CN111553691A - Pure decentralized block chain method and system - Google Patents

Pure decentralized block chain method and system Download PDF

Info

Publication number
CN111553691A
CN111553691A CN202010437967.1A CN202010437967A CN111553691A CN 111553691 A CN111553691 A CN 111553691A CN 202010437967 A CN202010437967 A CN 202010437967A CN 111553691 A CN111553691 A CN 111553691A
Authority
CN
China
Prior art keywords
feature data
transaction
facial feature
facial
abstract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010437967.1A
Other languages
Chinese (zh)
Inventor
陈议尊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010437967.1A priority Critical patent/CN111553691A/en
Publication of CN111553691A publication Critical patent/CN111553691A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a pure decentralized block chain method and a pure decentralized block chain system. Inquiring the same or similar facial feature data in a database, decrypting through a digital certificate to obtain a public key of the inquired facial feature data, and decrypting through the public key to obtain a first abstract; comparing the first abstract with the second abstract to obtain whether the facial feature data of the current visitor is consistent with the facial feature data inquired from the database, and if the first abstract is the same as the second abstract, judging that the inquired facial feature data is not tampered.

Description

Pure decentralized block chain method and system
Technical Field
The invention relates to the technical field of block chains, in particular to a pure decentralized block chain method and a pure decentralized block chain system.
Background
Blockchains can be used for automation tasks and processes not limited to the field of cryptocurrency, and such a solution would enable better cryptographic processing of transactions using the properties of blockchains. The current distribution and transaction in the market are not transparent, and the public credibility in the consumer market is not enough. All publications in the market have a serious centralization phenomenon, and the publications are popularized by respective enterprises or platforms no matter whether credit cards, aviation flights, shopping in shopping malls or online shopping malls in the telecommunication industry. For the consumer, the reliability of the transaction is pending.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a pure decentralized block chain method and a pure decentralized block chain system, which can ensure the transaction safety in a transaction link.
A pure decentralized blockchain method, comprising the steps of:
counting transaction data on a plurality of transaction nodes, and acquiring facial features of an accessor during transaction;
packaging the transaction data and the face feature data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the face feature data, the Hash of the transaction data and the Hash of the face feature data into the block head of the current block as a feature value, and calculating the Hash of the current block according to the feature value; constructing blocks generated successively into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node to be purely decentralized;
carrying out Hash operation on the facial feature data to obtain a first abstract, carrying out private key encryption on the first abstract obtained by calculation to obtain a digital signature, carrying out private key encryption on a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to the facial feature data and uploading the digital signature and the digital certificate to a network;
setting an access control module on each transaction node, wherein the access control module carries out authority management on an accessor accessing the transaction node;
starting a face recognition interface of a transaction node, constructing a face recognition (AR) frame on the face recognition interface, and moving a face recognition module in the transaction node to enable the face of a visitor to be moved into the AR frame and then executing face recognition;
acquiring facial feature data of an accessor, inquiring the same or similar facial feature data in a database, decrypting a digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypting a digital signature attached to the inquired facial feature data into a first abstract by using the public key;
and performing hash operation on the facial feature data of the current visitor to obtain a second abstract, comparing whether the first abstract and the second abstract are equal, and if so, allowing the visitor to access the transaction node.
Further, the method also comprises the following steps:
when the visitor accesses the transaction node, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
Further, the method also comprises the following steps:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting facial features.
A storable computing device comprising a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
A pure decentralized blockchain system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module and used for counting transaction data, and a biological feature acquisition module is arranged in each transaction node module and used for acquiring facial features of visitors during transaction;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and face feature data of all transaction node modules into a block within a preset time period, the transaction time, the time for acquiring the face feature data, the hash of the transaction data and the hash of the face feature data are recorded into the head of the current block to serve as a feature value, the hash of the current block is calculated according to the feature value, and then the sequentially generated blocks are mutually constructed into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node module to be purely decentralized;
the storable computing equipment performs Hash operation on the facial feature data to obtain a first abstract, performs private key encryption on the first abstract obtained through calculation to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the facial feature data and uploads the digital signature and the digital certificate to a network together;
setting an access control module on each transaction node module, wherein the access control module carries out authority management on an accessor accessing the transaction node module;
the transaction node module includes a facial recognition module having a facial recognition interface on which the storable computing device builds a facial recognition (AR) framework, the facial recognition module in the mobile transaction node module causing the visitor's face to move into the AR framework before performing facial recognition;
the access control module collects facial feature data of an accessor and sends the facial feature data to the storable computing equipment, the storable computing equipment inquires the same or similar facial feature data in the database, the storable computing equipment decrypts the digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypts the digital signature attached to the inquired facial feature data into a first abstract by using the public key;
the storable computing device performs hash operation on the facial feature data of the current visitor to obtain a second abstract, and compares whether the first abstract and the second abstract are equal; if the two are equal, a permission signal is sent to the access control module, and the access control module permits the visitor to access the transaction node module.
Further, when the visitor accesses the transaction node module, the access control module opens access with different permission levels for users with different permission levels, and the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
Further, the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting facial features.
When the invention is used, an accessor can operate the account of the accessor to trade at any trading node, the trading node can be equipment which can carry out trading operation, such as an intelligent terminal, and the like, a plurality of trading nodes can be intelligent terminals arranged at different trading points, the accessor operates the intelligent terminal to trade, and the trading nodes count the trading data.
When a certain transaction node is visited, identity authentication of a visitor is carried out in an AR identification mode when the certain transaction node is visited, the transaction node can be an intelligent terminal with a display, a face identification interface can be displayed on the display interface of the transaction node, for example, a face outline is displayed on the display interface to serve as an AR frame for face identification; then, a module for collecting images in the mobile transaction node terminal, for example, a camera (the camera may correspond to the face recognition module) of the mobile transaction node terminal, so that the face image of the visitor to be accessed is moved into the face contour in the display interface, and then face recognition is performed, and after the face image enters the face contour in the display interface, the face can be ensured to be within the recognition range of the face recognition module, thereby preventing the face from not completely entering the recognition range of the transaction node in the recognition process to cause unsuccessful recognition. The facial image of the mobile visitor can be a man-made mobile camera or a mobile camera moved by an algorithm.
The collected facial feature data are used as a reference, the same or similar facial feature data are inquired in a database, a public key of the inquired facial feature data is obtained through decryption of a digital certificate, and a first abstract is obtained through decryption of the public key;
the second abstract is a Hash operation result of the facial feature data of the visitor to be accessed, whether the facial feature data of the visitor at present are consistent with the facial feature data inquired from the database or not can be known by comparing the first abstract with the second abstract, and the matching accuracy of the facial feature data is ensured by triple encryption of Hash operation, digital signature and digital certificate; and because the hash operation obtains the irreversible characteristic of the abstract, the facial feature data corresponding to the first abstract is prevented from being tampered, and as long as the first abstract is the same as the second abstract, the inquired facial feature data can be judged to be not tampered and is matched with the facial feature data of the visitor who wants to visit at present, so that the transaction security of the visitor is guaranteed, and the security of the facial feature data in the database is guaranteed.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby.
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
In one embodiment, the invention firstly proposes to count transaction data on a plurality of transaction nodes, collect facial features of visitors during transaction, and specifically, collect facial structured light in a plurality of ways, for example, collect facial structured light by using a structured light camera;
then constructing a block chain system, packaging the transaction data and the face feature data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the face feature data, the hash of the transaction data and the hash of the face feature data into the block head of the current block as a feature value, and calculating the hash of the current block according to the feature value; constructing blocks generated successively into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node to be purely decentralized; therefore, the transaction data and the face characteristic data are purely decentralized, and are prevented from being tampered;
carrying out Hash operation on the facial feature data to obtain a first abstract, carrying out private key encryption on the first abstract obtained by calculation to obtain a digital signature, carrying out private key encryption on a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to the facial feature data and uploading the digital signature and the digital certificate to a network;
setting an access control module on each transaction node, wherein the access control module carries out authority management on an accessor accessing the transaction node;
starting a face recognition interface of a transaction node, constructing a face recognition (AR) frame on the face recognition interface, and moving a face recognition module in the transaction node to enable the face of a visitor to move into the AR frame and then execute face recognition;
acquiring facial feature data of an accessor, inquiring the same or similar facial feature data in a database, decrypting a digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypting a digital signature attached to the inquired facial feature data into a first abstract by using the public key;
and performing hash operation on the facial feature data of the current visitor to obtain a second abstract, comparing whether the first abstract and the second abstract are equal, and if so, allowing the visitor to access the transaction node.
The non-tampering property of distributed storage based on the block chain, the transaction time, the time for acquiring the facial feature data, the hash of the transaction data and the hash of the facial feature data are added into the block head, and the transaction data and the facial feature data are added into the block body, so that all related data of the transaction data and the facial feature data cannot be tampered.
Uploading the abstract, the digital signature and the digital certificate of the facial feature data to a network;
the visitor can operate his own account at any transaction node to carry out transaction, the transaction node can be, for example, an intelligent terminal and other devices capable of carrying out transaction operation, the transaction nodes can be intelligent terminals arranged at different transaction points, the visitor operates the intelligent terminal to carry out transaction, and the transaction nodes count transaction data.
When a certain transaction node is visited, identity authentication of a visitor is carried out in an AR identification mode, the transaction node can be an intelligent terminal with a display, a face identification interface can be displayed on a display interface of the transaction node, and for example, a face outline is displayed on the display interface to serve as an AR frame for face identification; then, a module for collecting images in the mobile transaction node terminal, for example, a camera (the camera may correspond to the face recognition module) of the mobile transaction node terminal, so that the face image of the visitor to be accessed is moved into the face contour in the display interface, and then face recognition is performed, and after the face image enters the face contour in the display interface, the face can be ensured to be within the recognition range of the face recognition module, thereby preventing the face from not completely entering the recognition range of the transaction node in the recognition process to cause unsuccessful recognition. Wherein the facial image of the mobile visitor may be a human mobile camera or a camera moved by an algorithm, such as automatic rotation of a mechanical algorithm, to look for the visitor's face.
The collected facial feature data is used as a reference, the same or similar facial feature data is inquired in a database, and the specific inquiry method can be a comparison algorithm based on data similarity, a public key of the inquired facial feature data is obtained through decryption of a digital certificate, and a first abstract is obtained through decryption of the public key;
the second abstract is a Hash operation result of the facial feature data of the visitor to be accessed, whether the facial feature data of the visitor at present are consistent with the facial feature data inquired from the database or not can be known by comparing the first abstract with the second abstract, and the matching accuracy of the facial feature data is ensured by triple encryption of Hash operation, digital signature and digital certificate; and because the hash operation obtains the irreversible characteristic of the abstract, the facial feature data corresponding to the first abstract is prevented from being tampered, and as long as the first abstract is the same as the second abstract, the inquired facial feature data can be judged to be not tampered and is matched with the facial feature data of the visitor who wants to visit at present, so that the transaction security of the visitor is guaranteed, and the security of the facial feature data in the database is guaranteed.
Facial features of the visitor may be collected in a variety of ways, such as by a facial recognition module.
In some embodiments, further comprising the step of: when the visitor accesses the transaction node, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
The facial feature data correspond to the authority level of the visitor, and when the visitor accesses a certain transaction node, the access control module can distinguish the authority level of the visitor by identifying the visitor; after the facial features of the visitor are collected, the staff can mark the corresponding authority level on the facial feature data, and the authority level and the facial feature data are associated by adopting a marking method, wherein the marking method can be a digital signature method for example; uploading the marked facial feature data to an intelligent contract and packaging the intelligent contract into a block; for example, the authority levels can be divided into common users, VIP users and blacklist users, and different access authorities can be set for users with different authority levels. For example: the common user can inquire the self and can carry out transaction; the VIP user can inquire about all persons, but only can carry out own transaction; the blacklisted user cannot access the transaction node.
Specifically, the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Preferably, a MongoDB database is adopted for collecting facial features; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced.
In particular, the access control module may be a verifier of facial features, such as a facial structure light recognizer or the like.
The present invention also contemplates a storable computing device,
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor is adapted to carry out any of the above-mentioned method steps when executing the computer program.
The invention also provides a pure decentralized block chain system,
the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, the storable computing equipment carries out statistics on transaction data, a biological characteristic acquisition module is arranged in each transaction node module, and the biological characteristic acquisition module acquires facial characteristics of an accessor during transaction and can acquire the facial characteristics in various ways, for example, a structured light camera is used for acquiring facial structured light;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and face feature data of all transaction node modules into a block within a preset time period, the transaction time, the time for acquiring the face feature data, the hash of the transaction data and the hash of the face feature data are recorded into the head of the current block to serve as a feature value, the hash of the current block is calculated according to the feature value, and then the sequentially generated blocks are mutually constructed into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node module to be purely decentralized;
the storable computing equipment performs Hash operation on the facial feature data to obtain a first abstract, performs private key encryption on the first abstract obtained through calculation to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the facial feature data and uploads the digital signature and the digital certificate to a network together;
setting an access control module on each transaction node module, wherein the access control module carries out authority management on an accessor accessing the transaction node module;
the transaction node module includes a facial recognition module having a facial recognition interface on which the storable computing device builds a facial recognition (AR) framework, the facial recognition module in the mobile transaction node module causing the visitor's face to move into the AR framework before performing facial recognition;
the access control module collects facial feature data of an accessor and sends the facial feature data to the storable computing equipment, the storable computing equipment inquires the same or similar facial feature data in the database, the storable computing equipment decrypts the digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypts the digital signature attached to the inquired facial feature data into a first abstract by using the public key;
the storable computing device performs hash operation on the facial feature data of the current visitor to obtain a second abstract, and compares whether the first abstract and the second abstract are equal; if the two are equal, a permission signal is sent to the access control module, and the access control module permits the visitor to access the transaction node module.
Similarly, an accessor can operate an account of the accessor to perform transaction at any transaction node module, the transaction node module can be equipment capable of performing transaction operation, such as an intelligent terminal, a plurality of transaction node modules can be intelligent terminals arranged at different transaction points, the accessor operates the intelligent terminal to perform transaction, and the transaction node modules count transaction data.
When a certain transaction node module is visited, identity authentication of a visitor is carried out in an AR identification mode, the transaction node module can be an intelligent terminal with a display, a face identification interface can be displayed on a display interface of the intelligent terminal, and for example, a face outline is displayed on the display interface to serve as a face identification AR frame; then, a module for collecting images in the mobile transaction node module terminal, for example, a camera (the camera may correspond to the face recognition module) of the mobile transaction node module terminal, so that the face image of the visitor to be visited is moved into the face contour in the display interface, and then face recognition is performed, and after the face image enters the face contour in the display interface, the face can be ensured to be necessarily in the recognition range of the face recognition module, thereby preventing that the face does not completely enter the recognition range of the transaction node in the recognition process to cause unsuccessful recognition. The facial image of the mobile visitor can be a man-made mobile camera or a mobile camera moved by an algorithm.
The collected facial feature data are used as a reference, the same or similar facial feature data are inquired in a database, a public key of the inquired facial feature data is obtained through decryption of a digital certificate, and a first abstract is obtained through decryption of the public key;
the second abstract is a Hash operation result of the facial feature data of the visitor to be accessed, whether the facial feature data of the visitor at present are consistent with the facial feature data inquired from the database or not can be known by comparing the first abstract with the second abstract, and the matching accuracy of the facial feature data is ensured by triple encryption of Hash operation, digital signature and digital certificate; and because the hash operation obtains the irreversible characteristic of the abstract, the facial feature data corresponding to the first abstract is prevented from being tampered, and as long as the first abstract is the same as the second abstract, the inquired facial feature data can be judged to be not tampered and is matched with the facial feature data of the visitor who wants to visit at present, so that the transaction security of the visitor is guaranteed, and the security of the facial feature data in the database is guaranteed.
Facial features of the visitor may be collected in a variety of ways, such as by a facial recognition module.
When the visitor accesses the transaction node module, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
The facial feature data correspond to the authority level of the visitor, and when the visitor accesses a certain transaction node, the access control module can distinguish the authority level of the visitor by identifying the visitor; after the facial features of the visitor are collected, the staff can mark the corresponding authority level on the facial feature data, and the authority level and the facial feature data are associated by adopting a marking method, wherein the marking method can be a digital signature method for example; uploading the marked facial feature data to an intelligent contract and packaging the intelligent contract into a block; for example, the authority levels can be divided into common users, VIP users and blacklist users, and different access authorities can be set for users with different authority levels. For example: the common user can inquire the self and can carry out transaction; the VIP user can inquire about all persons, but only can carry out own transaction; the blacklisted user cannot access the transaction node.
Similarly, in this embodiment, the transaction node module is interfaced with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate. Collecting facial features by adopting a MongoDB database; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced. The facial feature data includes facial structured light. The access control module may be a verifier of facial features, such as a facial structure light recognizer or the like.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (9)

1. A pure decentralized block chaining method, comprising: the method comprises the following steps:
counting transaction data on a plurality of transaction nodes, and acquiring facial features of an accessor during transaction;
packaging the transaction data and the face feature data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the face feature data, the Hash of the transaction data and the Hash of the face feature data into the block head of the current block as a feature value, and calculating the Hash of the current block according to the feature value; constructing blocks generated successively into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node to be purely decentralized;
carrying out Hash operation on the facial feature data to obtain a first abstract, carrying out private key encryption on the first abstract obtained by calculation to obtain a digital signature, carrying out private key encryption on a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to the facial feature data and uploading the digital signature and the digital certificate to a network;
setting an access control module on each transaction node, wherein the access control module carries out authority management on an accessor accessing the transaction node;
starting a face recognition interface of a transaction node, constructing a face recognition (AR) frame on the face recognition interface, and moving a face recognition module in the transaction node to enable the face of a visitor to be moved into the AR frame and then executing face recognition;
acquiring facial feature data of an accessor, inquiring the same or similar facial feature data in a database, decrypting a digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypting a digital signature attached to the inquired facial feature data into a first abstract by using the public key;
and performing hash operation on the facial feature data of the current visitor to obtain a second abstract, comparing whether the first abstract and the second abstract are equal, and if so, allowing the visitor to access the transaction node.
2. The method of claim 1, wherein: further comprising the steps of:
when the visitor accesses the transaction node, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
3. A pure decentralised blockchain method as claimed in claim 2, wherein: further comprising the steps of:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
4. A pure decentralised blockchain method as claimed in claim 3, wherein:
and adopting a MongoDB database to collect facial features.
5. A storable computing device characterized by:
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
6. A pure decentralized blockchain system, comprising:
the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, transaction data are counted by the storable computing equipment, a biological characteristic acquisition module is arranged in each transaction node module, and the biological characteristic acquisition module acquires facial characteristics of an accessor during transaction;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and face feature data of all transaction node modules into a block within a preset time period, the transaction time, the time for acquiring the face feature data, the hash of the transaction data and the hash of the face feature data are recorded into the head of the current block to serve as a feature value, the hash of the current block is calculated according to the feature value, and then the sequentially generated blocks are mutually constructed into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node module to be purely decentralized;
the storable computing equipment performs Hash operation on the facial feature data to obtain a first abstract, performs private key encryption on the first abstract obtained through calculation to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the facial feature data and uploads the digital signature and the digital certificate to a network together;
setting an access control module on each transaction node module, wherein the access control module carries out authority management on an accessor accessing the transaction node module;
the transaction node module includes a facial recognition module having a facial recognition interface on which the storable computing device builds a facial recognition (AR) framework, the facial recognition module in the mobile transaction node module causing the visitor's face to move into the AR framework before performing facial recognition;
the access control module collects facial feature data of an accessor and sends the facial feature data to the storable computing equipment, the storable computing equipment inquires the same or similar facial feature data in the database, the storable computing equipment decrypts the digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypts the digital signature attached to the inquired facial feature data into a first abstract by using the public key;
the storable computing device performs hash operation on the facial feature data of the current visitor to obtain a second abstract, and compares whether the first abstract and the second abstract are equal; if the two are equal, a permission signal is sent to the access control module, and the access control module permits the visitor to access the transaction node module.
7. A pure decentralised blockchain system as claimed in claim 6, wherein:
when the visitor accesses the transaction node module, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
8. A pure decentralised blockchain system as claimed in claim 7, wherein:
and the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
9. A pure decentralised blockchain system as claimed in claim 8, wherein:
and adopting a MongoDB database to collect facial features.
CN202010437967.1A 2020-05-21 2020-05-21 Pure decentralized block chain method and system Pending CN111553691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010437967.1A CN111553691A (en) 2020-05-21 2020-05-21 Pure decentralized block chain method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010437967.1A CN111553691A (en) 2020-05-21 2020-05-21 Pure decentralized block chain method and system

Publications (1)

Publication Number Publication Date
CN111553691A true CN111553691A (en) 2020-08-18

Family

ID=72001442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010437967.1A Pending CN111553691A (en) 2020-05-21 2020-05-21 Pure decentralized block chain method and system

Country Status (1)

Country Link
CN (1) CN111553691A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616539A (en) * 2018-05-03 2018-10-02 东莞市翔实信息科技有限公司 A kind of method and system that block chain transaction record accesses
CN108847931A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Block chain key generation method and device based on biometric
CN109347941A (en) * 2018-10-10 2019-02-15 南京简诺特智能科技有限公司 A kind of data sharing platform and its implementation based on block chain
CN109493020A (en) * 2018-11-08 2019-03-19 众安信息技术服务有限公司 Method for secure transactions and device based on block chain
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN110009339A (en) * 2018-12-29 2019-07-12 阿里巴巴集团控股有限公司 Data processing method and device based on block chain
CN110503434A (en) * 2019-07-15 2019-11-26 平安普惠企业管理有限公司 Data verification method, device, equipment and storage medium based on hash algorithm
CN110519297A (en) * 2019-09-17 2019-11-29 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain private key
CN110555029A (en) * 2019-09-06 2019-12-10 腾讯科技(深圳)有限公司 ticket management method and device based on block chain and storage medium
WO2019232880A1 (en) * 2018-06-04 2019-12-12 清华大学 Biomarker authentication-based block chain secure transaction method and apparatus
CN110889373A (en) * 2019-11-27 2020-03-17 中国农业银行股份有限公司 Block chain-based identity recognition method, information storage method and related device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616539A (en) * 2018-05-03 2018-10-02 东莞市翔实信息科技有限公司 A kind of method and system that block chain transaction record accesses
WO2019232880A1 (en) * 2018-06-04 2019-12-12 清华大学 Biomarker authentication-based block chain secure transaction method and apparatus
CN108847931A (en) * 2018-06-25 2018-11-20 北京奇虎科技有限公司 Block chain key generation method and device based on biometric
CN109347941A (en) * 2018-10-10 2019-02-15 南京简诺特智能科技有限公司 A kind of data sharing platform and its implementation based on block chain
CN109493020A (en) * 2018-11-08 2019-03-19 众安信息技术服务有限公司 Method for secure transactions and device based on block chain
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN110009339A (en) * 2018-12-29 2019-07-12 阿里巴巴集团控股有限公司 Data processing method and device based on block chain
CN110503434A (en) * 2019-07-15 2019-11-26 平安普惠企业管理有限公司 Data verification method, device, equipment and storage medium based on hash algorithm
CN110555029A (en) * 2019-09-06 2019-12-10 腾讯科技(深圳)有限公司 ticket management method and device based on block chain and storage medium
CN110519297A (en) * 2019-09-17 2019-11-29 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain private key
CN110889373A (en) * 2019-11-27 2020-03-17 中国农业银行股份有限公司 Block chain-based identity recognition method, information storage method and related device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王乃洲;金连文;高兵;金晓峰;: "基于区块链技术的身份认证与存储方法研究", 现代信息科技, no. 08, 25 April 2020 (2020-04-25) *

Similar Documents

Publication Publication Date Title
US20200201966A1 (en) Biometric based self-sovereign information management
US11062006B2 (en) Biometric based self-sovereign information management
CN106710032B (en) Entrance guard opening method and device
CN111553689A (en) Matching correlation method and system based on quadratic hash
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
US20200204545A1 (en) Method and system for secure information validation
US20200202333A1 (en) Method and system for self-sovereign information management
CN115758398B (en) Access control data processing method and device, access control system and storage medium
JP2022512202A (en) Trust token for resource access
CN110889697A (en) Block chain-based railway system and using method thereof
CN112308021A (en) Encrypted face feature matching method based on privacy protection
US11281754B2 (en) Biometric based self-sovereign information management
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
CN111598570A (en) Block chain method and system for auditing transaction based on facial recognition
CN113821780A (en) Video analysis method and device, electronic equipment and storage medium
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN111553694A (en) Distributed storage block chain method and system
CN106710033B (en) Entrance guard opening method and device
CN111553704A (en) Block chain method and system with access level limitation
CN111553693A (en) Associated certificate storage method and system based on secondary hash
US11288386B2 (en) Method and system for self-sovereign information management
CN111553691A (en) Pure decentralized block chain method and system
CN111553690A (en) Block chain system supporting multipoint transaction
CN104580262A (en) Safety method applicable to wireless internet of things
CN115690969A (en) Non-contact fingerprint authentication method, terminal, access control equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination