Video anti-counterfeiting system, method and device
An anti-counterfeiting system and video technology, applied in the field of data processing, can solve the problems of cumbersome steps, the inability to detect the authenticity at one time, and the lack of value protection on the Internet, so as to achieve the effect of improving the accuracy rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0047] Example one:
[0048] The embodiment of the application provides a video anti-counterfeiting system. The above-mentioned video anti-counterfeiting system adopts blockchain technology. A blockchain network is formed by building a network of nodes on multiple servers in the Internet. The nodes refer to the servers in the blockchain network. . The nodes can communicate based on application layer protocols. The communication protocols used include, for example, HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Transmission Control Protocol (TCP). )Wait. Bootstrapping and interconnection are realized by means of Domain Name System (DNS) seed, node seed and enumerating specified network segments, so that each node can send and receive messages between each other.
[0049] Reference figure 1 As shown, the structure diagram of a video anti-counterfeiting system provided by an embodiment of this application includes: a first node, at least one second node, and a...
Example Embodiment
[0074] Embodiment two:
[0075] The embodiment of the present application also provides a video anti-counterfeiting method. For better description, image 3 Shown is a schematic flow diagram of a video anti-counterfeiting method, the steps are as follows:
[0076] Step S302: The first node obtains the video stream and segments the video stream; the first node generates a first check value for the N video streams obtained after segmentation, and N is a positive integer.
[0077] Step S304, the first node selects the second node from at least one second node.
[0078] Step S306: The first node sends the i-th video stream among the N video streams and the first check value corresponding to the i-th video stream to the selected second node, where i is any positive integer less than or equal to N, where , The second node is selected to provide the i-th video stream and the corresponding first check value to the third node. The third node generates the second check value based on the i-th v...
Example Embodiment
[0080] Embodiment three:
[0081] The embodiment of the present application also provides a video anti-counterfeiting method. For better description, Figure 4 Shown is a schematic flow diagram of another video anti-counterfeiting method, the steps are as follows:
[0082] Step S402: The second node is selected to receive the i-th video stream and the first check value corresponding to the i-th video stream among the N video streams sent by the first node.
[0083] Step S404: The selected second node sends a first indication message to other nodes in the video anti-counterfeiting system, where the first indication message is used to indicate that the selected second node has recorded the i-th video stream and the corresponding first check value.
[0084] Step S406: After receiving the acquisition request sent by the third node, the selected second node sends the i-th video stream and the corresponding first check value to the third node; the third node generates the video stream based ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap