommendation of business personnel, prompt of key information of related risks, confirmation of consumers, feedback of consumers and the like are recorded completely and objectively.
In the existing video recording of the whole business handling process, the recording needs to be started manually, the recorded video is uploaded as a certificate manually, and in the process of manually recording and uploading results, the recorded video is tampered or edited maliciously, so that the tampered or edited video meets the regulations, and the security of the recorded data in the bank business handling process is low.
Disclosure of Invention
The embodiment of the application provides a data security protection method, a data security protection device, computer equipment and a storage medium which can be used in financial science and technology or other related fields, and can improve the security of data recorded in the banking transaction process.
The embodiment of the application provides a data security protection method, which comprises the following steps:
acquiring a double-recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double-recording instruction, and generating time watermarks on each recorded video frame in the video recording process;
when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio;
when the sound tracks between the video and the audio are consistent, the video is sent to a preset storage platform through a file transmission interface;
and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark.
Correspondingly, the embodiment of the present application further provides a data security protection device, including:
the recording module is used for acquiring a double recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double recording instruction, and generating time watermarks on each recorded video frame in the video recording process;
the detection module is used for ending the recording of the video and the audio when receiving the recording ending instruction and carrying out sound track consistency detection on the recorded video and audio;
the video sending module is used for sending the video to a preset storage platform through a file transmission interface when the sound tracks between the video and the audio are consistent;
and the warning module is used for carrying out anti-tampering detection on the time watermark in the video through the storage platform at a preset frequency and determining whether to output a tampering warning or not according to the anti-tampering detection result of the time watermark.
In some embodiments, the detection module comprises:
a sound acquiring unit for acquiring a video sound in the video and an audio sound in the audio;
and a first detection unit for detecting the consistency of the sound tracks of the video sound and the audio sound.
In some embodiments, the video sending module includes:
an information obtaining unit, configured to obtain service attribute information of a current service performed in the service scenario;
a video sending unit, configured to send the service attribute information and the video to the storage platform through the file transfer interface, so that the storage platform stores the service attribute information and the video in an associated manner;
correspondingly, the method also comprises the following steps:
and the searching unit is used for acquiring a video searching instruction carrying the service attribute, responding to the video searching instruction, and searching the video which is consistent with the attribute of the service attribute in the service attribute information according to the service attribute.
In some embodiments, the recording module includes:
the watermark generating unit is used for generating time watermarks on each video frame recorded in the video recording process through a watermark generating interface;
correspondingly, the alarm module comprises:
a video acquisition unit, configured to acquire the video at a preset frequency through the storage platform;
and the second detection unit is used for carrying out tamper-proof detection on the time watermark change among the video frames according to the time watermark on the video frames.
In some embodiments, the video is sent to a preset storage platform through a file transfer interface, and the audio is also sent to a corresponding position of the storage platform through the file transfer interface; the above-mentioned alarm module still includes:
and the alarm unit is used for determining to output a tampering alarm according to the anti-tampering detection result of the time watermark and the audio when the anti-tampering detection result of the time watermark indicates that tampering exists.
In some embodiments, the alarm unit includes:
a segment determining subunit, configured to determine a tampered segment in the video according to the tamper-proof detection result;
the audio intercepting subunit is used for determining a corresponding segment in the audio according to the tampered segment in the video, and performing audio interception on the corresponding segment in the audio to obtain a contrast audio file;
and the warning subunit is used for outputting a tampering warning based on the comparison audio file.
In some embodiments, the alarm unit further includes:
the control display subunit is used for displaying the playing control corresponding to the contrast audio file on a preset alarm page;
a highlight display subunit, configured to display a video playing progress bar of the video on the alarm page, and highlight and display a previous frame video frame and a next frame video frame of the tampered segment at corresponding positions in the playing progress bar;
and the file playing subunit is used for playing the comparison audio file when the click operation on the playing control is received, and simultaneously displaying the previous frame video frame and the next frame video frame of the tampered segment in the video.
Correspondingly, an embodiment of the present application further provides a computer device, which includes a memory, a processor, and a computer program stored on the storage and executable on the processor, where the processor executes the data security protection method provided in any one of the embodiments of the present application.
Correspondingly, the embodiment of the application also provides a storage medium, wherein the storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by the processor to execute the data security protection method.
The method comprises the steps of obtaining a double recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double recording instruction, and generating time watermarks on each recorded video frame in the video recording process; when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio; when the sound tracks between the videos and the audios are consistent, the videos are sent to a preset storage platform through a file transmission interface; the time watermark in the video is subjected to tamper-proof detection at a preset frequency through the storage platform, whether a tamper alarm is output or not is determined according to the tamper-proof detection result of the time watermark, so that automatic recording of the business handling process is realized through double recording instructions and recording ending instructions, and the accuracy of stored data is ensured by performing sound track detection before automatic storage, and the safety of the recorded data in the bank business handling process is integrally improved through periodic tamper-proof detection.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a data security protection method according to an embodiment of the present application.
Fig. 2 is a block diagram of a data security protection apparatus according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides a data security protection method, a data security protection device, a storage medium and computer equipment. Specifically, the data security protection method of the embodiment of the present application may be executed by a computer device, where the computer device may be a server, or may also be a terminal or other devices. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, CDN, big data and artificial intelligence platform. The terminal may be, but is not limited to, a smart phone, a desktop computer, a notebook computer, a tablet computer, etc. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
For example, the computer device may be a terminal, and the terminal may obtain a double recording instruction, perform video recording and audio recording on a current service scene simultaneously according to the double recording instruction, and generate a time watermark on each recorded video frame in a video recording process; when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio; when the sound tracks between the videos and the audios are consistent, the videos are sent to a preset storage platform through a file transmission interface; and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark.
Based on the above problems, embodiments of the present application provide a data security protection method, apparatus, computer device, and storage medium, which can improve the security of data recorded during a banking transaction.
The following are detailed below. It should be noted that the following description of the embodiments is not intended to limit the preferred order of the embodiments.
The embodiments of the present application provide a data security protection method, which may be executed by a terminal or a server, and are described by taking an example in which the data security protection method is executed by the terminal.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a data security protection method according to an embodiment of the present disclosure. The specific process of the data security protection method can be as follows:
101. and acquiring a double-recording instruction, simultaneously carrying out video recording and audio recording on the current service scene according to the double-recording instruction, and generating time watermarks on each recorded video frame in the video recording process.
The double recording instruction is used for controlling a preset double recording system to record videos and record audios of a current service scene at the same time. The terminal can be integrated with the double recording system and used for controlling each module in the double recording system; the terminal can also be connected with the double recording system in a specific mode so as to issue a control instruction to the double recording system in real time.
Specifically, the terminal may preset the dual recording system in an on-line state, so that the dual recording system may receive the instruction in real time, perform corresponding recording through dual recording hardware in the dual recording system, and perform corresponding processing on recorded data through dual recording software in the dual recording system. The dual recording system may include dual recording hardware for video recording and audio recording, such as a tablet, a camera, a computer, a mobile phone, and the like.
In the embodiment, the video recording and the audio recording are simultaneously controlled through the double recording instruction, so that the cost of human resources consumed by manual recording is reduced, the time watermark generated in real time in the video recording process is convenient for detecting the recorded data according to the time watermark when in need, and the possible risks of tampering or clipping are avoided.
In some embodiments, the generating the time watermark on each recorded video frame in the video recording process may include: and generating a time watermark on each recorded video frame in real time and dynamically in the video recording process through a watermark generation interface.
In some embodiments, the double recording system may further include a double recording control component, so that a relevant worker can issue a double recording instruction by operating the double recording control component, and the double recording system obtains the double recording instruction generated by the click operation by responding to the click operation on the double recording control component, and sends the double recording instruction to an audio/video platform in the double recording system, so as to prompt the audio/video platform to start an audio/video service end to record, that is, to simultaneously record a video and an audio in a current service scene.
102. And when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio.
In this embodiment, after the recording is finished, the verification of the recording result is realized by comparing the recorded audio with the recorded video. Because the recorded video and the recorded audio are both from the recording of the same service scene, whether the recorded data are accurate or not can be judged through the comparison result of the video and the audio. Namely, if the comparison result of the recorded video and the recorded audio is consistent, the recorded data is accurate; if the comparison result of the recorded video and the recorded audio is inconsistent, the recorded data is inaccurate.
The recorded video and the recorded audio are both from the recording of the same service scene, so that after the recorded data are obtained and are converted, whether the recorded data are accurate can be judged by comparing the recorded audio with the recorded audio of the video. Specifically, the consistency detection can be performed on the sound tracks in the audio.
In some embodiments, the dual recording system may further include a recording ending control, so that after a relevant worker handles a service in a service scene, the recording ending control is operated to issue a recording ending instruction, the dual recording system obtains the recording ending instruction generated by a click operation in response to the click operation on the recording ending control, and sends the recording ending instruction to an audio/video platform in the dual recording system, so as to prompt the audio/video platform to close an audio/video server that performs recording, that is, to simultaneously end video recording and audio recording performed on the current service scene.
In some embodiments, the performing the track consistency detection on the recorded video and audio may include: and acquiring the video sound in the video and the audio sound in the audio, and sequentially performing consistency detection on the sound tracks of the video sound and the audio sound at each moment in the whole recording time to obtain an integral detection result.
In some embodiments, when the sound tracks of the video and the audio are inconsistent, it is indicated that the recorded data is inaccurate and may be illegally tampered or edited, an error notification is required, and the error notification may be performed in a manner of a notification sound, a text, or the like, for example, an error notification "quality inspection fails and re-recording is requested" is performed on a front end page of the dual recording system, so that after the error notification, a related worker waits for a next step of work, for example, a dual recording instruction is re-issued.
In some embodiments, when the recorded data is detected to be inaccurate, the video and the audio may be modified according to the track-inconsistent segment in the video and the track-inconsistent segment in the audio by comparing the video and the audio to obtain the track-inconsistent segment in the video and the track-inconsistent segment in the audio.
Illustratively, segment durations of segments with inconsistent sound tracks in the video and segments with inconsistent sound tracks in the audio can be determined, if the segment durations of the segments with inconsistent sound tracks in the video and the segments with inconsistent sound tracks in the audio are consistent, a degree of matching between the sound tracks of the segments with inconsistent sound tracks in the video and the segments with inconsistent sound tracks in the audio can be determined, if the degree of matching is greater than a preset threshold of matching degree, sound tracks of the segments with inconsistent sound tracks in the video and the segments with inconsistent sound tracks in the audio can be subjected to averaging processing, and the segments with inconsistent sound tracks in the video and the segments with inconsistent sound tracks in the audio can be corrected through the averaged sound tracks.
103. And when the sound tracks between the video and the audio are consistent, sending the video to a preset storage platform through a file transmission interface.
In this embodiment, when the soundtrack between the video and the audio is consistent, which indicates that the recorded data is accurate, a file transfer interface is called to send the recorded video to a preset storage platform, so that the video is acquired from the storage platform when there is a need.
In some embodiments, the sending the video to a preset storage platform through a file transfer interface may include: acquiring the service attribute information of the current service performed in the service scene; and sending the service attribute information and the video to the storage platform through the file transmission interface so that the storage platform stores the service attribute information and the video in a correlation manner. The service attribute information includes, but is not limited to, a serial number, an order number, and client information of a current service scene handling service.
Correspondingly, the method further comprises the following steps: and acquiring a video searching instruction carrying a service attribute, responding to the video searching instruction, and searching for a video which is consistent with the attribute of the service attribute in the service attribute information according to the service attribute.
Exemplarily, when a compliance monitoring and managing entity needs to trace back recorded data of a service handled in a current service scenario, corresponding recorded data can be queried from the storage platform through the service attribute, and the recorded data is the video.
In some embodiments, before sending the video to a preset storage platform through a file transfer interface, the method further includes: according to the service handling process in the current service scene, dividing the video into corresponding video segments according to at least one service link in the service handling process, acquiring the service attribute information of at least one service link, and adding the service attribute information of each service link to at least one video frame of the video segment of the corresponding service link so as to be convenient for people to watch.
104. And performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark.
The tamper-proof detection is used for detecting whether the video is tampered.
The preset frequency can be set according to user requirements, and the preset frequency can be used for enabling the terminal to obtain a video from the storage platform at the preset frequency and carrying out tamper-proof detection on the time watermark in the video; and the terminal can also control the storage platform to carry out tamper-proof detection on the time watermark in the video at a preset frequency.
In this embodiment, the storage platform periodically detects the video, so that the discovery time when the video is tampered can be prolonged, and the tamper-proof detection is performed according to the time watermark generated when the video is recorded, so that the accuracy of video detection can be improved. If the time watermark is subjected to tamper detection, outputting a tamper alarm; and if the time watermark is subjected to tamper-proof detection, not outputting a tamper alarm.
The tamper alarm may be performed in the form of a prompt tone, a text, or the like, and may further display a video with tampering or a progress bar corresponding to the video when the tamper alarm is performed, so that the video may be played at a certain video frame position through the progress bar.
In some embodiments, when the temporal watermark is generated through the watermark generation interface, the tamper-resistant detection of the temporal watermark in the video at a preset frequency through the storage platform may include: acquiring the video at a preset frequency through the storage platform; and carrying out tamper-proof detection on the time watermark change among the video frames according to the time watermark on the video frames in the video.
In this embodiment, the tamper-resistant detection mainly detects whether the time watermark on the continuous video frames in the video shows a dynamically increasing change, and if the time watermark on the continuous video frames in the video shows a dynamically increasing change, it indicates that the tamper-resistant detection result is that no tampering has occurred; if the time watermarks on the continuous video frames in the video do not show dynamic incremental changes, the tamper-proof detection result is that the video is tampered, namely, the video is judged to be subjected to tampering means such as clipping, splicing and the like.
In some embodiments, the video is sent to a preset storage platform through a file transmission interface, and meanwhile, the audio is sent to a corresponding position of the storage platform through the file transmission interface, so that the video is correspondingly processed through the audio, and therefore tampering warning is better performed, and user experience is improved. Specifically, the determining whether to output a tamper alarm according to the tamper-proof detection result of the time watermark may include: and when the anti-tampering detection result of the time watermark indicates that tampering exists, determining to output a tampering alarm according to the anti-tampering detection result of the time watermark and the audio.
In some embodiments, the determining to output the tamper alarm according to the tamper-proof detection result of the time watermark and the audio may include: the terminal determines a tampered fragment in the video according to the anti-tampering detection result, determines a corresponding fragment in the audio according to the tampered fragment in the video, and performs audio interception on the corresponding fragment in the audio to obtain a comparison audio file; therefore, based on the comparison audio file, the tampering alarm is output, so that relevant workers can conveniently check the correct audio of the tampered video segment.
In some embodiments, further comprising: the terminal may display an alarm page to output the tamper alarm on the alarm page, and specifically may include: and the terminal displays a playing control corresponding to the contrast audio file on a preset alarm page so as to control the contrast audio file to be played through the playing control, displays a video playing progress bar of the video on the alarm page, and highlights corresponding positions of a previous video frame and a next video frame of the tampered segment in the playing progress bar so as to enable related workers to accurately find the tampered position in the video. When the click operation of the playing control is received, the contrast audio file is played, and a previous frame video frame and a next frame video frame of the tampered segment in the video are displayed at the same time, or the playing is started from the position of the previous frame video frame of the tampered segment in the video at the same time until the playing is stopped at the position of the next frame video frame.
Or when receiving the click operation of the previous frame of video frame of the tampered segment at the corresponding position in the playing progress bar, starting playing from the position of the previous frame of video frame of the tampered video in the video, and simultaneously playing the comparison audio file, so that the relevant staff can view the tampering alarm.
The embodiment of the application discloses a data security protection method, which comprises the following steps: acquiring a double-recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double-recording instruction, and generating time watermarks on each recorded video frame in the video recording process; when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio; when the sound tracks between the videos and the audios are consistent, the videos are sent to a preset storage platform through a file transmission interface; and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark, so that the safety of the data recorded in the banking transaction process can be improved.
In order to better implement the data security protection method provided by the embodiment of the present application, the embodiment of the present application further provides a data security protection device based on the data security protection method. The terms are the same as those in the above data security protection method, and details of implementation may refer to the description in the method embodiment.
Referring to fig. 2, fig. 2 is a block diagram of a data security protection device according to an embodiment of the present application, where the device includes:
the recording module 201 is configured to obtain a double recording instruction, perform video recording and audio recording on a current service scene simultaneously according to the double recording instruction, and generate a time watermark on each recorded video frame in a video recording process;
the detection module 202 is configured to, when receiving a recording ending instruction, end recording of a video and an audio, and perform soundtrack consistency detection on the recorded video and audio;
a video sending module 203, configured to send the video to a preset storage platform through a file transmission interface when the sound tracks of the video and the audio are consistent;
and an alarm module 204, configured to perform tamper-resistant detection on the time watermark in the video at a preset frequency through the storage platform, and determine whether to output a tamper alarm according to a tamper-resistant detection result of the time watermark.
In some embodiments, the detection module 202 comprises:
a sound acquiring unit for acquiring a video sound in the video and an audio sound in the audio;
and a first detection unit for detecting the consistency of the sound tracks of the video sound and the audio sound.
In some embodiments, the video sending module 203 includes:
an information obtaining unit, configured to obtain service attribute information of a current service performed in the service scenario;
a video sending unit, configured to send the service attribute information and the video to the storage platform through the file transfer interface, so that the storage platform stores the service attribute information and the video in an associated manner;
correspondingly, the method further comprises the following steps:
and the searching unit is used for acquiring a video searching instruction carrying the service attribute, responding to the video searching instruction, and searching the video which is consistent with the attribute of the service attribute in the service attribute information according to the service attribute.
In some embodiments, the recording module 201 includes:
the watermark generating unit is used for generating time watermarks on each video frame recorded in the video recording process through a watermark generating interface;
accordingly, the alarm module 204 includes:
the video acquisition unit is used for acquiring the video at a preset frequency through the storage platform;
and the second detection unit is used for carrying out tamper-proof detection on the time watermark change among the video frames according to the time watermark on the video frames.
In some embodiments, the video is sent to a preset storage platform through a file transfer interface, and meanwhile, the audio is sent to a corresponding position of the storage platform through the file transfer interface; the alarm module 204 further includes:
and the alarm unit is used for determining to output a tampering alarm according to the anti-tampering detection result of the time watermark and the audio when the anti-tampering detection result of the time watermark indicates that tampering exists.
In some embodiments, the alarm unit includes:
a segment determining subunit, configured to determine a tampered segment in the video according to the tamper-proof detection result;
the audio intercepting subunit is used for determining a corresponding segment in the audio according to the tampered segment in the video, and performing audio interception on the corresponding segment in the audio to obtain a contrast audio file;
and the warning subunit is used for outputting a tampering warning based on the comparison audio file.
In some embodiments, the alarm unit further includes:
the control display subunit is used for displaying the playing control corresponding to the contrast audio file on a preset alarm page;
a highlight display subunit, configured to display a video playing progress bar of the video on the alarm page, and highlight and display a previous frame video frame and a next frame video frame of the tampered segment at corresponding positions in the playing progress bar;
and the file playing subunit is used for playing the comparison audio file when the click operation on the playing control is received, and simultaneously displaying the previous frame video frame and the next frame video frame of the tampered segment in the video.
The embodiment of the application discloses a data security protection device, which is used for acquiring double recording instructions through a recording module 201, simultaneously carrying out video recording and audio recording on a current service scene according to the double recording instructions, and generating time watermarks on each recorded video frame in the video recording process; the detection module 202 is configured to, when receiving a recording ending instruction, end recording of a video and an audio, and perform soundtrack consistency detection on the recorded video and audio; the video sending module 203 is configured to send the video to a preset storage platform through a file transfer interface when the sound tracks between the video and the audio are consistent; and an alarm module 204, configured to perform tamper-resistant detection on the time watermark in the video at a preset frequency through the storage platform, and determine whether to output a tamper alarm according to a tamper-resistant detection result of the time watermark. Therefore, the safety of the data recorded in the banking transaction process is improved.
Correspondingly, the embodiment of the application also provides a computer device, and the computer device can be a terminal. As shown in fig. 3, fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application. The computer apparatus 300 includes a processor 301 having one or more processing cores, a memory 302 having one or more computer-readable storage media, and a computer program stored on the memory 302 and executable on the processor. The processor 301 is electrically connected to the memory 302. Those skilled in the art will appreciate that the computer device configurations illustrated in the figures are not meant to be limiting of computer devices and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components.
The processor 301 is a control center of the computer apparatus 300, connects various parts of the entire computer apparatus 300 by various interfaces and lines, performs various functions of the computer apparatus 300 and processes data by running or loading software programs and/or modules stored in the memory 302, and calling data stored in the memory 302, thereby monitoring the computer apparatus 300 as a whole.
In the embodiment of the present application, the processor 301 in the computer device 300 loads instructions corresponding to processes of one or more application programs into the memory 302, and the processor 301 executes the application programs stored in the memory 302 according to the following steps, so as to implement various functions:
acquiring a double-recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double-recording instruction, and generating time watermarks on each recorded video frame in the video recording process;
when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio;
when the sound tracks between the video and the audio are consistent, the video is sent to a preset storage platform through a file transmission interface;
and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether to output a tamper alarm according to a tamper-proof detection result of the time watermark.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Optionally, as shown in fig. 3, the computer device 300 further includes: a touch display 303, a radio frequency circuit 304, an audio circuit 305, an input unit 306, and a power source 307. The processor 301 is electrically connected to the touch display 303, the radio frequency circuit 304, the audio circuit 305, the input unit 306, and the power source 307. Those skilled in the art will appreciate that the computer device configuration illustrated in FIG. 3 does not constitute a limitation of the computer device, and may include more or fewer components than illustrated, or some components may be combined, or a different arrangement of components.
The touch display screen 303 may be used for displaying a graphical user interface and receiving operation instructions generated by a user acting on the graphical user interface. The touch display screen 303 may include a display panel and a touch panel. The display panel may be used, among other things, to display messages entered by or provided to a user and various graphical user interfaces of the computer device, which may be composed of graphics, text, icons, video, and any combination thereof. Alternatively, the display panel may be configured in the form of a Liquid crystal display (LCD, liquid crystal client account l display client account y), an organic Light-Emitting Diode (OLED, organic Light-Emitting Diode), or the like. The touch panel may be used to collect touch operations of a user on or near the touch panel (for example, operations of the user on or near the touch panel using any suitable object or accessory such as a finger, a stylus pen, and the like), and generate corresponding operation instructions, and the operation instructions execute corresponding programs. Alternatively, the touch panel may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives the touch message from the touch sensing device, converts the touch message into touch point coordinates, sends the touch point coordinates to the processor 301, and can receive and execute commands sent by the processor 301. The touch panel may overlay the display panel, and when the touch panel detects a touch operation thereon or nearby, the touch panel transmits the touch operation to the processor 301 to determine the type of the touch event, and then the processor 301 provides a corresponding visual output on the display panel according to the type of the touch event. In the embodiment of the present application, the touch panel and the display panel may be integrated into the touch display screen 303 to realize input and output functions. However, in some embodiments, the touch panel and the touch panel can be implemented as two separate components to perform the input and output functions. That is, the touch display screen 303 may also be used as a part of the input unit 306 to implement an input function.
The rf circuit 304 may be used for transceiving rf signals to establish wireless communication with a network device or other computer device via wireless communication, and for transceiving signals with the network device or other computer device.
The audio circuit 305 may be used to provide an audio interface between the user and the computer device through speakers, microphones. The audio circuit 305 may transmit the electrical signal converted from the received audio data to a speaker, and convert the electrical signal into a sound signal for output; on the other hand, the microphone converts the collected sound signal into an electric signal, which is received by the audio circuit 305 and converted into audio data, which is then processed by the audio data output processor 301, and then transmitted to, for example, another computer device via the radio frequency circuit 304, or output to the memory 302 for further processing. The audio circuit 305 may also include an earbud jack to provide communication of peripheral headphones with the computer device.
The input unit 306 may be used to receive input numbers, character messages, or user characteristic messages (e.g., fingerprints, irises, facial messages, etc.), and to generate keyboard, mouse, joystick, optical, or trackball signal inputs related to user settings and function control.
The power supply 307 is used to power the various components of the computer device 300. Optionally, the power supply 307 may be logically connected to the processor 301 through a power management system, so as to implement functions of managing charging, discharging, and power consumption management through the power management system. Power supply 307 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
Although not shown in fig. 3, the computer device 300 may further include a camera, a sensor, a wireless fidelity module, a bluetooth module, etc., which are not described in detail herein.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
As can be seen from the above, the computer device provided in this embodiment performs video recording and audio recording on a current service scene simultaneously according to a double recording instruction by obtaining the double recording instruction, and generates a time watermark on each recorded video frame in a video recording process; when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio; when the sound tracks between the videos and the audios are consistent, the videos are sent to a preset storage platform through a file transmission interface; and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present application provide a computer-readable storage medium, in which a plurality of computer programs are stored, where the computer programs can be loaded by a processor to execute the steps in any one of the data security protection methods provided by the embodiments of the present application. For example, the computer program may perform the steps of:
acquiring a double-recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double-recording instruction, and generating time watermarks on each recorded video frame in the video recording process;
when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio;
when the sound tracks between the videos and the audios are consistent, the videos are sent to a preset storage platform through a file transmission interface;
and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the storage medium may include: a read Only Memory (ROM, re client account d Only Memory), a random access Memory (R client account M, R client account and access Memory), a magnetic disk or an optical disk, and the like.
Since the computer program stored in the storage medium can execute the steps in any data security protection method provided in the embodiments of the present application, beneficial effects that can be achieved by any data security protection method provided in the embodiments of the present application can be achieved, and detailed descriptions are omitted here for the foregoing embodiments.
The data security protection method, apparatus, storage medium, and computer device provided in the embodiments of the present application are described in detail above, and specific examples are applied herein to explain the principles and implementations of the present application, and the descriptions of the above embodiments are only used to help understand the method and its core ideas of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A method for securing data, the method comprising:
acquiring a double-recording instruction, simultaneously carrying out video recording and audio recording on a current service scene according to the double-recording instruction, and generating time watermarks on each recorded video frame in the video recording process;
when receiving a recording ending instruction, ending the recording of the video and the audio, and carrying out sound track consistency detection on the recorded video and audio;
when the sound tracks between the video and the audio are consistent, the video is sent to a preset storage platform through a file transmission interface;
and performing tamper-proof detection on the time watermark in the video at a preset frequency through the storage platform, and determining whether a tamper alarm is output or not according to a tamper-proof detection result of the time watermark.
2. The method of claim 1, wherein the detecting the track consistency of the recorded video and audio comprises:
acquiring video sound in the video and audio sound in the audio;
and carrying out consistency detection on the sound tracks of the video sound and the audio sound.
3. The method according to claim 1, wherein the sending the video to a preset storage platform through a file transfer interface comprises:
acquiring the service attribute information of the current service performed in the service scene;
sending the service attribute information and the video to the storage platform through the file transmission interface so that the storage platform stores the service attribute information and the video in a correlation manner;
correspondingly, the method further comprises the following steps:
and acquiring a video searching instruction carrying a service attribute, and searching a video which is consistent with the attribute of the service attribute in the service attribute information according to the service attribute in response to the video searching instruction.
4. The method of claim 1, wherein generating a time watermark on each recorded video frame during a video recording process comprises:
generating time watermarks on each recorded video frame in the video recording process through a watermark generating interface;
correspondingly, the tamper-proofing detection of the time watermark in the video at a preset frequency through the storage platform includes:
acquiring the video at a preset frequency through the storage platform;
and carrying out tamper-proof detection on the time watermark change among the video frames according to the time watermark on each video frame in the video.
5. The method according to claim 1, wherein the video is transmitted to a preset storage platform through a file transfer interface, and the audio is also transmitted to a corresponding position of the storage platform through the file transfer interface;
the determining whether to output a tamper alarm according to the tamper-proof detection result of the time watermark includes:
and when the tamper-proof detection result of the time watermark is that tampering exists, determining to output a tamper alarm according to the tamper-proof detection result of the time watermark and the audio.
6. The method of claim 5, wherein the determining an output tamper alert based on the tamper-resistant detection result of the temporal watermark and the audio comprises:
determining a tampered segment in the video according to the anti-tampering detection result;
determining a corresponding segment in the audio according to the tampered segment in the video, and performing audio interception on the corresponding segment in the audio to obtain a contrast audio file;
outputting a tamper alert based on the comparison audio file.
7. The method of claim 6, further comprising:
displaying a playing control corresponding to the contrast audio file on a preset alarm page;
displaying a video playing progress bar of the video on the alarm page, and highlighting corresponding positions of a previous frame video frame and a next frame video frame of the tampered fragment in the playing progress bar;
and when the click operation on the playing control is received, playing the contrast audio file, and simultaneously displaying a previous frame video frame and a next frame video frame of the tampered segment in the video.
8. A data security protection apparatus, the apparatus comprising:
the recording module is used for acquiring double recording instructions, simultaneously carrying out video recording and audio recording on a current service scene according to the double recording instructions, and generating time watermarks on each recorded video frame in the video recording process;
the detection module is used for ending the recording of the video and the audio when receiving the recording ending instruction and carrying out sound track consistency detection on the recorded video and audio;
the video sending module is used for sending the video to a preset storage platform through a file transmission interface when the sound tracks between the video and the audio are consistent;
and the warning module is used for carrying out tamper-proof detection on the time watermark in the video through the storage platform at a preset frequency and determining whether to output a tamper warning or not according to a tamper-proof detection result of the time watermark.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor implements the data security method of any one of claims 1 to 7 when executing the program.
10. A storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the method of any of claims 1 to 7.
CN202211244980.0A 2022-10-12 2022-10-12 Data security protection method and device, computer equipment and storage medium Pending CN115633195A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211244980.0A CN115633195A (en) 2022-10-12 2022-10-12 Data security protection method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211244980.0A CN115633195A (en) 2022-10-12 2022-10-12 Data security protection method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115633195A true CN115633195A (en) 2023-01-20

Family

ID=84905429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211244980.0A Pending CN115633195A (en) 2022-10-12 2022-10-12 Data security protection method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115633195A (en)

Similar Documents

Publication Publication Date Title
CN110569909B (en) Block chain-based fault early warning method, device, equipment and storage medium
CN113727406B (en) Communication control method, device, equipment and computer readable storage medium
CN115987852A (en) Interface service state detection method and device, computer equipment and storage medium
CN109634702B (en) Information prompting method and device, electronic equipment and readable medium
CN115171222B (en) Behavior detection method and device, computer equipment and storage medium
CN115633195A (en) Data security protection method and device, computer equipment and storage medium
CN115421062A (en) Storage battery monitoring method and system, electronic equipment and storage medium
CN115187364A (en) Method and device for monitoring deposit risk under bank distributed scene
CN112669057B (en) Data prediction method and device, electronic equipment and storage medium
CN114417201A (en) Message processing method and device, computer equipment and storage medium
CN113704273A (en) Data management method, device, storage medium and server
CN113468113B (en) File label management method and device, storage medium and terminal equipment
CN116383071A (en) Service flow testing method and device, computer equipment and storage medium
CN115514850A (en) Value analysis method and device for outbound project, computer equipment and storage medium
CN115330514A (en) Loan behavior risk management method and device, computer equipment and storage medium
CN115103321A (en) Short message sending method and device, computer equipment and storage medium
CN113806362A (en) Test record information generation method and device, computer equipment and storage medium
CN115344413A (en) Bill abnormal problem positioning method, device, medium and equipment
CN115018496A (en) Carbon account management method and device, computer equipment and storage medium
CN116611904A (en) Security supervision method and device, computer equipment and storage medium
CN115631523A (en) Data processing method and device for business place, computer equipment and storage medium
CN114329399A (en) Face video verification method, device, equipment and storage medium
CN115658419A (en) Model data monitoring method, device, medium and equipment
CN115622968A (en) Black product behavior blocking method and device, computer equipment and storage medium
CN114428581A (en) Early warning data processing method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination