CN113869284B - Security image face privacy authority protection method and system - Google Patents

Security image face privacy authority protection method and system Download PDF

Info

Publication number
CN113869284B
CN113869284B CN202111324221.0A CN202111324221A CN113869284B CN 113869284 B CN113869284 B CN 113869284B CN 202111324221 A CN202111324221 A CN 202111324221A CN 113869284 B CN113869284 B CN 113869284B
Authority
CN
China
Prior art keywords
image information
field
facial
face
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111324221.0A
Other languages
Chinese (zh)
Other versions
CN113869284A (en
Inventor
张学银
郭群浩
王尚文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongxun Wanglian Technology Co ltd
Original Assignee
Shenzhen Zhongxun Wanglian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongxun Wanglian Technology Co ltd filed Critical Shenzhen Zhongxun Wanglian Technology Co ltd
Priority to CN202111324221.0A priority Critical patent/CN113869284B/en
Publication of CN113869284A publication Critical patent/CN113869284A/en
Application granted granted Critical
Publication of CN113869284B publication Critical patent/CN113869284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for protecting face privacy authority of a security image, which comprises the following steps: the method comprises the steps that a first face information acquisition terminal acquires face image information, and a second face information acquisition terminal acquires the face image information; after the facial image information is collected, a first facial information collecting terminal sends a first facial image information sending request message to a building information collecting node; after receiving a first facial image information sending request message, trying to decode a first field and a second field of the first facial image information sending request message by a building information collection node; if the first field and the second field of the first face image information sending request message are successfully decoded, the building information collection node sends a first face image information sending permission message to the first face information collection terminal; and after receiving the first face image information sending permission message, sending a first face image information data packet to the building information collection node by the first face information collection terminal.

Description

Security image face privacy authority protection method and system
Technical Field
The invention relates to the technical field of face recognition, in particular to a method and a system for protecting face privacy authority of a security image.
Background
The current face recognition technology has been widely used in the security field, and the security technology based on face recognition is obviously more convenient and faster than the traditional card swiping or fingerprint recognition mode, but the face recognition technology causes the worry of the user about privacy disclosure at the same time.
The prior art CN107273822B discloses a privacy protection method based on surveillance video multi-target tracking and face recognition, which includes: establishing and updating a background model according to the real-time monitoring video, and segmenting a foreground target area by using the new background model; carrying out pedestrian detection and face recognition based on a foreground target area, and realizing continuous tracking and identity recognition of community internal personnel and community external personnel in a community monitoring video through the combination of a Kalman filtering technology and a Hungarian algorithm; and video information of personnel in the community is protected by utilizing information hiding.
Disclosure of Invention
The invention aims to provide a method and a system for protecting face privacy authority of a security image.
In order to achieve the purpose, the invention provides a method for protecting the face privacy authority of a security image, which is characterized by comprising the following steps:
the method comprises the steps that a first face information acquisition terminal acquires face image information, and a second face information acquisition terminal acquires the face image information, wherein the first face information acquisition terminal and the second face information acquisition terminal have a wireless communication function;
after the facial image information is collected, a first facial image information sending request message is sent to a building information collection node by a first facial information collection terminal, wherein the first facial image information transmission request message has a first field for indicating that the first facial information collecting terminal has a message to be transmitted and a second field, wherein the second field of the first facial image information transmission request message is used to indicate the size of a message to be transmitted by the first facial information collecting terminal, wherein the number of bits included in the first field of the first facial image information transmission request message is smaller than the number of bits included in the second field of the first facial image information transmission request message, wherein, a first field of the first facial image information sending request message and a second field of the first facial image information sending request message are independently coded;
attempting, by the building information collection node, to decode a first field and a second field of the first facial image information transmission request message after receiving the first facial image information transmission request message;
if the first field and the second field of the first face image information sending request message are successfully decoded, sending a first face image information sending permission message to a first face information acquisition terminal by a building information collection node, wherein the first face image information sending permission message at least comprises a first field, a second field and a third field, the first field of the first face image information sending permission message allocates a first temporary identity identifier to the first face information acquisition terminal, the second field of the first face image information sending permission message indicates the system time of the building information collection node to the first face information acquisition terminal, and the third field of the first face image information sending permission message indicates a resource for sending face image information to the first face information acquisition terminal;
after receiving a first face image information sending permission message, sending a first face image information data packet to a building information collection node by a first face information collection terminal, wherein the first face image information data packet at least comprises a first temporary identity identifier and face image information;
after receiving the first facial image information data packet, the building information collection node sends the feature information for face recognition in the facial image information to the background server.
In a preferred embodiment, the method comprises the steps of:
determining, by the background server, an identity of the user based on the feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the background server is represented by a pseudo-identity code;
after the identity of the user is determined, the background server sends the determined identity of the user to the building information collection node;
after receiving the identity of the user, the building information collection node determines the real identity of the user based on the corresponding table of the pseudo-identity code and the real identity, and the building information collection node determines whether the user has the right to enter the building based on the real identity of the user, wherein the corresponding table of the pseudo-identity code and the real identity is stored in the building information collection node, and the corresponding table of the pseudo-identity code and the real identity can only perform local access operation;
after determining whether the user has permission to enter the building, a determination of the user's permission is sent by the building information collection node to a first facial information collection terminal having a first temporary identity identifier.
In a preferred embodiment, the method comprises the steps of:
if the first field of the first facial image information transmission request message is successfully decoded, but the second field of the first facial image information transmission request message is not successfully decoded, the building information collection node transmits a second facial image information transmission permission message to the first facial information collection terminal, wherein the second face image information transmission permission message includes at least a first field, a second field, and a third field, wherein the first field of the second face image information transmission permission message assigns a second temporary identity identifier to the first face information collecting terminal, wherein the second field of the second facial image information transmission permission message indicates the system time of the building information collection node to the first facial information collection terminal, a third field of the second facial image information sending permission message indicates resources of a second field used for resending the first facial image information sending request message to the first facial information acquisition terminal;
after receiving the second facial image information sending permission message, the first facial information acquisition terminal resends the second field of the first facial image information sending request message to the building information collection node;
if the second field of the retransmitted first facial image information sending request message is successfully decoded, sending a third facial image information sending permission message to the first facial information acquisition terminal by the building information collection node, wherein the third facial image information sending permission message at least comprises a first field and a second field, the first field of the third facial image information sending permission message allocates a third temporary identity identifier to the first facial information acquisition terminal, and the second field of the third facial image information sending permission message indicates resources for sending the facial image information to the first facial information acquisition terminal;
and after receiving the third facial image information sending permission message, sending a second facial image information data packet to the building information collection node by the first facial information collection terminal, wherein the second facial image information data packet at least comprises a third temporary identity identifier and facial image information.
In a preferred embodiment, the method comprises the steps of:
after receiving the second facial image information data packet, the building information collection node sends the feature information for face recognition in the facial image information to the background server;
determining, by the background server, an identity of the user based on the feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the background server is represented by a pseudo-identity code;
after the identity of the user is determined, the background server sends the determined identity of the user to the building information collection node;
after receiving the identity of the user, the building information collection node determines the real identity of the user based on the corresponding table of the pseudo-identity code and the real identity, and the building information collection node determines whether the user has the right to enter the building based on the real identity of the user, wherein the corresponding table of the pseudo-identity code and the real identity is stored in the building information collection node, and the corresponding table of the pseudo-identity code and the real identity can only perform local access operation;
after determining whether the user has the authority to enter the building, sending, by the building information collection node, a determination of the authority of the user to the first facial information collection terminal having the third temporary identity identifier.
In a preferred embodiment, the method comprises the steps of:
after the facial image information is collected, a second facial information collecting terminal sends a second facial image information sending request message to the building information collecting node, wherein the second face image information transmission request message has a first field and a second field, wherein the first field of the second face image information transmission request message is used for indicating that the second face information acquisition terminal has a message to be transmitted, wherein a second field of the second face image information transmission request message is used for indicating the size of a message to be transmitted by the second face information acquisition terminal, wherein the number of bits included in the first field of the second facial image information transmission request message is smaller than the number of bits included in the second field of the second facial image information transmission request message, wherein, the first field of the second facial image information sending request message and the second field of the second facial image information sending request message are independently coded;
if a first facial image information sending request message and a second facial image information sending request message are received at the same time, the building information collection node tries to decode a first field and a second field of the first facial image information sending request message and a first field and a second field of the second facial image information sending request message;
if the first field and the second field of the first facial image information transmission request message and the first field and the second field of the second facial image information transmission request message are successfully decoded, the building information collecting node multicasts a fourth facial image information transmission permission message to the first facial information collecting terminal and the second facial information collecting terminal, wherein the fourth face image information transmission permission message includes at least a first field, a second field, and a third field, wherein the first field of the fourth face image information transmission permission message is used for assigning a fourth temporary identity identifier, wherein the second field of the fourth face image information transmission permission message is used to indicate a system time of the building information collecting node, wherein the third field of the fourth face image information transmission permission message is used to indicate a resource for transmitting the face image information.
In a preferred embodiment, the method comprises the steps of:
after receiving a multicast fourth face image information sending permission message, sending a judgment request message to a second face information acquisition terminal by a first face information acquisition terminal;
after receiving a multicast fourth face image information sending permission message, sending a judgment request message to the first face information acquisition terminal by the second face information acquisition terminal;
after receiving the judgment request message, judging whether the second face acquisition terminal uses the fourth face image information to send a permission message or not by the second face acquisition terminal;
and if the second face acquisition terminal judges that the fourth face image information is used by the second face acquisition terminal to send the permission message, sending a judgment result to the first face acquisition terminal by the second face acquisition terminal, wherein the judgment result indicates to the first face acquisition terminal that the fourth face image information is used by the second face acquisition terminal to send the permission message.
In a preferred embodiment, the method comprises the steps of:
after judging that the second face image information is used by the second face acquisition terminal to send the permission message, the second face acquisition terminal sends a third face image information data packet to the building information collection node, wherein the third face image information data packet at least comprises a fourth temporary identity identifier and face image information;
after receiving the third facial image information data packet, the building information collection node sends feature information for face recognition in the facial image information to the background server;
determining, by the background server, an identity of the user based on the feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the background server is represented by a pseudo-identity code;
after the identity of the user is determined, the background server sends the determined identity of the user to the building information collection node;
after receiving the identity of the user, the building information collection node determines the real identity of the user based on the corresponding table of the pseudo-identity code and the real identity, and the building information collection node determines whether the user has the right to enter the building based on the real identity of the user, wherein the corresponding table of the pseudo-identity code and the real identity is stored in the building information collection node, and the corresponding table of the pseudo-identity code and the real identity can only perform local access operation;
after determining whether the user has permission to enter the building, sending, by the building information collection node, a determination of the permission of the user to a second facial information collection terminal having a fourth temporary identity identifier.
In a preferred embodiment, the method comprises the steps of:
after judging that the second facial image information transmission permission message is used by the second facial image acquisition terminal, transmitting a third facial image information transmission request message to the building information collection node by the first facial image acquisition terminal, wherein the third facial image information transmission request message has a first field and a second field, the first field of the third facial image information transmission request message is used for indicating that the first facial information acquisition terminal has a message to be transmitted, the second field of the third facial image information transmission request message is used for indicating the size of the message to be transmitted by the first facial information acquisition terminal, the number of bits included in the first field of the third facial image information transmission request message is smaller than the number of bits included in the second field of the third facial image information transmission request message, and the first field of the third facial image information transmission request message and the second field of the third facial image information transmission request message Are independently coded;
after receiving the third facial image information transmission request message, attempting to decode a first field and a second field of the third facial image information transmission request message by the building information collection node;
and if the first field and the second field of the third facial image information sending request message are successfully decoded, sending a fifth facial image information sending permission message to the first facial information acquisition terminal by the building information collection node, wherein the fifth facial image information sending permission message at least comprises the first field, the second field and the third field, the first field of the fifth facial image information sending permission message allocates a fifth temporary identity identifier to the first facial information acquisition terminal, the second field of the fifth facial image information sending permission message indicates the system time of the building information collection node to the first facial information acquisition terminal, and the third field of the fifth facial image information sending permission message indicates a resource for sending the facial image information to the first facial information acquisition terminal.
In a preferred embodiment, the method comprises the steps of:
after receiving a fifth facial image information sending permission message, sending a fourth facial image information data packet to a building information collection node by the first facial information collection terminal, wherein the fourth facial image information data packet at least comprises a fifth temporary identity identifier and facial image information;
after receiving the fourth face image information data packet, the building information collection node sends feature information for face recognition in the face image information to the background server.
The invention provides a security image face privacy authority protection system which is characterized by being configured to execute the method.
Compared with the prior art, the method and the system for protecting the face privacy authority of the security image have the advantages that the method and the system for protecting the face privacy authority of the security image are provided aiming at the requirements of the prior art, the system can protect the privacy of users to a certain degree, meanwhile, the transmission overhead is low, the time for the users to wait for judging the authority is shortened, and the user experience is improved.
Drawings
FIG. 1 is a flow diagram of a method according to an embodiment of the invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention.
FIG. 3 is a flow diagram of a method according to an embodiment of the invention.
FIG. 4 is a flow diagram of a method according to an embodiment of the invention.
Detailed Description
The following detailed description of the present invention is provided in conjunction with the accompanying drawings, but it should be understood that the scope of the present invention is not limited to the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
FIG. 1 is a flow diagram of a method according to an embodiment of the invention. As shown in the figure, the method of the present invention comprises the steps of:
s101: the method comprises the steps that a first face information acquisition terminal acquires face image information, and a second face information acquisition terminal acquires the face image information, wherein the first face information acquisition terminal and the second face information acquisition terminal have a wireless communication function; the wireless transceiver circuit is common knowledge, and the details of the wireless transceiver will not be described herein;
s102: after the face image information is acquired, sending a first face image information sending request message to a building information collection node by a first face information acquisition terminal, wherein the first face image information sending request message has a first field and a second field, wherein the first field of the first face image information sending request message is used for indicating that the first face information acquisition terminal has a message to be sent, in one embodiment, the first field of the first face image information sending request message may only include one bit, if the bit value is 1, the first face information acquisition terminal has the message to be sent, and if the bit value is 0, the first face information acquisition terminal does not have the message to be sent; in one embodiment, the building information collection node may be a central node disposed on each floor, the node having wireless transceiving function, simple computing function and a certain amount of storage space;
wherein the second field of the first facial image information transmission request message is used to indicate the size of the message to be transmitted by the first facial image information acquisition terminal, in one embodiment, the second field of the first facial image information transmission request message may be a binary number, and the binary number is used to indicate the size of the message to be transmitted by the first facial information acquisition terminal, and it should be understood by those skilled in the art that the size of the message that can be transmitted by the first facial information acquisition terminal through one message should have a maximum value, and the length of the binary number is determined by the aforementioned maximum value, and in one example, for example, the maximum value is 16 units (for example, one unit is 20 kbytes), then the bit length of the binary number should be 4 bits;
the number of bits included in a first field of the first facial image information sending request message is smaller than the number of bits included in a second field of the first facial image information sending request message, wherein the first field of the first facial image information sending request message and the second field of the first facial image information sending request message are independently coded; those skilled in the art will appreciate that since the first field and the second field are independently encoded, the receiving device can independently decode the first field and the second field and have the possibility of correctly receiving the first field, but not the second field;
s103: attempting, by the building information collection node, to decode a first field and a second field of the first facial image information transmission request message after receiving the first facial image information transmission request message;
s104: transmitting, by the building information collection node, a first facial image information transmission permission message to the first facial information collection terminal if the first field and the second field of the first facial image information transmission request message are successfully decoded, wherein the first facial image information transmission permission message includes at least a first field, a second field, and a third field, wherein the first field of the first facial image information transmission permission message assigns a first temporary identity identifier to the first facial information collection terminal, and in one embodiment, the length of the temporary identity identifier may be smaller than a terminal hardware identifier of the first facial information collection terminal (any terminal has an S/N number, which may be considered as a terminal hardware identifier), which in one embodiment may remain valid in one data exchange service, the first facial information collection terminal may be assigned a new temporary identity identifier in the next data exchange transaction. It should be understood by those skilled in the art that the one-time data exchange service referred to in the present invention refers to the facial information collection terminal sending facial image information to the building information collection node and until the facial information collection terminal receives a determination of the user's authority from the building information collection node. The temporary identity identifier is sent, so that the overhead of channel transmission can be reduced, and meanwhile, as the temporary identity identifier is changed frequently, the terminal identity is identified by the temporary identity identifier instead of the terminal hardware identifier, so that the terminal falsely using the terminal hardware identifier is prevented from stealing the data of the user;
the second field of the first facial image information sending permission message indicates the system time of the building information collection node to the first facial information collection terminal, and the third field of the first facial image information sending permission message indicates the resource for sending the facial image information to the first facial information collection terminal;
s105: after receiving a first face image information sending permission message, sending a first face image information data packet to a building information collection node by a first face information collection terminal, wherein the first face image information data packet at least comprises a first temporary identity identifier and face image information;
s106: after receiving the first facial image information data packet, the building information collection node sends the feature information for face recognition in the facial image information to the background server. It will be understood by those skilled in the art that the feature information used for face recognition is information obtained after preliminary processing is performed on the face image, not the face image itself. Different face recognition algorithms require different face feature information, the specific face recognition algorithm can be any commercially available face recognition algorithm, the specific feature information can be provided by a face recognition algorithm supplier, and the specific face recognition algorithm is not limited by the invention.
FIG. 2 is a flow diagram of a method according to an embodiment of the invention. In a preferred embodiment, the method comprises the steps of:
s201: determining, by the background server, an identity of the user based on the feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the background server is represented by a pseudo-identity code; in one embodiment, the pseudo-identity code may be represented as follows:
identified face index User identity
Index 1 AAAA
Index 2 BBBB
Index 3 CCCC
Index 4 DDDD
Index 5 EEEE
Index 6 FFFF
Index 7 GGGG
S202: after the identity of the user is determined, the background server sends the determined identity of the user to the building information collection node;
s203: after receiving the identity of the user, the building information collection node determines the real identity of the user based on the corresponding table of the pseudo-identity code and the real identity, and the building information collection node determines whether the user has the right to enter the building based on the real identity of the user, wherein the corresponding table of the pseudo-identity code and the real identity is stored in the building information collection node, and the corresponding table of the pseudo-identity code and the real identity can only perform local access operation; in one embodiment, the correspondence table of pseudo-identity codes to real identities may be represented as follows:
Figure BDA0003345446760000111
Figure BDA0003345446760000121
by the method, the background server only needs to brush facial feature information of the face user (but not real photos of the user), meanwhile, the background server only stores the pseudo-identity code of the user, and the name, the company and the position of the user cannot be seen by the background server, so that even if the background server inevitably needs to be accessed to the Internet and the local area network, the leakage of key identity information of the user cannot be caused; all key information of the user, such as a real image of the face of the user, a real name of the user, a company and a position where the user is located, is only stored in the building information collection node, and the corresponding table can be accessed only through a local operation mode (for example, the corresponding table can be copied only by physically inserting a storage device into the building information collection node), so that information leakage is prevented to the maximum extent.
S204: after determining whether the user has permission to enter the building, a determination of the user's permission is sent by the building information collection node to a first facial information collection terminal having a first temporary identity identifier.
FIG. 3 is a flow diagram of a method according to an embodiment of the invention. In a preferred embodiment, the method comprises the steps of:
s301: if the first field of the first face image information transmission request message is successfully decoded but the second field of the first face image information transmission request message is not successfully decoded, a second face image information transmission permission message is transmitted to the first face information acquisition terminal by the building information collection node, wherein the second face image information transmission permission message at least comprises the first field, the second field and a third field, the first field of the second face image information transmission permission message is allocated with a second temporary identity identifier to the first face information acquisition terminal, the second field of the second face image information transmission permission message indicates the system time of the building information collection node to the first face information acquisition terminal (the system time is used for the face information acquisition terminal to complete synchronization), and the third field of the second face image information transmission permission message indicates the first face information acquisition terminal to resend the first person A resource of a second field of the face image information transmission request message; in one embodiment, the second facial image information transmission permission message may include an instruction that requires the first facial information acquisition terminal to perform retransmission, and the first facial image information transmission permission message may not include an instruction that requires the first facial information acquisition terminal to perform retransmission, whereby the first facial information acquisition terminal can distinguish whether to transmit facial image data or retransmit the second field of the first facial image information transmission request message;
s302: after receiving the second facial image information sending permission message, the first facial information acquisition terminal resends the second field of the first facial image information sending request message to the building information collection node;
s303: if the second field of the retransmitted first facial image information sending request message is successfully decoded, sending a third facial image information sending permission message to the first facial information acquisition terminal by the building information collection node, wherein the third facial image information sending permission message at least comprises a first field and a second field, the first field of the third facial image information sending permission message allocates a third temporary identity identifier to the first facial information acquisition terminal, and the second field of the third facial image information sending permission message indicates resources for sending the facial image information to the first facial information acquisition terminal;
s304: and after receiving the third facial image information sending permission message, sending a second facial image information data packet to the building information collection node by the first facial information collection terminal, wherein the second facial image information data packet at least comprises a third temporary identity identifier and facial image information.
FIG. 4 is a flow diagram of a method according to an embodiment of the invention. In a preferred embodiment, the method comprises the steps of:
s401: after the facial image information is collected, a second facial information collecting terminal sends a second facial image information sending request message to the building information collecting node, wherein the second face image information transmission request message has a first field and a second field, wherein the first field of the second face image information transmission request message is used for indicating that the second face information acquisition terminal has a message to be transmitted, wherein a second field of the second face image information transmission request message is used to indicate the size of a message to be transmitted by the second face information collecting terminal, wherein the number of bits included in the first field of the second facial image information transmission request message is smaller than the number of bits included in the second field of the second facial image information transmission request message, the first field of the second facial image information sending request message and the second field of the second facial image information sending request message are independently coded; the design of the second face image information transmission request message may refer to the design of the specific embodiment described with respect to fig. 1, and will not be repeated here;
s402: if a first facial image information sending request message and a second facial image information sending request message are received at the same time, the building information collection node tries to decode a first field and a second field of the first facial image information sending request message and a first field and a second field of the second facial image information sending request message;
s403: if the first field and the second field of the first facial image information transmission request message and the first field and the second field of the second facial image information transmission request message are successfully decoded, the building information collecting node multicasts a fourth facial image information transmission permission message to the first facial information collecting terminal and the second facial information collecting terminal, wherein the fourth face image information transmission permission message includes at least a first field, a second field, and a third field, wherein the first field of the fourth face image information transmission permission message is used for assigning a fourth temporary identity identifier, wherein the second field of the fourth face image information transmission permission message is used to indicate a system time of the building information collecting node, wherein the third field of the fourth face image information transmission permission message is used to indicate a resource for transmitting the face image information. In one embodiment, the fourth facial image information transmission permission message may include a multicast identifier, in one embodiment, for example, bit 00 indicates unicast, 01 indicates multicast, and 10 indicates broadcast;
s404: after receiving a multicast fourth face image information sending permission message, sending a judgment request message to a second face information acquisition terminal by a first face information acquisition terminal; in a specific embodiment, the first facial information collection terminal determines that the fourth facial image information transmission permission message is multicast-transmitted through a multicast identifier in the fourth facial image information transmission permission message;
s405: after receiving a multicast fourth face image information sending permission message, sending a judgment request message to the first face information acquisition terminal by the second face information acquisition terminal;
s406: after receiving the judgment request message, judging whether the second face acquisition terminal uses the fourth face image information to send a permission message or not by the second face acquisition terminal; in a specific embodiment, after judging that the fourth face image information transmission permission message is multicast transmission, the first face information collecting terminal generates a random number by a random number generator, and in a specific embodiment, for example, the generated random number is 50 (the range of the random number generator may be 0 to 100), and in an embodiment, the first face information collecting terminal includes the generated random number 50 in a decision request message transmitted to the second face information collecting terminal; after judging that the fourth facial image information transmission permission message is multicast-transmitted, the second facial information collecting terminal generates a random number by a random number generator, in a specific embodiment, for example, the generated random number is 100 (the range of the random number generator may be 0 to 100), and in one embodiment, the second facial information collecting terminal includes the generated random number 100 in the decision request message transmitted to the first facial information collecting terminal; in one embodiment, since the random number generated by the second facial information collection terminal itself is 100 and the random number transmitted by the first facial information collection terminal is 50, it can be determined that the permission message is transmitted by the second facial information collection terminal using the fourth facial image information, and similarly, if the random number generated by the first facial information collection terminal itself is 50 and the random number transmitted by the second facial information collection terminal is 100, the first facial information collection terminal also determines that the permission message is transmitted by the second facial information collection terminal using the fourth facial image information; it should be understood by those skilled in the art that the "transmission of the permission message using the fourth face image information" mainly refers to the transmission of the image data using the resource indicated in the fourth face image information transmission permission message; in one embodiment, if the face information collection terminals generate the same random number, neither may use the resource indicated in the fourth face image information transmission permission message, after neither may use the resource indicated in the fourth face image information transmission permission message, the face information collection terminals may randomly back off for a certain time, and after the back off time, re-transmit the face image information transmission request message to the building information collection node;
s407: and if the second face acquisition terminal judges that the fourth face image information is used by the second face acquisition terminal to send the permission message, sending a judgment result to the first face acquisition terminal by the second face acquisition terminal, wherein the judgment result indicates to the first face acquisition terminal that the fourth face image information is used by the second face acquisition terminal to send the permission message.
In a preferred embodiment, the method comprises the steps of:
after judging that the second face image information is used by the second face acquisition terminal to send the permission message, the second face acquisition terminal sends a third face image information data packet to the building information collection node, wherein the third face image information data packet at least comprises a fourth temporary identity identifier and face image information;
after receiving the third facial image information data packet, the building information collection node sends feature information for face recognition in the facial image information to the background server;
determining, by the background server, an identity of the user based on the feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the background server is represented by a pseudo-identity code;
after the identity of the user is determined, the background server sends the determined identity of the user to the building information collection node;
after receiving the identity of the user, the building information collection node determines the real identity of the user based on the corresponding table of the pseudo-identity code and the real identity, and the building information collection node determines whether the user has the right to enter the building based on the real identity of the user, wherein the corresponding table of the pseudo-identity code and the real identity is stored in the building information collection node, and the corresponding table of the pseudo-identity code and the real identity can only perform local access operation;
after determining whether the user has permission to enter the building, sending, by the building information collection node, a determination of the permission of the user to a second facial information collection terminal having a fourth temporary identity identifier.
In a preferred embodiment, the method comprises the steps of:
after judging that the second facial image information transmission permission message is used by the second facial image acquisition terminal, transmitting a third facial image information transmission request message to the building information collection node by the first facial image acquisition terminal, wherein the third facial image information transmission request message has a first field and a second field, the first field of the third facial image information transmission request message is used for indicating that the first facial information acquisition terminal has a message to be transmitted, the second field of the third facial image information transmission request message is used for indicating the size of the message to be transmitted by the first facial information acquisition terminal, the number of bits included in the first field of the third facial image information transmission request message is smaller than the number of bits included in the second field of the third facial image information transmission request message, and the first field of the third facial image information transmission request message and the second field of the third facial image information transmission request message Are independently coded;
after receiving the third facial image information transmission request message, attempting to decode a first field and a second field of the third facial image information transmission request message by the building information collection node;
and if the first field and the second field of the third facial image information sending request message are successfully decoded, sending a fifth facial image information sending permission message to the first facial information acquisition terminal by the building information collection node, wherein the fifth facial image information sending permission message at least comprises the first field, the second field and the third field, the first field of the fifth facial image information sending permission message allocates a fifth temporary identity identifier to the first facial information acquisition terminal, the second field of the fifth facial image information sending permission message indicates the system time of the building information collection node to the first facial information acquisition terminal, and the third field of the fifth facial image information sending permission message indicates a resource for sending the facial image information to the first facial information acquisition terminal.
After receiving a fifth facial image information sending permission message, sending a fourth facial image information data packet to a building information collection node by the first facial information collection terminal, wherein the fourth facial image information data packet at least comprises a fifth temporary identity identifier and facial image information;
after receiving the fourth face image information data packet, the building information collection node sends feature information for face recognition in the face image information to the background server.
It should be understood that, in various embodiments of the present invention, the order of the above-described writing of each process does not mean the order of execution, and the order of execution of each process should be determined by its function and its inherent logic, and should not limit the implementation process of the embodiments of the present invention in any way.
It should be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

Claims (10)

1. A method for protecting the face privacy authority of a security image is characterized in that,
the method comprises the following steps:
the method comprises the steps that a first face information acquisition terminal acquires face image information, and a second face information acquisition terminal acquires the face image information, wherein the first face information acquisition terminal and the second face information acquisition terminal have a wireless communication function;
after the face image information is collected, sending a first face image information sending request message to a building information collection node by a first face information collection terminal, wherein the first face image information sending request message has a first field and a second field, the first field of the first face image information sending request message is used for indicating that the first face information collection terminal has a message to be sent, the second field of the first face image information sending request message is used for indicating the size of the message to be sent by the first face information collection terminal, the number of bits included in the first field of the first face image information sending request message is smaller than the number of bits included in the second field of the first face image information sending request message, and the first field of the first face image information sending request message and the second field of the first face image information sending request message The fields are independently encoded;
attempting, by a building information collection node, to decode a first field and a second field of the first facial image information transmission request message after receiving the first facial image information transmission request message;
if the first field and the second field of the first facial image information transmission request message are successfully decoded, a first facial image information transmission permission message is transmitted to the first facial information collecting terminal by the building information collecting node, wherein the first facial image information transmission permission message includes at least a first field, a second field, and a third field, wherein a first field of the first facial image information transmission permission message assigns a first temporary identity identifier to the first facial information collecting terminal, wherein a second field of the first facial image information transmission permission message indicates a system time of the building information collection node to the first facial information collection terminal, a third field of the first facial image information sending permission message indicates a resource for sending the facial image information to the first facial information acquisition terminal;
after receiving the first facial image information sending permission message, sending a first facial image information data packet to the building information collection node by a first facial information collection terminal, wherein the first facial image information data packet at least comprises the first temporary identity identifier and facial image information;
after the first facial image information data packet is received, the building information collection node sends feature information for face recognition in the facial image information to a background server.
2. The method for protecting the face privacy authority of the security image according to claim 1,
the method comprises the following steps:
determining, by a backend server, an identity of a user based on feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the backend server is represented by a pseudo-identity code;
after determining the identity of the user, sending, by a background server, the determined identity of the user to the building information collection node;
after receiving the identity of the user, determining the real identity of the user by a building information collection node based on a corresponding table of pseudo-identity codes and real identities, and determining whether the user has the right to enter the building by the building information collection node based on the real identity of the user, wherein the corresponding table of the pseudo-identity codes and the real identities is stored in the building information collection node, and the corresponding table of the pseudo-identity codes and the real identities can only perform local access operation;
after determining whether the user has permission to enter the building, a determination of the user's permission is sent by the building information collection node to a first facial information collection terminal having a first temporary identity identifier.
3. The method for protecting the privacy authority of the face of the security image according to claim 2,
the method comprises the following steps:
if the first field of the first facial image information transmission request message is successfully decoded but the second field of the first facial image information transmission request message is not successfully decoded, transmitting a second facial image information transmission permission message to the first facial information acquisition terminal by a building information collection node, wherein the second facial image information transmission permission message at least comprises the first field, the second field and a third field, wherein the first field of the second facial image information transmission permission message assigns a second temporary identity identifier to the first facial information acquisition terminal, wherein the second field of the second facial image information transmission permission message indicates the system time of the building information collection node to the first facial information acquisition terminal, wherein the third field of the second facial image information transmission permission message indicates the system time for retransmitting the building information collection node to the first facial information acquisition terminal A resource of a second field of the first face image information sending request message;
after receiving the second facial image information sending permission message, the first facial information acquisition terminal sends a second field of the first facial image information sending request message to the building information collection node again;
if the second field of the retransmitted first facial image information sending request message is successfully decoded, sending a third facial image information sending permission message to the first facial information acquisition terminal by the building information collection node, wherein the third facial image information sending permission message at least comprises a first field and a second field, the first field of the third facial image information sending permission message allocates a third temporary identity identifier to the first facial information acquisition terminal, and the second field of the third facial image information sending permission message indicates resources for sending the facial image information to the first facial information acquisition terminal;
after receiving the third facial image information sending permission message, sending a second facial image information data packet to the building information collection node by the first facial information collection terminal, wherein the second facial image information data packet at least comprises the third temporary identity identifier and facial image information.
4. The method for protecting the privacy authority of the face of the security image according to claim 3,
the method comprises the following steps:
after receiving the second facial image information data packet, the building information collection node sends feature information for face recognition in the facial image information to a background server;
determining, by a backend server, an identity of a user based on feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the backend server is represented by a pseudo-identity code;
after determining the identity of the user, sending, by a background server, the determined identity of the user to the building information collection node;
after receiving the identity of the user, determining the real identity of the user by a building information collection node based on a corresponding table of pseudo-identity codes and real identities, and determining whether the user has the right to enter the building by the building information collection node based on the real identity of the user, wherein the corresponding table of the pseudo-identity codes and the real identities is stored in the building information collection node, and the corresponding table of the pseudo-identity codes and the real identities can only perform local access operation;
after determining whether the user has the authority to enter the building, sending, by the building information collection node, a determination of the authority of the user to the first facial information collection terminal having the third temporary identity identifier.
5. The method for protecting the privacy authority of the face of the security image according to claim 4,
the method comprises the following steps:
after the face image information is acquired, a second face image information sending request message is sent to a building information collection node by a second face image information acquisition terminal, wherein the second face image information sending request message has a first field and a second field, the first field of the second face image information sending request message is used for indicating that the second face information acquisition terminal has a message to be sent, the second field of the second face image information sending request message is used for indicating the size of the message to be sent by the second face information acquisition terminal, the number of bits included in the first field of the second face image information sending request message is smaller than the number of bits included in the second field of the second face image information sending request message, and the first field of the second face image information sending request message and the second field of the second face image information sending request message The fields are independently encoded;
if the first facial image information sending request message and the second facial image information sending request message are received at the same time, the building information collection node tries to decode a first field and a second field of the first facial image information sending request message and a first field and a second field of the second facial image information sending request message;
if the first field and the second field of the first facial image information transmission request message and the first field and the second field of the second facial image information transmission request message are successfully decoded, a fourth facial image information transmission permission message is multicast by the building information collecting node to the first facial information collecting terminal and the second facial information collecting terminal, wherein the fourth face image information transmission permission message includes at least a first field, a second field, and a third field, wherein a first field of the fourth face image information transmission permission message is used to assign a fourth temporary identity identifier, wherein a second field of the fourth face image information transmission permission message is used to indicate a system time of the building information collecting node, wherein the third field of the fourth face image information transmission permission message is used to indicate a resource for transmitting face image information.
6. The method for protecting the privacy authority of the face of the security image according to claim 5,
the method comprises the following steps:
after receiving a multicast fourth face image information sending permission message, sending a judgment request message to a second face information acquisition terminal by a first face information acquisition terminal;
after receiving a multicast fourth face image information sending permission message, sending a judgment request message to the first face information acquisition terminal by the second face information acquisition terminal;
after receiving the judgment request message, the second facial information acquisition terminal judges whether the second facial information acquisition terminal uses the fourth facial image information to send a permission message;
and if the second facial information acquisition terminal sends the permission message by using the fourth facial image information, sending a judgment result to the first facial information acquisition terminal by the second facial information acquisition terminal, wherein the judgment result indicates the first facial information acquisition terminal that the second facial information acquisition terminal sends the permission message by using the fourth facial image information.
7. The method for protecting the privacy authority of the face of the security image according to claim 6,
the method comprises the following steps:
after judging that a second facial information acquisition terminal uses fourth facial image information to send a permission message, the second facial information acquisition terminal sends a third facial image information data packet to the building information collection node, wherein the third facial image information data packet at least comprises the fourth temporary identity identifier and facial image information;
after receiving the third facial image information data packet, the building information collection node sends feature information for face recognition in the facial image information to a background server;
determining, by a backend server, an identity of a user based on feature information for face recognition after receiving the feature information for face recognition in the face image information, wherein the identity of the user determined at the backend server is represented by a pseudo-identity code;
after determining the identity of the user, sending, by a background server, the determined identity of the user to the building information collection node;
after receiving the identity of the user, determining the real identity of the user by a building information collection node based on a corresponding table of pseudo identity codes and real identities, and determining whether the user has the authority to enter the building or not by the building information collection node based on the real identity of the user, wherein the corresponding table of the pseudo identity codes and the real identities is stored in the building information collection node, and the corresponding table of the pseudo identity codes and the real identities can only carry out local access operation;
after determining whether the user has permission to enter the building, sending, by the building information collection node, a determination of the permission of the user to a second facial information collection terminal having a fourth temporary identity identifier.
8. The method for protecting the privacy authority of the face of the security image according to claim 7,
the method comprises the following steps:
after determining that a fourth facial image information transmission permission message is used by the second facial information collection terminal, transmitting, by the first facial information collection terminal, a third facial image information transmission request message to the building information collection node, wherein the third facial image information transmission request message has a first field for indicating that the first facial information collection terminal has a message to transmit and a second field for indicating the size of the message to be transmitted by the first facial information collection terminal, wherein the number of bits included in the first field of the third facial image information transmission request message is smaller than the number of bits included in the second field of the third facial image information transmission request message, wherein a first field of the third facial image information transmission request message and a second field of the third facial image information transmission request message are independently coded;
attempting, by the building information collection node, decoding a first field and a second field of the third facial image information transmission request message after receiving the third facial image information transmission request message;
if the first field and the second field of the third face image information transmission request message are successfully decoded, a fifth facial image information transmission permission message is transmitted to the first facial information collecting terminal by the building information collecting node, wherein the fifth facial image information transmission permission message includes at least a first field, a second field, and a third field, wherein a first field of the fifth facial image information transmission permission message assigns a fifth temporary identity identifier to the first facial information collection terminal, wherein a second field of the fifth facial image information transmission permission message indicates the system time of the building information collection node to the first facial information collection terminal, and the third field of the fifth facial image information sending permission message indicates a resource for sending the facial image information to the first facial information acquisition terminal.
9. The method for protecting the privacy authority of the face of the security image according to claim 8,
the method comprises the following steps:
after receiving the fifth facial image information sending permission message, sending a fourth facial image information data packet to the building information collection node by the first facial information collection terminal, wherein the fourth facial image information data packet at least comprises the fifth temporary identity identifier and facial image information;
after receiving the fourth facial image information data packet, the building information collection node sends feature information for face recognition in the facial image information to a background server.
10. A security protection image face privacy authority protection system is characterized in that,
the security image face privacy authority protection system is configured to perform the method of any one of claims 1-9.
CN202111324221.0A 2021-11-09 2021-11-09 Security image face privacy authority protection method and system Active CN113869284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111324221.0A CN113869284B (en) 2021-11-09 2021-11-09 Security image face privacy authority protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111324221.0A CN113869284B (en) 2021-11-09 2021-11-09 Security image face privacy authority protection method and system

Publications (2)

Publication Number Publication Date
CN113869284A CN113869284A (en) 2021-12-31
CN113869284B true CN113869284B (en) 2022-05-03

Family

ID=78987599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111324221.0A Active CN113869284B (en) 2021-11-09 2021-11-09 Security image face privacy authority protection method and system

Country Status (1)

Country Link
CN (1) CN113869284B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104365122A (en) * 2012-04-24 2015-02-18 高通股份有限公司 System for delivering relevant user information based on proximity and privacy controls
KR102348823B1 (en) * 2018-08-22 2022-01-06 엔에이치엔한국사이버결제 주식회사 System and Method for Identification Based on Finanace Card Possessed by User
CN109903433B (en) * 2019-01-31 2022-02-11 武汉天喻聚联网络有限公司 Access control system and access control method based on face recognition

Also Published As

Publication number Publication date
CN113869284A (en) 2021-12-31

Similar Documents

Publication Publication Date Title
US8428064B2 (en) Wireless communication device, mac address management system, wireless communication method, and program
EP0813327A2 (en) Access control system and method
US8340061B2 (en) Transmission terminal, reception terminal, and information distribution system
CN1682516A (en) Method and apparatus for preventing spoofing of network addresses
CN106792709B (en) Method, device and terminal for preventing pseudo base station
US10785781B2 (en) Data transmission method, terminal and data transmission system
CN106713522A (en) Wireless fidelity (Wi-Fi) connection method and mobile terminal
ES2388928T3 (en) Procedure and equipment for controlling access to multicast IP streams
JP2001510662A (en) Secure packet radio network
CN109818943A (en) A kind of authentication method suitable for low orbit satellite Internet of Things
CN113869284B (en) Security image face privacy authority protection method and system
US9148864B2 (en) System and method for switching mobile station identification in wireless communication system
CN110034911B (en) Method, system and storage medium for fast data transmission in Internet of things
CN109413622B (en) Method for solving data transmission conflict in Internet of things
Kim et al. Covert jamming using fake ACK frame injection on IEEE 802.11 wireless LANs
CN100394754C (en) Identity identification method specially used in mobile phone networking insertion service
CN109617665B (en) Grading data transmission method in narrow-band Internet of things
CN1266339A (en) Method for transmitting data
CN103392310A (en) Method and arrangement for resolving a temporary block flow
CN112311493A (en) Cooperative transmission method, device and equipment
CN110012543B (en) Data transmission method, system and storage medium for low control overhead in Internet of things
CN112423277B (en) Security certificate recovery in bluetooth mesh networks
US20050249136A1 (en) Dynamic assignment of station addresses transmitted over shared-communications channels
CN111182473B (en) Method for sending multicast data in Internet of things
JP2005309974A (en) Network system, authentication method using network system, authentication program, and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant