CN108959953A - The anti-amending method of intelligent computer file - Google Patents

The anti-amending method of intelligent computer file Download PDF

Info

Publication number
CN108959953A
CN108959953A CN201810181179.3A CN201810181179A CN108959953A CN 108959953 A CN108959953 A CN 108959953A CN 201810181179 A CN201810181179 A CN 201810181179A CN 108959953 A CN108959953 A CN 108959953A
Authority
CN
China
Prior art keywords
value
column
file
image
pixel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810181179.3A
Other languages
Chinese (zh)
Other versions
CN108959953B (en
Inventor
李明霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Dao Sheng Mdt Infotech Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810181179.3A priority Critical patent/CN108959953B/en
Publication of CN108959953A publication Critical patent/CN108959953A/en
Application granted granted Critical
Publication of CN108959953B publication Critical patent/CN108959953B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/10Image acquisition
    • G06V10/12Details of acquisition arrangements; Constructional details thereof
    • G06V10/14Optical characteristics of the device performing the acquisition or on the illumination arrangements
    • G06V10/141Control of illumination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of anti-amending methods of intelligent computer file, the method includes using the anti-modification platform of intelligent file so that when current illegal user modifies to labeled file, the characteristic of the labeled file is set as not modifiable state in real time.

Description

The anti-amending method of intelligent computer file
Technical field
The present invention relates to computer field more particularly to a kind of anti-amending methods of intelligent computer file.
Background technique
File is the indispensable data in software development operation and maintenance.Software document or source code file refer to and software System and its related text entities of Software engineering process.The type of file includes software requirement file, design document, test File, user's manual etc..Demand file therein, design document and test file are usually in software development process by developing What person write, and the non-process class file such as user's manual is write by special non-technical writing personnel.
File can improve the efficiency of software development, guarantee the quality of software, and have in the use process of software guidance, The effect help, explained the puzzle, especially in maintenance work, file is indispensable data.
Under normal circumstances, file is once modified, unless being restored with professional recovery tool, it will be difficult to it gives for change, even if Using professional recovery tool, giving for change for file data is also bothersome laborious, and therefore, it is necessary to effectively be authenticated before a modification.
Summary of the invention
It to solve the above-mentioned problems, can be every the present invention provides a kind of anti-amending method of intelligent computer file Before secondary file is modified, the identity of the user of modification is identified, the attribute of file is identified, in above two identification On the basis of data, it is determined whether allow to modify to file data, to avoid giving for change for the file data for carrying out the later period Operation.
For this purpose, the present invention at least has inventive point important at following two:
(1) by the fining image procossing of signature analysis by column, the accuracy and efficiency of subsequent image identification be ensure that;
(2) user identity authentication scheme and file attribute administrative mechanism are introduced, is distinguishing that active user is illegal user And active user is carried out audible alarm and simultaneously active user is forbidden to repair in time when carrying out character input to the labeled file Change, to improve the safety of labeled file.
According to an aspect of the present invention, a kind of anti-amending method of intelligent computer file is provided, the method includes Using the anti-modification platform of intelligent file with when current illegal user modifies to labeled file, by the labeled text The characteristic of part is set as not modifiable state in real time, and the intelligence anti-modification platform of file includes:
Automatic light-supplementing equipment, setting on the subscriber terminal, are used for when image capture device carries out image data acquiring, base The real-time light intensity of scene in front of user terminal determines whether to carry out automatic light-supplementing movement, and is determining that carrying out automatic light-supplementing moves After work, corresponding light filling dynamics is determined based on the real-time light intensity of the scene in front of user terminal;
Image capture device, setting on the subscriber terminal, are beaten for being on the subscriber terminal in the presence of labeled file When open state, image data acquiring is carried out to the scene in front of user terminal, to obtain simultaneously outlet terminal scene image, is also used to When being in open state there is no labeled file on the subscriber terminal, stop the figure carrying out to the scene in front of user terminal As data acquire;
Color range adjusts equipment, connect with described image acquisition equipment, for receiving the terminal scene image, to the end It holds scene image to execute color range adjustment processing, to obtain color range adjustment image, and exports the color range adjustment image;
Column signature analysis equipment is connect with color range adjustment equipment, for receiving color range adjustment image, obtains the color The tonal content value, luminance components value and saturation degree signal component value of each pixel in the whole image of contrast, and according to each pixel The ownership column of point, to arrange the classification for index, export the tonal content value, bright of each pixel of each column to pixel progress Spend signal component value and saturation degree signal component value.
Specific embodiment
Embodiment of the present invention will be described in detail below.
In order to overcome above-mentioned deficiency, the present invention has built a kind of anti-amending method of intelligent computer file, the method Including using the anti-modification platform of intelligent file marked described when current illegal user modifies to labeled file The characteristic of note file is set as not modifiable state in real time, and the intelligence anti-modification platform of file is realized before a modification to file The intelligent management of operation, avoids file by malicious modification.
The anti-modification platform of the intelligent file shown according to an embodiment of the present invention includes:
Automatic light-supplementing equipment, setting on the subscriber terminal, are used for when image capture device carries out image data acquiring, base The real-time light intensity of scene in front of user terminal determines whether to carry out automatic light-supplementing movement, and is determining that carrying out automatic light-supplementing moves After work, corresponding light filling dynamics is determined based on the real-time light intensity of the scene in front of user terminal;
Image capture device, setting on the subscriber terminal, are beaten for being on the subscriber terminal in the presence of labeled file When open state, image data acquiring is carried out to the scene in front of user terminal, to obtain simultaneously outlet terminal scene image, is also used to When being in open state there is no labeled file on the subscriber terminal, stop the figure carrying out to the scene in front of user terminal As data acquire.
Then, continue that the specific structure of the anti-modification platform of intelligent file of the invention is further detailed.
Can also include: in the anti-modification platform of the intelligence file
Color range adjusts equipment, connect with described image acquisition equipment, for receiving the terminal scene image, to the end It holds scene image to execute color range adjustment processing, to obtain color range adjustment image, and exports the color range adjustment image.
Can also include: in the anti-modification platform of the intelligence file
Column signature analysis equipment is connect with color range adjustment equipment, for receiving color range adjustment image, obtains the color The tonal content value, luminance components value and saturation degree signal component value of each pixel in the whole image of contrast, and according to each pixel The ownership column of point, to arrange the classification for index, export the tonal content value, bright of each pixel of each column to pixel progress Spend signal component value and saturation degree signal component value.
Can also include: in the anti-modification platform of the intelligence file
Constituent analysis equipment is connect with the column signature analysis equipment, for each column each pixel execute with Lower processing: calculate the product of the tonal content value of each pixel in the column, luminance components value and saturation degree signal component value with The composition characteristics value for obtaining each pixel, by the composition characteristics value phase adduction of all pixels point in the column divided by described Color range adjusts the vertical resolution of image, exports the numerical value of acquisition as the column characteristic value of the column.
Can also include: in the anti-modification platform of the intelligence file
Suspicious column detection device is connect with the constituent analysis equipment, and column characteristic value is deviateed top column characteristic value recently Reach the default column for deviateing threshold value with the average value of the nearest column characteristic value in lower section to export as suspicious column;
Gray value matching unit is connect with the suspicious column detection device, for can to obtain by all suspicious column combinations Subgraph is doubted, by pixel of the gray value between the target gray value upper limit and target gray value lower limit in the suspicious subgraph As matched pixel point, combine all matched pixel points to obtain matching area, when the area of matching area is divided by the color When the area of the whole image of contrast is more than preset percentage threshold value, Target Acquisition pass signal is issued, when the area of matching area removes When being less than or equal to preset percentage threshold value with the area of color range adjustment image, Target Acquisition failure signal is issued;
Authentication device is connect with the gray value matching unit, for successfully believing receiving the Target Acquisition Number when, matching area match legitimate user's face mask, in successful match, issue legal identity signal, otherwise issue non- Legal identity signal;
Anti- modification equipment, connect with the authentication device, for when receiving the legal identity signal, by institute The property settings for stating labeled file are modifiable state, are also used to receiving the illegal identification signal or the target It is not modifiable state by the property settings of the labeled file when obtaining failure signal;
Sound caution device is connect with the anti-modification equipment, for being set in the characteristic of the labeled file Not after modifiable state, when user carries out character input to the labeled file, continuous alarming sound is issued, is also used to After the characteristic of the labeled file is set to modifiable state, when user carries out character input to the labeled file When, do not issue alarming sound.
Can also include: in the anti-modification platform of the intelligence file
Data uploading device is connect, for described respectively with the sound caution device and described image acquisition equipment While sound caution device issues continuous alarming sound, by the terminal scene image, link is uploaded to far by wireless communication At the file monitor server at end.
And in the anti-modification platform of the intelligent file:
The automatic light-supplementing equipment includes brightness measurer and secondary light source;
Wherein, the brightness measurer is used to measure the real-time light intensity of the scene in front of user terminal, the secondary light source For carrying out automatic light-supplementing movement.
In addition, the data uploading device realizes related data upload operation using GPRS communication equipment.GPRS is general It is grouped the abbreviation of wireless service technology (General Packet Radio Service), he is that gsm mobile telephone user is available A kind of mobile data services.GPRS can say be GSM continuity.GPRS with it is previous continuously different in the mode of channel transmission, be It is transmitted with package (Packet) formula, therefore the expense that user is born not is used with the calculating of its data transmission unit Its entire channel, theoretically inexpensively.The transmission rate of GPRS can be promoted to 56 even 114Kbps.
For the communication mode of GPRS packet switch in the communication mode of packet switch, data are divided into the packet of certain length (grouping) has a packets headers before each packet (address mark therein indicates the grouping is sent to where).Data transmission it Before do not need to allocate channel in advance, establish connection.But when each data packet reaches, according to the information in datagram header (such as destination address) temporarily finds an available channel resource and sends the datagram.In this transmission mode, number According to the side's of sending and receiving cochannel between there is no fixed occupancy relationship, channel resource can be regarded as being total to by all users Enjoy use.Since data service all shows a kind of paroxysmal business characteristic in most cases, to channel width Changes in demand is larger, therefore will preferably utilize channel resource using packet mode progress data transmission.Such as one into The user of row WWW browsing, most of the time are in browse state, and really only account for very little ratio for the time of data transmission. In this case according to the mode of fixed busy channel, it will cause the biggish wasting of resources.
Using the anti-modification platform of intelligent file of the invention, can not prevent for file in the prior art by malicious modification The technical issues of, by introducing user identity authentication scheme and file attribute administrative mechanism, distinguishing that active user is illegal When user and active user carry out character input to the labeled file, carry out audible alarm in time and forbid active user into Row modification, it is often more important that, also using the fining image procossing of signature analysis by column, for improving the standard of later image identification Exactness and efficiency.
It is understood that although the present invention has been disclosed in the preferred embodiments as above, above-described embodiment not to Limit the present invention.For any person skilled in the art, without departing from the scope of the technical proposal of the invention, Many possible changes and modifications all are made to technical solution of the present invention using the technology contents of the disclosure above, or are revised as With the equivalent embodiment of variation.Therefore, anything that does not depart from the technical scheme of the invention are right according to the technical essence of the invention Any simple modifications, equivalents, and modifications made for any of the above embodiments still fall within the range of technical solution of the present invention protection It is interior.

Claims (7)

1. a kind of anti-amending method of intelligent computer file, the method includes use the anti-modification platform of intelligent file with When current illegal user modifies to labeled file, it is set as the characteristic of the labeled file that can not modify shape in real time State, the intelligence anti-modification platform of file include:
Automatic light-supplementing equipment, setting on the subscriber terminal, are used for when image capture device carries out image data acquiring, based on use The real-time light intensity of scene in front of the terminal of family determines whether to carry out automatic light-supplementing movement, and carries out automatic light-supplementing movement determining Afterwards, corresponding light filling dynamics is determined based on the real-time light intensity of the scene in front of user terminal;
Image capture device, setting are in the shape that is opened on the subscriber terminal, for there is labeled file on the subscriber terminal When state, in front of user terminal scene carry out image data acquiring, with obtain and outlet terminal scene image, be also used to When being in open state there is no labeled file in the terminal of family, stop the picture number carrying out to the scene in front of user terminal According to acquisition.
2. the method as described in claim 1, which is characterized in that the platform further include:
Color range adjusts equipment, connect with described image acquisition equipment, for receiving the terminal scene image, to the terminal field Scape image executes color range adjustment processing, to obtain color range adjustment image, and exports the color range adjustment image.
3. method according to claim 2, which is characterized in that the platform further include:
Column signature analysis equipment is connect with color range adjustment equipment, for receiving color range adjustment image, obtains the color range tune The tonal content value, luminance components value and saturation degree signal component value of each pixel in whole image, and according to each pixel Ownership column carry out to arrange the classification for index pixel, export the tonal content value of each pixel of each column, brightness at Score value and saturation degree signal component value.
4. method as claimed in claim 3, which is characterized in that the platform further include:
Constituent analysis equipment is connect with the column signature analysis equipment, executes following place for each pixel to each column Reason: the product of the tonal content value of each pixel in the column, luminance components value and saturation degree signal component value is calculated to obtain The composition characteristics value of each pixel, by the composition characteristics value phase adduction of all pixels point in the column divided by the color range The vertical resolution for adjusting image is exported the numerical value of acquisition as the column characteristic value of the column.
5. method as claimed in claim 4, which is characterized in that the platform further include:
Suspicious column detection device is connect with the constituent analysis equipment, and column characteristic value is deviateed the nearest column characteristic value in top under The average value of the nearest column characteristic value in side reaches the default column for deviateing threshold value and exports as suspicious column;
Gray value matching unit is connect with the suspicious column detection device, for combining all suspicious column to obtain suspicious son Image, using pixel of the gray value between the target gray value upper limit and target gray value lower limit in the suspicious subgraph as Matched pixel point combines all matched pixel points to obtain matching area, when the area of matching area is divided by the color range tune When the area of whole image is more than preset percentage threshold value, Target Acquisition pass signal is issued, when the area of matching area is divided by institute When stating the area of color range adjustment image less than or equal to preset percentage threshold value, Target Acquisition failure signal is issued;
Authentication device is connect with the gray value matching unit, for when receiving the Target Acquisition pass signal, Legitimate user's face mask is matched in matching area, in successful match, legal identity signal is issued, otherwise issues illegal body Part signal;
Anti- modification equipment, connect with the authentication device, for when receiving the legal identity signal, by the quilt The property settings of tab file are modifiable state, are also used to receiving the illegal identification signal or the Target Acquisition It is not modifiable state by the property settings of the labeled file when failure signal;
Sound caution device is connect with the anti-modification equipment, for be set in the characteristic of the labeled file can not After modification state, when user carries out character input to the labeled file, continuous alarming sound is issued, is also used to described After the characteristic of labeled file is set to modifiable state, when user carries out character input to the labeled file, no Issue alarming sound.
6. method as claimed in claim 5, which is characterized in that the platform further include:
Data uploading device is connect, in the sound respectively with the sound caution device and described image acquisition equipment While caution device issues continuous alarming sound, by the terminal scene image, link is uploaded to distal end by wireless communication At file monitor server.
7. method as claimed in claim 6, it is characterised in that:
The automatic light-supplementing equipment includes brightness measurer and secondary light source;
Wherein, the brightness measurer is used to measure the real-time light intensity of the scene in front of user terminal, and the secondary light source is used for Carry out automatic light-supplementing movement.
CN201810181179.3A 2018-03-06 2018-03-06 The anti-amending method of intelligent computer file Active CN108959953B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810181179.3A CN108959953B (en) 2018-03-06 2018-03-06 The anti-amending method of intelligent computer file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810181179.3A CN108959953B (en) 2018-03-06 2018-03-06 The anti-amending method of intelligent computer file

Publications (2)

Publication Number Publication Date
CN108959953A true CN108959953A (en) 2018-12-07
CN108959953B CN108959953B (en) 2019-05-07

Family

ID=64495126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810181179.3A Active CN108959953B (en) 2018-03-06 2018-03-06 The anti-amending method of intelligent computer file

Country Status (1)

Country Link
CN (1) CN108959953B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276185A (en) * 2019-06-19 2019-09-24 郑雨鑫 Image mosaic tamper resistant method based on computer depth learning technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957903A (en) * 2010-09-13 2011-01-26 中兴通讯股份有限公司 Method and device for protecting class files
CN104506772A (en) * 2014-12-22 2015-04-08 小米科技有限责任公司 Method and device for regulating shooting parameters
CN104537289A (en) * 2014-12-18 2015-04-22 乐视致新电子科技(天津)有限公司 Method and device for protecting intended target in terminal device
US20170124347A1 (en) * 2015-11-04 2017-05-04 Ricoh Company, Ltd. Information processing apparatus, information processing method, and recording medium
CN107508801A (en) * 2017-08-04 2017-12-22 安徽智圣通信技术股份有限公司 A kind of file tamper-proof method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957903A (en) * 2010-09-13 2011-01-26 中兴通讯股份有限公司 Method and device for protecting class files
CN104537289A (en) * 2014-12-18 2015-04-22 乐视致新电子科技(天津)有限公司 Method and device for protecting intended target in terminal device
CN104506772A (en) * 2014-12-22 2015-04-08 小米科技有限责任公司 Method and device for regulating shooting parameters
US20170124347A1 (en) * 2015-11-04 2017-05-04 Ricoh Company, Ltd. Information processing apparatus, information processing method, and recording medium
CN107508801A (en) * 2017-08-04 2017-12-22 安徽智圣通信技术股份有限公司 A kind of file tamper-proof method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276185A (en) * 2019-06-19 2019-09-24 郑雨鑫 Image mosaic tamper resistant method based on computer depth learning technology

Also Published As

Publication number Publication date
CN108959953B (en) 2019-05-07

Similar Documents

Publication Publication Date Title
US9723261B2 (en) Information processing device, conference system and storage medium
JP2021532434A (en) Face feature extraction model Training method, face feature extraction method, device, equipment and storage medium
CN110119719A (en) Biopsy method, device, equipment and computer readable storage medium
CN103839037B (en) A kind of network video stream harmful content detection method based on many-core and GPU and system
KR20090003574A (en) Method and system for blocking noxious information
CN112633313B (en) Bad information identification method of network terminal and local area network terminal equipment
CN111861951A (en) Infrared light and visible light based dual-waveband monitoring method, device and system
CN110247819A (en) A kind of Wi-Fi video capture device detection method and system based on encryption stream identification
CN112017245B (en) Certificate positioning method
CN108959953B (en) The anti-amending method of intelligent computer file
Lubkowski et al. Provision of the reliable video surveillance services in heterogeneous networks
CN109389105A (en) A kind of iris detection and viewpoint classification method based on multitask
KR102171348B1 (en) Method and apparatus for application detection
CN107547839A (en) Remote control table based on graphical analysis
Jung et al. Complementary Color Barcode‐Based Optical Camera Communications
JP2007096608A (en) Unauthorized image detection apparatus, method, and program
CN108470452A (en) A kind of vehicle information management method, system and storage medium based on image recognition
CN108573129B (en) The anti-modification platform of intelligent computer file
JP5440272B2 (en) Push signal transmission status determination method, program, and apparatus
CN109889539B (en) Intelligent terminal browsing information filtering method based on WIFI
CN105611430B (en) Method and system for handling video content
US20180063710A1 (en) Authentication for device connection using visible patterns
CN116983660A (en) Image processing method and related device
CN107545212A (en) Binary channels cloud data management platform
CN109922083A (en) A kind of network protocol flow control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190301

Address after: 261061 blue health Valley B3 building, Health East Street, Weifang hi tech Zone, Shandong

Applicant after: Shandong Dao Sheng Mdt InfoTech Ltd

Address before: 222000 No. 262 Chaoyang Middle Road, Haizhou District, Lianyungang City, Jiangsu Province

Applicant before: Li Mingxia

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191223

Address after: 236000 Yingshang County Industrial Park, Fuyang City, Anhui Province

Patentee after: ANHUI HONGRUN DECORATION MATERIAL CO., LTD.

Address before: 261061 blue health Valley B3 building, Health East Street, Weifang hi tech Zone, Shandong

Patentee before: Shandong Dao Sheng Mdt InfoTech Ltd

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200330

Address after: 261061 blue health Valley B3 building, Health East Street, Weifang hi tech Zone, Shandong

Patentee after: Shandong Dao Sheng Mdt InfoTech Ltd.

Address before: 236000 Yingshang County Industrial Park, Fuyang City, Anhui Province

Patentee before: ANHUI HONGRUN DECORATION MATERIAL Co.,Ltd.