CN116233565A - Electronic signature generation method and system - Google Patents

Electronic signature generation method and system Download PDF

Info

Publication number
CN116233565A
CN116233565A CN202310482924.9A CN202310482924A CN116233565A CN 116233565 A CN116233565 A CN 116233565A CN 202310482924 A CN202310482924 A CN 202310482924A CN 116233565 A CN116233565 A CN 116233565A
Authority
CN
China
Prior art keywords
image data
original
target
security
signature information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310482924.9A
Other languages
Chinese (zh)
Other versions
CN116233565B (en
Inventor
蔡先勇
盛莉
黄乾瑛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Aolian Information Security Technology Co ltd
Original Assignee
Shenzhen Aolian Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Aolian Information Security Technology Co ltd filed Critical Shenzhen Aolian Information Security Technology Co ltd
Priority to CN202310482924.9A priority Critical patent/CN116233565B/en
Publication of CN116233565A publication Critical patent/CN116233565A/en
Application granted granted Critical
Publication of CN116233565B publication Critical patent/CN116233565B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • H04N21/64715Protecting content from unauthorized alteration within the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event, e.g. an object reaching a predetermined position

Abstract

The embodiment of the invention relates to the technical field of secure communication, and particularly discloses a method and a system for generating an electronic signature. The method comprises the steps that a security event reported by a certain camera in the security Internet of things in the monitoring process is received; the method comprises the steps that a camera is controlled to generate original image data and original signature information when a sampling time point is reached; screening out original image data of which the sampling time points belong to the same time period as target image data; aggregating the original signature information into target signature information; packaging all target image data and target signature information into a data packet; and transmitting the data packet to a server in the security Internet of things. The original signature information is compressed into the target signature information, so that the data volume can be reduced, the occupied bandwidth is reduced, the target image data and the target signature information are uploaded in a distinguishing sampling time point and a time period, the data structure is standard, the processing of a server is facilitated, and the processing efficiency is improved.

Description

Electronic signature generation method and system
Technical Field
The invention belongs to the technical field of secure communication, and particularly relates to an electronic signature generation method and system.
Background
In places such as factories and office buildings, a plurality of cameras are deployed so as to improve the safety of the places.
Each camera can generate one path of video data, in order to prevent the video data from being tampered, an electronic signature is generated on the video data when the video data are generated by the cameras, each path of video data and the electronic signature are independently uploaded to a cloud end, and the video data are analyzed at the cloud end.
Because each path of video data independently generates and transmits the electronic signature, the process occupies more bandwidth, and cloud analysis of the video data is also more inconvenient.
Disclosure of Invention
The embodiment of the invention aims to provide an electronic signature generation method and system, and aims to solve the problems in the background technology.
In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
an electronic signature generation method specifically includes the following steps:
receiving a security event reported by a certain camera in the security and protection Internet of things in the monitoring process;
controlling all cameras in the security and protection Internet of things and installed in the area where the security event occurs to generate original image data and original signature information when each sampling time point is reached, wherein the original signature information is provided with an electronic signature of the original image data;
Screening out the original image data of which the sampling time points belong to the same time period as target image data;
compressing the same or similar data for the original signature information under the condition of maintaining the electronic signature unchanged for the target image data so as to aggregate the original signature information into target signature information;
packaging all the target image data and the target signature information into a data packet;
and transmitting the data packet to a server in the security internet of things, wherein the server is used for analyzing the original security of the area by combining the target image data at the same sampling time point when the target image data are successfully checked by using the electronic signature, and generating the target security of the area by combining the original security at the same time period.
As a further limitation of the technical solution of the embodiment of the present invention, the controlling all cameras installed in the area where the security event occurs in the security internet of things to generate the original image data and the original signature information when reaching the sampling time point specifically includes the following steps:
inquiring all cameras in the security and protection Internet of things, which are installed in the area where the security event occurs, wherein the cameras are provided with the frequency for acquiring the original image data;
Calculating the reciprocal of the frequency to be used as the time length of the interval of the camera for collecting the original image data;
dividing a plurality of sampling time points on a time axis, wherein the time length with the highest interval value between every two adjacent sampling time points;
and controlling the camera to report the original image data and the original signature information generated when the camera is closest to the sampling time point.
As a further limitation of the technical solution of the embodiment of the present invention, the screening the original image data of which the sampling time point belongs to the same time period as the target image data includes:
inquiring the minimum quantity required by the original image data when a server in the security internet of things processes the security event;
multiplying a target number by the duration with the highest value, wherein the target number is the sum value between the minimum number and the preset error number as a time period;
dividing a plurality of time nodes on a time axis, wherein the time period is between every two adjacent time nodes;
and screening out the original image data of the sampling time points between two adjacent time nodes as target image data.
As a further limitation of the technical solution of the embodiment of the present invention, the compressing the same or similar data on the original signature information for the target image data under the condition of maintaining the electronic signature unchanged, so as to aggregate the original signature information into the target signature information specifically includes the following steps:
screening the data which are the same or similar in the time period from the original signature information as first target data aiming at the target image data;
screening the same or similar data in the sampling points from the original signature information as second target data aiming at the target image data;
compressing the original signature information under the condition of maintaining the electronic signature unchanged, so as to keep the first target data and the second target data in part of the original signature information and filter the first target data and the second target data in part of the original signature information;
and sequentially aggregating the compressed original signature information into target signature information.
As a further limitation of the technical solution of the embodiment of the present invention, the screening, for the target image data, the data that are the same or similar in the time period from the original signature information, as the first target data, specifically includes the following steps:
Selecting first time information representing the time period from the time stamp of the original signature information screen as first target data aiming at the target image data;
screening out security levels from all the original signature information;
setting the security level with the highest duty ratio as a security tag as first target data.
As a further limitation of the technical solution of the embodiment of the present invention, the screening, for the target image data, the data that are the same or similar in the sampling time point from the original signature information, as second target data includes:
screening second time information representing the sampling time point from the time stamp of the original signature information aiming at the target image data;
and mapping the second time information into the same time label, wherein the time label is used as second target data and represents the sequence of the sampling time points in the time period.
As a further limitation of the technical solution of the embodiment of the present invention, the compressing the original signature information under the condition of maintaining the electronic signature unchanged, so as to retain the first target data and the second target data in a part of the original signature information, and filtering the first target data and the second target data in a part of the original signature information specifically includes the following steps:
Determining first characteristic information and second characteristic information, wherein the first characteristic information is first original signature information of a first sampling time point in the time period, and the second characteristic information is first original signature information of each sampling time point;
the first time information is reserved in the first characteristic information, and the first time information is filtered out from the first characteristic information;
replacing the second time information with the time tag in the second characteristic information, and filtering the second time information in the non-second characteristic information;
retaining the electronic signature in each piece of original signature information;
and replacing the security level with the security tag in the first characteristic information, filtering the security level if the security level is the same as the security tag for each piece of original signature information, and replacing the security level with an offset between the security level and the security tag if the security level is different from the security tag.
As a further limitation of the technical solution of the embodiment of the present invention, the packaging all the target image data and the target signature information into a data packet specifically includes the following steps:
Compressing the target image data acquired by the same camera;
writing the target signature information into header information of a data packet;
and packaging the compressed target image data into the data packets according to the sequence.
An electronic signature generation system, the electronic signature generation system comprising:
the security event receiving module is used for receiving security events reported by a certain camera in the security Internet of things in the monitoring process;
the security data receiving module is used for controlling all cameras installed in the area where the security event occurs in the security Internet of things to generate original image data and original signature information when each sampling time point is reached, wherein the original signature information is provided with an electronic signature of the original image data;
the image data screening module is used for screening the original image data of which the sampling time points belong to the same time period as target image data;
the signature information compression module is used for compressing the same or similar data of the original signature information aiming at the target image data under the condition of maintaining the electronic signature unchanged so as to aggregate the original signature information into target signature information;
The security data packaging module is used for packaging all the target image data and the target signature information into a data packet;
the data packet transmission module is used for transmitting the data packet to a server in the security internet of things, and the server is used for analyzing the original security of the area in combination with the target image data at the same sampling time point and generating the target security of the area in combination with the original security at the same time period when the target image data are successfully checked by using the electronic signature.
As a further limitation of the technical solution of the embodiment of the present invention, the security data receiving module is further configured to:
inquiring all cameras in the security and protection Internet of things, which are installed in the area where the security event occurs, wherein the cameras are provided with the frequency for acquiring the original image data;
calculating the reciprocal of the frequency to be used as the time length of the interval of the camera for collecting the original image data;
dividing a plurality of sampling time points on a time axis, wherein the time length with the highest interval value between every two adjacent sampling time points;
and controlling the camera to report the original image data and the original signature information generated when the camera is closest to the sampling time point.
As a further limitation of the technical solution of the embodiment of the present invention, the image data screening module is further configured to:
inquiring the minimum quantity required by the original image data when a server in the security internet of things processes the security event;
multiplying a target number by the duration with the highest value, wherein the target number is the sum value between the minimum number and the preset error number as a time period;
dividing a plurality of time nodes on a time axis, wherein the time period is between every two adjacent time nodes;
and screening out the original image data of the sampling time points between two adjacent time nodes as target image data.
As a further limitation of the technical solution of the embodiment of the present invention, the signature information compression module is further configured to:
screening the data which are the same or similar in the time period from the original signature information as first target data aiming at the target image data;
screening the same or similar data in the sampling points from the original signature information as second target data aiming at the target image data;
compressing the original signature information under the condition of maintaining the electronic signature unchanged, so as to keep the first target data and the second target data in part of the original signature information and filter the first target data and the second target data in part of the original signature information;
And sequentially aggregating the compressed original signature information into target signature information.
As a further limitation of the technical solution of the embodiment of the present invention, the signature information compression module is further configured to:
selecting first time information representing the time period from the time stamp of the original signature information screen as first target data aiming at the target image data;
screening out security levels from all the original signature information;
setting the security level with the highest duty ratio as a security tag as first target data.
As a further limitation of the technical solution of the embodiment of the present invention, the signature information compression module is further configured to:
screening second time information representing the sampling time point from the time stamp of the original signature information aiming at the target image data;
and mapping the second time information into the same time label, wherein the time label is used as second target data and represents the sequence of the sampling time points in the time period.
As a further limitation of the technical solution of the embodiment of the present invention, the signature information compression module is further configured to:
determining first characteristic information and second characteristic information, wherein the first characteristic information is first original signature information of a first sampling time point in the time period, and the second characteristic information is first original signature information of each sampling time point;
The first time information is reserved in the first characteristic information, and the first time information is filtered out from the first characteristic information;
replacing the second time information with the time tag in the second characteristic information, and filtering the second time information in the non-second characteristic information;
retaining the electronic signature in each piece of original signature information;
and replacing the security level with the security tag in the first characteristic information, filtering the security level if the security level is the same as the security tag for each piece of original signature information, and replacing the security level with an offset between the security level and the security tag if the security level is different from the security tag.
Further, the security data packaging module is further configured to:
compressing the target image data acquired by the same camera;
writing the target signature information into header information of a data packet;
and packaging the compressed target image data into the data packets according to the sequence.
An electronic signature generation system comprising an edge node and a plurality of cameras, wherein the edge node comprises:
At least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the electronic signature generation method.
A computer readable storage medium storing a computer program for causing a processor to implement the electronic signature generation method when executed.
Compared with the prior art, the invention has the beneficial effects that:
in the embodiment, a security event reported by a certain camera in the security and protection internet of things in the monitoring process is received; controlling all cameras installed in the area where the security event occurs in the security Internet of things to generate original image data and original signature information when each sampling time point is reached, wherein the original signature information is provided with an electronic signature of the original image data; screening out original image data of which the sampling time points belong to the same time period as target image data; compressing the same or similar data for the original signature information under the condition of maintaining the electronic signature unchanged aiming at the target image data so as to aggregate the original signature information into target signature information; packaging all target image data and target signature information into a data packet; transmitting the data packet to a server in the security internet of things, wherein the server is used for combining the original security of the target image data analysis area at the same sampling time point and the target security of the original security generation area at the same time period when the target image data is successfully checked by using the electronic signature. The original signature information is compressed into the target signature information, so that the data volume can be reduced, the occupied bandwidth is reduced, the target image data and the target signature information are uploaded in a distinguishing sampling time point and a time period, the data structure is standard, the processing of a server is facilitated, and the processing efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following description will briefly introduce the drawings that are needed in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 shows a flowchart of a method provided by an embodiment of the present invention.
Fig. 2 shows an application architecture diagram of a system provided by an embodiment of the present invention.
Fig. 3 shows an application architecture diagram of a system provided by an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Fig. 1 shows a flowchart of a method provided by an embodiment of the present invention.
Specifically, the electronic signature generation method specifically comprises the following steps:
step 101, receiving a security event reported by a certain camera in the security internet of things in the monitoring process.
In this embodiment, the security internet of things may be deployed in advance, where the security internet of things includes a cloud end and edge nodes, servers with different functions in the cloud end are deployed in places to be monitored, and a plurality of cameras are installed in the places and all access the edge nodes.
In order to improve the timeliness of monitoring, the cameras are provided with processors with higher performance, so that the cameras can support running lightweight class networks, such as MobileNet, shuffleNet.
In order to ensure the accuracy of monitoring, large neural networks, such as ResNet50, VGG16, etc., are deployed in the cloud server.
In the process of monitoring the place, each camera can continuously collect video data, the video data are provided with multi-frame image data, the cameras can input the image data into a classification network at certain intervals for classifying the content of the image data, and if the classification result contains preset safety events such as fire, smoke, running of multiple persons and the like, the safety events can be reported to the edge nodes.
And 102, controlling all cameras in the security internet of things and installed in the area where the security event occurs to generate original image data and original signature information when each sampling time point is reached.
In this embodiment, when the camera is installed in a place, different groups may be divided according to regions, for example, one floor is one region, one production line is one region, and the like.
If the edge node receives a security event reported by a certain camera, the group to which the camera belongs can be determined, so that the area where the security event occurs is determined, and all cameras in the group (area) are notified to report the original image data and the original signature information when the sampling time point is reached.
The original signature information includes information such as a time stamp at the time of acquiring the original image data, an electronic signature generated on the original image data by using algorithms such as RSA, SM2, SM9, schnorr, and the like, and a security level generated when classifying the original image data by using a classification network.
Further, the security level indicates a level of security of the security event, such as high risk, danger, abnormality, security, and the like.
In general, the cost of a camera with a certain logic operation capability is relatively high, the cameras in the same place may be deployed in batches, and different batches of cameras may have certain differences in hardware specifications and/or software specifications, where the differences may affect the frequency of capturing video data (original image data) by the cameras, and a cloud server (especially, a neural network, and a post-processing module for smoothing the result of the neural network) processes the video data (original image data) with a number of requirements, so that the sampling time points are used to align the original image data captured by different cameras in this embodiment.
In a specific implementation, all cameras in the security and protection Internet of things and installed in a region where a security event occurs are queried, wherein the cameras are provided with frequency for acquiring original image data.
And calculating the reciprocal of the frequency, and taking the reciprocal as the time length of the interval between the camera and the acquisition of the original image data.
And dividing a plurality of sampling time points on a time axis, wherein the time length with the highest interval value between every two adjacent sampling time points is determined by the camera with the lowest frequency.
The control camera reports the original image data and the original signature information generated when the control camera is closest to the sampling time point, and the original image data acquired at the sampling time point can be regarded as the original image data closest to the sampling time point, so that for the camera with higher frequency, part of the original image data can be discarded.
Step 103, screening out the original image data with the sampling time points belonging to the same time period as the target image data.
In this embodiment, the edge node reports data to the cloud end once every a certain time period, so that original image data with sampling time points belonging to the same time period can be screened out and used as target image data.
In a specific implementation, considering that a certain error exists in a result of processing single-frame original image data by a cloud server by using a neural network, the cloud server generally uses a post-processing module to smooth the result of the neural network, so that the influence caused by the error is reduced, and then the minimum number required by the server in the security and protection internet of things for processing the security event can be queried, and the minimum number generally depends on the post-processing module.
The target number is multiplied by the time length with the highest value as a time period, wherein the target number is the sum value between the minimum number and the preset error number.
A plurality of time nodes are divided on a time axis, wherein a time period is arranged between every two adjacent time nodes.
Comparing the sampling time point with each time node, and screening out original image data of the sampling time point between two adjacent time nodes as target image data.
Step 104, compressing the same or similar data on the original signature information for the target image data under the condition of maintaining the electronic signature unchanged, so as to aggregate the original signature information into target signature information.
In this embodiment, some identical or similar data exists in each piece of original signature information, and for the target image data, the identical or similar data can be compressed on the original signature information under the condition of maintaining the electronic signature unchanged, so that a plurality of pieces of original signature information are aggregated into one piece of target signature information, and the identical or similar data does not affect the processing of the security event after being compressed.
In one embodiment of the present invention, step 104 specifically includes the steps of:
In step 1041, for the target image data, the same or similar data in the time period is screened out from the original signature information as the first target data.
For the target image data, the data which are the same or similar at the time period layer can be screened out from the original signature information and recorded as first target data.
In a specific implementation, for target image data, first time information representing a time period is selected from time stamps of an original signature information screen as first target data.
For example, 2023, 3, 25, 16, 0 minutes, 0 seconds is time stamped as 1679731200, and the time of the current time period is on the order of minutes, 167973 may be noted as the first target data.
In addition, security levels are screened out from all original signature information, the duty ratios of various security levels are counted, and the security level with the highest duty ratio is set as a security tag to be used as first target data.
Step 1042, for the target image data, the same or similar data in the sampling point is screened out from the original signature information as the second target data.
And screening the data which are the same or similar on the sampling point layer in the original signature information as second target data aiming at the target image data.
In a specific implementation, for target image data, second time information representing sampling time points is screened out from time stamps of original signature information, and the second time information is mapped into the same time label to be used as second target data, wherein the time label represents the sequence of the sampling time points in a time period.
Step 1043, compressing the original signature information under the condition of maintaining the electronic signature unchanged, so as to retain the first target data and the second target data in part of the original signature information, and filtering the first target data and the second target data in part of the original signature information.
Under the condition of maintaining the electronic signature unchanged, the original signature information is compressed, and in the compression process, the first target data and the second target data are reserved in part of the original signature information and used as references of other original signature information, and the first target data and the second target data are filtered out in part of the original signature information so as to reduce the data quantity.
In a specific implementation, a plurality of sampling time points are arranged in time sequence in the same time period, and a plurality of original signature information are arranged in sequence according to the serial numbers of the cameras at each sampling time point.
Then, first characteristic information and second characteristic information may be determined, where the first characteristic information is first original signature information of a first sampling time point in a time period, and the second characteristic information is first original signature information of each sampling time point.
The first time information is reserved in the first characteristic information, and the first time information is filtered out in non-first characteristic information (namely, other original signature information except the first characteristic information in the same time period).
And replacing the second time information with the time tag in the second characteristic information, and filtering the second time information in non-second characteristic information (namely, other original signature information except the second characteristic information in the same sampling time point).
Then, all the original feature information in the same time period share a first time information, and all the original feature information in the same sampling time point share a time tag, so that not only can the data volume be greatly reduced, but also the first time information and the time tag can restore a general time stamp, and the neural network and the post-processing module in the cloud server do not pay attention to the specific time stamp, so that the general time stamp does not influence the subsequent analysis.
An electronic signature is retained in each original signature information in order to verify whether the original image data is tampered with.
And replacing the security level with a security tag in the first characteristic information, filtering the security level if the security level is the same as the security tag for each piece of original signature information, and replacing the security level with an offset between the security level and the security tag if the security level is different from the security tag.
Because the neural network and the post-processing module in the cloud server pay attention to the security level, in the same scene, the security level of most of original image data is the same, the corresponding original signature information shares the same security level, the data volume can be reduced as much as possible, and the security level of other original signature information is converted into the offset between the security tag, so that the post-processing module can smooth the result of the neural network conveniently.
Step 1044, aggregating the compressed original signature information into the target signature information in order.
For the compressed original signature information at the same sampling time point, the compressed original signature information can be aggregated into candidate signature information according to the serial number sequence of the camera, and for the candidate signature information at the same time period, the candidate signature information can be aggregated into target signature information according to the time sequence of the sampling time point.
And step 105, packaging all the target image data and the target signature information into a data packet.
In this embodiment, all the target image data and the target signature information in the same time period may be packed into the data packet.
In a specific implementation, compressing target image data acquired by the same camera by adopting an algorithm such as H.264, writing target signature information into header information of a data packet, and packaging the compressed target image data into the data packet in sequence.
And 106, transmitting the data packet to a server in the security internet of things.
In this embodiment, the data packet may be transmitted to a server in the security internet of things in a streaming manner, when the server finishes receiving the data packet, the server reversely restores the target signature information to original signature information, splits each frame of target image data collected by each camera, and each frame of target image data corresponds to each target signature information, uses an electronic signature to verify the original image data, and when the electronic signature is used to verify the target image data successfully, invokes a neural network to combine the original security of the target image data analysis area at the same sampling time point, invokes a post-processing module to smooth the original security of the combined contract time period, so as to generate the target security of the area.
And when the target security is determined to be greater than or equal to the preset level, ignoring the security event at the moment.
When the target security is determined to be smaller than the preset level, alarm information is generated to prompt corresponding staff to check.
In the embodiment, a security event reported by a certain camera in the security and protection internet of things in the monitoring process is received; controlling all cameras installed in the area where the security event occurs in the security Internet of things to generate original image data and original signature information when each sampling time point is reached, wherein the original signature information is provided with an electronic signature of the original image data; screening out original image data of which the sampling time points belong to the same time period as target image data; compressing the same or similar data for the original signature information under the condition of maintaining the electronic signature unchanged aiming at the target image data so as to aggregate the original signature information into target signature information; packaging all target image data and target signature information into a data packet; transmitting the data packet to a server in the security internet of things, wherein the server is used for combining the original security of the target image data analysis area at the same sampling time point and the target security of the original security generation area at the same time period when the target image data is successfully checked by using the electronic signature. The original signature information is compressed into the target signature information, so that the data volume can be reduced, the occupied bandwidth is reduced, the target image data and the target signature information are uploaded in a distinguishing sampling time point and a time period, the data structure is standard, the processing of a server is facilitated, and the processing efficiency is improved.
Further, fig. 2 shows an application architecture diagram of the system provided by the embodiment of the present invention.
The electronic signature generation system specifically comprises the following modules:
the security event receiving module 201 is configured to receive a security event reported by a certain camera in the security internet of things in a monitoring process;
the security data receiving module 202 is configured to control all cameras installed in the area where the security event occurs in the security internet of things to generate original image data and original signature information when each time point reaches a sampling time point, where the original signature information has an electronic signature of the original image data;
an image data screening module 203, configured to screen the original image data whose sampling time points belong to the same time period as target image data;
a signature information compression module 204, configured to compress, for the target image data, the same or similar data for the original signature information under the condition that the electronic signature is maintained unchanged, so as to aggregate the original signature information into target signature information;
the security data packaging module 205 is configured to package all the target image data and the target signature information into a data packet;
The data packet transmission module 206 is configured to transmit the data packet to a server in the security internet of things, where the server is configured to analyze, when the verification of the target image data using the electronic signature is successful, an original security of the region in association with the target image data at the same sampling time point, and generate, in association with the original security in the same time period, a target security of the region.
Further, the security data receiving module 202 is further configured to:
inquiring all cameras in the security and protection Internet of things, which are installed in the area where the security event occurs, wherein the cameras are provided with the frequency for acquiring the original image data;
calculating the reciprocal of the frequency to be used as the time length of the interval of the camera for collecting the original image data;
dividing a plurality of sampling time points on a time axis, wherein the time length with the highest interval value between every two adjacent sampling time points;
and controlling the camera to report the original image data and the original signature information generated when the camera is closest to the sampling time point.
Further, the image data filtering module 203 is further configured to:
inquiring the minimum quantity required by the original image data when a server in the security internet of things processes the security event;
Multiplying a target number by the duration with the highest value, wherein the target number is the sum value between the minimum number and the preset error number as a time period;
dividing a plurality of time nodes on a time axis, wherein the time period is between every two adjacent time nodes;
and screening out the original image data of the sampling time points between two adjacent time nodes as target image data.
Further, the signature information compression module 204 is further configured to:
screening the data which are the same or similar in the time period from the original signature information as first target data aiming at the target image data;
screening the same or similar data in the sampling points from the original signature information as second target data aiming at the target image data;
compressing the original signature information under the condition of maintaining the electronic signature unchanged, so as to keep the first target data and the second target data in part of the original signature information and filter the first target data and the second target data in part of the original signature information;
And sequentially aggregating the compressed original signature information into target signature information.
Further, the signature information compression module 204 is further configured to:
selecting first time information representing the time period from the time stamp of the original signature information screen as first target data aiming at the target image data;
screening out security levels from all the original signature information;
setting the security level with the highest duty ratio as a security tag as first target data.
Further, the signature information compression module 204 is further configured to:
screening second time information representing the sampling time point from the time stamp of the original signature information aiming at the target image data;
and mapping the second time information into the same time label, wherein the time label is used as second target data and represents the sequence of the sampling time points in the time period.
Further, the signature information compression module 204 is further configured to:
determining first characteristic information and second characteristic information, wherein the first characteristic information is first original signature information of a first sampling time point in the time period, and the second characteristic information is first original signature information of each sampling time point;
The first time information is reserved in the first characteristic information, and the first time information is filtered out from the first characteristic information;
replacing the second time information with the time tag in the second characteristic information, and filtering the second time information in the non-second characteristic information;
retaining the electronic signature in each piece of original signature information;
and replacing the security level with the security tag in the first characteristic information, filtering the security level if the security level is the same as the security tag for each piece of original signature information, and replacing the security level with an offset between the security level and the security tag if the security level is different from the security tag.
Further, the security data packaging module 205 is further configured to:
compressing the target image data acquired by the same camera;
writing the target signature information into header information of a data packet;
and packaging the compressed target image data into the data packets according to the sequence.
Further, fig. 3 shows an application architecture diagram of the system provided by the embodiment of the present invention.
Wherein, the electronic signature generation system comprises an edge node 310 and a plurality of cameras 320, wherein, the edge node 310 comprises:
at least one processor 311; and
a memory 312 communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory 312 stores a computer program executable by the at least one processor 311, the computer program being executable by the at least one processor 311 to enable the at least one processor to perform the electronic signature generation method according to any one of the embodiments of the present invention.
Further, an embodiment of the present invention provides a computer readable storage medium, where a computer program is stored, where the computer program is configured to cause a processor to implement the electronic signature generating method according to any one of the embodiments of the present invention when executed.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (10)

1. The electronic signature generation method is characterized by comprising the following steps of:
Receiving a security event reported by a certain camera in the security and protection Internet of things in the monitoring process;
controlling all cameras in the security and protection Internet of things and installed in the area where the security event occurs to generate original image data and original signature information when each sampling time point is reached, wherein the original signature information is provided with an electronic signature of the original image data;
screening out the original image data of which the sampling time points belong to the same time period as target image data;
compressing the same or similar data for the original signature information under the condition of maintaining the electronic signature unchanged for the target image data so as to aggregate the original signature information into target signature information;
packaging all the target image data and the target signature information into a data packet;
and transmitting the data packet to a server in the security internet of things, wherein the server is used for analyzing the original security of the area by combining the target image data at the same sampling time point when the target image data are successfully checked by using the electronic signature, and generating the target security of the area by combining the original security at the same time period.
2. The method for generating an electronic signature as recited in claim 1, wherein said controlling all cameras installed in the area where the security event occurs within the security internet of things to generate the original image data and the original signature information each time a sampling time point is reached specifically includes the steps of:
inquiring all cameras in the security and protection Internet of things, which are installed in the area where the security event occurs, wherein the cameras are provided with the frequency for acquiring the original image data;
calculating the reciprocal of the frequency to be used as the time length of the interval of the camera for collecting the original image data;
dividing a plurality of sampling time points on a time axis, wherein the time length with the highest interval value between every two adjacent sampling time points;
and controlling the camera to report the original image data and the original signature information generated when the camera is closest to the sampling time point.
3. The electronic signature generation method as recited in claim 2, wherein the screening out the original image data whose sampling time points belong to the same time period as target image data includes:
inquiring the minimum quantity required by the original image data when a server in the security internet of things processes the security event;
Multiplying a target number by the duration with the highest value, wherein the target number is the sum value between the minimum number and the preset error number as a time period;
dividing a plurality of time nodes on a time axis, wherein the time period is between every two adjacent time nodes;
and screening out the original image data of the sampling time points between two adjacent time nodes as target image data.
4. The method for generating an electronic signature as recited in claim 1, wherein compressing the same or similar data for the original signature information with respect to the target image data while maintaining the electronic signature unchanged, so as to aggregate the original signature information into target signature information, comprises the steps of:
screening the data which are the same or similar in the time period from the original signature information as first target data aiming at the target image data;
screening the same or similar data in the sampling points from the original signature information as second target data aiming at the target image data;
compressing the original signature information under the condition of maintaining the electronic signature unchanged, so as to keep the first target data and the second target data in part of the original signature information and filter the first target data and the second target data in part of the original signature information;
And sequentially aggregating the compressed original signature information into target signature information.
5. The method according to claim 4, wherein the step of screening the original signature information for the target image data for data identical or similar in the time period as first target data specifically includes the steps of:
selecting first time information representing the time period from the time stamp of the original signature information screen as first target data aiming at the target image data;
screening out security levels from all the original signature information;
setting the security level with the highest duty ratio as a security tag as first target data.
6. The method according to claim 5, wherein the screening the original signature information for the target image data for the same or similar data at the sampling time point as second target data includes:
screening second time information representing the sampling time point from the time stamp of the original signature information aiming at the target image data;
And mapping the second time information into the same time label, wherein the time label is used as second target data and represents the sequence of the sampling time points in the time period.
7. The method for generating an electronic signature as recited in claim 6, wherein compressing the original signature information while maintaining the electronic signature so as to retain the first target data and the second target data in a portion of the original signature information, and filtering the first target data and the second target data in a portion of the original signature information, comprises the steps of:
determining first characteristic information and second characteristic information, wherein the first characteristic information is first original signature information of a first sampling time point in the time period, and the second characteristic information is first original signature information of each sampling time point;
the first time information is reserved in the first characteristic information, and the first time information is filtered out from the first characteristic information;
replacing the second time information with the time tag in the second characteristic information, and filtering the second time information in the non-second characteristic information;
Retaining the electronic signature in each piece of original signature information;
and replacing the security level with the security tag in the first characteristic information, filtering the security level if the security level is the same as the security tag for each piece of original signature information, and replacing the security level with an offset between the security level and the security tag if the security level is different from the security tag.
8. The method for generating an electronic signature as recited in any one of claims 1 to 7, wherein said packaging all of said target image data and said target signature information into a data packet specifically comprises the steps of:
compressing the target image data acquired by the same camera;
writing the target signature information into header information of a data packet;
and packaging the compressed target image data into the data packets according to the sequence.
9. An electronic signature generation system, characterized in that the electronic signature generation system comprises:
the security event receiving module is used for receiving security events reported by a certain camera in the security Internet of things in the monitoring process;
The security data receiving module is used for controlling all cameras installed in the area where the security event occurs in the security Internet of things to generate original image data and original signature information when each sampling time point is reached, wherein the original signature information is provided with an electronic signature of the original image data;
the image data screening module is used for screening the original image data of which the sampling time points belong to the same time period as target image data;
the signature information compression module is used for compressing the same or similar data of the original signature information aiming at the target image data under the condition of maintaining the electronic signature unchanged so as to aggregate the original signature information into target signature information;
the security data packaging module is used for packaging all the target image data and the target signature information into a data packet;
the data packet transmission module is used for transmitting the data packet to a server in the security internet of things, and the server is used for analyzing the original security of the area in combination with the target image data at the same sampling time point and generating the target security of the area in combination with the original security at the same time period when the target image data are successfully checked by using the electronic signature.
10. An electronic signature generation system, comprising an edge node and a plurality of cameras, wherein the edge node comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the electronic signature generation method of any one of claims 1-8.
CN202310482924.9A 2023-05-04 2023-05-04 Electronic signature generation method and system Active CN116233565B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310482924.9A CN116233565B (en) 2023-05-04 2023-05-04 Electronic signature generation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310482924.9A CN116233565B (en) 2023-05-04 2023-05-04 Electronic signature generation method and system

Publications (2)

Publication Number Publication Date
CN116233565A true CN116233565A (en) 2023-06-06
CN116233565B CN116233565B (en) 2023-07-21

Family

ID=86573480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310482924.9A Active CN116233565B (en) 2023-05-04 2023-05-04 Electronic signature generation method and system

Country Status (1)

Country Link
CN (1) CN116233565B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111959A (en) * 1999-10-04 2001-04-20 Hitachi Ltd Monitor system
KR20030016750A (en) * 2001-08-21 2003-03-03 엘지전자 주식회사 Image data reduction and transmission method for personal computer screen monitoring in terminal which can communicate with remote terminal by image
CN106569750A (en) * 2016-11-09 2017-04-19 郑州云海信息技术有限公司 Data compression method and device
CN112446052A (en) * 2021-01-29 2021-03-05 东方微电科技(武汉)有限公司 Aggregated signature method and system suitable for secret-related information system
CN113673495A (en) * 2021-10-25 2021-11-19 北京通建泰利特智能系统工程技术有限公司 Intelligent security method and system based on neural network and readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111959A (en) * 1999-10-04 2001-04-20 Hitachi Ltd Monitor system
KR20030016750A (en) * 2001-08-21 2003-03-03 엘지전자 주식회사 Image data reduction and transmission method for personal computer screen monitoring in terminal which can communicate with remote terminal by image
CN106569750A (en) * 2016-11-09 2017-04-19 郑州云海信息技术有限公司 Data compression method and device
CN112446052A (en) * 2021-01-29 2021-03-05 东方微电科技(武汉)有限公司 Aggregated signature method and system suitable for secret-related information system
CN113673495A (en) * 2021-10-25 2021-11-19 北京通建泰利特智能系统工程技术有限公司 Intelligent security method and system based on neural network and readable storage medium

Also Published As

Publication number Publication date
CN116233565B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN106060442B (en) Video storage method, device and system
CN110166418B (en) Attack detection method and device, computer equipment and storage medium
CN110225299B (en) Video monitoring method and device, computer equipment and storage medium
CN112291520B (en) Abnormal event identification method and device, storage medium and electronic device
CN110995468A (en) System fault processing method, device, equipment and storage medium of system to be analyzed
CN107959812B (en) Monitoring data storage method, device and system and routing equipment
CN105354126A (en) Method and device for monitoring exception in page script file
CN110928880B (en) Data processing method, device, terminal and medium based on block chain
CN108322350B (en) Service monitoring method and device and electronic equipment
CN111143163A (en) Data monitoring method and device, computer equipment and storage medium
CN112491659B (en) Flow playback test method and device, computer equipment and storage medium
WO2020093164A1 (en) Methods and systems for detection of anomalous motion in a video stream and for creating a video summary
CN108900374A (en) A kind of data processing method and device applied to DPI equipment
CN113254341B (en) Link data tracking method, device, equipment and storage medium
CN111241938A (en) Face recognition method and device based on image verification and computer equipment
CN116456057B (en) Video processing system and method based on Internet of things
CN113065912A (en) Method, apparatus, device and medium for monitoring orders with unsynchronized order states
CN116233565B (en) Electronic signature generation method and system
CN111860590A (en) License plate voting method and device, computer equipment and storage medium
US20130290476A1 (en) Identifying Business Transactions from Traffic in an Enterprise Content Management System
US11012696B2 (en) Reducing an amount of storage used to store surveillance videos
CN115729683A (en) Task processing method, device, system, computer equipment and storage medium
CN111263113B (en) Data packet sending method and device and data packet processing method and device
CN111078588B (en) Garbage recycling method, device, equipment and storage medium
CN115952398B (en) Traditional calculation method, system and storage medium based on data of Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant