CN111598570A - Block chain method and system for auditing transaction based on facial recognition - Google Patents

Block chain method and system for auditing transaction based on facial recognition Download PDF

Info

Publication number
CN111598570A
CN111598570A CN202010437008.XA CN202010437008A CN111598570A CN 111598570 A CN111598570 A CN 111598570A CN 202010437008 A CN202010437008 A CN 202010437008A CN 111598570 A CN111598570 A CN 111598570A
Authority
CN
China
Prior art keywords
feature data
abstract
facial feature
facial
transaction node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010437008.XA
Other languages
Chinese (zh)
Inventor
陈议尊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010437008.XA priority Critical patent/CN111598570A/en
Publication of CN111598570A publication Critical patent/CN111598570A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

When the invention is used, an accessor can operate the account of the accessor at any transaction node to carry out transaction, and when the accessor visits a certain transaction node, the acquired facial feature data is used as a reference, and the identity verification of the accessor is carried out by adopting an AR (augmented reality) identification mode, so that the condition that the face does not completely enter the identification range of the transaction node in the identification process to cause unsuccessful identification can be prevented. Inquiring the same or similar facial feature data in a database, decrypting through a digital certificate to obtain a public key of the inquired facial feature data, and decrypting through the public key to obtain a first abstract; comparing the first abstract with the second abstract to obtain whether the facial feature data of the current visitor is consistent with the facial feature data inquired from the database, and if the first abstract is the same as the second abstract, judging that the inquired facial feature data is not tampered.

Description

Block chain method and system for auditing transaction based on facial recognition
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain method and a block chain system based on facial recognition for auditing transactions.
Background
Blockchains can be used for automation tasks and processes not limited to the field of cryptocurrency, and such a solution would enable better cryptographic processing of transactions using the properties of blockchains. The current distribution and transaction in the market are not transparent, and the public credibility in the consumer market is not enough. All publications in the market have a serious centralization phenomenon, and the publications are popularized by respective enterprises or platforms no matter whether credit cards, aviation flights, shopping in shopping malls or online shopping malls in the telecommunication industry. For the consumer, the reliability of the transaction is pending.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a block chain method and a block chain system for auditing transactions based on facial recognition, which can ensure the transaction safety in a transaction link.
The invention provides a blockchain method for auditing transactions based on facial recognition, which is characterized in that facial feature data are prestored in a blockchain, a first abstract obtained by carrying out Hash operation on the facial feature data is prestored, and a digital signature and a digital certificate corresponding to the first abstract are also prestored;
the first abstract, the digital signature and the digital certificate are distributed and packaged and recorded in each transaction node through a block chain;
setting an access control module on each transaction node, wherein the access control module carries out authority management on an accessor accessing the transaction node;
acquiring facial feature data of an accessor, inquiring the same or similar facial feature data in a database, decrypting a digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypting a digital signature attached to the inquired facial feature data into a first abstract by using the public key;
and performing hash operation on the facial feature data of the current visitor to obtain a second abstract, comparing whether the first abstract and the second abstract are equal, and if so, allowing the visitor to access the transaction node.
Further, the method also comprises the following steps:
when the visitor accesses the transaction node, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
Further, the method also comprises the following steps:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting facial features.
A storable computing device comprising a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
The blockchain system for auditing transactions based on facial recognition comprises a blockchain system, wherein facial feature data are prestored in the blockchain system, a first abstract obtained by performing Hash operation on the facial feature data is prestored, and a digital signature and a digital certificate corresponding to the first abstract are also prestored; the first abstract, the digital signature and the digital certificate are distributed and packaged and recorded in each transaction node through a block chain;
setting an access control module on each transaction node module, wherein the access control module carries out authority management on an accessor accessing the transaction node module;
the transaction node module includes a facial recognition module having a facial recognition interface on which the storable computing device builds a facial recognition (AR) framework, the facial recognition module in the mobile transaction node module causing the visitor's face to move into the AR framework before performing facial recognition;
the access control module collects facial feature data of an accessor and sends the facial feature data to the storable computing equipment, the storable computing equipment inquires the same or similar facial feature data in the database, the storable computing equipment decrypts the digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypts the digital signature attached to the inquired facial feature data into a first abstract by using the public key;
the storable computing device performs hash operation on the facial feature data of the current visitor to obtain a second abstract, and compares whether the first abstract and the second abstract are equal; if the two are equal, a permission signal is sent to the access control module, and the access control module permits the visitor to access the transaction node module.
Further, when the visitor accesses the transaction node module, the access control module opens access with different permission levels for users with different permission levels, and the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
Further, the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Further, a MongoDB database is adopted for collecting facial features.
When the invention is used, an accessor can operate the account of the accessor to trade at any trading node, the trading node can be equipment which can carry out trading operation, such as an intelligent terminal, and the like, a plurality of trading nodes can be intelligent terminals arranged at different trading points, the accessor operates the intelligent terminal to trade, and the trading nodes count the trading data.
When a certain transaction node is visited, identity authentication of a visitor is carried out in an AR identification mode when the certain transaction node is visited, the transaction node can be an intelligent terminal with a display, a face identification interface can be displayed on the display interface of the transaction node, for example, a face outline is displayed on the display interface to serve as an AR frame for face identification; then, a module for collecting images in the mobile transaction node terminal, for example, a camera (the camera may correspond to the face recognition module) of the mobile transaction node terminal, so that the face image of the visitor to be accessed is moved into the face contour in the display interface, and then face recognition is performed, and after the face image enters the face contour in the display interface, the face can be ensured to be within the recognition range of the face recognition module, thereby preventing the face from not completely entering the recognition range of the transaction node in the recognition process to cause unsuccessful recognition. The facial image of the mobile visitor can be a man-made mobile camera or a mobile camera moved by an algorithm.
The collected facial feature data are used as a reference, the same or similar facial feature data are inquired in a database, a public key of the inquired facial feature data is obtained through decryption of a digital certificate, and a first abstract is obtained through decryption of the public key;
the second abstract is a Hash operation result of the facial feature data of the visitor to be accessed, whether the facial feature data of the visitor at present are consistent with the facial feature data inquired from the database or not can be known by comparing the first abstract with the second abstract, and the matching accuracy of the facial feature data is ensured by triple encryption of Hash operation, digital signature and digital certificate; and because the hash operation obtains the irreversible characteristic of the abstract, the facial feature data corresponding to the first abstract is prevented from being tampered, and as long as the first abstract is the same as the second abstract, the inquired facial feature data can be judged to be not tampered and is matched with the facial feature data of the visitor who wants to visit at present, so that the transaction security of the visitor is guaranteed, and the security of the facial feature data in the database is guaranteed.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby.
It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
In an embodiment, the invention first provides a blockchain method for auditing transactions based on facial recognition, wherein facial feature data are prestored in a blockchain, a first abstract obtained by performing hash operation on the facial feature data is prestored, and a digital signature and a digital certificate corresponding to the first abstract are also prestored;
the first abstract, the digital signature and the digital certificate are distributed and packaged and recorded in each transaction node through a block chain;
setting an access control module on each transaction node, wherein the access control module carries out authority management on an accessor accessing the transaction node;
starting a face recognition interface of a transaction node, constructing a face recognition (AR) frame on the face recognition interface, and moving a face recognition module in the transaction node to enable the face of a visitor to move into the AR frame and then execute face recognition;
acquiring facial feature data of an accessor, inquiring the same or similar facial feature data in a database, decrypting a digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypting a digital signature attached to the inquired facial feature data into a first abstract by using the public key;
and performing hash operation on the facial feature data of the current visitor to obtain a second abstract, comparing whether the first abstract and the second abstract are equal, and if so, allowing the visitor to access the transaction node.
Uploading the abstract, the digital signature and the digital certificate of the facial feature data to a network;
the visitor can operate his own account at any transaction node to carry out transaction, the transaction node can be, for example, an intelligent terminal and other devices capable of carrying out transaction operation, the transaction nodes can be intelligent terminals arranged at different transaction points, the visitor operates the intelligent terminal to carry out transaction, and the transaction nodes count transaction data.
For the extraction and evidence storage of the facial feature data, the following modes can be adopted: counting transaction data on a plurality of transaction nodes, collecting facial features of visitors during transaction, specifically, collecting facial structured light in a plurality of ways, for example, collecting facial structured light by using a structured light camera;
then constructing a block chain system, packaging the transaction data and the face feature data of all transaction nodes into a block within a preset time period, recording the transaction time, the time for acquiring the face feature data, the hash of the transaction data and the hash of the face feature data into the block head of the current block as a feature value, and calculating the hash of the current block according to the feature value; constructing blocks generated successively into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node to be purely decentralized; therefore, the transaction data and the face characteristic data are purely decentralized, and are prevented from being tampered;
carrying out Hash operation on the facial feature data to obtain a first abstract, carrying out private key encryption on the first abstract obtained by calculation to obtain a digital signature, carrying out private key encryption on a public key corresponding to the private key to obtain a digital certificate, and attaching the digital signature and the digital certificate to the facial feature data and uploading the digital signature and the digital certificate to a network;
when a certain transaction node is visited, identity authentication of a visitor is carried out in an AR identification mode, the transaction node can be an intelligent terminal with a display, a face identification interface can be displayed on a display interface of the transaction node, and for example, a face outline is displayed on the display interface to serve as an AR frame for face identification; then, a module for collecting images in the mobile transaction node terminal, for example, a camera (the camera may correspond to the face recognition module) of the mobile transaction node terminal, so that the face image of the visitor to be accessed is moved into the face contour in the display interface, and then face recognition is performed, and after the face image enters the face contour in the display interface, the face can be ensured to be within the recognition range of the face recognition module, thereby preventing the face from not completely entering the recognition range of the transaction node in the recognition process to cause unsuccessful recognition. Wherein the facial image of the mobile visitor may be a human mobile camera or a camera moved by an algorithm, such as automatic rotation of a mechanical algorithm, to look for the visitor's face.
The non-tampering property of distributed storage based on the block chain, the transaction time, the time for acquiring the facial feature data, the hash of the transaction data and the hash of the facial feature data are added into the block head, and the transaction data and the facial feature data are added into the block body, so that all related data of the transaction data and the facial feature data cannot be tampered.
The collected facial feature data is used as a reference, the same or similar facial feature data is inquired in a database, and the specific inquiry method can be a comparison algorithm based on data similarity, a public key of the inquired facial feature data is obtained through decryption of a digital certificate, and a first abstract is obtained through decryption of the public key;
the second abstract is a Hash operation result of the facial feature data of the visitor to be accessed, whether the facial feature data of the visitor at present are consistent with the facial feature data inquired from the database or not can be known by comparing the first abstract with the second abstract, and the matching accuracy of the facial feature data is ensured by triple encryption of Hash operation, digital signature and digital certificate; and because the hash operation obtains the irreversible characteristic of the abstract, the facial feature data corresponding to the first abstract is prevented from being tampered, and as long as the first abstract is the same as the second abstract, the inquired facial feature data can be judged to be not tampered and is matched with the facial feature data of the visitor who wants to visit at present, so that the transaction security of the visitor is guaranteed, and the security of the facial feature data in the database is guaranteed.
Facial features of the visitor may be collected in a variety of ways, such as by a facial recognition module.
In some embodiments, further comprising the step of: when the visitor accesses the transaction node, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
The facial feature data correspond to the authority level of the visitor, and when the visitor accesses a certain transaction node, the access control module can distinguish the authority level of the visitor by identifying the visitor; after the facial features of the visitor are collected, the staff can mark the corresponding authority level on the facial feature data, and the authority level and the facial feature data are associated by adopting a marking method, wherein the marking method can be a digital signature method for example; uploading the marked facial feature data to an intelligent contract and packaging the intelligent contract into a block; for example, the authority levels can be divided into common users, VIP users and blacklist users, and different access authorities can be set for users with different authority levels. For example: the common user can inquire the self and can carry out transaction; the VIP user can inquire about all persons, but only can carry out own transaction; the blacklisted user cannot access the transaction node.
Specifically, the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by the third party monitoring system to obtain a digital certificate.
Preferably, a MongoDB database is adopted for collecting facial features; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced.
In particular, the access control module may be a verifier of facial features, such as a facial structure light recognizer or the like.
The present invention also contemplates a storable computing device,
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor is adapted to carry out any of the above-mentioned method steps when executing the computer program.
The present invention also provides a blockchain system for auditing transactions based on facial recognition,
the system comprises a blockchain system, wherein facial feature data and a first abstract obtained by performing hash operation on the facial feature data are prestored in the blockchain system, and a digital signature and a digital certificate corresponding to the first abstract are prestored; the first abstract, the digital signature and the digital certificate are distributed and packaged and recorded in each transaction node through a block chain;
setting an access control module on each transaction node module, wherein the access control module carries out authority management on an accessor accessing the transaction node module;
the transaction node module includes a facial recognition module having a facial recognition interface on which the storable computing device builds a facial recognition (AR) framework, the facial recognition module in the mobile transaction node module causing the visitor's face to move into the AR framework before performing facial recognition;
the access control module collects facial feature data of an accessor and sends the facial feature data to the storable computing equipment, the storable computing equipment inquires the same or similar facial feature data in the database, the storable computing equipment decrypts the digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypts the digital signature attached to the inquired facial feature data into a first abstract by using the public key;
the storable computing device performs hash operation on the facial feature data of the current visitor to obtain a second abstract, and compares whether the first abstract and the second abstract are equal; if the two are equal, a permission signal is sent to the access control module, and the access control module permits the visitor to access the transaction node module.
Specifically, the manner of acquiring the facial features and calculating the digital signature and the digital certificate of the facial recognition data may be as follows: the system comprises a plurality of transaction node modules, wherein storable computing equipment is arranged in each transaction node module, the storable computing equipment carries out statistics on transaction data, a biological characteristic acquisition module is arranged in each transaction node module, and the biological characteristic acquisition module acquires facial characteristics of an accessor during transaction and can acquire the facial characteristics in various ways, for example, a structured light camera is used for acquiring facial structured light;
the method comprises the steps that a single or a plurality of storable computing devices pack transaction data and face feature data of all transaction node modules into a block within a preset time period, the transaction time, the time for acquiring the face feature data, the hash of the transaction data and the hash of the face feature data are recorded into the head of the current block to serve as a feature value, the hash of the current block is calculated according to the feature value, and then the sequentially generated blocks are mutually constructed into a block chain; the transaction data and the face characteristic data in the block are downloaded to each transaction node module to be purely decentralized;
the storable computing equipment performs Hash operation on the facial feature data to obtain a first abstract, performs private key encryption on the first abstract obtained through calculation to obtain a digital signature, encrypts a public key corresponding to the private key to obtain a digital certificate, attaches the digital signature and the digital certificate to the facial feature data and uploads the digital signature and the digital certificate to a network together;
and arranging an access control module on each transaction node module, wherein the access control module is used for carrying out authority management on an accessor accessing the transaction node module.
Similarly, an accessor can operate an account of the accessor to perform transaction at any transaction node module, the transaction node module can be equipment capable of performing transaction operation, such as an intelligent terminal, a plurality of transaction node modules can be intelligent terminals arranged at different transaction points, the accessor operates the intelligent terminal to perform transaction, and the transaction node modules count transaction data.
When a certain transaction node module is visited, identity authentication of a visitor is carried out in an AR identification mode, the transaction node module can be an intelligent terminal with a display, a face identification interface can be displayed on a display interface of the intelligent terminal, and for example, a face outline is displayed on the display interface to serve as a face identification AR frame; then, a module for collecting images in the mobile transaction node module terminal, for example, a camera (the camera may correspond to the face recognition module) of the mobile transaction node module terminal, so that the face image of the visitor to be visited is moved into the face contour in the display interface, and then face recognition is performed, and after the face image enters the face contour in the display interface, the face can be ensured to be necessarily in the recognition range of the face recognition module, thereby preventing that the face does not completely enter the recognition range of the transaction node in the recognition process to cause unsuccessful recognition. The facial image of the mobile visitor can be a man-made mobile camera or a mobile camera moved by an algorithm.
The collected facial feature data are used as a reference, the same or similar facial feature data are inquired in a database, a public key of the inquired facial feature data is obtained through decryption of a digital certificate, and a first abstract is obtained through decryption of the public key;
the second abstract is a Hash operation result of the facial feature data of the visitor to be accessed, whether the facial feature data of the visitor at present are consistent with the facial feature data inquired from the database or not can be known by comparing the first abstract with the second abstract, and the matching accuracy of the facial feature data is ensured by triple encryption of Hash operation, digital signature and digital certificate; and because the hash operation obtains the irreversible characteristic of the abstract, the facial feature data corresponding to the first abstract is prevented from being tampered, and as long as the first abstract is the same as the second abstract, the inquired facial feature data can be judged to be not tampered and is matched with the facial feature data of the visitor who wants to visit at present, so that the transaction security of the visitor is guaranteed, and the security of the facial feature data in the database is guaranteed.
Facial features of the visitor may be collected in a variety of ways, such as by a facial recognition module.
When the visitor accesses the transaction node module, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
The facial feature data correspond to the authority level of the visitor, and when the visitor accesses a certain transaction node, the access control module can distinguish the authority level of the visitor by identifying the visitor; after the facial features of the visitor are collected, the staff can mark the corresponding authority level on the facial feature data, and the authority level and the facial feature data are associated by adopting a marking method, wherein the marking method can be a digital signature method for example; uploading the marked facial feature data to an intelligent contract and packaging the intelligent contract into a block; for example, the authority levels can be divided into common users, VIP users and blacklist users, and different access authorities can be set for users with different authority levels. For example: the common user can inquire the self and can carry out transaction; the VIP user can inquire about all persons, but only can carry out own transaction; the blacklisted user cannot access the transaction node.
Similarly, in this embodiment, the transaction node module is interfaced with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate. Collecting facial features by adopting a MongoDB database; compared with other distributed databases, the MongoDB has more storage advantages, and data can be stored in a binary Json format Bson, so that the data storage format is uniform, and the occupied size of the data is reduced. The facial feature data includes facial structured light. The access control module may be a verifier of facial features, such as a facial structure light recognizer or the like.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (9)

1. A blockchain method for auditing transactions based on facial recognition is characterized in that: the method comprises the following steps:
the method comprises the steps that facial feature data are prestored in a block chain, a first abstract obtained by carrying out Hash operation on the facial feature data is prestored, and a digital signature and a digital certificate corresponding to the first abstract are also prestored;
the first abstract, the digital signature and the digital certificate are distributed and packaged and recorded in each transaction node through a block chain;
setting an access control module on each transaction node, wherein the access control module carries out authority management on an accessor accessing the transaction node;
acquiring facial feature data of an accessor, inquiring the same or similar facial feature data in a database, decrypting a digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypting a digital signature attached to the inquired facial feature data into a first abstract by using the public key;
and performing hash operation on the facial feature data of the current visitor to obtain a second abstract, comparing whether the first abstract and the second abstract are equal, and if so, allowing the visitor to access the transaction node.
2. A blockchain method for auditing transactions based on facial recognition according to claim 1, where: further comprising the steps of:
when the visitor accesses the transaction node, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
3. A blockchain method for auditing transactions based on facial recognition according to claim 2, wherein: further comprising the steps of:
and the transaction node is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
4. A blockchain method for auditing transactions based on facial recognition according to claim 3, wherein:
and adopting a MongoDB database to collect facial features.
5. A storable computing device characterized by:
the storable computing device comprises a memory and a processor; the memory is used for storing a computer program; the processor, when executing the computer program, is adapted to carry out the method steps of any of claims 1-4.
6. A blockchain system for auditing transactions based on facial recognition, comprising:
the system comprises a blockchain system, wherein facial feature data and a first abstract obtained by performing hash operation on the facial feature data are prestored in the blockchain system, and a digital signature and a digital certificate corresponding to the first abstract are prestored; the first abstract, the digital signature and the digital certificate are distributed and packaged and recorded in each transaction node through a block chain;
setting an access control module on each transaction node module, wherein the access control module carries out authority management on an accessor accessing the transaction node module;
the transaction node module includes a facial recognition module having a facial recognition interface on which the storable computing device builds a facial recognition (AR) framework, the facial recognition module in the mobile transaction node module causing the visitor's face to move into the AR framework before performing facial recognition;
the access control module collects facial feature data of an accessor and sends the facial feature data to the storable computing equipment, the storable computing equipment inquires the same or similar facial feature data in the database, the storable computing equipment decrypts the digital certificate attached to the inquired facial feature data to obtain a corresponding public key, and decrypts the digital signature attached to the inquired facial feature data into a first abstract by using the public key;
the storable computing device performs hash operation on the facial feature data of the current visitor to obtain a second abstract, and compares whether the first abstract and the second abstract are equal; if the two are equal, a permission signal is sent to the access control module, and the access control module permits the visitor to access the transaction node module.
7. A blockchain system for auditing transactions based on facial recognition according to claim 6, where:
when the visitor accesses the transaction node module, the access control module opens access of different permission levels for users of different levels, wherein the permission levels are associated with the facial feature data; the permission levels include normal users, VIP users, and blacklist users.
8. A blockchain system for auditing transactions based on facial recognition according to claim 7 wherein:
and the transaction node module is in butt joint with a third party monitoring system, and a public key corresponding to the private key is encrypted by using the third party monitoring system to obtain a digital certificate.
9. A blockchain system for auditing transactions based on facial recognition according to claim 8, where:
and adopting a MongoDB database to collect facial features.
CN202010437008.XA 2020-05-21 2020-05-21 Block chain method and system for auditing transaction based on facial recognition Withdrawn CN111598570A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010437008.XA CN111598570A (en) 2020-05-21 2020-05-21 Block chain method and system for auditing transaction based on facial recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010437008.XA CN111598570A (en) 2020-05-21 2020-05-21 Block chain method and system for auditing transaction based on facial recognition

Publications (1)

Publication Number Publication Date
CN111598570A true CN111598570A (en) 2020-08-28

Family

ID=72183963

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010437008.XA Withdrawn CN111598570A (en) 2020-05-21 2020-05-21 Block chain method and system for auditing transaction based on facial recognition

Country Status (1)

Country Link
CN (1) CN111598570A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113191902A (en) * 2021-05-24 2021-07-30 中国工商银行股份有限公司 Transaction processing method and device based on block chain, electronic equipment and medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113191902A (en) * 2021-05-24 2021-07-30 中国工商银行股份有限公司 Transaction processing method and device based on block chain, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN108134791A (en) A kind of data center's total management system login validation method
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
CN111553689A (en) Matching correlation method and system based on quadratic hash
JP2022512202A (en) Trust token for resource access
CN115758398B (en) Access control data processing method and device, access control system and storage medium
CN112686351A (en) Channel risk control method and device
US11374933B2 (en) Securing digital data transmission in a communication network
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
CN111598570A (en) Block chain method and system for auditing transaction based on facial recognition
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN112329004A (en) Method and device for face recognition and face password
CN111553694A (en) Distributed storage block chain method and system
CN106710033B (en) Entrance guard opening method and device
CN111553693A (en) Associated certificate storage method and system based on secondary hash
CN111553691A (en) Pure decentralized block chain method and system
CN115982687A (en) User identity verification system for data operation and maintenance management platform
CN111553690A (en) Block chain system supporting multipoint transaction
US20200082397A1 (en) System and method for iot device authentication and secure transaction authorization
CN104580262A (en) Safety method applicable to wireless internet of things
CN113132106B (en) User identity recognition system
CN111553692A (en) Access data encryption processing method and system for block chain
CN112417424A (en) Authentication method and system for power terminal
CN112183959A (en) Safety control terminal, server and system for standard evaluation base
CN112863652A (en) Medical image data storage system
JPH05290149A (en) System and device for fingerprint collation and certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200828

WW01 Invention patent application withdrawn after publication