CN114938465A - Encrypted data transmission method and device based on characteristic sequence - Google Patents

Encrypted data transmission method and device based on characteristic sequence Download PDF

Info

Publication number
CN114938465A
CN114938465A CN202210875052.8A CN202210875052A CN114938465A CN 114938465 A CN114938465 A CN 114938465A CN 202210875052 A CN202210875052 A CN 202210875052A CN 114938465 A CN114938465 A CN 114938465A
Authority
CN
China
Prior art keywords
face
feature sequence
face feature
white list
video stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210875052.8A
Other languages
Chinese (zh)
Other versions
CN114938465B (en
Inventor
王立峰
邱达
刘家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202210875052.8A priority Critical patent/CN114938465B/en
Publication of CN114938465A publication Critical patent/CN114938465A/en
Application granted granted Critical
Publication of CN114938465B publication Critical patent/CN114938465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention discloses an encrypted data transmission method and device based on a characteristic sequence, wherein a first face characteristic sequence white list is set, when a face corresponding to a face image in the first face characteristic sequence white list exists in a monitored video stream, a target face characteristic sequence is obtained from the first face characteristic sequence white list and is used as a verification code of an encrypted monitored video stream to be stored, when a video obtaining request sent by a subsequent user terminal is required, a second face characteristic sequence white list is uploaded, and if the target face characteristic sequence is in the second face characteristic sequence white list, the corresponding encrypted monitored video stream is sent to the user terminal. Therefore, even if a short message verification code or an account password is leaked in the process of logging in the platform by a user, other terminals cannot acquire the encrypted monitoring video stream corresponding to the verification code, and the technical problem of low safety in the mode of acquiring the monitoring video through the short message verification code or the account password in the prior art is solved.

Description

Encrypted data transmission method and device based on characteristic sequence
Technical Field
The embodiment of the application relates to the field of video streaming, in particular to an encrypted data transmission method and device based on a characteristic sequence.
Background
At present, in order to monitor the conditions at home, many users can choose to install a camera at home, the camera uploads a shot monitoring video to a server for storage, and then the user can review or watch the monitoring video in real time by accessing the server through a user terminal such as a mobile phone. However, currently, when a user acquires a surveillance video from a server, the user generally logs in a related platform through a short message verification code or an account password, and acquires the surveillance video through the platform, but when the account password or the short message verification code of the user is leaked, the data of the surveillance video is very easy to be stolen by other people, so that the privacy of the user cannot be guaranteed.
In summary, in the prior art, a technical problem of low security exists in a manner of acquiring a monitoring video through a short message verification code or an account password.
Disclosure of Invention
The embodiment of the invention provides a feature sequence-based encrypted data transmission method and device, which can improve the security in the process of acquiring a monitoring video and solve the technical problem of lower security in the mode of acquiring the monitoring video through a short message verification code or an account password in the prior art.
In a first aspect, an embodiment of the present invention provides an encrypted data transmission method based on a feature sequence, including:
carrying out face detection on a monitoring video stream, and intercepting a first face image corresponding to a detected face from the monitoring video stream;
encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images;
if yes, acquiring a target human face characteristic sequence from the first human face characteristic sequence white list, and storing the target human face characteristic sequence as a verification code of the encrypted monitoring video stream;
responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
traversing the second face feature sequence white list based on the verification code, and if the verification code is located in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
Preferably, the face feature sequence is obtained by the following method:
carrying out feature recognition on the face image to obtain face feature data;
and obtaining a face feature sequence based on the face feature data.
Preferably, the obtaining of the face feature sequence based on the face feature data includes:
and carrying out binary conversion on the face feature data by using an SHA256 algorithm to obtain a face feature sequence.
Preferably, the number of the target face images is one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
and acquiring a face feature sequence corresponding to the target face image from the first face feature sequence white list as a target face feature sequence.
Preferably, the number of the target face images is more than one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
determining the frequency of occurrence of each face in the surveillance video stream;
and taking the face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as the target face feature sequence.
Preferably, the second face feature sequence white list at least includes a face feature sequence corresponding to a user to which the user terminal belongs.
Preferably, before responding to the video acquisition request sent by the user terminal, the method further includes:
receiving a user face image of a current user uploaded by the user terminal;
judging whether the face image of the user exists in a corresponding face image in the first face feature sequence white list or not;
and if so, allowing to respond to the video acquisition request sent by the user terminal.
In a second aspect, an embodiment of the present invention provides an encrypted data transmission apparatus based on a feature sequence, including:
the system comprises a face detection module, a face detection module and a face recognition module, wherein the face detection module is used for carrying out face detection on a monitoring video stream and capturing a first face image corresponding to a detected face in the monitoring video stream;
the video stream encryption module is used for encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
the first verification module is used for acquiring a pre-stored first face feature sequence white list and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
a verification code obtaining module, configured to obtain a target face feature sequence from the first face feature sequence white list if a corresponding face image exists in the first face feature sequence white list, and store the target face feature sequence as a verification code of the encrypted surveillance video stream;
the request response module is used for responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
and the video stream sending module is used for traversing the second face feature sequence white list based on the verification code, and sending the encrypted monitoring video stream corresponding to the verification code to the user terminal if the verification code is positioned in the second face feature sequence white list.
In a third aspect, an embodiment of the present invention provides an encrypted data transmission device, where the encrypted data transmission device includes a processor and a memory;
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to execute a method of encrypted data transmission based on a sequence of features according to the instructions in the computer program.
In a fourth aspect, embodiments of the present invention provide a storage medium storing computer-executable instructions for performing a method for feature sequence based encrypted data transmission as described in the first aspect when executed by a computer processor.
The embodiment of the present invention provides an encrypted data transmission method based on a feature sequence, where a first face feature sequence white list is set, and when a face corresponding to a face image in the first face feature sequence white list exists in a surveillance video stream, a target face feature sequence is obtained from the first face feature sequence white list and stored as a verification code of an encrypted surveillance video stream, and when a video obtaining request is sent by a subsequent user terminal, a second face feature sequence white list needs to be uploaded, and if the target face feature sequence is in the second face feature sequence white list, a corresponding encrypted surveillance video stream is sent to the user terminal. Therefore, even if a short message verification code or an account password is leaked in the process of logging in the platform by a user, other terminals cannot acquire the encrypted monitoring video stream corresponding to the verification code, the security in the process of acquiring the encrypted monitoring video stream is improved, the privacy of the user is also protected, and the technical problem of low security existing in the mode of acquiring the monitoring video through the short message verification code or the account password in the prior art is solved.
Drawings
Fig. 1 is a schematic flowchart of an encrypted data transmission method based on a feature sequence according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of uploading a surveillance video stream by a camera according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a user terminal acquiring an encrypted surveillance video according to an embodiment of the present invention.
Fig. 4 is a flowchart illustrating another encrypted data transmission method based on a signature sequence according to an embodiment of the present invention.
Fig. 5 is a schematic structural diagram of an encrypted data transmission apparatus based on a feature sequence according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of an encrypted data transmission device according to an embodiment of the present invention.
Detailed Description
The following description and the annexed drawings set forth in detail certain illustrative embodiments of the application so as to enable those skilled in the art to practice them. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. The scope of the embodiments of the present application includes the full ambit of the claims, as well as all available equivalents of the claims. Embodiments may be referred to herein, individually or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed. The various embodiments are described in a progressive manner, with each embodiment focusing on differences from the other embodiments, and with like parts being referred to one another. For the structures, products and the like disclosed by the embodiments, the description is relatively simple because the structures, the products and the like correspond to the parts disclosed by the embodiments, and the relevant parts can be just described by referring to the method part.
As shown in fig. 1, fig. 1 is a flowchart of an encrypted data transmission method based on a feature sequence according to an embodiment of the present invention. The encrypted data transmission method based on the characteristic sequence provided by the embodiment of the invention can be executed by encrypted data transmission equipment, the encrypted data transmission equipment can be realized in a software and/or hardware mode, and the encrypted data transmission equipment can be composed of two or more physical entities or one physical entity. For example, the encrypted data transmission device may be a device having a data processing function, such as a server or an upper computer. The method comprises the following steps:
step 101, performing face detection on the monitoring video stream, and capturing a first face image corresponding to the detected face in the monitoring video stream.
In this embodiment, as shown in fig. 2, the camera is installed in the living environment of the user, the camera is remotely connected to the encrypted data transmission device in the cloud, and after the camera captures the surveillance video stream of the living environment, the surveillance video stream is uploaded to the encrypted data transmission device. Then, the encrypted data transmission device performs face detection on the surveillance video stream, thereby recognizing a face appearing in the surveillance video stream. In this embodiment, a face may be recognized from the surveillance video stream by using an existing face detection algorithm, for example, a face feature point-based recognition algorithm or a neural network-based face recognition algorithm, and the specific process may refer to the prior art and is not described in detail in this embodiment. After the faces are identified, the encrypted data transmission device intercepts a first face image corresponding to each identified face from the monitoring video stream. It can be understood that for each face identified, only one corresponding first face image is intercepted.
And 102, encrypting the monitoring video stream to obtain an encrypted monitoring video stream.
After the face appearing in the monitoring video stream is identified, the encrypted data transmission equipment further encrypts the monitoring video stream to obtain the encrypted monitoring video stream.
103, acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images.
And then, the encrypted data transmission equipment acquires a first face feature sequence white list stored in advance by the user from a database of the encrypted data transmission equipment, wherein the first face feature sequence white list comprises face images stored in advance by the user and face feature sequences corresponding to the face images. The face feature sequence may be a sequence including face feature information in a face image. After the encrypted data transmission equipment acquires the first face feature sequence white list, whether a target face image corresponding to the first face image exists or not is searched in the first face feature sequence white list. The target face image is a face image having the same face as the first face image. For example, the encrypted data transmission device may compare the similarity between the first face image and the face image in the first face feature sequence white list, and if the similarity is greater than a preset similarity threshold, it may be determined that the faces in the first face image and the face image are the same face, that is, the face image is a target face image corresponding to the first face image.
In one embodiment, the face feature sequence is obtained by the following method:
and step 1031, performing feature recognition on the face image to obtain face feature data.
Firstly, a face feature recognition algorithm is adopted to perform feature recognition on a face image, and face feature data are obtained from the face image.
And 1032, obtaining a face feature sequence based on the face feature data.
And then, converting the face characteristic data to obtain a face characteristic sequence. For example, the face feature data is subjected to binary conversion, and the face feature data is converted into binary data, octal data, hexadecimal data, or the like, so that a face feature sequence is obtained. In one embodiment, the SHA256 algorithm may be used to perform binary conversion on the face feature data to obtain a face feature sequence.
And step 104, if the encrypted monitoring video stream exists, acquiring a target face characteristic sequence from the first face characteristic sequence white list, and storing the target face characteristic sequence as a verification code of the encrypted monitoring video stream.
And if the first face feature sequence white list has a target face image corresponding to the first face image, the encrypted data transmission equipment acquires a target face feature sequence from the face feature sequence of the first face feature sequence white list, and stores the target face feature sequence as a verification code of the encrypted monitoring video stream. Therefore, a user can upload in advance a face image of an object to be privacy-protected and a corresponding face feature sequence, such as a face image of each person in a family member and a corresponding face feature sequence, in a first face feature sequence white list, and when a face of any one family person appears in a monitored video stream, the encrypted data transmission device sets a corresponding verification code for the monitored video stream. In an embodiment, the encrypted data transmission device may use a face feature sequence corresponding to the target face image as a verification code, or may arbitrarily select one face feature sequence from face feature sequences in a first face feature sequence white list as the target face feature sequence.
And step 105, responding to a video acquisition request sent by the user terminal, wherein the video acquisition request comprises a second face feature sequence white list.
Subsequently, when the user needs to acquire the monitoring video stream, a video acquisition request can be sent to the encrypted data transmission device through the user terminal. It should be further noted that, in the video acquisition request, a second face feature sequence white list stored in the user terminal is further included, the second face feature sequence white list is preset by the user and stored in the user terminal, when the user terminal receives an operation instruction sent by the user when sending the video acquisition request to the encrypted data transmission device, the second face feature sequence white list is acquired and is attached to the video acquisition request, and then the video acquisition request is sent to the encrypted data transmission device. In one embodiment, in order to reduce the amount of data required to be transmitted by the video acquisition request, the video acquisition request may only include the facial feature sequences in the second facial feature sequence white list, and the facial images are not required to be included.
And 106, traversing the white list of the second face feature sequence based on the verification code, and if the verification code is located in the white list of the second face feature sequence, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
And when the encrypted data transmission equipment receives a video acquisition request sent by the user terminal, traversing a second face feature sequence white list in the video acquisition request, and judging whether the verification code is in the second face feature sequence white list. And if the verification code is in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal, so that the user terminal decrypts the encrypted monitoring video stream after receiving the encrypted monitoring video stream to obtain the monitoring video stream. It can be understood that, in this embodiment, the user terminal stores a decryption algorithm corresponding to the encryption algorithm of the surveillance video stream, and the user terminal decrypts the encrypted surveillance video stream using the decryption algorithm to obtain the surveillance video stream. And if the verification code is not in the second face feature sequence white list, not sending the encrypted monitoring video stream to the user terminal. That is, a second face feature sequence white list set by the user needs to be stored on the user terminal, and the verification code also needs to exist in the second face feature sequence white list, so as to prove that the user who sets the second face feature sequence white list on the user terminal is associated with the person to which the face image corresponding to the verification code belongs, and the encrypted surveillance video stream can be transmitted to the user terminal. And if the user terminal does not have the second face feature sequence white list or the second face feature sequence white list does not comprise the face feature sequence corresponding to the verification code, the encrypted monitoring video stream is not sent to the user terminal. Therefore, even if the short message verification code or the account password on the user terminal is leaked, the encrypted monitoring video stream corresponding to the verification code cannot be acquired due to the fact that the second face feature sequence white list is not arranged on other user terminals or the face feature sequence corresponding to the verification code is not arranged in the second face feature sequence white list, safety of the user in the process of acquiring the encrypted monitoring video stream is greatly improved, and privacy of the user is protected.
Illustratively, when a user a wants to protect privacy of the user a, the user B, and the user C, a face image and a face feature sequence of the user a, a face image and a face feature sequence of the user B, and a face image and a face feature sequence of the user C are uploaded in a first face feature sequence white list of the server. And simultaneously setting a second face feature sequence white list at the user terminal of the user, the user terminal of the user B and the user terminal of the user C, wherein the second face feature sequence white list is the same as the first face feature sequence white list. When the server detects the face of a user A, a user B or a user C in a monitoring video stream shot by a camera, a first face image is intercepted, and after the fact that the first face image has a corresponding target face image in a first face feature sequence white list is determined, a face feature sequence is selected from the first face feature sequence white list to serve as a verification code of the encrypted monitoring video stream. When a user a, a user B or a user C obtains the encrypted surveillance video stream, the user terminal sends a video obtaining request to the server, and after receiving the video obtaining request, the server determines that the verification code is located in the second face feature sequence white list of the video obtaining request, that is, the encrypted surveillance video stream data can be sent to the corresponding user terminal, and the specific process is shown in fig. 3. It can be understood that when the face of the user a, the face of the user B, or the face of the user C does not appear in the surveillance video stream, since the privacy of the user a, the user B, or the user C is not involved, it is not necessary to set the authentication code to the encrypted surveillance video stream.
In the foregoing, an embodiment of the present invention provides a feature sequence-based encrypted data transmission method, where a first face feature sequence white list is set, and when a face corresponding to a face image in the first face feature sequence white list exists in a surveillance video stream, a target face feature sequence is obtained from the first face feature sequence white list and stored as a verification code of an encrypted surveillance video stream, and when a video obtaining request is sent by a subsequent user terminal, a second face feature sequence white list needs to be uploaded, and if the target face feature sequence is in the second face feature sequence white list, the corresponding encrypted surveillance video stream is sent to the user terminal. Therefore, even if the short message verification code or the account password is leaked in the process of logging in the platform by the user, other terminals cannot acquire the encrypted monitoring video stream corresponding to the verification code, the security in the process of acquiring the encrypted monitoring video stream is improved, and meanwhile the privacy of the user is also protected.
As shown in fig. 4, fig. 4 is a flowchart of another feature sequence-based encrypted data transmission method according to an embodiment of the present invention, where the feature sequence-based encrypted data transmission method is an embodiment of the feature sequence-based encrypted data transmission method, and includes the following steps:
step 201, performing face detection on the monitoring video stream, and capturing a first face image corresponding to the detected face in the monitoring video stream.
Step 202, the monitoring video stream is encrypted to obtain an encrypted monitoring video stream.
Step 203, acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images.
And 204, if the encrypted monitoring video stream exists, acquiring a target face characteristic sequence from the first face characteristic sequence white list, and storing the target face characteristic sequence as a verification code of the encrypted monitoring video stream.
It should be noted that, in this embodiment, there are two cases in the number of target face images, one is that the number of target face images is only one, and the other is that the number of target face images is multiple. There are different ways to determine the target face feature sequence for different situations in this embodiment.
In one embodiment, the number of target face images is one.
Correspondingly, obtaining the target face feature sequence from the first face feature sequence white list includes:
and acquiring a face feature sequence corresponding to the target face image from the first face feature sequence white list as a target face feature sequence.
In this embodiment, when the number of the target face images is one, that is, only one first face image acquired in the surveillance video stream has a corresponding target face image, the face feature sequence corresponding to the target face image is used as the target face feature sequence, and the target face feature sequence is used as the verification code of the encrypted surveillance video stream and is stored. Therefore, when the target face feature sequence exists in a second face feature sequence white list of a subsequent user terminal, the corresponding encrypted monitoring video stream can be obtained. That is, only the user who knows the face feature sequence of the target face image can acquire the corresponding encrypted monitoring video stream data, and the user who can know the face feature sequence of the target face image can generally know the face feature sequence of the target face image by the user who has a certain contact with the user to which the target face image belongs, so that the privacy of the user can be further protected.
In another embodiment, when the number of the target face images is more than one.
Correspondingly, acquiring a face feature sequence corresponding to the face from the first face feature sequence white list as a target face feature sequence, including:
the frequency of each face occurrence in the surveillance video stream is determined.
It should be noted that, in another embodiment, when a plurality of corresponding target face images exist in a first face feature sequence white list in a first face image of a plurality of faces intercepted from a surveillance video stream, a frequency of occurrence of each face is first determined in the surveillance video stream.
And taking the target face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as a target face feature sequence.
And then, taking the target face image corresponding to the face with the highest occurrence frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as a target face feature sequence. Because the frequency of the face corresponding to the second face image appearing in the surveillance video stream is the highest, which means that most of the video content in the surveillance video stream is related to the user to which the second face image belongs, the face feature sequence corresponding to the second face image is used as the target face feature sequence, and the target face feature sequence is used as the verification code of the encrypted surveillance video stream data.
And step 205, receiving the user face image of the current user uploaded by the user terminal.
In this embodiment, before receiving a video acquisition request sent by a user terminal, the identity of a user using the user terminal needs to be verified. Specifically, a user face image of a current user uploaded by a user terminal is received, and the user face image can be obtained by shooting through a camera arranged on the user terminal.
And step 206, judging whether the face image of the user has a corresponding face image in the first face feature sequence white list.
After receiving the face image of the user, the encrypted data transmission device further searches whether a face image with the similarity exceeding a similarity threshold exists in a first face feature sequence white list, wherein the face image is a face image corresponding to the face image of the user.
And step 207, if yes, allowing to respond to the video acquisition request sent by the user terminal.
If the face image with the similarity exceeding the similarity threshold exists in the first face feature sequence white list, responding to the video acquisition request sent by the user terminal is allowed, otherwise, the video acquisition request sent by the corresponding user terminal is not allowed. Therefore, the user to which each face image belongs in the first face feature sequence white list can obtain the encrypted monitoring video stream through the user terminal, and even if the user terminal of the user is lost, other people cannot obtain the encrypted monitoring video stream, so that the safety in the process of obtaining the encrypted monitoring video stream is further improved, and the privacy of the user is protected.
And step 208, responding to a video acquisition request sent by the user terminal, wherein the video acquisition request comprises a second face feature sequence white list.
And step 209, traversing the white list of the second face feature sequence based on the verification code, and if the verification code is located in the white list of the second face feature sequence, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
In one embodiment, the second face feature sequence white list at least includes a face feature sequence corresponding to a user to which the user terminal belongs.
In this embodiment, the second face feature sequence white list at least includes a face feature sequence and a face image corresponding to the user to which the user terminal belongs, so that when the encrypted surveillance video stream data takes the face feature sequence corresponding to the face appearing in the surveillance video stream as the verification code, the user to which the user terminal belongs can obtain the encrypted surveillance video stream that is shot by the user. In an embodiment, a user who sets a first face feature sequence white list may be used as an administrator, and the administrator may further send a face feature sequence and a corresponding face image specified in the first face feature sequence white list to a specified user terminal through the user terminal, so that other user terminals can add the specified face feature sequence and the corresponding face image to a second face feature sequence white list, and thus, encrypted monitoring video streams of other specified users can be obtained. For example, the administrator a user sets the face images and the face feature sequences of the user a, the user B and the user C in the first face feature sequence white list, and then sends the face image and the face feature sequence of the user B to the user terminal of the user C, so that the user C can also obtain the encrypted monitoring video stream in which the user B is shot through the user terminal, and different permissions are allocated to different user terminals.
In the embodiment of the present invention, when the number of the target face images is one, the face feature sequence corresponding to the target face image is used as the verification code of the encrypted surveillance video stream, and when the number of the target face images is multiple, the target face image corresponding to the face with the highest frequency of occurrence in the surveillance video stream is obtained, and the face feature sequence corresponding to the image is used as the verification code of the encrypted surveillance video stream, so that the corresponding encrypted surveillance video stream can be obtained only when the target face feature sequence exists in the white list of the second face feature sequence of the user terminal, which improves the security in the process of obtaining the encrypted surveillance video stream and protects the privacy of the user. In addition, before responding to a video acquisition request sent by a user terminal, the embodiment of the invention also judges whether the face image of the user terminal has a corresponding face image in the first face feature sequence white list, if so, the embodiment of the invention allows responding to the video acquisition request sent by the user terminal, so that the user corresponding to each face image in the first face feature sequence white list can acquire the encrypted monitoring video stream through the user terminal, even if the user terminal of the user is lost, other people cannot acquire the encrypted monitoring video stream, the safety of the encrypted monitoring video stream in the acquisition process is further improved, and the privacy of the user is protected.
As shown in fig. 5, fig. 5 is a characteristic sequence-based encrypted data transmission apparatus according to an embodiment of the present invention, including:
the face detection module 301 is configured to perform face detection on a surveillance video stream, and capture a first face image corresponding to a detected face in the surveillance video stream;
a video stream encryption module 302, configured to encrypt the monitoring video stream to obtain an encrypted monitoring video stream;
the first verification module 303 is configured to obtain a pre-stored first face feature sequence white list, and determine whether a corresponding target face image exists in the first face feature sequence white list according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
a verification code obtaining module 304, configured to, if a corresponding face image exists in the first face feature sequence white list, obtain a target face feature sequence from the first face feature sequence white list, and store the target face feature sequence as a verification code of the encrypted surveillance video stream;
a request response module 305, configured to respond to a video acquisition request sent by a user terminal, where the video acquisition request includes a second face feature sequence white list;
a video stream sending module 306, configured to traverse the second face feature sequence white list based on the verification code, and send the encrypted surveillance video stream corresponding to the verification code to the user terminal if the verification code is located in the second face feature sequence white list.
On the basis of the embodiment, the human face image recognition system further comprises a sequence acquisition module, a sequence recognition module and a sequence analysis module, wherein the sequence acquisition module is used for carrying out feature recognition on the human face image to obtain human face feature data; and obtaining a face feature sequence based on the face feature data.
On the basis of the above embodiment, the system further comprises a sequence acquisition module specifically configured to perform binary conversion on the face feature data by using an SHA256 algorithm to obtain a face feature sequence.
On the basis of the above embodiment, the number of the target face images is one;
correspondingly, the verification code obtaining module 304 is specifically configured to obtain, from the first face feature sequence white list, a face feature sequence corresponding to the target face image as a target face feature sequence.
On the basis of the embodiment, the number of the target face images is more than one;
correspondingly, the identifying code obtaining module 304 is specifically configured to determine the frequency of each face in the monitoring video stream; and taking the face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as the target face feature sequence.
On the basis of the above embodiment, the second face feature sequence white list at least includes a face feature sequence corresponding to the user to which the user terminal belongs.
On the basis of the above embodiment, the video processing device further includes a user authentication module, configured to receive a user face image of a current user uploaded by the user terminal before responding to the video acquisition request sent by the user terminal; judging whether the face image of the user exists in a corresponding face image in the first face feature sequence white list or not; and if so, allowing to respond to the video acquisition request sent by the user terminal.
The present embodiment also provides an encrypted data transmission apparatus, as shown in fig. 6, an encrypted data transmission apparatus 40, which includes a processor 400 and a memory 401;
the memory 401 is configured to store a computer program 402 and to transmit the computer program 402 to the processor;
the processor 400 is configured to execute the steps of one of the above-described embodiments of the method for encrypted data transmission based on a signature sequence according to the instructions in the computer program 402.
Illustratively, the computer program 402 may be partitioned into one or more modules/units, which are stored in the memory 401 and executed by the processor 400 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions for describing the execution process of the computer program 402 in the encrypted data transmission apparatus 40.
The encrypted data transmission device 40 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The encrypted data transmission device 40 may include, but is not limited to, a processor 400, a memory 401. It will be understood by those skilled in the art that fig. 6 is merely an example of the encrypted data transmission apparatus 40, and does not constitute a limitation of the encrypted data transmission apparatus 40, and may include more or less components than those shown, or combine some components, or different components, for example, the encrypted data transmission apparatus 40 may further include an input-output device, a network access device, a bus, etc.
The Processor 400 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 401 may be an internal storage unit of the encrypted data transmission apparatus 40, such as a hard disk or a memory of the encrypted data transmission apparatus 40. The memory 401 may also be an external storage device of the encrypted data transmission device 40, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the encrypted data transmission device 40. Further, the memory 401 may also include both an internal storage unit of the encrypted data transmission apparatus 40 and an external storage apparatus. The memory 401 is used to store the computer program and other programs and data required by the encrypted data transmission apparatus 40. The memory 401 may also be used to temporarily store data that has been output or is to be output.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention, which is substantially or partly contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing computer programs, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Embodiments of the present invention also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a method for encrypted data transmission based on a signature sequence, the method comprising the steps of:
carrying out face detection on a monitoring video stream, and capturing a first face image corresponding to a detected face in the monitoring video stream;
encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images;
if yes, acquiring a target face feature sequence from the first face feature sequence white list, and storing the target face feature sequence as a verification code of the encrypted monitoring video stream;
responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
traversing the second face feature sequence white list based on the verification code, and if the verification code is located in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
It should be noted that the foregoing is only a preferred embodiment of the present invention and the technical principles applied. Those skilled in the art will appreciate that the embodiments of the present invention are not limited to the specific embodiments described herein, and that various obvious changes, rearrangements and substitutions can be made by those skilled in the art without departing from the scope of the embodiments of the invention. Therefore, although the embodiments of the present invention have been described in more detail through the above embodiments, the embodiments of the present invention are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the concept of the embodiments of the present invention, and the scope of the embodiments of the present invention is determined by the scope of the appended claims.

Claims (10)

1. An encrypted data transmission method based on a characteristic sequence is characterized by comprising the following steps:
carrying out face detection on a monitoring video stream, and capturing a first face image corresponding to a detected face in the monitoring video stream;
encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
acquiring a pre-stored first face feature sequence white list, and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images stored in advance and face feature sequences corresponding to the face images;
if yes, acquiring a target face feature sequence from the first face feature sequence white list, and storing the target face feature sequence as a verification code of the encrypted monitoring video stream;
responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
traversing the second face feature sequence white list based on the verification code, and if the verification code is located in the second face feature sequence white list, sending the encrypted monitoring video stream corresponding to the verification code to the user terminal.
2. The encrypted data transmission method based on the feature sequence as claimed in claim 1, wherein the face feature sequence is obtained by the following method:
carrying out feature recognition on the face image to obtain face feature data;
and obtaining a face feature sequence based on the face feature data.
3. The feature sequence-based encrypted data transmission method according to claim 2, wherein obtaining the face feature sequence based on the face feature data includes:
and carrying out binary conversion on the face feature data by using an SHA256 algorithm to obtain a face feature sequence.
4. The feature sequence-based encrypted data transmission method according to claim 1, wherein the number of the target face images is one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
and acquiring a face feature sequence corresponding to the target face image from the first face feature sequence white list as a target face feature sequence.
5. The feature sequence-based encrypted data transmission method according to claim 1, wherein the number of the target face images is more than one;
correspondingly, the obtaining of the target face feature sequence from the first face feature sequence white list includes:
determining the frequency of occurrence of each face in the surveillance video stream;
and taking the face image corresponding to the face with the highest frequency as a second face image, and acquiring a face feature sequence corresponding to the second face image from the first face feature sequence white list as the target face feature sequence.
6. The method according to any one of claims 4 to 5, wherein the second face feature sequence white list at least includes a face feature sequence corresponding to a user to which the user terminal belongs.
7. The method for encrypted data transmission based on signature sequence of claim 1, wherein before responding to the video acquisition request sent by the user terminal, the method further comprises:
receiving a user face image of a current user uploaded by the user terminal;
judging whether the face image of the user exists in a corresponding face image in the first face feature sequence white list or not;
and if so, allowing to respond to the video acquisition request sent by the user terminal.
8. An encrypted data transmission apparatus based on a signature sequence, comprising:
the system comprises a face detection module, a face detection module and a face recognition module, wherein the face detection module is used for carrying out face detection on a monitoring video stream and capturing a first face image corresponding to a detected face in the monitoring video stream;
the video stream encryption module is used for encrypting the monitoring video stream to obtain an encrypted monitoring video stream;
the first verification module is used for acquiring a pre-stored first face feature sequence white list and determining whether a corresponding target face image exists in the first face feature sequence white list or not according to the first face image; the first face feature sequence white list comprises face images which are stored in advance and face feature sequences corresponding to the face images;
a verification code obtaining module, configured to obtain a target human face feature sequence from the first human face feature sequence white list if a corresponding human face image exists in the first human face feature sequence white list, and store the target human face feature sequence as a verification code of the encrypted surveillance video stream;
the request response module is used for responding to a video acquisition request sent by a user terminal, wherein the video acquisition request comprises a second face feature sequence white list;
and the video stream sending module is used for traversing the second face feature sequence white list based on the verification code, and sending the encrypted monitoring video stream corresponding to the verification code to the user terminal if the verification code is positioned in the second face feature sequence white list.
9. An encrypted data transmission apparatus, characterized in that the encrypted data transmission apparatus comprises a processor and a memory;
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to execute a method of encrypted data transmission based on a sequence of features according to any one of claims 1 to 7 in accordance with instructions in the computer program.
10. A storage medium storing computer-executable instructions for performing a method of feature sequence based encrypted data transmission according to any one of claims 1 to 7 when executed by a computer processor.
CN202210875052.8A 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence Active CN114938465B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210875052.8A CN114938465B (en) 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210875052.8A CN114938465B (en) 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence

Publications (2)

Publication Number Publication Date
CN114938465A true CN114938465A (en) 2022-08-23
CN114938465B CN114938465B (en) 2022-10-18

Family

ID=82868773

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210875052.8A Active CN114938465B (en) 2022-07-25 2022-07-25 Encrypted data transmission method and device based on characteristic sequence

Country Status (1)

Country Link
CN (1) CN114938465B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134080A (en) * 2022-08-25 2022-09-30 广州万协通信息技术有限公司 Data transmission method and device based on security encryption chip

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040145657A1 (en) * 2002-06-27 2004-07-29 Naoki Yamamoto Security camera system
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
JP2012186674A (en) * 2011-03-07 2012-09-27 Hitachi Kokusai Electric Inc Monitoring camera system
CN106559654A (en) * 2016-11-18 2017-04-05 广州炫智电子科技有限公司 A kind of recognition of face monitoring collection system and its control method
CN107169367A (en) * 2017-04-07 2017-09-15 北京安云世纪科技有限公司 A kind of storage method, device and mobile terminal for shooting file
CN108289202A (en) * 2018-01-29 2018-07-17 北京大椽科技有限公司 A kind of intelligent network monitoring method and system
CN108668097A (en) * 2018-05-22 2018-10-16 苏州市启献智能科技有限公司 It is a kind of to realize that the long-range child of home intercommunication checks system and method
CN108989764A (en) * 2018-08-22 2018-12-11 河南省颍河电子科技有限公司 A kind of scenic spot tourist film generation system
CN110166734A (en) * 2018-02-12 2019-08-23 北京快乐智慧科技有限责任公司 A kind of Intelligence In Baogang Kindergarten monitoring method and system
CN110446105A (en) * 2019-09-20 2019-11-12 网易(杭州)网络有限公司 Video-encryption, decryption method and device
CN110505455A (en) * 2019-08-30 2019-11-26 北京青岳科技有限公司 A kind of the monitor video access method and system of secret protection
CN112422499A (en) * 2020-09-14 2021-02-26 深圳英飞拓科技股份有限公司 Method and system for identifying black and white lists of human face based on 5G transmission
CN113079161A (en) * 2021-04-01 2021-07-06 武汉飓飚信息技术有限公司 Method and system for sharing monitoring camera
US20210233371A1 (en) * 2018-06-19 2021-07-29 Pelco, Inc. Automatic video privacy
CN113821780A (en) * 2021-09-26 2021-12-21 深圳市商汤科技有限公司 Video analysis method and device, electronic equipment and storage medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040145657A1 (en) * 2002-06-27 2004-07-29 Naoki Yamamoto Security camera system
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
JP2012186674A (en) * 2011-03-07 2012-09-27 Hitachi Kokusai Electric Inc Monitoring camera system
CN106559654A (en) * 2016-11-18 2017-04-05 广州炫智电子科技有限公司 A kind of recognition of face monitoring collection system and its control method
CN107169367A (en) * 2017-04-07 2017-09-15 北京安云世纪科技有限公司 A kind of storage method, device and mobile terminal for shooting file
CN108289202A (en) * 2018-01-29 2018-07-17 北京大椽科技有限公司 A kind of intelligent network monitoring method and system
CN110166734A (en) * 2018-02-12 2019-08-23 北京快乐智慧科技有限责任公司 A kind of Intelligence In Baogang Kindergarten monitoring method and system
CN108668097A (en) * 2018-05-22 2018-10-16 苏州市启献智能科技有限公司 It is a kind of to realize that the long-range child of home intercommunication checks system and method
US20210233371A1 (en) * 2018-06-19 2021-07-29 Pelco, Inc. Automatic video privacy
CN108989764A (en) * 2018-08-22 2018-12-11 河南省颍河电子科技有限公司 A kind of scenic spot tourist film generation system
CN110505455A (en) * 2019-08-30 2019-11-26 北京青岳科技有限公司 A kind of the monitor video access method and system of secret protection
CN110446105A (en) * 2019-09-20 2019-11-12 网易(杭州)网络有限公司 Video-encryption, decryption method and device
CN112422499A (en) * 2020-09-14 2021-02-26 深圳英飞拓科技股份有限公司 Method and system for identifying black and white lists of human face based on 5G transmission
CN113079161A (en) * 2021-04-01 2021-07-06 武汉飓飚信息技术有限公司 Method and system for sharing monitoring camera
CN113821780A (en) * 2021-09-26 2021-12-21 深圳市商汤科技有限公司 Video analysis method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134080A (en) * 2022-08-25 2022-09-30 广州万协通信息技术有限公司 Data transmission method and device based on security encryption chip
CN115134080B (en) * 2022-08-25 2022-12-20 广州万协通信息技术有限公司 Data transmission method and device based on security encryption chip

Also Published As

Publication number Publication date
CN114938465B (en) 2022-10-18

Similar Documents

Publication Publication Date Title
EP3257194B1 (en) Systems and methods for securely managing biometric data
EP3037998B1 (en) Method and system for providing secure and standalone-operable biometric authentication
CN110414258B (en) File processing method and system and data processing method
WO2019236470A1 (en) Blockchain-embedded secure digital camera system to verify audiovisual authenticity
US20150186709A1 (en) Method and system for biometrical identification of a user
CN114938465B (en) Encrypted data transmission method and device based on characteristic sequence
CN103902871A (en) User identity authentication method adopting iris recognition to realize cloud computation
KR102469380B1 (en) Method and system for de-identifying and restoring personal information of image data
CN111294482B (en) Image processing method and system
CN105208045A (en) Identity authentication method, equipment and system
CN111581661A (en) Terminal management method and device based on biological feature recognition and computer equipment
US20200145403A1 (en) Authentication system and authentication method
CN114596639A (en) Biological feature recognition method and device, electronic equipment and storage medium
US20210344676A1 (en) Method and system for securing communications between a lead device and a secondary device
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
CN105812338B (en) Data access control method and network management equipment
US20190114413A1 (en) Server, camera and method
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
CN115134080B (en) Data transmission method and device based on security encryption chip
CN110149210A (en) A kind of data transmission method and device
US11508155B2 (en) Methods, systems, apparatuses, and devices for facilitating managing incidents occurring in areas monitored by low data-rate monitoring devices using the low data-rate monitoring devices
CN115426189A (en) Information security protection method and system based on big data
US20210073396A1 (en) System and Method for Secure Image Embeddings
KR20140137084A (en) System and method for providing video by closed-circuit television
KR20170014522A (en) Portable finger vein reader and biometric authentication method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant