[go: up one dir, main page]

CN117294415A - Block chain-based data storage method, device, equipment and storage medium - Google Patents

Block chain-based data storage method, device, equipment and storage medium Download PDF

Info

Publication number
CN117294415A
CN117294415A CN202311138880.4A CN202311138880A CN117294415A CN 117294415 A CN117294415 A CN 117294415A CN 202311138880 A CN202311138880 A CN 202311138880A CN 117294415 A CN117294415 A CN 117294415A
Authority
CN
China
Prior art keywords
blockchain
double
video
conference
record file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311138880.4A
Other languages
Chinese (zh)
Inventor
秦臻
潘灿灿
梁策
刘希伟
叶桂芳
文宇
庄懿
谢欣言
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Merchants Bank Co Ltd
Original Assignee
China Merchants Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Merchants Bank Co Ltd filed Critical China Merchants Bank Co Ltd
Priority to CN202311138880.4A priority Critical patent/CN117294415A/en
Publication of CN117294415A publication Critical patent/CN117294415A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Psychiatry (AREA)
  • Social Psychology (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a data storage method, device, equipment and storage medium based on a blockchain, belongs to the technical field of the blockchain, and can verify identity information input by a user through a client when a meeting starts so as to ensure the authenticity of the user identity, double recording can be carried out in the meeting process so as to ensure the integrity of relevant data of the meeting, when the meeting ends, content inspection is carried out on double recorded files, and the double recorded files which are qualified in inspection are stored to the blockchain so as to ensure the safety of relevant data of the meeting based on the anonymity, non-tamper-resistance, openness and transparency of the chain of the blockchain technology and the like. Thereby enabling to improve reliability of conference related data.

Description

Block chain-based data storage method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a blockchain-based data storage method, device, apparatus, and storage medium.
Background
In the conventional process of negotiating or transacting business, the clients usually develop in the modes of paper form filling, manual confirmation and the like, and after the completion, except for the finally confirmed contract, any trace of the clients in the process of negotiating business or transacting business cannot be reserved, and the data capable of serving as judicial evidence is lacking.
At present, the whole process of negotiating or handling the business by the clients is usually reserved in a conference recording mode, however, the reliability of conference related data is disputed because the identity of the clients cannot be accurately confirmed and the authenticity of the conference recording cannot be ensured in the mode.
Therefore, the related art has a technical problem that the reliability of conference related data is low.
Disclosure of Invention
The main purpose of the application is to provide a data storage method, device, equipment and storage medium based on a blockchain, which aim to solve the technical problem of low reliability of conference related data.
In order to achieve the above objective, the present application provides a blockchain-based data certification method, which is applied to a blockchain-based data certification system, wherein the blockchain-based data certification system comprises an audio and video cloud server, a recording server and a blockchain, the audio and video cloud server is used for initiating a conference, and the blockchain-based data certification method comprises the following steps:
when the conference starts, verifying the identity information input by the user through the client;
after the verification is passed, double-recording processing is carried out on the conference process through the recording server;
And when the conference is finished, carrying out content inspection on the double-record file, and storing the double-record file which is qualified in inspection into a blockchain so as to acquire related data of the conference based on the blockchain.
In one possible implementation manner of the present application, the step of performing content verification on the dual-record file when the conference ends includes:
when the conference is over, identifying the voice and the noise in the audio in the double-record file through a preset audio verification model, and verifying whether the noise in the audio is higher than a preset noise threshold value or not;
if the detection result is that the noise in the audio is higher than a preset noise threshold, preprocessing the noise in the audio in the two-way file until the noise in the audio is lower than the preset noise threshold;
identifying human faces in the video in the double-record file through a preset video inspection model, and judging whether the human faces in the video are matched with the identity information;
and if the face in the video is not matched with the identity information, a prompt is sent out for the manager to check.
In one possible implementation manner of the application, a video inspection model is preset to identify a face in each video frame in the double-record file, so as to obtain a plurality of faces corresponding to each video frame;
After the step of identifying the face in the video in the double-record file through the preset video inspection model, the method further comprises the following steps:
judging whether a plurality of corresponding faces in each video frame are identical, if not, determining the missing rate of the faces based on the missing faces in each video frame and the number of the video frames;
based on the miss rate, it is determined whether to issue a prompt to a manager.
In one possible implementation manner of the present application, the step of performing content verification on the dual-record file when the conference ends includes:
when the conference is finished, acquiring a first audio frequency in a front preset period and a second audio frequency in a rear preset period in the double-record file;
converting the first audio and the second audio into text data respectively;
based on a preset business telephone template and the text data, acquiring a first feature vector and a second feature vector respectively corresponding to the preset business telephone template and the text data through an NLP model;
and carrying out cosine similarity calculation on the first feature vector and the second feature vector to obtain a cosine similarity value, so as to judge whether the content of the double-record file is complete or not based on the cosine similarity value.
In a possible implementation manner of the present application, the step of performing cosine similarity calculation on the first feature vector and the second feature vector to obtain a cosine similarity value includes:
if the cosine similarity value is larger than a preset similarity threshold value, acquiring a first video in a front preset period and a second video in a rear preset period in the double-record file;
and identifying the actions in the first video and the second video to obtain an action identification result so as to judge whether the content of the double-record file is complete or not based on the action identification result.
In one possible embodiment of the present application, the step of storing the qualified dual file into the blockchain includes:
acquiring third audio corresponding to different users in the qualified double-record file through a preset voice recognition model;
calculating a first hash value of a video in the qualified double-record file and a second hash value of a third audio corresponding to different users in the qualified double-record file;
and storing the video in the qualified double-record file and the third audio corresponding to different users into different blocks of the blockchain based on the first hash value and the second hash value.
In one possible embodiment of the present application, after the step of storing the qualified dual file into the blockchain, the method further includes:
and acquiring the complete double-record file qualified by inspection based on the first hash value, the second hash value and the storage addresses corresponding to different blocks of the block chain.
In one possible implementation manner of the present application, before the step of verifying the identity information input by the user through the client when the conference starts, the method includes:
if the current conference form is an online conference, sending a conference link to each user client based on conference personnel information so that each user can enter the conference based on the conference link;
and if the current conference form is an off-line conference, starting the conference based on the conference participant information.
The application also provides a data storage certificate device based on the blockchain, is applied to the data storage certificate system based on the blockchain, the data storage certificate system based on the blockchain includes audio and video cloud server, record server and blockchain, audio and video cloud server is used for initiating the meeting, the device includes:
the identity verification module is used for verifying the identity information input by the user through the client when the conference starts;
The double-recording module is used for carrying out double-recording processing on the conference process through the recording server after the verification is passed;
and the checking and storing module is used for carrying out content checking on the double-record file when the conference is finished, and storing the double-record file which is qualified in checking into the blockchain so as to acquire the related data of the conference based on the blockchain.
The application also provides a blockchain-based data certification device, the device comprising: a memory, a processor, and a blockchain-based data certification program stored on the memory and executable on the processor, the blockchain-based data certification program configured to implement the steps of the blockchain-based data certification method as in any of the above.
The present application also provides a storage medium having stored thereon a blockchain-based data certification program that when executed by a processor implements the steps of the blockchain-based data certification method as set forth in any of the above.
The application provides a data storage and verification method based on a blockchain, which is applied to a data storage and verification system based on the blockchain, wherein the data storage and verification system based on the blockchain comprises an audio and video cloud server, a recording server and the blockchain, the audio and video cloud server is used for initiating a conference, and when the conference starts, identity information input by a user through a client is verified; after the verification is passed, double-recording processing is carried out on the conference process through the recording server; and when the conference is finished, carrying out content inspection on the double-record file, and storing the double-record file which is qualified in inspection into a blockchain so as to acquire related data of the conference based on the blockchain. It can be understood that the identity information input by a user through a client can be checked at the beginning of a conference to ensure the authenticity of the user identity, double recording can be performed in the conference process to ensure the integrity of conference related data, when the conference is finished, content checking is performed on double recorded files, and the double recorded files which are qualified in checking are stored in a blockchain to ensure the safety of the conference related data based on the characteristics of anonymity, non-tamper-resistance, openness and transparency on the chain and the like of the blockchain technology. Thereby enabling to improve reliability of conference related data.
Drawings
FIG. 1 is a flowchart of a first embodiment of a blockchain-based data certification method according to the present application;
FIG. 2 is a logic architecture diagram of a blockchain-based data certification method in accordance with the first embodiment of the present application;
FIG. 3 is a schematic diagram of a first scenario of a blockchain-based data certification method according to the first embodiment of the present application;
FIG. 4 is a first scenario diagram illustrating a blockchain-based data certification method according to the first embodiment of the present application;
FIG. 5 is a schematic diagram of a block chain based data logging device of a hardware runtime environment in accordance with an embodiment of the present application;
fig. 6 is a schematic diagram of a blockchain-based data certification device according to the first embodiment of the present application.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. Although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein.
The embodiment of the application provides a data certification method based on a blockchain, referring to fig. 1 and fig. 2, in this embodiment, the data certification system based on a blockchain is applied to a data certification system based on a blockchain, and includes an audio and video cloud server, a recording server and a blockchain, where the audio and video cloud server is used for initiating a conference, and the data certification method based on a blockchain includes:
step S10: when the conference starts, verifying the identity information input by the user through the client;
step S20: after the verification is passed, double-recording processing is carried out on the conference process through the recording server;
step S30: and when the conference is finished, carrying out content inspection on the double-record file, and storing the double-record file which is qualified in inspection into a blockchain so as to acquire related data of the conference based on the blockchain.
As an example, the blockchain-based data certification method is applied to a blockchain-based data certification device subordinate to a blockchain-based data certification system.
As one example, the blockchain-based data certification system includes an audio-video cloud server (such as the video cloud chain shown in fig. 2), a recording server, and a blockchain.
As an example, the blockchain-based data certification system also includes a storage cloud server (Elastic Compute Service, ECS), e.g., DMC (document management system ) in a ACS (Azure Container Service) cloud container.
As an example, as shown in fig. 3, the storage cloud server and the audio/video cloud server implement communication connection through a voice network cloud active proxy (local proxy server). The storage cloud server comprises a service network and a file management system.
As an example, as shown in fig. 3, the file management system includes a conference control server, a web page dual-recording background, a web page dual-recording foreground, and a cloud link background. The service network comprises an ECS gateway and a cloud chain background.
As an example, the blockchain-based data certification system further includes a client, which may be a web browser and an application (e.g., a mobile banking app as shown in fig. 3), or the like.
The present embodiment aims at: the reliability of conference related data can be improved.
The method comprises the following specific steps:
step S10: when the conference starts, verifying the identity information input by the user through the client;
as an example, the audio-video cloud server is used for initiating a conference, a user is connected with the audio-video cloud server through a client to enter the conference, when the conference starts, the conference control server sends an identity verification interface to the user client, and the user inputs identity information through the client, so that verification of the identity information input by the user through the client is realized.
As one example, the identity information includes a user's name, identification number, cell phone number, business license, and the like.
As an example, before determining to initiate a meeting, identity information of a user who needs to negotiate a service or transact the service is generally obtained, and when the meeting begins, only identity information of an existing user in a database is compared with identity information input by the user through a client, so that whether the identity of the user matches with the meeting can be checked.
In this embodiment, the step of performing content verification on the dual-record file when the conference is over includes:
step A1: when the conference is over, identifying the voice and the noise in the audio in the double-record file through a preset audio verification model, and verifying whether the noise in the audio is higher than a preset noise threshold value or not;
step A2: if the detection result is that the noise in the audio is higher than a preset noise threshold, preprocessing the noise in the audio in the two-way file until the noise in the audio is lower than the preset noise threshold;
as an example, the preset audio verification model may be obtained by performing iterative training on an audio verification model to be trained based on audio data including human voice and noise, and a preset noise label. The noise label comprises that the noise in the audio is higher than a preset noise threshold value, and the noise in the audio is lower than the preset noise threshold value.
As one example, the preset noise threshold may be determined based on the contrast of human voice to noise.
As an example, if the test result is that the noise in the audio is higher than the preset noise threshold, the noise of the audio in the two-way file is preprocessed, which may be that the noise removing process is performed on the audio frame in the audio frame by frame. For example, the audio may be subjected to noise removal processing or the like based on GoldWave or Acon Digital Restoration Suite or the like. And obtaining the qualified double-record file in terms of noise until the noise in the audio is lower than a preset noise threshold.
Step A3: identifying human faces in the video in the double-record file through a preset video inspection model, and judging whether the human faces in the video are matched with the identity information;
step A4: and if the face in the video is not matched with the identity information, a prompt is sent out for the manager to check.
As an example, in order to further confirm consistency of contents in the double-record file, a video inspection model may be preset to identify faces in videos in the double-record file, and determine whether the faces in the videos are matched with the identity information, so as to further prevent security problems caused by problems such as identity verification omission or inaccurate identity verification in the conference process.
As an example, the preset video inspection model may be Eigenfaces, fisherfaces, LBPH or the like.
As an example, if the face in the video does not match with the identity information, a prompt is sent for the manager to check, and if the check determines that the face in the video includes other staff, the double-record file is determined to be qualified. And if the face in the video is matched with the identity information, determining that the double-record file is qualified.
In this embodiment, a video inspection model is preset to identify a face in each video frame in the double-record file, so as to obtain a plurality of faces corresponding to each video frame; after the step of identifying the face in the video in the double-record file through the preset video inspection model, the method further comprises the following steps:
step F1: judging whether a plurality of corresponding faces in each video frame are identical, if not, determining the missing rate of the faces based on the missing faces in each video frame and the number of the video frames;
step F2: based on the miss rate, it is determined whether to issue a prompt to a manager.
As an example, by identifying the face in each video frame in the double-record file through a preset video inspection model, a plurality of faces corresponding to each video frame may be obtained, for example, a face a, a face b, and a face c corresponding to the video frame 1. The video frame 2 corresponds to a face a, a face b, etc.
As an example, since the conference needs to be kept secret, if someone enters and exits the conference continuously during the conference, the conference security may be reduced, and thus the missing rate of the face in the conference needs to be detected, that is, out-of-frame detection.
Specifically, whether a plurality of corresponding faces in each video frame are identical or not is judged, if so, no person leaves the conference in the conference process, and the confidentiality and the safety of the conference are high; if the faces are not identical, determining the missing rate of the faces based on the number of the faces missing in each video frame and the number of the video frames.
As an example, if the total number of video frames is 200 frames, and it is determined by statistics that the faces c are missing in each of the video frames 2, 10, 50, and 160, the missing rate of the faces is determined to be 2% based on the number of missing faces and the number of video frames in each video frame.
As an example, if the conference is left only briefly or a small number of times, it is considered normal, and if the deletion rate exceeds a preset deletion rate threshold, it is considered necessary to give a prompt to the manager. Specifically, the preset deletion rate threshold may be 10% or 5%, or the like.
In this embodiment, before the step of verifying the identity information input by the user through the client when the conference starts, the method includes:
Step S40: if the current conference form is an online conference, sending a conference link to each user client based on conference personnel information so that each user can enter the conference based on the conference link;
as an example, there are two conference modes in general, one is that parties cooperate or both the supply and demand of a service are in face-to-face negotiation of a service, or that a customer arrives at a specific place to seek to transact a service, and one is that a service is negotiated in the form of a teleconference.
As an example, if the current conference is an online conference (i.e., a teleconference), the identity information of the existing user in the database may be obtained through a UniBServer-AION interface, the user UID (User Identification ) may be obtained according to the mobile phone number of the user, the call ID registered by the user client may be obtained through the user UID, and a call may be initiated to the call ID, or a conference link may be made and sent to the user client; the conference generated in this way can be used for realizing a multi-person conference flow so as to realize a multi-person conference architecture in which an internal person and an external client enter the conference at the same time.
As an example, if the meeting is online, the screenshot can be completed by clicking an "identity card verification" button displayed on the client, OCR (optical character recognition, text recognition) recognition is performed on the identity information input by the user in the screenshot, the identity card number and name of the user are extracted, and the identity information of the user is verified in parallel with the network. After the user inputs the identity information, the name, the identity card number and the client channel number of the user are interacted with the identity recognition model through a file management system to obtain an identity verification result, and the identity verification result is asynchronously returned through kafka (distributed message publishing-subscribing system).
Step S50: and if the current conference form is an off-line conference, starting the conference based on the conference participant information.
As an example, if the current conference is in the form of an offline conference, the client does not need to enter the conference, and the party hosting the conference needs to verify the identity of the client through the conference interface of the client. Here, both the customer and the user are required to be within the shooting range of the camera used for conference recording.
As an example, the identity information verification process of the user of the online conference is the same as the identity information verification process of the user of the online conference.
Step S20: after the verification is passed, double-recording processing is carried out on the conference process through the recording server;
as an example, if the identity verification of the user passes, the recording server performs double-recording processing on the conference process, that is, records video and audio in the whole process of handling the service by the user, and obtains a double-recording file.
As an example, for audio in a dual-transcript file, asr (Automatic Speech Recognition ) techniques may be used for transcoding to computer-readable input (to ensure security of stored audio), provided that: the audio duration is supported within a preset duration (for example, 1 hour), the audio with the size not exceeding 100MB is supported, the audio format including NMF is supported, and the sampling rate, the number of channels, the bit width and the like are not limited.
Step S30: and when the conference is finished, carrying out content inspection on the double-record file, and storing the double-record file which is qualified in inspection into a blockchain so as to acquire related data of the conference based on the blockchain.
As an example, when the conference ends, the double-record server performs content inspection on the double-record file to prevent problems occurring in the double-record process from being not detected, which results in reduced reliability of the double-record file for subsequent certification.
As one example, the certified dual-record files include dual-record files without noise affecting human voice, full content dual-record files, and the like.
As an example, the blockchain-based data certification system further includes functions such as voice broadcasting, enterprise query, legal query, screen sharing, and the like.
As an example, after content inspection is performed on the dual-record file, the dual-record server automatically initiates video certification, and may also initiate from the page end of the video cloud server or from the page end of the user. The hash value of the double-record file can be calculated, wherein the calculation method is SHR256 (the used hash value length is 256 bits), when a plurality of double-record files exist, whether the double-record files have associated hash values is inquired, and if the double-record files do not exist, the hash values of the double-record files are sequentially read and calculated. And calling a block chain memory card interface, acquiring an Access token, and storing the corresponding double-record file into the block chain based on the hash value and the Access token. The AccessToken has a valid period, and the time that the AccessToken interface can cache each time is limited. And calling a block chain hash certificate storing interface. The automatic forensic process supports a fail-over function. The number of retries is limited and the retry interval time is limited. The update state of the double-record file before the certificate is stored is 'in the certificate', the update state after the certificate is stored is successful, and the update state after the retry times are used is failed.
Specifically, as shown in fig. 4, the service network directly uploads the dual record file through interfacing with a file management system (ECS) with a gateway signature link. The file management system automatically stores the corresponding double-record file into the blockchain based on the hash value and the AccessToken. The content of the double-record file is ensured not to be tampered.
As one example, the conference number is reserved after the conference is over and the pipeline state is saved for maintaining the latest video.
As one example, the blockchain-based data certification system also includes a running water management system. The double-record file, the service processing state and the downloading of the data can be checked through the flow management system. When checking or downloading data, the service network and the video cloud server are used for checking the authority, so that the reliability of the video is ensured, the service system review and data downloading functions mainly adopt a dynamic anti-theft chain technology, the safety of the video is ensured, and crawlers and external chains are prevented. The dynamic anti-theft chain technology is to obtain a video address and a static anti-theft chain address (corresponding to an address suffix) from a file management system through a barrel+key (video address and hash value) when viewing or downloading data, request the file management system to obtain a real video address through calculation through the static anti-theft chain address when viewing back each time, and finally play the video through the real url (Uniform Resource Locator ) address. At the time of downloading, it may be obtained directly through signature links, for example: the code curl-H 'CMB_UINFO: xxx' signalUrl is used for obtaining.
In this embodiment, identity information input by a user through a client can be checked at the beginning of a conference to ensure the authenticity of the user identity, double recording can be performed in the conference process to ensure the integrity of conference related data, when the conference is over, content checking is performed on double recorded files, and the double recorded files which are qualified in the checking are stored in a blockchain to ensure the safety of the conference related data based on the characteristics of anonymity, non-tamper-ability, openness and transparency on the chain of the blockchain technology and the like. Thereby enabling to improve reliability of conference related data.
Further, based on the foregoing embodiments of the present application, another embodiment of the present application is provided, in which the step of performing content verification on the dual-record file when the conference ends includes:
step B1: when the conference is finished, acquiring a first audio frequency in a front preset period and a second audio frequency in a rear preset period in the double-record file;
as an example, since integrity is very important for reliability of data, in order to ensure integrity of a double file, when a conference is over, a first audio in a pre-set period and a second audio in a post-set period in the double file are acquired. Specifically, the audio may be audio within the preceding minute and the following minute, or audio within the preceding 30 seconds and the following 30 seconds, or the like, and is not limited herein.
As an example, the first audio in the pre-set period and the second audio in the post-set period in the double-record file are acquired to reduce the workload of subsequent calculation. However, since the contents of the conversation have the same or similar characteristics at a certain period of time when the conference starts and ends, the integrity of the whole double-recorded file can be judged based on the first audio frequency in the front preset period and the second audio frequency in the rear preset period in the double-recorded file.
Step B2: converting the first audio and the second audio into text data respectively;
as an example, the first audio and the second audio may be converted into text data by an audio conversion tool such as an audio property. To facilitate subsequent analysis of the text content.
Step B3: based on a preset business telephone template and the text data, acquiring a first feature vector and a second feature vector respectively corresponding to the preset business telephone template and the text data through an NLP model;
as an example, the preset business session template includes a session such as "greeting" at the beginning of a conference, a "conference introduction" and the like, and also includes a session such as "express intention of collaboration or thank you and the like," determine a session such as collaboration or business office and the like "at the end of a conference.
As an example, based on a preset business session template and the text data, a first feature vector and a second feature vector corresponding to the preset business session template and the text data respectively are obtained through an NLP (Natural Language Processing ) model, so as to facilitate subsequent calculation of text content similarity.
Step B4: and carrying out cosine similarity calculation on the first feature vector and the second feature vector to obtain a cosine similarity value, so as to judge whether the content of the double-record file is complete or not based on the cosine similarity value.
As an example, the preset business speech template corresponds to a first feature vector, the text data corresponds to a second feature vector, and an included angle between the first feature vector and the second feature vector is calculated, that is, a cosine similarity value is obtained. If the cosine similarity value is smaller than a preset similarity threshold, determining that the similarity between the preset business conversation template and the text data is higher, namely, the integrity of the content of the double-record file is higher.
In this embodiment, the step of performing cosine similarity calculation on the first feature vector and the second feature vector to obtain a cosine similarity value includes:
Step C1: if the cosine similarity value is larger than a preset similarity threshold value, acquiring a first video in a front preset period and a second video in a rear preset period in the double-record file;
step C2: and identifying the actions in the first video and the second video to obtain an action identification result so as to judge whether the content of the double-record file is complete or not based on the action identification result.
As an example, if the cosine similarity value is greater than a preset similarity threshold, it is determined that the similarity between the preset business session template and the text data is low. However, in order to avoid false detection of the double-record file, a first video in a pre-preset period and a second video in a post-preset period in the double-record file can be further obtained, actions in the first video in the pre-preset period and the second video in the post-preset period in the double-record file are identified, and whether the content of the double-record file is complete is judged based on the action identification result.
As an example, the client may often perform some representative actions at the beginning and end of the conference, such as "action of calling such as" handshake "at the beginning of the conference or" action of sitting down, opening a notebook or a computer ", and" action of calling such as "handshake" at the end of the conference or "action of standing up, organizing data, and closing a computer", which are not limited herein.
As an example, the actions in the first video and the second video may be recognized by a preset gesture recognition model. The preset gesture recognition model may include a hidden markov model, a support vector machine, and the like.
As an example, based on the action recognition result and a preset conference common action, whether the action recognition result is similar to the action in the preset conference common action is judged, and if so, the content of the double-record file is determined to be complete. If the content of the double-record file is not similar, determining that the content of the double-record file is incomplete.
In this embodiment, the integrity of the content of the double-record file is determined by analyzing the audio or video of the pre-preset time period and the audio or video of the post-preset time period of the double-record file, so as to ensure the reliability of the double-record file.
Further, based on the above embodiments of the present application, another embodiment of the present application is provided, in which the step of storing the qualified dual record file into the blockchain includes:
step D1: acquiring third audio corresponding to different users in the qualified double-record file through a preset voice recognition model;
As an example, in order to improve the security of re-reading after the double-record file is stored, a preset voice recognition model is used to obtain third audios corresponding to different users in the double-record file that is qualified by the inspection. Specifically, through a preset voice recognition model, the audio in the double-record file is recognized, so that the corresponding audio of different users is recognized, and a new third audio is generated based on the audio frame of the third audio corresponding to the different users. That is, the third audio includes a plurality of audio data, each corresponding to a respective one of the users.
Step D2: calculating a first hash value of a video in the qualified double-record file and a second hash value of a third audio corresponding to different users in the qualified double-record file;
as an example, a first hash value of a video in the qualified dual-record file and a second hash value of a third audio corresponding to a different user in the qualified dual-record file are calculated, that is, identifiers (a first hash value and a second hash value) are respectively added to the video and the third audio in the qualified dual-record file.
Step D3: and storing the video in the qualified double-record file and the third audio corresponding to different users into different blocks of the blockchain based on the first hash value and the second hash value.
As an example, based on the first hash value and the second hash value, the video in the qualified dual-record file and the third audio corresponding to different users are respectively stored into different blocks of the blockchain. That is, the first hash value and the second hash value are associated, but the videos in the qualified double-record file corresponding to the same double-record file and the third audios corresponding to different users are stored separately, so that the security of the double-record file storage is improved.
In this embodiment, after the step of storing the qualified dual-record file in the blockchain, the method further includes:
step S60: and acquiring the complete double-record file qualified by inspection based on the first hash value, the second hash value and the storage addresses corresponding to different blocks of the block chain.
As an example, based on the first hash value, the second hash value, and the storage addresses corresponding to different blocks of the blockchain, the complete qualified dual-record file is obtained. When a user reads, the video and the third audio in the different blocks can be read based on the first hash value and the second hash value to obtain the complete double-record file, so that the safety of the user for reading the double-record file is improved, the double-record file is prevented from being tampered, and the reliability of the double-record file is improved.
In this embodiment, the video in the qualified dual-record file corresponding to the same dual-record file and the third audio corresponding to different users are separately stored, so as to improve the security of storing the dual-record file. And when the video and the third audio in the different blocks are read, the complete double-record file can be obtained only by reading the video and the third audio in the different blocks based on the first hash value and the second hash value, so that the safety of reading the double-record file by a user is improved, the double-record file is prevented from being tampered, and the reliability of the double-record file is improved.
Referring to fig. 5, fig. 5 is a schematic device structure diagram of a hardware running environment according to an embodiment of the present application.
As shown in fig. 5, the blockchain-based data certification device may include: a processor 1001, a memory 1005, and a communication bus 1002. The communication bus 1002 is used to enable connected communication between the processor 1001 and the memory 1005.
Optionally, the blockchain-based data certification device may further include a user interface, a network interface, a camera, an RF (Radio Frequency) circuit, a sensor, a WiFi module, and the like. The user interface may include a Display, an input sub-module such as a Keyboard (Keyboard), and the optional user interface may also include a standard wired interface, a wireless interface. The network interface may include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the blockchain-based data storage device structure shown in fig. 5 does not constitute a limitation of the blockchain-based data storage device and may include more or fewer components than shown, or may combine certain components, or may be a different arrangement of components.
As shown in fig. 5, an operating system, a network communication module, and a blockchain-based data certification program may be included in the memory 1005 as one type of storage medium. The operating system is a program that manages and controls the hardware and software resources of the blockchain-based data logging device, supporting the execution of blockchain-based data logging programs and other software and/or programs. The network communication module is used to enable communication between components within the memory 1005 and with other hardware and software in the blockchain-based data storage system.
In the blockchain-based data certification device shown in fig. 5, a processor 1001 is configured to execute a blockchain-based data certification program stored in a memory 1005, to implement the steps of the blockchain-based data certification method described in any of the above.
The specific implementation manner of the blockchain-based data storage and verification device is basically the same as the above-mentioned embodiments of the blockchain-based data storage and verification method, and is not repeated here.
The application also provides a data storage and certification device based on a blockchain, as shown in fig. 6, which is applied to a data storage and certification system based on the blockchain, wherein the data storage and certification system based on the blockchain comprises an audio and video cloud server, a recording server and a blockchain, and the audio and video cloud server is used for initiating a conference, and the device comprises:
the identity verification module 10 is used for verifying the identity information input by the user through the client when the conference starts;
the double-record module 20 is used for carrying out double-record processing on the conference process through the record server after the verification is passed;
and the checking and storing module 30 is used for checking the content of the double-record file when the conference is over, and storing the double-record file which is qualified in checking into the blockchain so as to acquire the related data of the conference based on the blockchain.
Optionally, in a possible embodiment of the present application, the checking and storing module 30 includes:
the audio checking sub-module is used for identifying the voice and the noise in the audio in the double-record file through a preset audio checking model when the conference is finished, and checking whether the noise in the audio is higher than a preset noise threshold value or not;
The preprocessing sub-module is used for preprocessing the noise of the audio in the two-way file until the noise in the audio is lower than a preset noise threshold value if the detection result is that the noise in the audio is higher than the preset noise threshold value;
the video inspection sub-module is used for identifying the faces in the videos in the double-record file through a preset video inspection model and judging whether the faces in the videos are matched with the identity information or not;
and the prompt sub-module is used for sending out a prompt for the manager to check if the face in the video is not matched with the identity information.
Optionally, in a possible embodiment of the present application, the checking and storing module 30 includes:
the first audio acquisition sub-module is used for acquiring first audio in a front preset period and second audio in a rear preset period in the double-record file when the conference is finished;
the audio conversion sub-module is used for respectively converting the first audio and the second audio into text data;
the feature vector acquisition sub-module is used for acquiring a first feature vector and a second feature vector which are respectively corresponding to the preset business conversation template and the text data through an NLP model based on the preset business conversation template and the text data;
And the similarity judging sub-module is used for carrying out cosine similarity calculation on the first characteristic vector and the second characteristic vector to obtain a cosine similarity value so as to judge whether the content of the double-record file is complete or not based on the cosine similarity value.
Optionally, in a possible implementation manner of the present application, the similarity determining submodule includes:
the video acquisition unit is used for acquiring a first video in a front preset period and a second video in a rear preset period in the double-record file if the cosine similarity value is larger than a preset similarity threshold;
and the action recognition unit is used for recognizing actions in the first video and the second video to obtain action recognition results so as to judge whether the content of the double-record file is complete or not based on the action recognition results.
Optionally, in a possible embodiment of the present application, the checking and storing module 30 includes:
the second audio acquisition sub-module is used for acquiring third audio corresponding to different users in the qualified double-record file through a preset voice recognition model;
the hash value calculation sub-module is used for calculating a first hash value of the video in the qualified double-record file and a second hash value of the third audio corresponding to different users in the qualified double-record file;
And the file storage sub-module is used for respectively storing the video in the qualified double-record file and the third audio corresponding to different users into different blocks of the block chain based on the first hash value and the second hash value.
Optionally, in a possible embodiment of the present application, after the step of storing the qualified dual file in the blockchain, the apparatus further includes:
and the file acquisition module is used for acquiring the complete double-record file which is qualified by inspection based on the first hash value, the second hash value and the storage addresses corresponding to different blocks of the block chain.
Optionally, in a possible implementation manner of the present application, before the step of verifying the identity information input by the user through the client when the conference starts, the apparatus includes:
the online conference module is used for sending a conference link to each user client based on conference joining personnel information if the current conference form is an online conference, so that each user can enter the conference based on the conference linking;
and the online conference module is used for starting the conference based on the conference joining personnel information if the current conference form is the online conference.
The specific implementation manner of the blockchain-based data certification device is basically the same as the above-mentioned embodiments of the blockchain-based data certification method, and is not repeated here.
The present application also provides a storage medium having stored thereon a blockchain-based data certification program that when executed by a processor implements the steps of the blockchain-based data certification method as set forth in any of the above.
The specific implementation manner of the storage medium is basically the same as the above embodiments of the blockchain-based data storage method, and will not be repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (10)

1. The blockchain-based data certification method is characterized by being applied to a blockchain-based data certification system, wherein the blockchain-based data certification system comprises an audio and video cloud server, a recording server and a blockchain, the audio and video cloud server is used for initiating a conference, and the blockchain-based data certification method comprises the following steps of:
when the conference starts, verifying the identity information input by the user through the client;
after the verification is passed, double-recording processing is carried out on the conference process through the recording server;
and when the conference is finished, carrying out content inspection on the double-record file, and storing the double-record file which is qualified in inspection into a blockchain so as to acquire related data of the conference based on the blockchain.
2. The blockchain-based data certification method of claim 1, wherein the step of performing content verification on the double-record file when the conference is ended comprises:
when the conference is over, identifying the voice and the noise in the audio in the double-record file through a preset audio verification model, and verifying whether the noise in the audio is higher than a preset noise threshold value or not;
if the detection result is that the noise in the audio is higher than a preset noise threshold, preprocessing the noise in the audio in the two-way file until the noise in the audio is lower than the preset noise threshold;
Identifying human faces in the video in the double-record file through a preset video inspection model, and judging whether the human faces in the video are matched with the identity information;
and if the face in the video is not matched with the identity information, a prompt is sent out for the manager to check.
3. The blockchain-based data storage method of claim 2, wherein the faces in each video frame in the double-record file are identified through a preset video inspection model to obtain a plurality of faces corresponding to each video frame;
after the step of identifying the face in the video in the double-record file through the preset video inspection model, the method further comprises the following steps:
judging whether a plurality of corresponding faces in each video frame are identical, if not, determining the missing rate of the faces based on the missing faces in each video frame and the number of the video frames;
based on the miss rate, it is determined whether to issue a prompt to a manager.
4. The blockchain-based data certification method of claim 1, wherein the step of performing content verification on the double-record file when the conference is ended comprises:
When the conference is finished, acquiring a first audio frequency in a front preset period and a second audio frequency in a rear preset period in the double-record file;
converting the first audio and the second audio into text data respectively;
based on a preset business telephone template and the text data, acquiring a first feature vector and a second feature vector respectively corresponding to the preset business telephone template and the text data through an NLP model;
and carrying out cosine similarity calculation on the first feature vector and the second feature vector to obtain a cosine similarity value, so as to judge whether the content of the double-record file is complete or not based on the cosine similarity value.
5. The blockchain-based data certification method of claim 4, wherein the step of performing cosine similarity calculation on the first feature vector and the second feature vector to obtain a cosine similarity value includes:
if the cosine similarity value is larger than a preset similarity threshold value, acquiring a first video in a front preset period and a second video in a rear preset period in the double-record file;
and identifying the actions in the first video and the second video to obtain an action identification result so as to judge whether the content of the double-record file is complete or not based on the action identification result.
6. The blockchain-based data certification method of claim 1, wherein the step of storing the certified dual record file to the blockchain comprises:
acquiring third audio corresponding to different users in the qualified double-record file through a preset voice recognition model;
calculating a first hash value of a video in the qualified double-record file and a second hash value of a third audio corresponding to different users in the qualified double-record file;
and storing the video in the qualified double-record file and the third audio corresponding to different users into different blocks of the blockchain based on the first hash value and the second hash value.
7. The blockchain-based data certification method of claim 6, wherein after the step of storing the certified dual record file to the blockchain, the method further comprises:
and acquiring the complete double-record file qualified by inspection based on the first hash value, the second hash value and the storage addresses corresponding to different blocks of the block chain.
8. The utility model provides a data is deposited and is shown device based on blockchain, its characterized in that is applied to the data is deposited and is shown system based on blockchain, data is shown system based on blockchain includes audio and video cloud ware, records server and blockchain, audio and video cloud ware is used for initiating the meeting, the device includes:
The identity verification module is used for verifying the identity information input by the user through the client when the conference starts;
the double-recording module is used for carrying out double-recording processing on the conference process through the recording server after the verification is passed;
and the checking and storing module is used for carrying out content checking on the double-record file when the conference is finished, and storing the double-record file which is qualified in checking into the blockchain so as to acquire the related data of the conference based on the blockchain.
9. A blockchain-based data certification device, the device comprising: a memory, a processor, and a blockchain-based data certification program stored on the memory and executable on the processor, the blockchain-based data certification program configured to implement the steps of the blockchain-based data certification method of any of claims 1 to 7.
10. A storage medium having stored thereon a blockchain-based data certification program that when executed by a processor performs the steps of the blockchain-based data certification method of any of claims 1 to 7.
CN202311138880.4A 2023-09-05 2023-09-05 Block chain-based data storage method, device, equipment and storage medium Pending CN117294415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311138880.4A CN117294415A (en) 2023-09-05 2023-09-05 Block chain-based data storage method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311138880.4A CN117294415A (en) 2023-09-05 2023-09-05 Block chain-based data storage method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117294415A true CN117294415A (en) 2023-12-26

Family

ID=89250897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311138880.4A Pending CN117294415A (en) 2023-09-05 2023-09-05 Block chain-based data storage method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117294415A (en)

Similar Documents

Publication Publication Date Title
US11842740B2 (en) Seamless authentication and enrollment
CN111741356B (en) Quality inspection method, device and equipment for double-recording video and readable storage medium
US11803665B2 (en) System and method for validating authorship of an electronic signature session
WO2021175019A1 (en) Guide method for audio and video recording, apparatus, computer device, and storage medium
CN113706091B (en) Intelligent remote auditing method, device, system, computer equipment and storage medium
US20170103397A1 (en) Video identification method and computer program product thereof
CN107733666A (en) Conference implementation method and device and electronic equipment
CN112200697B (en) Remote video room watching method, device, equipment and computer storage medium
AU2018354129A1 (en) System and method for automated online notarization meeting recovery
CN106161406B (en) The method and apparatus for obtaining user account
CN110599190A (en) Identity authentication method and device based on block chain
US20220300993A1 (en) System and method for conducting a survey by a survey bot
CN106815328A (en) Document processing method, document processing system and Notes server
US12014096B1 (en) System and method for remote authentication based on computer-vision technologies
CN117294415A (en) Block chain-based data storage method, device, equipment and storage medium
CN107819807A (en) A kind of Information Authentication method, apparatus and equipment
CN115776548A (en) Double recording system
CN105430345A (en) A method for remote monitoring of comprehensive video training platform
US20220051357A1 (en) System and method for attorney-client privileged digital evidence capture, analysis and collaboration
CN113420133A (en) Session processing method, device, equipment and storage medium
CN113537818B (en) Online examination processing method and system
US20240220592A1 (en) System and method for detecting agent sharing credentials
CN109257613A (en) Method and apparatus for handling information
CN116074015A (en) Bank terminal transaction method and device based on block chain
CN116520993A (en) Intelligent customer service interaction method and system based on video face tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination