CN111554026A - Face recognition system and method based on block chain - Google Patents
Face recognition system and method based on block chain Download PDFInfo
- Publication number
- CN111554026A CN111554026A CN202010372379.4A CN202010372379A CN111554026A CN 111554026 A CN111554026 A CN 111554026A CN 202010372379 A CN202010372379 A CN 202010372379A CN 111554026 A CN111554026 A CN 111554026A
- Authority
- CN
- China
- Prior art keywords
- module
- algorithm
- block chain
- face
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/55—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- General Engineering & Computer Science (AREA)
- Bioinformatics & Computational Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention relates to the field of face recognition, and discloses a face recognition system and a face recognition method based on a block chain, wherein the system comprises a block chain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein the block chain database stores face images of users with access control authorities, the face recognition module acquires face images of door openers, and the face image of the person who opens the door is encrypted by an encryption algorithm and then is sent to an image processing control module through a wireless communication module, the image processing control module carries out matching analysis processing on the acquired face image of the person who opens the door and the face image stored in a block chain database, and sending corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, controlling the electromagnetic lock to be opened by the image processing control module, or sending an alarm instruction to the alarm module, and giving an alarm by the alarm module. The invention has various data transmission modes, can meet the requirements of users on various data transmission modes, reduces the volume and lowers the cost.
Description
Technical Field
The invention relates to the field of face recognition, in particular to a face recognition system and method based on a block chain.
Background
With the continuous progress of modern society science and technology, people are experiencing the convenience and benefits brought by high technology, and meanwhile, the requirements of people on high technology services and life are higher and higher. However, with the development of science and technology, many unsafe aspects are brought, for example, criminal behaviors such as theft, robbery and spying by using high-tech means are increasing day by day. How to make the safety precaution measures of people follow the development of science and technology, and more effectively preventing the offending behaviors of the criminal behaviors becomes a problem to be solved urgently. The requirement of people for safety performance cannot be met only by means of common door locks, security doors or fixed storage media. The existing face recognition access control systems based on the block chain store face images of users by using a block chain database, so that the risk of failure of the whole system caused by hanging or attacking of one node is avoided, and the safety level of the access control system is improved. However, the data transmission mode is single, and the requirement of the user on diversified data transmission modes cannot be met. In addition, in such a face recognition access control system based on a block chain, the processor is separated from the controller, which not only increases the volume, but also causes higher cost.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a face recognition system and method based on a block chain, which have multiple data transmission modes, can meet the requirements of users for diversified data transmission modes, reduce the size, and reduce the cost, and solve the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a face recognition system based on a block chain is constructed, and comprises a block chain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein a face image of a user with an access right is stored in the block chain database, the face recognition module collects the face image of a door opener, the collected face image of the door opener is encrypted by an encryption algorithm and then is sent to the image processing control module through the wireless communication module, the image processing control module performs matching analysis processing on the collected face image of the door opener and the face image stored in the block chain database, corresponding control instructions are sent to the electromagnetic lock and the alarm module according to matching analysis processing results, and if the matching analysis processing results show that the door opener has the access right, the image processing control module controls the electromagnetic lock to open, if the matching analysis processing result shows that the door opener does not have the access control authority, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
In the face recognition system based on the block chain, the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffe-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm.
In the face recognition system based on the block chain, the block chain database is composed of a plurality of block chain link points, and the block chain nodes are used for storing face images of users with access control authority.
The invention also relates to a face recognition method based on the block chain, which is applied to the face recognition system based on the block chain and comprises the following steps:
A) the face recognition module collects face images of door openers, encrypts the collected face images of the door openers by using an encryption algorithm and then sends the face images to the image processing control module through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
B) The image processing control module carries out matching analysis processing on the acquired face image of the door opener and the face image stored in the block chain database, finds out the face image with the highest similarity with the face image of the door opener from the block chain database, and obtains a matching analysis processing result;
C) the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, judges whether the matching analysis processing result shows that a door opener has access control authority, and if so, executes the step D); otherwise, executing step E);
D) the image processing control module controls the electromagnetic lock to be unlocked;
E) the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm.
In the face recognition method based on the block chain, the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffe-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm.
In the face recognition method based on the block chain, the block chain database is composed of a plurality of block chain link points, and the block chain nodes are used for storing face images of users with access control authority.
The block chain-based face recognition system and the block chain-based face recognition method have the following beneficial effects that: the intelligent door lock comprises a blockchain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein the blockchain database stores face images of users with access control authority, the face recognition module collects the face images of door openers, encrypts the collected face images by using an encryption algorithm and sends the face images to the image processing control module through the wireless communication module, the wireless communication module is any one or combination of any more of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and the image processing control module is adopted to realize image processing and control functions and provide various wireless communication modes The volume is reduced, and the cost is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a system according to an embodiment of the present invention;
fig. 2 is a flow chart of the method in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the face recognition system and method based on the block chain, the schematic structural diagram of the face recognition system based on the block chain is shown in fig. 1. In fig. 1, the face recognition system based on the block chain comprises a block chain database 1, a face recognition module 2, a wireless communication module 3, an image processing control module 4, an electromagnetic lock 5 and an alarm module 6, wherein the block chain database 1 stores a user face image of the access authority, the face recognition module 2 collects a face image of a door opener, encrypts the collected face image of the door opener by using an encryption algorithm and then sends the encrypted face image to the image processing control module 4 through the wireless communication module 3, the image processing control module 4 performs matching analysis processing on the collected face image of the door opener and the face image stored in the block chain database 1, and sends a corresponding control instruction to the electromagnetic lock 5 and the alarm module 6 according to a matching analysis processing result, if the matching analysis processing result shows that the door opener has the access authority, the image processing control module 4 controls the electromagnetic lock 5 to open, if the matching analysis processing result shows that the door opener does not have the access control authority, the image processing control module 4 sends an alarm instruction to the alarm module, and the alarm module 6 gives an alarm.
It is worth mentioning that in the face recognition system based on the block chain, the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFISH algorithm, ElGamal algorithm, Deffie-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm. The DES algorithm is a data encryption standard, has high speed and is suitable for occasions where a large amount of data is encrypted. The 3DES algorithm is based on DES, and three times of encryption are performed on a block of data by using three different keys, so that the intensity is higher. The RC2 algorithm and the RC4 algorithm encrypt a large amount of data with a variable-length key faster than the DES algorithm. The IDEA algorithm is an international data encryption algorithm, and provides very strong security using a 128-bit key. The RSA algorithm is a public key algorithm supporting variable-length keys, and the length of a file block to be encrypted is also variable. The DSA algorithm is a digital signature algorithm, and is a standard DSS (digital signature standard). The AES algorithm is an advanced encryption standard, is an encryption algorithm standard of the next generation, has high speed and high security level, and one realization of the current AES standard is the Rijndael algorithm. The BLOWFSH algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high. The MD5 algorithm generally gives MD5 values under more formal and strict websites, such as a safety-focused software tool, each with MD 5.
The wireless communication module 3 is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase the flexibility of wireless communication mode, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires the communication quality to be higher. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The face recognition system based on the block chain has various data transmission modes and can meet the requirement of a user on data transmission diversity.
In addition, the image processing control module 4 integrates the processor and the controller in the prior art, and the functions which can be completed by two devices originally are needed.
The block chain database 1 is composed of a plurality of block chain link points, and the block chain link points are used for storing user face images of access control authorities. The block chain database 1 is used for storing the face image of the user, so that the risk of failure of the whole system caused by hanging or attacking of one node is avoided, and the safety level of the face recognition system based on the block chain is improved.
Fig. 2 is a flowchart of a face recognition method based on a block chain in this embodiment, and in fig. 2, the face recognition method based on a block chain is applied to the face recognition system based on a block chain in this embodiment, and the face recognition method based on a block chain includes the following steps:
step S01, the face recognition module collects the face image of the person who opens the door, and the collected face image of the person who opens the door is encrypted by an encryption algorithm and then is sent to the image processing control module through the wireless communication module: in the step, the face recognition module collects the face image of the person who opens the door, encrypts the collected face image of the person who opens the door by using an encryption algorithm and then sends the encrypted face image to the image processing control module through the wireless communication module. The encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffie-Hellman algorithm, novel elliptic curve algorithm or MD5 algorithm. The DES algorithm is a data encryption standard, has high speed and is suitable for occasions where a large amount of data is encrypted. The 3DES algorithm is based on DES, and three times of encryption are performed on a block of data by using three different keys, so that the intensity is higher. The RC2 algorithm and the RC4 algorithm encrypt a large amount of data with a variable-length key faster than the DES algorithm. The IDEA algorithm is an international data encryption algorithm, and provides very strong security using a 128-bit key. The RSA algorithm is a public key algorithm supporting variable-length keys, and the length of a file block to be encrypted is also variable. The DSA algorithm is a digital signature algorithm, and is a standard DSS (digital signature standard). The AES algorithm is an advanced encryption standard, is an encryption algorithm standard of the next generation, has high speed and high security level, and one realization of the current AES standard is the Rijndael algorithm. The BLOWFSH algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high. The MD5 algorithm generally gives MD5 values under more formal and strict websites, such as a safety-focused software tool, each with MD 5.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase the flexibility of wireless communication mode, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires the communication quality to be higher. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The face recognition method based on the block chain has various data transmission modes and can meet the requirement of a user on data transmission diversity.
Step S02, the image processing control module performs matching analysis processing on the acquired face image of the person who opens the door and the face images stored in the blockchain database, finds out the face image with the highest similarity to the face image of the person who opens the door from the blockchain database, and obtains a matching analysis processing result: in this step, the image processing control module performs matching analysis processing on the acquired face image of the person who opens the door and the face image stored in the block chain database, and finds out the face image with the highest similarity to the face image of the person who opens the door from the block chain database, so as to obtain a matching analysis processing result.
Step S03, the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, and judges whether the matching analysis processing result shows that the door opener has the access right: in this step, the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, and simultaneously judges whether the matching analysis processing result shows that the door opener has the access right, if so, the step S04 is executed; otherwise, step S05 is executed.
Step S04 the image processing control module controls the electromagnetic lock to open: if the judgment result of the above step S03 is yes, the present step is executed. In this step, the image processing control module controls the electromagnetic lock to be opened.
Step S05, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm: if the judgment result of the above step S03 is no, the present step is executed. In this step, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm.
In short, in this embodiment, the blockchain database 1, the face recognition module 2, the wireless communication module 3, the image processing control module 4, the electromagnetic lock 5 and the alarm module 6 are provided, the blockchain database 1 stores face images of users with access control authority, the face recognition module 2 collects face images of door openers, encrypts the collected face images by using an encryption algorithm and sends the encrypted face images to the image processing control module 4 through the wireless communication module 3, the wireless communication module 3 is any one or a combination of any two of a 5G communication module, a 4G communication module, a bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and the image processing control module is used for realizing image processing and control functions, so as to provide multiple wireless communication modes The requirement of a user on diversified data transmission modes can be met, the size is reduced, and the cost is reduced.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A face recognition system based on a block chain is characterized by comprising a block chain database, a face recognition module, a wireless communication module, an image processing control module, an electromagnetic lock and an alarm module, wherein the block chain database stores face images of users with access control authority, the face recognition module collects the face images of door openers and transmits the collected face images of the door openers to the image processing control module through the wireless communication module after being encrypted by an encryption algorithm, the image processing control module performs matching analysis processing on the collected face images of the door openers and the face images stored in the block chain database, sends corresponding control instructions to the electromagnetic lock and the alarm module according to matching analysis processing results, and displays that the door openers have the access control authority if the matching analysis processing results, the image processing control module controls the electromagnetic lock to be opened, and if the matching analysis processing result shows that a door opener does not have access control authority, the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
2. The blockchain-based face recognition system of claim 1, wherein the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFISH algorithm, ElGamal algorithm, Deffie-Hellman algorithm, new elliptic curve algorithm, or MD5 algorithm.
3. The system according to claim 2, wherein the blockchain database comprises a plurality of blockchain nodes, and the blockchain nodes are used for storing the face images of the users with access control authority.
4. A face recognition method based on block chain, which is applied to the face recognition system based on block chain as claimed in claim 1, and comprises the following steps:
A) the face recognition module collects face images of door openers, encrypts the collected face images of the door openers by using an encryption algorithm and then sends the face images to the image processing control module through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module.
B) The image processing control module carries out matching analysis processing on the acquired face image of the door opener and the face image stored in the block chain database, finds out the face image with the highest similarity with the face image of the door opener from the block chain database, and obtains a matching analysis processing result;
C) the image processing control module sends corresponding control instructions to the electromagnetic lock and the alarm module according to the matching analysis processing result, judges whether the matching analysis processing result shows that a door opener has access control authority, and if so, executes the step D); otherwise, executing step E);
D) the image processing control module controls the electromagnetic lock to be unlocked;
E) the image processing control module sends an alarm instruction to the alarm module, and the alarm module gives an alarm.
5. The blockchain-based face recognition method according to claim 4, wherein the encryption algorithm is DES algorithm, 3DES algorithm, RC2 algorithm, RC4 algorithm, IDEA algorithm, RSA algorithm, DSA algorithm, AES algorithm, BLOWFFISH algorithm, ElGamal algorithm, Deffe-Hellman algorithm, new elliptic curve algorithm, or MD5 algorithm.
6. The blockchain-based face recognition method according to claim 5, wherein the blockchain database is composed of a plurality of blockchain link points, and the blockchain nodes are used for storing face images of users with access control authority.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010372379.4A CN111554026A (en) | 2020-05-06 | 2020-05-06 | Face recognition system and method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010372379.4A CN111554026A (en) | 2020-05-06 | 2020-05-06 | Face recognition system and method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111554026A true CN111554026A (en) | 2020-08-18 |
Family
ID=72000445
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010372379.4A Withdrawn CN111554026A (en) | 2020-05-06 | 2020-05-06 | Face recognition system and method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111554026A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116597552A (en) * | 2023-07-19 | 2023-08-15 | 青岛大数华创科技有限公司 | Face recognition authorization management system for biological sample warehouse-in and warehouse-out |
-
2020
- 2020-05-06 CN CN202010372379.4A patent/CN111554026A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116597552A (en) * | 2023-07-19 | 2023-08-15 | 青岛大数华创科技有限公司 | Face recognition authorization management system for biological sample warehouse-in and warehouse-out |
CN116597552B (en) * | 2023-07-19 | 2023-09-22 | 青岛大数华创科技有限公司 | Face recognition authorization management system for biological sample warehouse-in and warehouse-out |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105257145B (en) | Remote safe deposit box | |
CN108171831B (en) | Bidirectional security authentication method based on NFC mobile phone and intelligent lock | |
US11201886B2 (en) | Security detection method, device, and apparatus | |
CN109905235A (en) | A kind of smart lock unlocking method, smart lock, terminal, server and system | |
Wang et al. | NOTSA: Novel OBU with three-level security architecture for internet of vehicles | |
CN104282058B (en) | The method for unlocking of the safety intelligent lock system of band video monitoring based on bluetooth | |
CN104299300B (en) | The unblanking and close locking method of safety intelligent lock system based on NFC | |
CN104113839A (en) | Mobile data safety protection system and method based on SDN | |
CN106846573B (en) | The method of opening electronic lock and corresponding electronic lock in no linking Internet | |
CN114448727B (en) | Information processing method and system based on industrial internet identification analysis system | |
CN108881327A (en) | A kind of computer internet information safety control system based on cloud computing | |
CN107067516A (en) | Method for unlocking and system and door-locking system | |
CN104052817A (en) | Intelligent door and intelligent door control method and system | |
CN103136830A (en) | Communication-free hopping code generation method of access control system | |
CN108932771A (en) | A kind of long-range temporary Authorization, method for unlocking and system | |
CN116760740A (en) | Intelligent embedded monitoring system in Internet of things equipment | |
CN112165693B (en) | Safe and efficient privacy protection data fusion method | |
CN111554026A (en) | Face recognition system and method based on block chain | |
CN112491908A (en) | Security certification management system based on block chain big data | |
Hurst et al. | Behavioural observation for critical infrastructure security support | |
CN116684875A (en) | Communication security authentication method for electric power 5G network slice | |
CN116665352A (en) | Access control method and system | |
CN108449317B (en) | Access control system for security verification based on SGX and homomorphic encryption and implementation method thereof | |
CN116346423A (en) | Client data multiple encryption system and method in intelligent Internet of things energy system | |
JP7410313B2 (en) | Methods for cryptographically protecting communication devices and communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200818 |