Video anti-counterfeiting system, method and device

An anti-counterfeiting system and video technology, applied in the field of data processing, can solve the problems of cumbersome steps, the inability to detect the authenticity at one time, and the lack of value protection on the Internet, so as to achieve the effect of improving the accuracy rate

Inactive Publication Date: 2018-12-18
北京朗达和顺科技有限公司
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of network technology, the security of stored information has attracted more and more attention. Although various data (pictures, videos, music, etc.) can be conveniently stored through the Internet, the security of these data still needs to be guaranteed by these third parties. , the Internet itself does not have a value protection mechanism, and if the information that needs to be kept secret is leaked and then tampered with, it will be even more impossible to guarantee the security and authenticity of the information
[0003] Recently, with the popularization of digital video recording equipment, the reductio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video anti-counterfeiting system, method and device
  • Video anti-counterfeiting system, method and device
  • Video anti-counterfeiting system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0047] Example one:

[0048] The embodiment of the application provides a video anti-counterfeiting system. The above-mentioned video anti-counterfeiting system adopts blockchain technology. A blockchain network is formed by building a network of nodes on multiple servers in the Internet. The nodes refer to the servers in the blockchain network. . The nodes can communicate based on application layer protocols. The communication protocols used include, for example, HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Transmission Control Protocol (TCP). )Wait. Bootstrapping and interconnection are realized by means of Domain Name System (DNS) seed, node seed and enumerating specified network segments, so that each node can send and receive messages between each other.

[0049] Reference figure 1 As shown, the structure diagram of a video anti-counterfeiting system provided by an embodiment of this application includes: a first node, at least one second node, and a...

Example Embodiment

[0074] Embodiment two:

[0075] The embodiment of the present application also provides a video anti-counterfeiting method. For better description, image 3 Shown is a schematic flow diagram of a video anti-counterfeiting method, the steps are as follows:

[0076] Step S302: The first node obtains the video stream and segments the video stream; the first node generates a first check value for the N video streams obtained after segmentation, and N is a positive integer.

[0077] Step S304, the first node selects the second node from at least one second node.

[0078] Step S306: The first node sends the i-th video stream among the N video streams and the first check value corresponding to the i-th video stream to the selected second node, where i is any positive integer less than or equal to N, where , The second node is selected to provide the i-th video stream and the corresponding first check value to the third node. The third node generates the second check value based on the i-th v...

Example Embodiment

[0080] Embodiment three:

[0081] The embodiment of the present application also provides a video anti-counterfeiting method. For better description, Figure 4 Shown is a schematic flow diagram of another video anti-counterfeiting method, the steps are as follows:

[0082] Step S402: The second node is selected to receive the i-th video stream and the first check value corresponding to the i-th video stream among the N video streams sent by the first node.

[0083] Step S404: The selected second node sends a first indication message to other nodes in the video anti-counterfeiting system, where the first indication message is used to indicate that the selected second node has recorded the i-th video stream and the corresponding first check value.

[0084] Step S406: After receiving the acquisition request sent by the third node, the selected second node sends the i-th video stream and the corresponding first check value to the third node; the third node generates the video stream based ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a video anti-counterfeiting system, a method and a device, which relate to the technical field of data processing. The system comprises a first node, at least one second node and a third node. Wherein the first node is used for acquiring a video stream and segmenting the video stream; generating a first check value for the N video streams obtained after the segmentation; selecting a second node for receiving and recording an i-th video stream and a corresponding first check value; the third node generates a second check value corresponding to the ith video stream; When it is detected that the first check value corresponding to the ith video stream is inconsistent with the second check value corresponding to the ith video stream, it is determined that the ith video stream obtained from the jth selected second node is tampered with. The present application judges the authenticity of a video by a check value, thereby alleviating the problem of tedious steps in videoauthenticity identification in the prior art.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular, to a video anti-counterfeiting system, method and device. Background technique [0002] With the development of network technology, the security of stored information has attracted more and more attention. Although various data (pictures, videos, music, etc.) can be conveniently stored through the Internet, the security of these data still needs to be guaranteed by these third parties. , The Internet itself does not have a value protection mechanism, and if the information that needs to be kept secret is leaked and then tampered with, the security and authenticity of this information cannot be guaranteed. [0003] Recently, with the popularization of digital video recording equipment, the reduction of storage costs and the growing strength of editing software, digital video is gradually becoming an important means for people to store information. However, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/234H04N21/44H04N21/845
CPCH04N21/23418H04N21/44008H04N21/8456
Inventor 汪孝斌马兆远
Owner 北京朗达和顺科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products