Search

CN-121985188-A - Method, device and computer program product for verifying longitude and latitude watermark

CN121985188ACN 121985188 ACN121985188 ACN 121985188ACN-121985188-A

Abstract

The embodiment of the application discloses a method, a device and a computer program product for verifying longitude and latitude watermarks. The method comprises the steps of obtaining a plurality of longitude and latitude data obtained for a target picture, wherein the longitude and latitude data at least comprise longitude and latitude data obtained by calling a C/C++ language layer positioning interface, performing splicing processing on the longitude and latitude data to obtain service data, sending the service data to a server side so that the server side can detect whether longitude and latitude falsification risks exist by comparing differences of the longitude and latitude data contained in the service data, and executing risk processing in response to the existence of the longitude and latitude falsification risks. The application can ensure the authenticity of the generated longitude and latitude watermark data by detecting the longitude and latitude counterfeiting risk, and improves the credibility of the watermark image.

Inventors

  • LEI ZHEN
  • LI XUGANG
  • RUAN FENGLI
  • Zhan Gangao
  • WANG DI
  • HAN FULIN

Assignees

  • 汇海银河(北京)科技有限公司

Dates

Publication Date
20260505
Application Date
20251128

Claims (17)

  1. 1. A method for verifying a longitude and latitude watermark, applied to a client, the method comprising: Acquiring a plurality of longitude and latitude data acquired aiming at a target picture, wherein the longitude and latitude data at least comprise longitude and latitude data acquired by calling a C/C++ language layer positioning interface; Performing splicing processing on the longitude and latitude data to obtain service data; The service data is sent to a server side, so that the server side can detect whether the risk of latitude and longitude counterfeiting exists by comparing the differences of a plurality of latitude and longitude data contained in the service data; In response to the risk of latitude and longitude forgery, risk processing is performed.
  2. 2. The method of claim 1, wherein the acquiring the plurality of latitude and longitude data acquired for the target picture comprises: Invoking a Java layer positioning interface to obtain at least one of GPS longitude and latitude data, network positioning longitude and latitude data or fusion positioning longitude and latitude data, wherein the fusion positioning longitude and latitude data is obtained by fusing the GPS longitude and latitude data and the network positioning longitude and latitude data; and calling the C/C++ language layer positioning interface to acquire at least one of network positioning longitude and latitude data and GNSS longitude and latitude data.
  3. 3. The method of claim 1, wherein the performing a stitching process on the plurality of latitude and longitude data to obtain service data includes: and splicing the longitude and latitude data and the signatures thereof to obtain the service data, so that the server side can detect whether the risk of longitude and latitude counterfeiting exists by verifying the signatures of the longitude and latitude data in the service data.
  4. 4. The method of claim 1, wherein the sending the service data to a server side comprises: encrypting the service data by using a dynamic key, wherein the dynamic key is obtained by requesting the client to a server by using a pre-stored basic key; And sending the encrypted service data to the server side so that the server side can detect whether the latitude and longitude counterfeiting risk exists by decrypting the service data.
  5. 5. The method according to claim 4, wherein the method further comprises: acquiring a pre-stored basic key; The basic key is carried in a key request and is sent to the server side; Receiving dynamic key segments issued by the server through at least two different communication connections respectively; and assembling the dynamic key segment to obtain the dynamic key.
  6. 6. The method of claim 1, further comprising at least one of: the server side returns a target longitude and latitude and a signature thereof, and the signature of the target longitude and latitude is verified, wherein the target longitude and latitude is obtained by the server side based on the longitude and latitude, and generation of a longitude and latitude watermark for the target picture is forbidden in response to failure of signature verification of the target longitude and latitude; and responding to the return address information of the server side and the signature thereof, verifying the signature of the address information, wherein the address information is determined by the server side based on the target longitude and latitude, and responding to the failure of signature verification of the address information, and executing risk processing.
  7. 7. The method of claim 6, further comprising at least one of: in the process of generating the longitude and latitude watermark aiming at the target picture, verifying the longitude and latitude displayed by a text view component by utilizing the target longitude and latitude, and if verification fails, executing risk processing; and in the process of generating the longitude and latitude watermark aiming at the target picture, verifying the address displayed by the text view component by utilizing the address information, and if verification fails, executing risk processing.
  8. 8. The method of claim 6, wherein after generating a latitude and longitude watermark for the target picture, the method further comprises at least one of: and identifying the longitude and latitude contained in the longitude and latitude watermark by utilizing a character identification technology, verifying the longitude and latitude obtained by identification by utilizing the target longitude and latitude, and executing risk processing if verification fails.
  9. 9. The method of any one of claims 1 to 8, wherein the risk processing includes at least one of reporting errors, crashing, user identity authentication, and disabling generation of longitude and latitude watermarks for the target picture.
  10. 10. The method for verifying the longitude and latitude watermark is applied to a server side and is characterized by comprising the following steps: Receiving service data sent by a client, wherein the service data is obtained by splicing a plurality of longitude and latitude data, and the plurality of longitude and latitude data at least comprises the longitude and latitude data obtained by calling a C/C++ language layer positioning interface by the client; detecting whether a latitude and longitude counterfeiting risk exists by comparing the differences of the plurality of latitude and longitude data; In response to detecting the existence of the risk of longitude and latitude forgery, information or risk processing instructions indicating the existence of the risk of longitude and latitude forgery are sent to the client so that the client can execute risk processing.
  11. 11. The method of claim 10, wherein the business data comprises a signature of the latitude and longitude data, the method further comprising: And verifying the signature of each latitude and longitude data in the service data to detect whether the risk of latitude and longitude counterfeiting exists.
  12. 12. The method according to claim 10, wherein the method further comprises: receiving a key request sent by the client, and verifying a basic key carried by the key request; generating a dynamic key for the client in response to the basic key verification passing, and returning the information of the dynamic key to the client; After receiving the service data sent by the client, decrypting by using the dynamic key corresponding to the client to obtain the service data, and if the decryption fails, determining that the risk of latitude and longitude counterfeiting exists.
  13. 13. The method of claim 12, wherein the returning the information of the dynamic key to the client comprises: splitting the dynamic key into at least two dynamic key segments; And sending the at least two dynamic key segments to the client through at least two different communication connections respectively, so that the client can assemble the at least two dynamic key segments to obtain the dynamic key.
  14. 14. The method according to any one of claims 10 to 13, further comprising at least one of: If the latitude and longitude counterfeiting risk is not detected, determining a target latitude and longitude by utilizing the plurality of latitude and longitude data, and returning the target latitude and longitude and the signature thereof to the client; If the risk of longitude and latitude falsification is not detected, determining a target longitude and latitude by utilizing the longitude and latitude data, inquiring address information corresponding to the target longitude and latitude by utilizing the target longitude and latitude, and returning the address information and the signature thereof to the client.
  15. 15. A device for verifying a longitude and latitude watermark, which is disposed at a client, the device comprising: The data acquisition unit is configured to acquire a plurality of longitude and latitude data acquired for the target picture, wherein the plurality of longitude and latitude data at least comprise longitude and latitude data acquired by calling a C/C++ language layer positioning interface; the splicing processing unit is configured to splice the longitude and latitude data to obtain service data; The data sending unit is configured to send the service data to a server side so that the server side can detect whether the risk of longitude and latitude counterfeiting exists by comparing the differences of a plurality of longitude and latitude data contained in the service data; And a risk processing unit configured to perform risk processing in response to the risk of latitude and longitude forgery.
  16. 16. A device for verifying a longitude and latitude watermark, which is disposed at a server, the device comprising: the data receiving unit is configured to receive service data sent by a client, wherein the service data is obtained by splicing a plurality of longitude and latitude data, and the plurality of longitude and latitude data at least comprises longitude and latitude data obtained by calling a C/C++ language layer positioning interface by the client; A risk detection unit configured to detect whether there is a risk of latitude and longitude forgery by comparing the variability of the plurality of latitude and longitude data; And a data transmission unit configured to transmit information indicating that there is a risk of latitude and longitude forgery or a risk processing instruction to the client in response to detecting that there is a risk of latitude and longitude forgery, so that the client performs risk processing.
  17. 17. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method of any one of claims 1 to 14.

Description

Method, device and computer program product for verifying longitude and latitude watermark Technical Field The present application relates to the field of information security technologies, and in particular, to a method, an apparatus, and a computer program product for verifying a longitude and latitude watermark. Background The watermark camera application is a mobile application program capable of automatically adding various information watermarks when taking photos, and is widely applied to scenes such as work records, life card punching, content creation and the like. Including time watermarks, longitude and latitude watermarks, location watermarks, and the like. The authenticity of the longitude and latitude watermarks is a core link for ensuring the credibility of the position information of the shot content. However, a malicious attacker may tamper with the latitude and longitude information in various ways, for example tamper with the return value of the positioning interface to forge the latitude and longitude data, so that the authenticity of the latitude and longitude is difficult to ensure, the watermark information is further distorted, and finally the credibility of the watermark image is reduced. Disclosure of Invention The application provides a method, a device and a computer program product for verifying longitude and latitude watermarks, which are used for detecting the risk of longitude and latitude counterfeiting and ensuring the authenticity of longitude and latitude watermark data. The application provides the following scheme: According to a first aspect, a method for verifying a longitude and latitude watermark is provided and applied to a client, the method comprises the steps of obtaining a plurality of longitude and latitude data obtained for a target picture, wherein the longitude and latitude data at least comprise longitude and latitude data obtained by calling a C/C++ language layer positioning interface, performing splicing processing on the longitude and latitude data to obtain service data, sending the service data to a server so that the server can detect whether longitude and latitude counterfeiting risks exist by comparing differences of the longitude and latitude data contained in the service data, and executing risk processing in response to the existence of the longitude and latitude counterfeiting risks. According to a second aspect, a method for verifying a longitude and latitude watermark is provided and applied to a server side, wherein the method comprises the steps of receiving service data sent by a client side, wherein the service data are obtained by splicing a plurality of longitude and latitude data, the plurality of longitude and latitude data at least comprise longitude and latitude data obtained by calling a C/C++ language layer positioning interface by the client side, detecting whether longitude and latitude falsification risks exist by comparing the differences of the plurality of longitude and latitude data, and sending information or risk processing instructions indicating that the longitude and latitude falsification risks exist to the client side in response to the detection of the existence of the longitude and latitude falsification risks so that the client side can execute risk processing. According to a third aspect, a device for verifying a longitude and latitude watermark is provided, and the device is arranged at a client and comprises a data acquisition unit configured to acquire a plurality of longitude and latitude data acquired for a target picture, wherein the plurality of longitude and latitude data at least comprise longitude and latitude data acquired by calling a C/C++ language layer positioning interface, a splicing processing unit configured to splice the plurality of longitude and latitude data to obtain service data, a data sending unit configured to send the service data to the server so that the server can detect whether longitude and latitude falsification risks exist by comparing differences of the plurality of longitude and latitude data contained in the service data, and a risk processing unit configured to execute risk processing in response to the existence of the longitude and latitude falsification risks. According to a fourth aspect, a device for verifying a longitude and latitude watermark is provided, and the device is arranged at a server and comprises a data receiving unit configured to receive service data sent by a client, wherein the service data is obtained by splicing a plurality of longitude and latitude data, the plurality of longitude and latitude data at least comprise longitude and latitude data obtained by calling a C/C++ language layer positioning interface by the client, a risk detecting unit configured to detect whether a longitude and latitude falsification risk exists by comparing the differences of the plurality of longitude and latitude data, and a data sending unit configured to send informa