CN116827683A - Safe and reliable electronic certificate fixing method and device - Google Patents

Safe and reliable electronic certificate fixing method and device Download PDF

Info

Publication number
CN116827683A
CN116827683A CN202311068620.4A CN202311068620A CN116827683A CN 116827683 A CN116827683 A CN 116827683A CN 202311068620 A CN202311068620 A CN 202311068620A CN 116827683 A CN116827683 A CN 116827683A
Authority
CN
China
Prior art keywords
image data
intensity level
target image
target
occurrences
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311068620.4A
Other languages
Chinese (zh)
Other versions
CN116827683B (en
Inventor
牛皓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cao Xing
Original Assignee
Shenzhen Daheng Data Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Daheng Data Security Technology Co ltd filed Critical Shenzhen Daheng Data Security Technology Co ltd
Priority to CN202311068620.4A priority Critical patent/CN116827683B/en
Publication of CN116827683A publication Critical patent/CN116827683A/en
Application granted granted Critical
Publication of CN116827683B publication Critical patent/CN116827683B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Processing Or Creating Images (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to the field of computers, in particular to a safe and reliable electronic fixing method and a device, wherein the method comprises the steps that a server determines that a client selects target image data in a mirror image database, and determines that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image, and the initial image data is respectively converted into a second intensity level group of the RGB image and the HSV image; further determining a target rough difference value, and judging that the target image data is valid when the target rough difference value is smaller than a set threshold value; the server side sends an image data uploading permission; the client uploads target image data to the authentication end according to the image data uploading permission; by constructing a mirror image database, the original data is prevented from being tampered during data extraction; after the image data is selected by the client, the rough difference value calculation is carried out on the target image data and the initial image data, the target image data to be uploaded by the client is determined to be effective, and the image is prevented from being tampered when being uploaded to the authentication end.

Description

Safe and reliable electronic certificate fixing method and device
Technical Field
The application relates to the field of computers, in particular to a safe and reliable electronic certificate fixing method and device.
Background
The electronic data is formed in the case generation process, is stored, processed and transmitted in a digital form, and can prove the fact of the case. In recent years, when related laws and regulations such as civil litigation law and criminal litigation law are modified, electronic data is defined as one of evidences, and the power of rights and interests for collecting, storing, solidifying and reproducing related electronic evidences is enhanced. Thus, network activity participants protect network related interests by legal, administrative, etc. means, and are in need of online collection and solidification of electronic data to timely and objectively collect and solidify evidence of network infringement which may be destroyed and lost or difficult to obtain later, and if necessary, verify and restore to maintain their proof qualification for presentation or provision to judicial and administrative authorities.
When judicial personnel or authorized personnel extract data serving as evidence at a client, although the data can not be modified in the process of data extraction at present, the data is difficult to be modified before uploading, particularly, the slightly modified image data is difficult to identify, rapid and accurate screening is difficult to realize for data with larger data volume such as images, and the efficiency is lower in the process of evidence comparison and searching. In the existing evidence acquisition and transmission process, interference by involved personnel is likely, and the security of electronic evidence transmission needs to be enhanced in order to realize the security transmission of the electronic evidence.
Disclosure of Invention
The present application has been made in view of the above problems, and has as its object to provide a secure and reliable electronic authentication method and apparatus which overcomes or at least partially solves the above problems, including:
a safe and credible electronic certificate fixing method relates to a server, a client and an authentication end, and the method comprises the following steps:
the server receives an image data calling request initiated by the client and determines a target image database according to the image data calling request;
the server side builds a mirror image database according to the target image database and opens access read permission of the mirror image database to the client side; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server;
the server receives the image data uploading request, determines the target image data and determines that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value;
the server side sends an image data uploading license to the client side according to the effective target image data; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
Preferably, the first intensity level group includes the number of occurrences of each intensity level of three channels of red, green and blue in the RGB image converted from the target image data, and the number of occurrences of each intensity level of three channels of hue, saturation and brightness in the HSV image; the determining the first intensity level set for converting the target image data into RGB images and HSV images, respectively, includes:
the service end converts the target image data into RGB images, the number of pixels of the RGB images is n, the color intensity values of the red, green and blue channels of the RGB images are divided into L intensity levels,representing the number of occurrences of the kth intensity level of the R-channel,represents the number of occurrences of the kth intensity level of the G channel,/->Represents the number of occurrences of the kth intensity level of the B channel,/->
The serviceThe terminal converts the target image data into HSV images, the number of pixels of the HSV images is n, the intensity values of three channels of hue, saturation and brightness of the HSV images are respectively divided into P intensity levels,represents the number of occurrences of the mth intensity level of the H channel,/->Represents the number of occurrences of the mth intensity level of the S channel,/->Representing the number of occurrences of the mth intensity level of the V-channel,
preferably, the second intensity level group includes the number of occurrences of each intensity level of the three channels of red, green and blue in the RGB image converted from the initial image data, and the number of occurrences of each intensity level of the three channels of hue, saturation and brightness in the HSV image; the determining the second intensity level set for converting the initial image data into RGB images and HSV images, respectively, includes:
the server determines the number of occurrences of each intensity level of the RGB image and the HSV image of the initial image data,the number of occurrences of the kth intensity level of the R-channel representing the initial image data, +.>The number of occurrences of the kth intensity level of the G-channel representing the initial image data,/for each of the k-th intensity levels>Representing the number of occurrences of the kth intensity level of the B-channel of the initial image data, +.>Representing the number of occurrences of the mth intensity level of the initial image data H-channel, and/or>Representing the number of occurrences of the mth intensity level of the S-channel of the initial image data, (-), for example>Representing the number of occurrences of the mth intensity level of the initial image data V-channel.
Preferably, said determining a target coarse difference value from said first set of intensity levels and said second set of intensity levels comprises:
and calculating a rough difference value F between the target image data and the initial image data, wherein the formula is as follows:
wherein ,representing H channel custom coefficient values,>representing S-channel custom coefficient values,>representing the V-channel custom coefficient value.
Preferably, determining the target image data includes:
when the target image data is video frame data, each frame image from the first frame to the last frame of the video frame image is determined to be the target image data.
Preferably, before the determining that the target image data is converted into the RGB image and the HSV image, respectively, the determining includes:
and carrying out Gaussian filtering denoising on the target image data.
Preferably, the server receives an image data call request initiated by the client, and before the step of receiving the image data call request, the method further includes:
acquiring delay D, packet loss rate Y and consumed energy W of wireless communication between electronic evidence acquisition sensor equipment and processor equipment; calculating the communication transmission reliability:
wherein ,/>Representing delay parameters, +.>Indicating packet loss parameter,/->Representing the overall parameter, the value of J is more than 0 and less than 1; the greater the value of J, the higher the confidence.
A secure and trusted electronic authentication device, which relates to a server, a client and an authentication end, wherein the device comprises:
the request module is used for receiving an image data calling request initiated by the client side by the server side and determining a target image database according to the image data calling request;
the construction module is used for constructing a mirror image database according to the target image database by the server and opening the access read permission of the mirror image database to the client; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server;
the judging module is used for receiving the image data uploading request by the server, determining the target image data and determining a first intensity level group for respectively converting the target image data into an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value;
the permission module is used for sending image data uploading permission to the client according to the effective target image data by the server; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
A computer device comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor implements the steps of a secure trusted electronic authentication method as described above.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a secure trusted electronic certificate authority method as described above.
The application has the following advantages:
according to the technical scheme, the mirror image database is built according to the calling request, so that the original data is prevented from being tampered during data extraction; after the image data is selected by the client, the rough difference value calculation is carried out on the target image data and the initial image data, the target image data to be uploaded by the client is determined to be effective, and the image is prevented from being tampered when being uploaded to the authentication end.
Drawings
In order to more clearly illustrate the technical solutions of the present application, the drawings that are needed in the description of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flow chart of steps of a secure and trusted electronic certificate authorities method according to an embodiment of the present application;
FIG. 2 is a block diagram of a secure trusted electronic certificate authority according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order that the manner in which the above recited objects, features and advantages of the present application are obtained will become more readily apparent, a more particular description of the application briefly described above will be rendered by reference to the appended drawings. It will be apparent that the described embodiments are some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The inventors found by analyzing the prior art that: while conventional encrypting electronic data with hash values can improve the security of the electronic data, it is manually selected which electronic data is encrypted. And the conditions of data miss selection, unsafe data environment or wrong selection are easy to occur by people. Based on the method, the data fixing process is realized by training a model by means of a powerful machine learning technology such as deep learning.
Referring to fig. 1, a flowchart of steps of a method for fixing electronic data based on deep learning according to an embodiment of the application is shown; the method comprises the following steps:
s110, the server receives an image data calling request initiated by the client and determines a target image database according to the image data calling request;
s120, the server builds a mirror image database according to the target image database, and opens access read rights of the mirror image database to the client; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server;
s130, the server receives the image data uploading request, determines the target image data and determines that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value;
s140, the server side sends image data uploading permission to the client side according to the effective target image data; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
According to the technical scheme, the mirror image database is built according to the calling request, so that the original data is prevented from being tampered during data extraction; after the image data is selected by the client, the rough difference value calculation is carried out on the target image data and the initial image data, the target image data to be uploaded by the client is determined to be effective, and the image is prevented from being tampered when being uploaded to the authentication end.
The following examples further illustrate a secure and trusted electronic authentication method.
In step S130, the first intensity level group includes the number of occurrences of each intensity level of the three channels of red, green, and blue in the RGB image converted from the target image data, and the number of occurrences of each intensity level of the three channels of hue, saturation, and brightness in the HSV image; the determining the first intensity level set for converting the target image data into RGB images and HSV images, respectively, includes:
the service end converts the target image data into RGB images, the number of pixels of the RGB images is n, the color intensity values of the red, green and blue channels of the RGB images are divided into L intensity levels,representing the number of occurrences of the kth intensity level of the R-channel,represents the number of occurrences of the kth intensity level of the G channel,/->Represents the number of occurrences of the kth intensity level of the B channel,/->
The server converts the target image data into HSV images, the number of pixels of the HSV images is n, intensity values of three channels of hue, saturation and brightness of the HSV images are respectively divided into P intensity levels,represents the number of occurrences of the mth intensity level of the H channel,/->Represents the number of occurrences of the mth intensity level of the S channel,/->Representing the number of occurrences of the mth intensity level of the V-channel,
further, the second intensity level group comprises the number of the occurrence of each intensity level of three channels of red, green and blue in the initial image data converted into RGB image, and the number of the occurrence of each intensity level of three channels of tone, saturation and brightness in HSV image; the determining the second intensity level set for converting the initial image data into RGB images and HSV images, respectively, includes:
the server determines the number of occurrences of each intensity level of the RGB image and the HSV image of the initial image data,the number of occurrences of the kth intensity level of the R-channel representing the initial image data, +.>The number of occurrences of the kth intensity level of the G-channel representing the initial image data,/for each of the k-th intensity levels>Represents the kth intensity of the B-channel of the initial image dataNumber of stage occurrences, +.>Representing the number of occurrences of the mth intensity level of the initial image data H-channel, and/or>Representing the number of occurrences of the mth intensity level of the S-channel of the initial image data, (-), for example>Representing the number of occurrences of the mth intensity level of the initial image data V-channel.
And calculating a rough difference value F between the target image data and the initial image data, wherein the formula is as follows:
wherein ,representing H channel custom coefficient values,>representing S-channel custom coefficient values,>representing the V-channel custom coefficient value.
When the coarse difference value F is smaller than the set threshold, the target image data is determined to be valid, and when the coarse difference value F is larger than the set threshold, the target image data is determined to be invalid.
In an embodiment of the present application, determining the target image data includes:
when the target image data is video frame data, each frame image from the first frame to the last frame of the video frame image is determined to be the target image data.
Before the determining that the target image data is converted into an RGB image and an HSV image respectively, the method comprises the following steps:
and carrying out Gaussian filtering denoising on the target image data.
The server receives an image data calling request initiated by the client, and the method further comprises the following steps:
acquiring delay D, packet loss rate Y and consumed energy W of wireless communication between electronic evidence acquisition sensor equipment and processor equipment; calculating the communication transmission reliability:
wherein ,/>Representing delay parameters, +.>Indicating packet loss parameter,/->Representing the overall parameter, the value of J is more than 0 and less than 1; the greater the value of J, the higher the confidence. The consumed energy W comprises the sum of the transmission loss and the power amplification loss of the sensor, and is determined by the transmission distance, the frequency, the transmission frequency, the gain of a transmitting antenna and the gain of a receiving antenna, and can also be determined by the strength of a transmitting signal and a receiving signal. The signal reception strength refers to the strength of a wireless signal received by the receiving station apparatus. rss=pt+gr+gt-Lc-Lbf. RSS = received signal strength. Pt=transmit power. Gr=receive antenna gain. Gt = transmit antenna gain. Lc=attenuation of cable and cable head. Lbf = free space loss. The energy consumed is characterized by the transmitted signal strength minus the received signal strength.
The calculation method greatly enhances the calculation efficiency by calculating the rough difference value F between the target image data and the initial image data, namely, the target image data is converted into RGB images, the target image data is converted into HSV images, and the calculation efficiency is greatly enhanced by making differences with the initial image data RGB and the images converted by the HSV images in different intensity levels of the following channels, namely, the number of the k-th intensity level of the R channel, the number of the k-th intensity level of the G channel, the number of the k-th intensity level of the B channel, the number of the m-th intensity level of the H channel, the number of the m-th intensity level of the S channel and the number of the m-th intensity level of the V channel;
the application is provided withRepresenting H channel custom coefficient values,>representing S-channel custom coefficient values,>the user-defined coefficient value of the V channel is represented, the combination of the RGB image and the HSV image is realized, the accurate calculation of the coarse difference value F is realized, and the calculation efficiency is greatly enhanced.
According to the application, when the rough difference value F is smaller than the set threshold value, the target image data is judged to be valid, and when the rough difference value F is larger than the set threshold value, the electronic evidence image data or the video frame data is judged to be invalid, namely, the screening function of the image is greatly enhanced, and the integrity of the evidence is greatly improved.
The application overcomes the defect that in the prior art, each pixel in the image is calculated, but the application only calculates the characteristic frequency of the pixel, thereby greatly reducing the calculated amount and greatly improving the searching efficiency for large-scale evidence searching.
The method comprises the steps of acquiring delay D, packet loss rate Y and consumed energy W of wireless communication between electronic evidence acquisition sensor equipment and processor equipment; the reliability of communication transmission is calculated, and the safety transmission of the electronic evidence is realized through the calculation of the reliability of the application, so that the transmission verification efficiency is improved.
Referring to fig. 2, a schematic structural diagram of a secure and trusted electronic certificate authority according to an embodiment of the present application is shown;
the method specifically comprises the following steps:
a request module 110, configured to receive an image data retrieval request initiated by the client, and determine a target image database according to the image data retrieval request;
the construction module 120 is configured to construct a mirror image database according to the target image database by the server, and open access read rights of the mirror image database to the client; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server;
the determining module 130 is configured to receive the image data uploading request, determine the target image data, and determine that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value;
a license module 140, configured to send, by the server, an image data upload license to the client according to the valid target image data; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
Referring to fig. 3, a computer device of the secure and trusted electronic certificate authorities of the present application may specifically include the following:
the computer device 12 described above is embodied in the form of a general purpose computing device, and the components of the computer device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, a bus 18 that connects the various system components, including the system memory 28 and the processing units 16.
Bus 18 represents one or more of several types of bus 18 structures, including a memory bus 18 or memory controller, a peripheral bus 18, an accelerated graphics port, a processor, or a local bus 18 using any of a variety of bus 18 architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus 18, micro channel architecture (MAC) bus 18, enhanced ISA bus 18, video Electronics Standards Association (VESA) local bus 18, and Peripheral Component Interconnect (PCI) bus 18.
Computer device 12 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. The computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (commonly referred to as a "hard disk drive"). Although not shown in fig. 3, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk such as a CD-ROM, DVD-ROM, or other optical media may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. The memory may include at least one program product having a set (e.g., at least one) of program modules 42, the program modules 42 being configured to carry out the functions of embodiments of the application.
A program/utility 40 having a set (at least one) of program modules 42 may be stored in, for example, a memory, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules 42, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods of the embodiments described herein.
The computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, camera, etc.), one or more devices that enable a user to interact with the computer device 12, and/or any devices (e.g., network card, modem, etc.) that enable the computer device 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Moreover, computer device 12 may also communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet, through network adapter 20. As shown, network adapter 20 communicates with other modules of computer device 12 via bus 18. It should be appreciated that although not shown in fig. 3, other hardware and/or software modules may be used in connection with computer device 12, including, but not limited to: microcode, device drivers, redundant processing units 16, external disk drive arrays, RAID systems, tape drives, data backup storage systems 34, and the like.
The processing unit 16 executes programs stored in the system memory 28 to perform various functional applications and data processing, such as implementing a secure and trusted electronic authentication method provided by embodiments of the present application.
That is, the processing unit 16 realizes when executing the program: the server receives an image data calling request initiated by the client and determines a target image database according to the image data calling request; the server side builds a mirror image database according to the target image database and opens access read permission of the mirror image database to the client side; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server; the server receives the image data uploading request, determines the target image data and determines that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value; the server side sends an image data uploading license to the client side according to the effective target image data; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
In an embodiment of the present application, the present application further provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a secure and trusted electronic certificate method as provided in all embodiments of the present application:
that is, the program is implemented when executed by a processor: the server receives an image data calling request initiated by the client and determines a target image database according to the image data calling request; the server side builds a mirror image database according to the target image database and opens access read permission of the mirror image database to the client side; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server; the server receives the image data uploading request, determines the target image data and determines that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value; the server side sends an image data uploading license to the client side according to the effective target image data; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
Any combination of one or more computer readable media may be employed. The computer readable medium may be a computer-readable signal medium or a computer-readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the scope of the embodiments of the application.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
The above description of the present application provides a secure and reliable electronic certification method and apparatus, and specific examples are applied to illustrate the principles and embodiments of the present application, where the above examples are only used to help understand the method and core idea of the present application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (10)

1. The safe and reliable electronic certification method is characterized by comprising a server, a client and an authentication end, wherein the method comprises the following steps:
the server receives an image data calling request initiated by the client and determines a target image database according to the image data calling request;
the server side builds a mirror image database according to the target image database and opens access read permission of the mirror image database to the client side; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server;
the server receives the image data uploading request, determines the target image data and determines that the target image data is respectively converted into a first intensity level group of an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value;
the server side sends an image data uploading license to the client side according to the effective target image data; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
2. The method of claim 1, wherein the first set of intensity levels includes converting the target image data to a number of occurrences of each intensity level of three red, green, and blue channels in an RGB image, and to a number of occurrences of each intensity level of three hue, saturation, and brightness channels in an HSV image; the determining the first intensity level set for converting the target image data into RGB images and HSV images, respectively, includes:
the server converts the target image data into RGB images, the number of pixels of the RGB images is n, and the color intensities of red, green and blue channels of the RGB imagesThe values are divided into L intensity levels,represents the number of occurrences of the kth intensity level of the R channel,/->Represents the number of occurrences of the kth intensity level of the G channel,/->Representing the number of occurrences of the kth intensity level of the B-channel,
the server converts the target image data into HSV images, the number of pixels of the HSV images is n, intensity values of three channels of hue, saturation and brightness of the HSV images are respectively divided into P intensity levels,represents the number of occurrences of the mth intensity level of the H channel,/->Represents the number of occurrences of the mth intensity level of the S channel,/->Representing the number of occurrences of the mth intensity level of the V-channel,
3. the method of claim 2, wherein the second set of intensity levels includes converting the initial image data to a number of occurrences of each intensity level of three red, green, and blue channels in an RGB image, and to a number of occurrences of each intensity level of three hue, saturation, and brightness channels in an HSV image; the determining the second intensity level set for converting the initial image data into RGB images and HSV images, respectively, includes:
the server determines the number of occurrences of each intensity level of the RGB image and the HSV image of the initial image data,the number of occurrences of the kth intensity level of the R-channel representing the initial image data, +.>The number of occurrences of the kth intensity level of the G-channel representing the initial image data,/for each of the k-th intensity levels>Representing the number of occurrences of the kth intensity level of the B-channel of the initial image data, +.>Representing the number of occurrences of the mth intensity level of the initial image data H-channel, and/or>Representing the number of occurrences of the mth intensity level of the S-channel of the initial image data,Representing the number of occurrences of the mth intensity level of the initial image data V-channel.
4. A method according to claim 3, wherein said determining a target coarse value from said first set of intensity levels and said second set of intensity levels comprises:
and calculating a rough difference value F between the target image data and the initial image data, wherein the formula is as follows:
wherein ,representing H channel custom coefficient values,>representing S-channel custom coefficient values,>representing the V-channel custom coefficient value.
5. The method of claim 1, wherein determining the target image data comprises:
when the target image data is video frame data, each frame image from the first frame to the last frame of the video frame image is determined to be the target image data.
6. The method of claim 1, wherein the determining the target image data prior to converting to RGB and HSV images, respectively, comprises:
and carrying out Gaussian filtering denoising on the target image data.
7. The method of claim 1, wherein the server receives the client-initiated image data retrieval request, further comprising:
acquiring delay D, packet loss rate Y and consumed energy W of wireless communication between electronic evidence acquisition sensor equipment and processor equipment; calculating the communication transmission reliability:
wherein ,/>Representing delay parameters, +.>Indicating packet loss parameter,/->Representing the overall parameter, the value of J is more than 0 and less than 1; the greater the value of J, the higher the confidence.
8. A secure, trusted electronic authentication device, characterized in that it relates to a server, a client and an authentication, said device comprising:
the request module is used for receiving an image data calling request initiated by the client side by the server side and determining a target image database according to the image data calling request;
the construction module is used for constructing a mirror image database according to the target image database by the server and opening the access read permission of the mirror image database to the client; the client is used for selecting target image data from the mirror image database and sending an image data uploading request to the server;
the judging module is used for receiving the image data uploading request by the server, determining the target image data and determining a first intensity level group for respectively converting the target image data into an RGB image and an HSV image; determining corresponding initial image data in the image database according to the target image data, and determining that the initial image data are respectively converted into a second intensity level group of RGB images and HSV images; determining a target coarse difference value according to the first intensity level group and the second intensity level group, and judging that the target image data is valid when the target coarse difference value is smaller than a set threshold value;
the permission module is used for sending image data uploading permission to the client according to the effective target image data by the server; the client is used for uploading the target image data to the authentication end according to the image data uploading permission.
9. A computer device comprising a processor, a memory and a computer program stored on the memory and capable of running on the processor, which when executed by the processor implements a secure trusted electronic certificate method as claimed in any one of claims 1 to 7.
10. A computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, which computer program, when executed by a processor, implements a secure trusted electronic certificate authority method according to any one of claims 1 to 7.
CN202311068620.4A 2023-08-24 2023-08-24 Safe and reliable electronic certificate fixing method and device Active CN116827683B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311068620.4A CN116827683B (en) 2023-08-24 2023-08-24 Safe and reliable electronic certificate fixing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311068620.4A CN116827683B (en) 2023-08-24 2023-08-24 Safe and reliable electronic certificate fixing method and device

Publications (2)

Publication Number Publication Date
CN116827683A true CN116827683A (en) 2023-09-29
CN116827683B CN116827683B (en) 2023-11-21

Family

ID=88118688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311068620.4A Active CN116827683B (en) 2023-08-24 2023-08-24 Safe and reliable electronic certificate fixing method and device

Country Status (1)

Country Link
CN (1) CN116827683B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001006459A1 (en) * 1999-07-19 2001-01-25 E-Sual Method and system for displaying remotely transmitted images
US20080063287A1 (en) * 2006-09-13 2008-03-13 Paul Klamer Method And Apparatus For Providing Lossless Data Compression And Editing Media Content
CN101853299A (en) * 2010-05-31 2010-10-06 杭州淘淘搜科技有限公司 Image searching result ordering method based on perceptual cognition
CN111581659A (en) * 2020-06-16 2020-08-25 深圳市大恒数据安全科技有限责任公司 Method and device for calling electronic evidence
KR102242694B1 (en) * 2020-11-19 2021-04-26 (주)대교씨엔에스 Monitoring method and apparatus using video wall
CN113556518A (en) * 2021-09-23 2021-10-26 成都派沃特科技股份有限公司 Video data scheduling method, device, equipment and storage medium
CN113887412A (en) * 2021-09-30 2022-01-04 中国科学院过程工程研究所 Detection method, detection terminal, monitoring system and storage medium for pollution emission
CN115063800A (en) * 2022-08-16 2022-09-16 阿里巴巴(中国)有限公司 Text recognition method and electronic equipment
WO2023279890A1 (en) * 2021-07-06 2023-01-12 北京锐安科技有限公司 Image processing method and apparatus, electronic device, and storage medium
WO2023050829A1 (en) * 2021-09-29 2023-04-06 北京百度网讯科技有限公司 Video frame processing method and apparatus, and electronic device and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001006459A1 (en) * 1999-07-19 2001-01-25 E-Sual Method and system for displaying remotely transmitted images
US20080063287A1 (en) * 2006-09-13 2008-03-13 Paul Klamer Method And Apparatus For Providing Lossless Data Compression And Editing Media Content
CN101853299A (en) * 2010-05-31 2010-10-06 杭州淘淘搜科技有限公司 Image searching result ordering method based on perceptual cognition
CN111581659A (en) * 2020-06-16 2020-08-25 深圳市大恒数据安全科技有限责任公司 Method and device for calling electronic evidence
KR102242694B1 (en) * 2020-11-19 2021-04-26 (주)대교씨엔에스 Monitoring method and apparatus using video wall
WO2023279890A1 (en) * 2021-07-06 2023-01-12 北京锐安科技有限公司 Image processing method and apparatus, electronic device, and storage medium
CN113556518A (en) * 2021-09-23 2021-10-26 成都派沃特科技股份有限公司 Video data scheduling method, device, equipment and storage medium
WO2023050829A1 (en) * 2021-09-29 2023-04-06 北京百度网讯科技有限公司 Video frame processing method and apparatus, and electronic device and storage medium
CN113887412A (en) * 2021-09-30 2022-01-04 中国科学院过程工程研究所 Detection method, detection terminal, monitoring system and storage medium for pollution emission
CN115063800A (en) * 2022-08-16 2022-09-16 阿里巴巴(中国)有限公司 Text recognition method and electronic equipment

Also Published As

Publication number Publication date
CN116827683B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
EP3130113B1 (en) Automated cloud-based analytics for security and/or surveillance
US10084995B2 (en) Systems and methods for an automated cloud-based video surveillance system
US20150381943A1 (en) Systems and Methods for an Automated Cloud-Based Video Surveillance System
US20150381417A1 (en) Systems and Methods for an Automated Cloud-Based Video Surveillance System
CN109871845B (en) Certificate image extraction method and terminal equipment
JP2000041144A (en) Image capture system and method
CN106710032B (en) Entrance guard opening method and device
WO2022078353A1 (en) Vehicle driving state determination method and apparatus, and computer device and storage medium
CN112270309A (en) Vehicle access point equipment snapshot quality evaluation method and device and readable medium
CN113904861B (en) Encryption traffic safety detection method and device
CN111629165A (en) Alarm video processing method, device, equipment and storage medium
WO2019200737A1 (en) Real estate data uploading method and apparatus, computer device, and storage medium
CN104734852A (en) Identity authentication method and device
CN112217841A (en) Live broadcast room management method and device, computer equipment and storage medium
CN108712400A (en) Data transmission method, device, computer readable storage medium and electronic equipment
CN111386711A (en) Method, device and system for managing electronic fingerprints of electronic files
CN111369557B (en) Image processing method, device, computing equipment and storage medium
CN116827683B (en) Safe and reliable electronic certificate fixing method and device
CN113158773B (en) Training method and training device for living body detection model
CN115134080B (en) Data transmission method and device based on security encryption chip
CN115114667A (en) Privacy information processing and classifying method and device for security chip
CN115359391A (en) Inspection image detection method, inspection image detection device, electronic device and medium
CN109218320B (en) Website link security verification method and device, computer equipment and storage medium
CN107169670B (en) Law enforcement record evaluation system and method thereof
CN112702623A (en) Video processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231211

Address after: 518000, Building I, Block 402, Gaozheng Garden, Gaozheng Haojing Garden, Guangming Street, Guangming New District, Shenzhen, Guangdong Province

Patentee after: Cao Xing

Address before: 518000 Shenzhen Hong Kong University Research Base, No. 015, Gaoxin South 7th Road, Gaoxin Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong Province W703A

Patentee before: SHENZHEN DAHENG DATA SECURITY TECHNOLOGY CO.,LTD.