CN-121985077-A - High-definition roll process trace safety protection method, system, equipment and medium
Abstract
The application discloses a security protection method, a security protection system, security protection equipment and a security protection medium for trace of a high-speed scroll process, wherein the security protection method comprises the steps of determining a key corresponding to first time according to the first time and a key factor, and storing the first time and the key into a key set; the method comprises the steps of determining a target key from a key set according to a second time, encrypting an image through a selected encryption and decryption method and the target key to obtain image encrypted content, wherein the image encrypted content is an encrypted marking process trace, calculating image abstract information corresponding to the second time according to user information, image abstract information calculated last time, the second time and the image encrypted content, and checking whether the marking process trace is tampered or not according to the selected encryption and decryption method, the target key, the user information, the image abstract information calculated last time, the second time, the image encrypted content and the image abstract information corresponding to the second time. The application can promote the trace safety protection in the process of reading the paper in colleges and universities.
Inventors
- MA XIAOFENG
Assignees
- 广州乘方科技有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20260130
Claims (10)
- 1. The method for protecting the trace safety of the high-speed scroll process is characterized by comprising the following steps of: acquiring an image in the process of marking the paper, and reserving the image as a mark in the process of marking the paper; Calculating a key factor by a preset mapping method; According to the key acquisition interval, a first time is obtained, a key corresponding to the first time is determined according to the first time and the key factor, and the first time and the key are stored in a key set; Acquiring a second time when the image is encrypted, and determining a target key from the key set according to the second time; encrypting the image through the selected encryption and decryption method and the target key to obtain image encrypted content, wherein the image encrypted content is an encrypted marking process trace; calculating the image abstract information corresponding to the second time according to the user information, the image abstract information calculated last time, the second time and the image encrypted content; and browsing the encrypted marking process trace and checking whether the marking process trace is tampered or not according to the selected encryption and decryption method, the target key, the user information, the image abstract information calculated last time, the second time, the image encrypted content and the image abstract information corresponding to the second time.
- 2. The method of claim 1, wherein determining the key corresponding to the first time based on the first time and the key factor comprises: adding the first time and the key factor to obtain a first addition result; and processing the first addition result by adopting a preset summary algorithm to obtain the key corresponding to the first time.
- 3. The method of claim 1, wherein determining a target key from the set of keys based on the second time comprises: Selecting a first target record from the key set according to a first time in the key set, wherein the first target record is a first record in a plurality of records corresponding to the first time which is less than or equal to the second time in the key set; and taking the key in the first target record as a target key.
- 4. The security protection method for high-speed reading roll process traces according to claim 1, wherein the encrypting the image by the selected encryption and decryption method and the target key to obtain the image encrypted content comprises: Acquiring image binary data; selecting one encryption and decryption method from a plurality of preset encryption and decryption methods at will; and encrypting the image by adopting a selected encryption and decryption method according to the binary data of the image and the target key to obtain image encrypted content.
- 5. The method according to claim 1, wherein calculating the image summary information corresponding to the second time based on the user information, the last calculated image summary information, the second time, and the image encrypted content, comprises: adding the user information, the image abstract information calculated last time, the second time and the image encrypted content to obtain a second added result; And processing the second addition result by adopting a preset summary algorithm to obtain image summary information corresponding to the second time.
- 6. The method according to claim 1, wherein the browsing the encrypted marking and checking whether the marking is tampered according to the selected encrypting and decrypting method, the target key, the user information, the last calculated image summary information, the second time, the image encrypted content, and the image summary information corresponding to the second time, comprises: Storing the user information, the image encryption content, the selected encryption and decryption method and the target key into a database table, wherein a recorded field in the database table comprises the user information, the image encryption content, the encryption and decryption method, the key, the checking time and a suspicious mark; Storing the selected encryption and decryption method, the target key, the user information, the last calculated image abstract information, the second time, the image encrypted content and the image abstract information corresponding to the second time to a check image set, and storing the check image set to a plurality of server nodes; Checking the data of the check image sets in the plurality of server nodes according to the check time intervals to obtain check time and a target check result, wherein the target check result is a result of checking whether the trace of the examination paper reading process is tampered or not; decrypting the image encrypted content according to the selected encryption and decryption method and the target key in the database table to obtain a target image; When browsing the target image, searching the user information and the image encryption content corresponding to the target image in the database table according to the user information and the image encryption content corresponding to the checking result; Determining a second target record in the database table through the searched user information and the image encryption content in the database table; And if the target inspection result indicates that the marking is not tampered, not displaying a suspicious mark, and if the target inspection result indicates that the marking is tampered, updating the inspection time in the second target record and displaying the suspicious mark according to the inspection time and the target inspection result.
- 7. The method of claim 6, wherein the checking the data of the check image set in the plurality of server nodes according to the check time interval to obtain the check time and the target check result comprises: determining checking time according to the checking time interval; When the checking time is reached, checking whether the data of the check image sets in the plurality of server nodes are consistent, if the data of more than half of the nodes in the plurality of server nodes are inconsistent, indicating that the marking of the paper marking process is tampered and marked as suspicious, and if the data of more than half of the nodes in the plurality of server nodes are consistent, indicating that the marking of the paper marking process is not tampered and marked as normal; and taking the result marked as suspicious or normal as a target checking result.
- 8. A high review roll process trace security system, the system comprising: The image data acquisition unit is used for acquiring an image in the process of marking the paper, and reserving the image as a mark in the process of marking the paper; The first data calculation unit is used for calculating a key factor through a preset mapping method; The first data determining unit is used for obtaining a first time according to a key obtaining interval, determining a key corresponding to the first time according to the first time and the key factor, and storing the first time and the key into a key set; a second data determining unit, configured to obtain a second time when the image is encrypted, and determine a target key from the key set according to the second time; the image encryption unit is used for encrypting the image through the selected encryption and decryption method and the target key to obtain image encrypted content, wherein the image encrypted content is an encrypted marking process trace; A second data calculating unit, configured to calculate image summary information corresponding to the second time according to user information, image summary information calculated last time, the second time, and the image encrypted content; And the trace browsing and checking unit is used for browsing the encrypted marking process trace and checking whether the marking process trace is tampered or not according to the selected encryption and decryption method, the target key, the user information, the image abstract information calculated last time, the second time, the image encrypted content and the image abstract information corresponding to the second time.
- 9. An electronic device comprising at least one control processor and a memory communicatively coupled to the at least one control processor, the memory storing instructions executable by the at least one control processor to enable the at least one control processor to perform the high-review roll-up process trace safety protection method of any one of claims 1 to 7.
- 10. A computer-readable storage medium storing computer-executable instructions for causing a computer to perform the high-review roll-up trace security protection method according to any one of claims 1 to 7.
Description
High-definition roll process trace safety protection method, system, equipment and medium Technical Field The application relates to the technical field of data security, in particular to a method, a system, equipment and a medium for protecting trace security in a high-speed scroll process. Background Along with the digital transformation requirement of universities, various data are transmitted on a network, and the security requirement of the high-school data is higher and higher. In the process of reading paper in colleges and universities, paper reading experts often read the paper directly on the equipment through a handwriting pen, and the trace of the paper reading process is reserved by continuously acquiring images of the paper reading process. However, the trace of the paper marking process in the process of marking is not effectively protected and reserved by the related technology at present, and even if the trace of the paper marking process is reserved by the related technology, the trace of the paper marking process can be tampered, so that the trace of the paper marking process has lower safety, and the backtracking of the safe and effective paper marking process is not facilitated. Disclosure of Invention The application aims to provide a method, a system, equipment and a medium for safely protecting trace in a high-school roll reading process, which can effectively reserve trace in the roll reading process and promote the safety protection of trace in the roll reading process in the university. In a first aspect, an embodiment of the present application provides a method for protecting trace security in a high-resolution scroll process, where the method includes: acquiring an image in the process of marking the paper, and reserving the image as a mark in the process of marking the paper; Calculating a key factor by a preset mapping method; According to the key acquisition interval, a first time is obtained, a key corresponding to the first time is determined according to the first time and the key factor, and the first time and the key are stored in a key set; Acquiring a second time when the image is encrypted, and determining a target key from the key set according to the second time; encrypting the image through the selected encryption and decryption method and the target key to obtain image encrypted content, wherein the image encrypted content is an encrypted marking process trace; calculating the image abstract information corresponding to the second time according to the user information, the image abstract information calculated last time, the second time and the image encrypted content; and browsing the encrypted marking process trace and checking whether the marking process trace is tampered or not according to the selected encryption and decryption method, the target key, the user information, the image abstract information calculated last time, the second time, the image encrypted content and the image abstract information corresponding to the second time. Compared with the prior art, the first aspect of the application has the following beneficial effects: the method comprises the steps of obtaining an image in a paper reading process, reserving the image as a paper reading process trace, calculating a key factor through a preset mapping method, obtaining a first time according to a key obtaining interval, determining a key corresponding to the first time according to the first time and the key factor, storing the first time and the key into a key set, obtaining a second time when the image is encrypted, determining a target key from the key set according to the second time, encrypting the image through a selected encryption and decryption method and the target key to obtain an image encrypted content, wherein the image encrypted content is the encrypted paper reading process trace, calculating image abstract information corresponding to the second time according to user information, the last calculated image abstract information, the second time and the image encrypted content, and browsing the encrypted paper reading process trace and checking whether the paper reading process trace is tampered or not according to the selected encryption and decryption method, the target key, the user information, the last calculated image abstract information, the second time, the image encrypted content and the image abstract information corresponding to the second time. Therefore, the trace in the process of marking the paper can be effectively reserved by reserving and encrypting the acquired image; and browsing the encrypted marking process trace and checking whether the marking process trace is tampered or not according to the selected encryption and decryption method, the target key, the user information, the image abstract information calculated last time, the second time, the image encrypted content and the image abstract information corresponding to the second time, so that the se