CN107133353A - A kind of autonomous liability management method based on biological information - Google Patents
A kind of autonomous liability management method based on biological information Download PDFInfo
- Publication number
- CN107133353A CN107133353A CN201710379591.1A CN201710379591A CN107133353A CN 107133353 A CN107133353 A CN 107133353A CN 201710379591 A CN201710379591 A CN 201710379591A CN 107133353 A CN107133353 A CN 107133353A
- Authority
- CN
- China
- Prior art keywords
- responsibility
- person liable
- facility
- biological information
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 30
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000012546 transfer Methods 0.000 claims description 20
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 206010040904 Skin odour abnormal Diseases 0.000 claims description 4
- 210000004556 brain Anatomy 0.000 claims description 4
- 230000005021 gait Effects 0.000 claims description 4
- 210000000554 iris Anatomy 0.000 claims description 4
- 210000001525 retina Anatomy 0.000 claims description 4
- 231100000241 scar Toxicity 0.000 claims description 4
- 210000003462 vein Anatomy 0.000 claims description 4
- 230000001755 vocal effect Effects 0.000 claims description 4
- 238000013480 data collection Methods 0.000 abstract description 2
- 238000005457 optimization Methods 0.000 abstract description 2
- 239000000383 hazardous chemical Substances 0.000 description 9
- 239000000126 substance Substances 0.000 description 5
- XFXPMWWXUTWYJX-UHFFFAOYSA-N Cyanide Chemical compound N#[C-] XFXPMWWXUTWYJX-UHFFFAOYSA-N 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 3
- 238000007689 inspection Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000007812 deficiency Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/1093—Calendar-based scheduling for persons or groups
- G06Q10/1097—Task assignment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
Abstract
The invention discloses a kind of autonomous liability management method based on biological information, this method managed by automatic data collection during related responsibility data, to realize the automatic discrimination of responsible party;(distributed authentication mode) is managed by block chain simultaneously, can not be denied and inexpensive safety certification to realize.Automatically the biometrics called to account, block chain (distributed authentication) is related to personnel are combined, the autonomous Informatization Management Modes for facility and event is set up, the effective execution and optimization of rules and regulations is realized by overall process informationization.
Description
Technical field
The present invention relates to a kind of autonomous liability management method based on biological information.
Background technology
During Internet of Things is managed, people is the management subject of thing, and the quality of management will determine the effect of Internet of Things management
Rate or effect, the responsibility of people are the key of management in place, be currently mostly by formulating regulation or system, during for calling to account according to
According to, but be difficult to be judged with big data when calling to account;Or need third party to notarize in management process, so that management cost mistake
High or process is excessively complicated, difficult to realize effective according to regulating reason.So, the correlation during how being managed by automatic data collection
Responsibility date, to realize the automatic discrimination of responsible party, while (distributed authentication mode) is managed by block chain, can not to realize
Deny and inexpensive safety certification, be the key issue for needing to solve.To call to account automatically, block chain (distributed authentication) and people
The related biometrics of member are combined, and available for the autonomous Informatization Management Modes built for facility and event, are led to
Cross effective execution and optimization that rules and regulations are realized in overall process informationization.
The content of the invention
In view of the above-mentioned deficiencies in the prior art, it is an object of the present invention to provide a kind of autonomous responsibility pipe based on biological information
Reason method.
The purpose of the present invention is achieved through the following technical solutions:A kind of autonomous liability management based on biological information
Method, comprises the following steps:
(1) block chain sets up facility responsibility table, the project of facility responsibility table includes from during wound generation block startup:Facility ID, duty
Let people, Obligation Names.
(2) biological information of person liable is entered into block chain, builds person liable's biological information storehouse;
(3) unique facility ID is set to facility, and facility ID and its person liable are entered into facility responsibility table;
(4) when facility is shifted, block chain node gathers new person liable, the biological information of old person liable, and carries out wide
Broadcast;
(5) information in the biological information and information bank of collection is compared, unanimously then passes through checking, it is allowed to which facility turns
Move, and generate facility responsibility transfer packet, including facility ID, the biological information of old person liable, new person liable
Biological information and Obligation Names, and broadcasted;Meanwhile, more new facility responsibility table.
Further, for a certain person liable, sub- responsibility table is set up;The biological information of sub- person liable is recorded by person liable
Enter to block chain, build the sub- person liable's biological information storehouse being responsible for by the person liable;Person liable is according to described in step (4)-(5)
Method carries out responsibility transfer to sub- person liable, and the responsibility transfer object of sub- person liable is confined to responsible person liable, and same
Sub- person liable in sub- person liable's biological information storehouse.
Further, for a certain facility, setting facility transfer authority, when new person liable meets transfer authority, just permits
Perhaps facility is shifted;The authority is:Specific person liable, person liable's quantity or transfer time region.
Further, described biological information includes:DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave,
Dermatoglyph, decorative pattern, posture, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, recognition of face, footprint and scar letter
The combination of a kind of information or much information in breath.
A kind of autonomous liability management method based on biological information, comprises the following steps:
(1) block chain starts from wound generation block;
(2) according to event handling code, setting processing step, and person liable, including primary responsibility are set to each step
People, one-level person liable, two grades of persons liable ..., n grades of persons liable, the responsibility node of one block chain of each person liable's correspondence, point
Not Wei primary responsibility node, one-level responsibility node, two grades of responsibility nodes ..., n grades of responsibility nodes;Each step correspondence one
Responsibility node;
(3) by primary person liable, one-level person liable, two grades of persons liable ..., the biological information of n grades of persons liable protects respectively
Corresponding responsibility node is stored in, is veritified for identity;
(4) after event triggering, primary person liable is according to event handling code and the process step of setting, at event
Reason;Including biological information and event information, event handling information are uploaded into primary responsibility node;
(5) primary responsibility node carries out identity veritification to primary person liable, and veritification passes through, then broadcasted event;Extensively
Object is broadcast for next stage responsibility node;
(6) one-level person liable is received after event information by one-level responsibility node, is uploaded biological information and " is received true
Recognize " instruction;After identity veritification of the one-level responsibility node to person liable passes through, that is, complete the primary responsibility transmission of event;One-level responsibility
People is handled event according to event handling code and the process step of setting, including by event information, event handling information
Upload to one-level responsibility node;
(7) to next stage responsibility node broadcasts, responsibility transmission and event handling are carried out according to step (6), at event
Reason is completed.
Further, persons liable at different levels are set by job duty.
Further, the responsibility node with one-level is one or more.
Further, one or more responsibility nodes are shared for another or multiple other block chains.
Further, described biological information includes:DNA, electrocardiogram, vein, iris, retina, vocal print, brain wave,
Dermatoglyph, decorative pattern, posture, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, recognition of face, footprint and scar letter
The combination of a kind of information or much information in breath.
The present invention realizes liability management with very low cost and high efficiency, has the advantage that:
(1) person liable of clear and definite Internet of Things equipment and liability management;
(2) responsibility chain during clear and definite event handling and person liable;
(3) management process can realize the autonomized mechanism of safety management.
Embodiment
With reference to embodiment, the invention will be further described.
Example 1:
The present embodiment is related to facility (hazardous chemical) liability management of Hangzhou colleges and universities, and foundation is《Hazardous chemical is pacified
Full management rules-Decree of the State Council of the People's Republic of China the 645th》With《Laboratory safety management》Etc. rules and regulations.
(1) the privately owned block chain of the colleges and universities is created, hazardous chemical responsibility table is set up, hazardous chemical responsibility table
Project includes:Facility ID, person liable, Obligation Names.
(2) fingerprint that colleges and universities are mutually closed to rule personnel is entered into block chain, builds person liable's biological information storehouse;
(3) unique facility ID is set to every a hazardous chemical, and by facility ID and current person liable's typing
Into hazardous chemical responsibility table;
(4) when experimenter B needs hazardous chemical z, with current keeping side, i.e., current person liable A is linked up, and is linked up
The biological information of new person liable, old person liable are inputted by block chain node afterwards, node obtains facility transfer request, and please by this
Ask and broadcasted;
(5) veritify node the information in the biological information and information bank of both sides is compared, unanimously then by checking, permit
Perhaps facility is shifted, and generates facility responsibility transfer packet, including the facility ID, biological information of old person liable, new
The biological information and Obligation Names of person liable, and broadcasted;Meanwhile, more new facility responsibility table.
As preferred technical scheme, above-mentioned " allowing facility to shift " can be realized by following scheme to be managed:By danger
Chemicals z is placed in intelligent safe, and the intelligent safe is connected with the control node of block chain, and checking is passed through when veritifying node
Afterwards, control node control safety cabinet is opened, it is to avoid both sides privately shift dangerous chemical;Intelligent cupboard is detected according to RFID
It has been removed to corresponding hazardous chemical z, that is, responsibility is shifted between completing AB;
When experimenter B needs to give hazardous chemical z without qualification is responsible for when student is practical, it can pass through
In the following manner carries out liability management:Set up sub- responsibility table;The fingerprint of multiple students in its experimental group is divided by experimenter B
Block chain is not entered into, is built by experimenter B person liable's biological information storehouse;Experimenter B can be blamed to its student
Part is appointed to shift, and the responsibility transfer object of student is confined to the classmate in experimenter B, and the experimental group.
For extrahazardous chemical substance, for example, cyanide is, it is necessary to set specified permission~whom specific duties people, i.e. only
Allow specific experimenter to use, the transfer object of the cyanide can only be the experimenter of designated groups, and need personnel into
Group transfer.In the transfer process of cyanide, veritify node and the finger print information of transfer object is veritified, if not meeting authority,
Do not allow transfer.
By the above method, current person liable can be first inquired about in " facility responsibility table ", can also be verified in node,
Management can voluntarily in place.
Example 2:
The present embodiment is related to the liability management of fire-fighting event, and foundation is《Institution of higher learning's fire safety regulations》、《Fire-fighting
Method》Or《Fire Service Act》.
(1) the liability management block chain of fire-fighting event is set up;
(2) basis《Institution of higher learning's fire safety regulations》、《Fire service law》And《Fire Service Act》, setting processing step
Suddenly, each step implements to the person liable's (can specify person liable by post) specified, is respectively primary person liable, one-level responsibility
People, two grades of persons liable ..., n grades of persons liable, the responsibility node of one block chain of each person liable's correspondence is respectively primary duty
Appoint node, one-level responsibility node, two grades of responsibility nodes ..., n grades of responsibility nodes;
(3) by primary person liable, one-level person liable, two grades of persons liable ..., the facial information of n grades of persons liable protects respectively
Corresponding responsibility node is stored in, is veritified for identity;
(4) after fire occurs, fire-control patrol personnel A is primary person liable, according to event handling code and the processing of setting
Step, is handled event;Including the event informations such as the intensity of a fire of facial information and fire, area, place, event are uploaded
To primary responsibility node;
(5) primary responsibility node carries out recognition of face to primary person liable, and veritification passes through, then broadcasted event.Extensively
Object is broadcast for next stage responsibility node;
(6) supervisor B, i.e. one-level person liable are received after event information by one-level responsibility node, upload face letter
Breath and " receive and confirm " instruction;One-level responsibility node by rear, that is, completes the primary responsibility of event to the recognition of face of person liable
Transmission;One-level person liable is handled event according to event handling code and the process step of setting, for example, according to the intensity of a fire,
Set rescue method, including fire-fighting group x fire-fighting and rescues and medical matters group y medical aids, then by fire it is new with
And rescue method uploads to one-level responsibility node;
(7) to next stage responsibility node broadcasts, two grades of responsibility nodes, i.e. fire-fighting group x and medical matters group y pass through respective
Two grades of responsibility nodes are received after event information, upload facial information and " receive and confirm " instruction;Two grades of responsibility node difference
Recognition of face to person liable passes through rear, the i.e. primary responsibility transmission of completion event;Fire-fighting group x and medical matters group y are according to specification
Carry out rescue.
In this implementation, supervisor B, the one-level responsibility node at place can be with city-level or provincial fire-fighting system block chain
Share;When the intensity of a fire is in the case of oneself is uncontrollable, aid request can be sent to city-level or provincial fire-fighting system.City-level or province
The fire-fighting system of level receives after request, and fire is rescued according to code.
By the above method, responsibility is implemented completely automatically, it is impossible to altered, or juggled cost is very high.
Example 3:
The related personnel of some colleges and universities, by organization, is included in system, has registered biological information and (has such as used fingerprint
Certification), identity card ID (or job number), can be mapped with role, form the set of node of privately owned block chain.
The following is the process of supervision to fire-control patrol main body responsibility.
1) building z fire-control patrol personnel A, after all related facilities of having patrolled, submits all in fingerprint mode
Related record of patrol;
2) when supervisor B is checking the record of patrol that A is submitted, discovery was all checked, was spot-check to importantly putting,
Think it is all believable, A main body responsibility is registered on the books in place using block chain mode with fingerprint, then signature broadcast, respectively
Node, which is received, merchandises and verifies signature, and B supervision responsibility is confirmed in place after broadcasting successfully.1 will be recorded:Building z ID, inspection people
Member A and main body responsibility in place with record 2:Building z ID, supervisor B and supervision responsibility in place, is stored in " the facility duty of full chain
Appoint table " in, while z ID, time, A, B are stored in historic responsibility table;
Once 3) find that a certain facility is problematic, as long as B traces A main body responsibility by supervision and selective examination rate in place, then.
Thus establish A fire-fighting autonomous management.
In a colleges and universities, A represents the administration of the prevention and control people of chemical institute, and z is chemical university building, and B is disappearing for Security Department
Anti- superintendent.The secondary unit of this colleges and universities is represented respectively:Security Department and the fire-fighting commune management mode of chemical institute.
Example 4:
Education (by taking family as an example, is described) with the mobile phone A PP applications with fingerprint
Parent A, B, and child C (student)
School S teacher T is the teacher of a certain course, and T is that student C has formulated study plan, homework, it is desirable to parent
A or B supervised learning processes.
In neonatal period, the above persons' information and biometric information registration are got home on the block chain of school district.
Student C is in learning process, in particularly homework t, and teacher T requires each problem (t1, t2, t3, t4 ...)
It is able to will do, the main body responsibility of study is student C, and supervisory responsibility is A or B.
The request of completion is submitted to parent by student C, and A or B pinpoint the problems after inspection, and also several topics are not done pair, it is desirable to
Student C is submitted after doing again, after submission through check it is errorless after, may not do to topic shoot, or stamp monitoring ability
Not enough, it is registered in by parent by fingerprint form in block chain.And broadcasted.
When teacher T is checking that student's C operations are problematic, according to block chain, it is student C that can be understood according to handling situations
Study prime responsibility do not have in place, or parent monitoring ability not enough or supervisory responsibility does not have in place, and entered according to different situations
Row processing.
Example 5:
The management (by taking mobile phone A PP descriptions as an example) of business administration, upper strata to lower floor, foundation is《Business administration regulations》, or
Person was optimized with block chain《Business administration regulations》.
Following A, B, C, D are the members of company, one post (or role) of each member's correspondence, and each post has
The job duty requirement of enterprise.
A is B upper strata, and C is B lower floor, in New Hire Onboarding, is registered in the block chain of company.
When A is assigned a task instruction list T (including t1, t2, t3 ...) by mobile phone app to B, B receives post processing, and will
Wherein task t1 licenses to C execution, and C obtains time that correlation is set after t1 tasks and may submit to B after effect, B collect or
Block chain is submitted to item by item, and is broadcasted.
Once the time arrives, when A does not receive B corresponding information, then B supervision responsibility does not have in place, if B asked that C, C did not had
There is timely reply, be then C question of liability.
The responsibility of cooperating type, t1 licenses to C, D and resolves into t11 and t12 execution, and synthesizes execution by B, once t12 is not held
Row is completed, then it is assumed that is D responsibility, is B question of liability if t1 does not have completion.
Claims (9)
1. a kind of autonomous liability management method based on biological information, it is characterised in that comprise the following steps:
(1) block chain sets up facility responsibility table, the project of facility responsibility table includes from during wound generation block startup:Facility ID, responsibility
People, Obligation Names;
(2) biological information of person liable is entered into block chain, builds person liable's biological information storehouse;
(3) unique facility ID is set to facility, and facility ID and current person liable is entered into facility responsibility table;
(4) when facility is shifted, block chain node gathers new person liable, the biological information of old person liable, and is broadcasted;
(5) veritify node the information in the biological information and information bank that collect is compared, unanimously then pass through checking, it is allowed to
Facility is shifted, and generates a facility responsibility transfer packet, including facility ID, the biological information of old person liable, new duty
The biological information and Obligation Names let people, and broadcasted;Meanwhile, more new facility responsibility table.
2. according to the method described in claim 1, it is characterised in that for a certain person liable, set up sub- responsibility table;Pass through responsibility
The biological information of sub- person liable is entered into block chain by people, builds the sub- person liable's biological information storehouse being responsible for by the person liable;Duty
Let people according to the method described in step (4)-(5) and to carry out responsibility transfer, the responsibility transfer object office of sub- person liable to sub- person liable
It is limited to the sub- person liable in responsible person liable, and same sub- person liable's biological information storehouse.
3. according to the method described in claim 1, it is characterised in that for a certain facility, setting facility transfer authority, when new duty
During satisfaction of leting people transfer authority, just facility is allowed to shift;The authority is:When specific person liable, person liable's quantity or transfer
Between region.
4. the method described in claim 1, it is characterised in that described biological information includes:DNA, electrocardiogram, vein, iris,
Retina, vocal print, brain wave, dermatoglyph, decorative pattern, posture, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, face
Identification, footprint and a kind of information in scar information or the combination of much information.
5. a kind of autonomous liability management method based on biological information, it is characterised in that comprise the following steps:
(1) block chain starts from wound generation block;
(2) according to event handling code, setting processing step, and person liable, including primary person liable, one are set to each step
Level person liable, two grades of persons liable ..., n grade persons liable, the responsibility node of one block chain of each person liable's correspondence, respectively
Primary responsibility node, one-level responsibility node, two grades of responsibility nodes ..., n grades of responsibility nodes.One responsibility of each step correspondence
Node;
(3) by primary person liable, one-level person liable, two grades of persons liable ..., the biological information of n grades of persons liable is stored in respectively
Corresponding responsibility node, is veritified for identity;
(4) after event triggering, primary person liable is handled event according to event handling code and the process step of setting,
Including biological information, event information and event handling information are uploaded into primary responsibility node;
(5) primary responsibility node carries out identity veritification to primary person liable, and veritification passes through, then broadcasted event.Broadcast pair
As for next stage responsibility node;
(6) one-level person liable is received after event information by one-level responsibility node, uploads biological information and " receive and confirm "
Instruction;After identity veritification of the one-level responsibility node to person liable passes through, that is, complete the primary responsibility transmission of event;One-level person liable presses
According to event handling code and the process step of setting, event is handled, including event information, event handling information are uploaded
To one-level responsibility node;
(7) to next stage responsibility node broadcasts, responsibility transmission and event handling are carried out according to step (6), until event handling is complete
Into.
6. method according to claim 5, it is characterised in that persons liable at different levels are set by job duty.
7. method according to claim 5, it is characterised in that the responsibility node with one-level is one or more.
8. method according to claim 5, it is characterised in that one or more responsibility nodes for another or it is multiple other
Block chain have.
9. the method described in claim 5, it is characterised in that described biological information includes:DNA, electrocardiogram, vein, iris,
Retina, vocal print, brain wave, dermatoglyph, decorative pattern, posture, gait, infrared temperature spectrogram, dental impression, denture, ear shape, body odour, face
Identification, footprint and a kind of information in scar information or the combination of much information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710379591.1A CN107133353A (en) | 2017-05-25 | 2017-05-25 | A kind of autonomous liability management method based on biological information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710379591.1A CN107133353A (en) | 2017-05-25 | 2017-05-25 | A kind of autonomous liability management method based on biological information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107133353A true CN107133353A (en) | 2017-09-05 |
Family
ID=59732008
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710379591.1A Pending CN107133353A (en) | 2017-05-25 | 2017-05-25 | A kind of autonomous liability management method based on biological information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107133353A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108846642A (en) * | 2018-06-21 | 2018-11-20 | 夸克链科技(深圳)有限公司 | A kind of block chain community autonomy system |
CN108875422A (en) * | 2018-05-07 | 2018-11-23 | 南京快文信息科技有限公司 | Brain wave data storage method and system based on block chain |
CN109614780A (en) * | 2018-10-23 | 2019-04-12 | 平安科技(深圳)有限公司 | Biological information certifying method and device, storage medium, electronic equipment |
CN110504025A (en) * | 2018-05-16 | 2019-11-26 | 漫迪医疗仪器(上海)有限公司 | The recognition methods of biological condition code based on biological magnetic and system, identification terminal |
CN110837658A (en) * | 2019-11-18 | 2020-02-25 | 浙江蓝景科技有限公司 | Processing method and system of coupon information, electronic device and storage medium |
WO2020088008A1 (en) * | 2018-11-01 | 2020-05-07 | 阿里巴巴集团控股有限公司 | Biological characteristic information processing method and apparatus based on block chain, and terminal device |
CN112116175A (en) * | 2019-06-19 | 2020-12-22 | 中国石油化工股份有限公司 | Security management method based on Internet of things |
CN113128836A (en) * | 2021-03-19 | 2021-07-16 | 福建省万物智联科技有限公司 | Responsibility tracing method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1391082A (en) * | 2002-03-08 | 2003-01-15 | 重庆大学 | Network monitor method and device for easily exploding articles (detonator) |
US20030204751A1 (en) * | 2002-04-24 | 2003-10-30 | International Business Machines Corporation | Distributed Environment Controlled Access Facility |
CN105354677A (en) * | 2015-11-19 | 2016-02-24 | 业成光电(深圳)有限公司 | Working conference management system of engineering system and operation method of working conference management system |
CN105681301A (en) * | 2016-01-16 | 2016-06-15 | 杭州复杂美科技有限公司 | Settlement method on block chain |
CN106327173A (en) * | 2016-08-22 | 2017-01-11 | 布比(北京)网络技术有限公司 | Network payment method and network payment device |
-
2017
- 2017-05-25 CN CN201710379591.1A patent/CN107133353A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1391082A (en) * | 2002-03-08 | 2003-01-15 | 重庆大学 | Network monitor method and device for easily exploding articles (detonator) |
US20030204751A1 (en) * | 2002-04-24 | 2003-10-30 | International Business Machines Corporation | Distributed Environment Controlled Access Facility |
CN105354677A (en) * | 2015-11-19 | 2016-02-24 | 业成光电(深圳)有限公司 | Working conference management system of engineering system and operation method of working conference management system |
CN105681301A (en) * | 2016-01-16 | 2016-06-15 | 杭州复杂美科技有限公司 | Settlement method on block chain |
CN106327173A (en) * | 2016-08-22 | 2017-01-11 | 布比(北京)网络技术有限公司 | Network payment method and network payment device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108875422A (en) * | 2018-05-07 | 2018-11-23 | 南京快文信息科技有限公司 | Brain wave data storage method and system based on block chain |
CN108875422B (en) * | 2018-05-07 | 2022-07-12 | 灰觋有限公司 | Brain wave data storage method and system based on block chain |
CN110504025A (en) * | 2018-05-16 | 2019-11-26 | 漫迪医疗仪器(上海)有限公司 | The recognition methods of biological condition code based on biological magnetic and system, identification terminal |
CN108846642A (en) * | 2018-06-21 | 2018-11-20 | 夸克链科技(深圳)有限公司 | A kind of block chain community autonomy system |
CN109614780A (en) * | 2018-10-23 | 2019-04-12 | 平安科技(深圳)有限公司 | Biological information certifying method and device, storage medium, electronic equipment |
CN109614780B (en) * | 2018-10-23 | 2023-04-28 | 平安科技(深圳)有限公司 | Biological information authentication method and device, storage medium and electronic equipment |
WO2020088008A1 (en) * | 2018-11-01 | 2020-05-07 | 阿里巴巴集团控股有限公司 | Biological characteristic information processing method and apparatus based on block chain, and terminal device |
CN112116175A (en) * | 2019-06-19 | 2020-12-22 | 中国石油化工股份有限公司 | Security management method based on Internet of things |
CN110837658A (en) * | 2019-11-18 | 2020-02-25 | 浙江蓝景科技有限公司 | Processing method and system of coupon information, electronic device and storage medium |
CN113128836A (en) * | 2021-03-19 | 2021-07-16 | 福建省万物智联科技有限公司 | Responsibility tracing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107133353A (en) | A kind of autonomous liability management method based on biological information | |
KR101561299B1 (en) | An apparatus for performing attendance check and simultaneously locking the screen using beacon signals and the method thereof | |
Desai et al. | Breaking the Cycle of Incarceration: A Young Black Male's Journey from Probation to Self-Advocacy. | |
Svetlík et al. | The safety training in the municipality | |
US20180146320A1 (en) | System to communicate information using mobile-enabled application | |
Colonna | Legal implications of using AI as an exam invigilator | |
Stewart | How Do the States Regulate Restraint and Seclusion in Public Schools-A Survey of the Strengths and Weaknesses in State Laws | |
Petrosino et al. | Research in brief: School-based law enforcement | |
CN107705091A (en) | A kind of Quick Response Code location fingerprint identifies student's intelligent Checking on Work Attendance management method | |
Gredecki et al. | ‘Crafting identity’: Constructions of the prison officer role | |
True | Safety in the Educational Environment: Rural District Administrator Perceptions of School Safety in Northeast Tennessee Public Schools | |
JONeS | Conflicting cultures with a common goal: collaborating with school resource officers | |
Haviv et al. | Judaism intertwines with worldly good: a qualitative study on religious rehabilitation programs in the Israeli Prison Service | |
Pelzer et al. | Rehabilitation and reintegration of released Islamist extremists in Germany | |
Davis et al. | Am I there yet? The views of people with learning disability on forensic community rehabilitation | |
Brockbank et al. | Understanding trans and gender-diverse student experiences of online learning | |
JP2009129117A (en) | Classroom management system | |
Policy | Engagement & Wellbeing Policy | |
ZAVOS | Sexual Violence in Greek universities: Politics of Disclosure, Interventions and Institutional Change | |
Robertson | Emergency and disaster preparedness in California community colleges: Administrative response and responsibility | |
Davis et al. | Implementing Effective Programs to Increase Safety and Reduce Bullying in Connecticut Private Schools, USA: A Policy Perspective | |
Gordon | Texas Police Officers Perception of Needed School Safety Training to Prevent Active Shootings | |
Dailey et al. | Student safety and casualty mitigation during an active school shooter simulation: an exploratory study | |
An | 25 Addressing the aftermath of violence in a school context | |
Xu et al. | Design and Implementation of Appointment Management System for the Innovation Laboratory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170905 |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170905 |