CN111554026A - Face recognition system and method based on block chain - Google Patents

Face recognition system and method based on block chain Download PDF

Info

Publication number
CN111554026A
CN111554026A CN202010372379.4A CN202010372379A CN111554026A CN 111554026 A CN111554026 A CN 111554026A CN 202010372379 A CN202010372379 A CN 202010372379A CN 111554026 A CN111554026 A CN 111554026A
Authority
CN
China
Prior art keywords
module
algorithm
block chain
face
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010372379.4A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin Venture Service Co ltd
Original Assignee
Guangdong Hongxin Venture Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin Venture Service Co ltd filed Critical Guangdong Hongxin Venture Service Co ltd
Priority to CN202010372379.4A priority Critical patent/CN111554026A/en
Publication of CN111554026A publication Critical patent/CN111554026A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/55Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the field of face recognition, and discloses a face recognition system and a face recognition method based on a block chain, wherein the system comprises a block chain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein the block chain database stores face images of users with access control authorities, the face recognition module acquires face images of door openers, and the face image of the person who opens the door is encrypted by an encryption algorithm and then is sent to an image processing control module through a wireless communication module, the image processing control module carries out matching analysis processing on the acquired face image of the person who opens the door and the face image stored in a block chain database, and sending corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, controlling the electromagnetic lock to be opened by the image processing control module, or sending an alarm instruction to the alarm module, and giving an alarm by the alarm module. The invention has various data transmission modes, can meet the requirements of users on various data transmission modes, reduces the volume and lowers the cost.

Description

Face recognition system and method based on block chain
Technical Field
The invention relates to the field of face recognition, in particular to a face recognition system and method based on a block chain.
Background
With the continuous progress of modern society science and technology, people are experiencing the convenience and benefits brought by high technology, and meanwhile, the requirements of people on high technology services and life are higher and higher. However, with the development of science and technology, many unsafe aspects are brought, for example, criminal behaviors such as theft, robbery and spying by using high-tech means are increasing day by day. How to make the safety precaution measures of people follow the development of science and technology, and more effectively preventing the offending behaviors of the criminal behaviors becomes a problem to be solved urgently. The requirement of people for safety performance cannot be met only by means of common door locks, security doors or fixed storage media. The existing face recognition access control systems based on the block chain store face images of users by using a block chain database, so that the risk of failure of the whole system caused by hanging or attacking of one node is avoided, and the safety level of the access control system is improved. However, the data transmission mode is single, and the requirement of the user on diversified data transmission modes cannot be met. In addition, in such a face recognition access control system based on a block chain, the processor is separated from the controller, which not only increases the volume, but also causes higher cost.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a face recognition system and method based on a block chain, which have multiple data transmission modes, can meet the requirements of users for diversified data transmission modes, reduce the size, and reduce the cost, and solve the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a face recognition system based on a block chain is constructed, and comprises a block chain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein a face image of a user with an access right is stored in the block chain database, the face recognition module collects the face image of a door opener, the collected face image of the door opener is encrypted by an encryption algorithm and then is sent to the image processing control module through the wireless communication module, the image processing control module performs matching analysis processing on the collected face image of the door opener and the face image stored in the block chain database, corresponding control instructions are sent to the electromagnetic lock and the alarm module according to matching analysis processing results, and if the matching analysis processing results show that the door opener has the access right, the image processing control module controls the electromagnetic lock to open, if the matching analysis processing result shows that the door opener does not have the access control authority, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
In the face recognition system based on the block chain, the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffe-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm.
In the face recognition system based on the block chain, the block chain database is composed of a plurality of block chain link points, and the block chain nodes are used for storing face images of users with access control authority.
The invention also relates to a face recognition method based on the block chain, which is applied to the face recognition system based on the block chain and comprises the following steps:
A) the face recognition module collects face images of door openers, encrypts the collected face images of the door openers by using an encryption algorithm and then sends the face images to the image processing control module through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
B) The image processing control module carries out matching analysis processing on the acquired face image of the door opener and the face image stored in the block chain database, finds out the face image with the highest similarity with the face image of the door opener from the block chain database, and obtains a matching analysis processing result;
C) the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, judges whether the matching analysis processing result shows that a door opener has access control authority, and if so, executes the step D); otherwise, executing step E);
D) the image processing control module controls the electromagnetic lock to be unlocked;
E) the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm.
In the face recognition method based on the block chain, the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffe-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm.
In the face recognition method based on the block chain, the block chain database is composed of a plurality of block chain link points, and the block chain nodes are used for storing face images of users with access control authority.
The block chain-based face recognition system and the block chain-based face recognition method have the following beneficial effects that: the intelligent door lock comprises a blockchain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein the blockchain database stores face images of users with access control authority, the face recognition module collects the face images of door openers, encrypts the collected face images by using an encryption algorithm and sends the face images to the image processing control module through the wireless communication module, the wireless communication module is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and the image processing control module is adopted to realize image processing and control functions and provide various wireless communication modes The volume is reduced, and the cost is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention;
fig. 2 is a flow chart of the method in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the face recognition system and method based on the block chain, the schematic structural diagram of the face recognition system based on the block chain is shown in fig. 1. In fig. 1, the face recognition system based on the block chain comprises a block chain database 1, a face recognition module 2, a wireless communication module 3, an image processing control module 4, an electromagnetic lock 5 and an alarm module 6, wherein the block chain database 1 stores a user face image of the access authority, the face recognition module 2 collects a face image of a door opener, encrypts the collected face image of the door opener by using an encryption algorithm and then sends the encrypted face image to the image processing control module 4 through the wireless communication module 3, the image processing control module 4 performs matching analysis processing on the collected face image of the door opener and the face image stored in the block chain database 1, and sends a corresponding control instruction to the electromagnetic lock 5 and the alarm module 6 according to a matching analysis processing result, if the matching analysis processing result shows that the door opener has the access authority, the image processing control module 4 controls the electromagnetic lock 5 to open, if the matching analysis processing result shows that the door opener does not have the access control authority, the image processing control module 4 sends an alarm instruction to the alarm module, and the alarm module 6 gives an alarm.
It is worth mentioning that in the face recognition system based on the block chain, the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFISH algorithm, ElGamal algorithm, Deffie-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm. The DES algorithm is a data encryption standard, has high speed and is suitable for occasions where a large amount of data is encrypted. The 3DES algorithm is based on DES, and three times of encryption are performed on a block of data by using three different keys, so that the intensity is higher. The RC2 algorithm and the RC4 algorithm encrypt a large amount of data with a variable-length key faster than the DES algorithm. The IDEA algorithm is an international data encryption algorithm, and provides very strong security using a 128-bit key. The RSA algorithm is a public key algorithm supporting variable-length keys, and the length of a file block to be encrypted is also variable. The DSA algorithm is a digital signature algorithm, and is a standard DSS (digital signature standard). The AES algorithm is an advanced encryption standard, is an encryption algorithm standard of the next generation, has high speed and high security level, and one realization of the current AES standard is the Rijndael algorithm. The BLOWFSH algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high. The MD5 algorithm generally gives MD5 values under more formal and strict websites, such as a safety-focused software tool, each with MD 5.
The wireless communication module 3 is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase the flexibility of wireless communication mode, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires the communication quality to be higher. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The face recognition system based on the block chain has various data transmission modes and can meet the requirement of a user on data transmission diversity.
In addition, the image processing control module 4 integrates the processor and the controller in the prior art, and the functions which can be completed by two devices originally are needed.
The block chain database 1 is composed of a plurality of block chain link points, and the block chain link points are used for storing user face images of access control authorities. The block chain database 1 is used for storing the face image of the user, so that the risk of failure of the whole system caused by hanging or attacking of one node is avoided, and the safety level of the face recognition system based on the block chain is improved.
Fig. 2 is a flowchart of a face recognition method based on a block chain in this embodiment, and in fig. 2, the face recognition method based on a block chain is applied to the face recognition system based on a block chain in this embodiment, and the face recognition method based on a block chain includes the following steps:
step S01, the face recognition module collects the face image of the person who opens the door, and the collected face image of the person who opens the door is encrypted by an encryption algorithm and then is sent to the image processing control module through the wireless communication module: in the step, the face recognition module collects the face image of the person who opens the door, encrypts the collected face image of the person who opens the door by using an encryption algorithm and then sends the encrypted face image to the image processing control module through the wireless communication module. The encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffie-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm. The DES algorithm is a data encryption standard, has high speed and is suitable for occasions where a large amount of data is encrypted. The 3DES algorithm is based on DES, and three times of encryption are performed on a block of data by using three different keys, so that the intensity is higher. The RC2 algorithm and the RC4 algorithm encrypt a large amount of data with a variable-length key faster than the DES algorithm. The IDEA algorithm is an international data encryption algorithm, and provides very strong security using a 128-bit key. The RSA algorithm is a public key algorithm supporting variable-length keys, and the length of a file block to be encrypted is also variable. The DSA algorithm is a digital signature algorithm, and is a standard DSS (digital signature standard). The AES algorithm is an advanced encryption standard, is an encryption algorithm standard of the next generation, has high speed and high security level, and one realization of the current AES standard is the Rijndael algorithm. The BLOWFSH algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high. The MD5 algorithm generally gives MD5 values under more formal and strict websites, such as a safety-focused software tool, each with MD 5.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase the flexibility of wireless communication mode, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires the communication quality to be higher. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The face recognition method based on the block chain has various data transmission modes and can meet the requirement of a user on data transmission diversity.
Step S02, the image processing control module performs matching analysis processing on the acquired face image of the person who opens the door and the face images stored in the blockchain database, finds out the face image with the highest similarity to the face image of the person who opens the door from the blockchain database, and obtains a matching analysis processing result: in this step, the image processing control module performs matching analysis processing on the acquired face image of the person who opens the door and the face image stored in the block chain database, and finds out the face image with the highest similarity to the face image of the person who opens the door from the block chain database, so as to obtain a matching analysis processing result.
Step S03, the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, and judges whether the matching analysis processing result shows that the door opener has the access right: in this step, the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, and simultaneously judges whether the matching analysis processing result shows that the door opener has the access right, if so, the step S04 is executed; otherwise, step S05 is executed.
Step S04 the image processing control module controls the electromagnetic lock to open: if the judgment result of the above step S03 is yes, the present step is executed. In this step, the image processing control module controls the electromagnetic lock to be opened.
Step S05, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm: if the judgment result of the above step S03 is no, the present step is executed. In this step, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm.
In short, in this embodiment, the blockchain database 1, the face recognition module 2, the wireless communication module 3, the image processing control module 4, the electromagnetic lock 5 and the alarm module 6 are provided, the blockchain database 1 stores face images of users with access control authority, the face recognition module 2 collects face images of door openers, encrypts the collected face images by using an encryption algorithm and sends the encrypted face images to the image processing control module 4 through the wireless communication module 3, the wireless communication module 3 is any one or a combination of any two of a 5G communication module, a 4G communication module, a bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and the image processing control module is used for realizing image processing and control functions, so as to provide multiple wireless communication modes The requirement of a user on diversified data transmission modes can be met, the size is reduced, and the cost is reduced.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A face recognition system based on a block chain is characterized by comprising a block chain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein the block chain database stores face images of users with access control authority, the face recognition module collects the face images of door openers and transmits the collected face images of the door openers to the image processing control module through the wireless communication module after being encrypted by an encryption algorithm, the image processing control module performs matching analysis processing on the collected face images of the door openers and the face images stored in the block chain database, sends corresponding control instructions to the electromagnetic lock and the alarm module according to matching analysis processing results, and displays that the door openers have the access control authority if the matching analysis processing results, the image processing control module controls the electromagnetic lock to be opened, and if the matching analysis processing result shows that a door opener does not have access control authority, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
2. The blockchain-based face recognition system of claim 1, wherein the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFISH algorithm, ElGamal algorithm, Deffie-Hellman algorithm, new elliptic curve algorithm, or MD5 algorithm.
3. The system according to claim 2, wherein the blockchain database comprises a plurality of blockchain nodes, and the blockchain nodes are used for storing the face images of the users with access control authority.
4. A face recognition method based on block chain, which is applied to the face recognition system based on block chain as claimed in claim 1, and comprises the following steps:
A) the face recognition module collects face images of door openers, encrypts the collected face images of the door openers by using an encryption algorithm and then sends the face images to the image processing control module through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
B) The image processing control module carries out matching analysis processing on the acquired face image of the door opener and the face image stored in the block chain database, finds out the face image with the highest similarity with the face image of the door opener from the block chain database, and obtains a matching analysis processing result;
C) the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, judges whether the matching analysis processing result shows that a door opener has access control authority, and if so, executes the step D); otherwise, executing step E);
D) the image processing control module controls the electromagnetic lock to be unlocked;
E) the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm.
5. The blockchain-based face recognition method according to claim 4, wherein the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffe-Hellman algorithm, new elliptic curve algorithm, or MD5 algorithm.
6. The blockchain-based face recognition method according to claim 5, wherein the blockchain database is composed of a plurality of blockchain link points, and the blockchain nodes are used for storing face images of users with access control authority.
CN202010372379.4A 2020-05-06 2020-05-06 Face recognition system and method based on block chain Withdrawn CN111554026A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010372379.4A CN111554026A (en) 2020-05-06 2020-05-06 Face recognition system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010372379.4A CN111554026A (en) 2020-05-06 2020-05-06 Face recognition system and method based on block chain

Publications (1)

Publication Number Publication Date
CN111554026A true CN111554026A (en) 2020-08-18

Family

ID=72000445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010372379.4A Withdrawn CN111554026A (en) 2020-05-06 2020-05-06 Face recognition system and method based on block chain

Country Status (1)

Country Link
CN (1) CN111554026A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116597552A (en) * 2023-07-19 2023-08-15 青岛大数华创科技有限公司 Face recognition authorization management system for biological sample warehouse-in and warehouse-out

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116597552A (en) * 2023-07-19 2023-08-15 青岛大数华创科技有限公司 Face recognition authorization management system for biological sample warehouse-in and warehouse-out
CN116597552B (en) * 2023-07-19 2023-09-22 青岛大数华创科技有限公司 Face recognition authorization management system for biological sample warehouse-in and warehouse-out

Similar Documents

Publication Publication Date Title
CN105257145B (en) Remote safe deposit box
CN108171831B (en) Bidirectional security authentication method based on NFC mobile phone and intelligent lock
US11201886B2 (en) Security detection method, device, and apparatus
CN109905235A (en) A kind of smart lock unlocking method, smart lock, terminal, server and system
Wang et al. NOTSA: Novel OBU with three-level security architecture for internet of vehicles
CN104282058B (en) The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth
CN104299300B (en) The unblanking and close locking method of safety intelligent lock system based on NFC
CN104113839A (en) Mobile data safety protection system and method based on SDN
CN106846573B (en) The method of opening electronic lock and corresponding electronic lock in no linking Internet
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
CN108881327A (en) A kind of computer internet information safety control system based on cloud computing
CN107067516A (en) Method for unlocking and system and door-locking system
CN104052817A (en) Intelligent door and intelligent door control method and system
CN103136830A (en) Communication-free hopping code generation method of access control system
CN108932771A (en) A kind of long-range temporary Authorization, method for unlocking and system
CN116760740A (en) Intelligent embedded monitoring system in Internet of things equipment
CN112165693B (en) Safe and efficient privacy protection data fusion method
CN111554026A (en) Face recognition system and method based on block chain
CN112491908A (en) Security certification management system based on block chain big data
Hurst et al. Behavioural observation for critical infrastructure security support
CN116684875A (en) Communication security authentication method for electric power 5G network slice
CN116665352A (en) Access control method and system
CN108449317B (en) Access control system for security verification based on SGX and homomorphic encryption and implementation method thereof
CN116346423A (en) Client data multiple encryption system and method in intelligent Internet of things energy system
JP7410313B2 (en) Methods for cryptographically protecting communication devices and communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200818