CN111815842A - Health information uplink method and device, storage medium and electronic device - Google Patents

Health information uplink method and device, storage medium and electronic device Download PDF

Info

Publication number
CN111815842A
CN111815842A CN202010623236.6A CN202010623236A CN111815842A CN 111815842 A CN111815842 A CN 111815842A CN 202010623236 A CN202010623236 A CN 202010623236A CN 111815842 A CN111815842 A CN 111815842A
Authority
CN
China
Prior art keywords
target
target object
key
information
health information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010623236.6A
Other languages
Chinese (zh)
Inventor
苟喜霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Beijing Haiyi Tongzhan Information Technology Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Beijing Haiyi Tongzhan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd, Beijing Haiyi Tongzhan Information Technology Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202010623236.6A priority Critical patent/CN111815842A/en
Publication of CN111815842A publication Critical patent/CN111815842A/en
Priority to PCT/CN2021/101792 priority patent/WO2022001778A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01JMEASUREMENT OF INTENSITY, VELOCITY, SPECTRAL CONTENT, POLARISATION, PHASE OR PULSE CHARACTERISTICS OF INFRARED, VISIBLE OR ULTRAVIOLET LIGHT; COLORIMETRY; RADIATION PYROMETRY
    • G01J5/00Radiation pyrometry, e.g. infrared or optical thermometry
    • G01J5/0022Radiation pyrometry, e.g. infrared or optical thermometry for sensing the radiation of moving bodies
    • G01J5/0025Living bodies
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/60ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Public Health (AREA)
  • Biomedical Technology (AREA)
  • Primary Health Care (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Epidemiology (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Human Computer Interaction (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The application discloses a health information uplink method and device, a storage medium and an electronic device. Wherein, the method comprises the following steps: performing identity verification on a target object by using a first biological characteristic, wherein the first biological characteristic is acquired by acquiring the target object, and the target object is an object to be obtained with health information; acquiring health information of a target object under the condition that the target object passes identity authentication; the health information of the target object is linked into the blockchain. The method and the device solve the technical problem that the accuracy of the recorded health information is low in the related technology.

Description

Health information uplink method and device, storage medium and electronic device
Technical Field
The present application relates to the field of block chaining, and in particular, to a health information uplink method and apparatus, a storage medium, and an electronic apparatus.
Background
When an epidemic situation of an infectious disease occurs, in order to control the development of the epidemic situation, health detection needs to be carried out at a position with concentrated population, the current detection system manually scans an object to be detected by using a body temperature gun, and the scanning speed of the body temperature scanning gun is slow, so that the detection efficiency is very slow. The body temperature checking of the detection personnel every day needs to spend a lot of time and energy, and the screened personnel often need to queue due to low detection efficiency, so that aggregation is easily caused, thereby increasing the infection risk, in particular to the community access, the subway access, the company access in peak hours on duty and the access of various public occasions.
In addition, when the body temperature is recorded, the health information such as the body temperature of the detected person is recorded manually, and the recorded health information is easy to make mistakes due to writing errors, missing filling, wrong filling and the like in the recording process.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The application provides a health information uplink method and device, a storage medium and an electronic device, which are used for at least solving the technical problem of low accuracy of health information recorded in the related art.
According to an aspect of the present application, there is provided a method for uplink of health information, including: performing identity verification on a target object by using a first biological characteristic, wherein the first biological characteristic is acquired from the target object; acquiring health information of a target object under the condition that the target object passes identity authentication; the health information of the target object is linked into the blockchain.
According to another aspect of the present application, there is also provided a health information uplink apparatus, including: the verification unit is used for verifying the identity of the target object by utilizing a first biological characteristic, wherein the first biological characteristic is acquired by acquiring the target object; the acquisition unit is used for acquiring the health information of the target object under the condition that the target object passes identity authentication; a uplink unit for uplink the health information of the target object into the block chain.
According to another aspect of the present application, there is also provided a storage medium comprising a stored program which when executed performs the method described above.
According to another aspect of the present application, there is also provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the above method by the computer program.
In the application, the first biological characteristic is utilized to perform identity verification on the target object, the terminal acquires the health information of the target object under the condition that the target object passes through the identity verification, the acquired health information can be matched with an actual acquired object of the health information, the terminal directly links the health information of the target object to a block chain after the acquisition is completed, the health information is not required to be recorded manually, the technical problem that the accuracy of the recorded health information in the related technology is low can be solved, and the situations of miswriting, missing filling, wrong position filling and the like caused by manual recording are avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a diagram illustrating a hardware environment of a health information uplink method according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating an alternative method for uplink of health information according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative blockchain system according to embodiments of the present application;
FIG. 4 is a schematic diagram of an alternative equipment module according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an alternative detection scheme according to an embodiment of the present application;
FIG. 6 is a flowchart illustrating an alternative method for uplink of health information according to an embodiment of the present application;
FIG. 7 is a flowchart illustrating an alternative method for uplink of health information according to an embodiment of the present application;
FIG. 8 is a diagram illustrating an alternative health information uplink apparatus according to an embodiment of the present application; and the number of the first and second groups,
fig. 9 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiments of the present application, an embodiment of a method for uplink of health information is provided.
Optionally, in this embodiment, the uplink method of health information may be applied to a terminal in a hardware environment including a plurality of terminals as shown in fig. 1. As shown in fig. 1, the terminals are connected to each other through a network, and the terminals are not limited to PCs, mobile phones, tablet computers, and the like.
The uplink method for health information according to the embodiment of the present application may be performed by a terminal, and the terminal may perform the uplink method for health information according to the embodiment of the present application, or may perform the uplink method for health information according to the embodiment of the present application by a ue installed thereon. Fig. 2 is a flowchart of an optional uplink method for health information according to an embodiment of the present application, and as shown in fig. 2, the method may include the following steps:
step S101, the terminal carries out identity verification on a target object by utilizing a first biological characteristic, wherein the first biological characteristic is acquired by the target object.
The target object is an object to be obtained with health information, the biological characteristics are inherent physiological characteristics (such as fingerprints, irises, facial features, DNA and the like) or behavior characteristics (such as gait, keystroke habits and the like) of a human body, and the terminal of the application can carry out personal identity authentication through the biological characteristics.
And step S102, under the condition that the target object passes identity authentication, the terminal acquires health information of the target object.
When the terminal collects the health information of the target object, the health information is collected in a non-contact mode, for example, the body temperature of a human body is collected by infrared rays, the eyeball information of the human body is identified by images, and the like.
Step S103, the health information of the target object is linked to the block chain.
Optionally, when the health information of the target object is linked to the blockchain, the health information can be implemented by using BaaS (blockchain as a Service), the BaaS embeds a blockchain frame into the cloud computing platform, and provides a convenient and high-performance blockchain ecological environment and ecological matching Service for developers by using the deployment and management advantages of cloud Service infrastructure, and supports a blockchain open platform for business expansion and operation support of the developers. A set of complete BaaS solution comprises four main contents of equipment access, access control, service monitoring and a block chain platform, and the health information can be uplink through an uplink interface provided by the BaaS.
Through the steps, the first biological characteristic is used for carrying out identity verification on the target object, the terminal acquires the health information of the target object under the condition that the target object passes through the identity verification, the acquired health information can be matched with an actual acquired object of the health information, the terminal directly links the health information of the target object to a block chain after the acquisition is finished without manually recording the health information, the technical problem that the accuracy of the recorded health information in the related technology is low can be solved, and the situations of miswriting, missing filling, wrong position filling and the like caused by manual recording are avoided. The technical solution of the present application is further detailed below with reference to the steps shown in fig. 2.
In the technical solution provided in step S101, the terminal performs identity verification on the target object by using the first biological characteristic.
Optionally, before the identity of the target object is verified by using the first biological characteristic, the integrated terminal is installed in advance, the terminal includes an image acquisition module, and under the condition that the target object is located in an image acquisition area of the acquisition module, image information of the target object is acquired; and extracting the first biological characteristics from the image information by adopting an image identification scheme, such as identifying human facial characteristics, iris characteristics and the like by using an image analysis method.
Optionally, the authenticating the target object by using the first biometric feature comprises steps 1-3:
step 1, receiving target identity information input for a target object, such as an identity card number, a mobile phone and the like, which can uniquely identify a user.
And 2, searching for a second biological characteristic matched with the target identity information.
Specifically, when searching for a second biometric feature matching the target identity information, if the user is a user who has used the blockchain system of the present application, the biometric feature using the target identity information as an identifier can be obtained from the blockchain as the second biometric feature, and the identity information of the uplinked object and the corresponding biometric feature are stored in the blockchain; if the user is the user who uses the blockchain system of the present application for the first time, the relevant biometric information cannot be acquired from the blockchain, that is, if the biometric feature identified by the target identity information is not acquired from the blockchain, the second biometric feature matching the target identity information is searched for from the target system (that is, other systems storing the biometric feature of the user, such as a national identity information query system).
And 3, performing identity verification on the target object by comparing the first biological characteristics with the second biological characteristics.
Determining that the target object passes the identity verification under the condition that the matching degree between the first biological characteristic and the second biological characteristic reaches a target threshold value; and determining that the target object passes the identity verification under the condition that the matching degree between the first biological characteristic and the second biological characteristic does not reach the target threshold value. For example, for a matching algorithm using facial features, the degree of matching between the captured facial features and the acquired facial features is calculated, and considering that there may be slight variations in the face, the target threshold is set to 2%, and if less than 2%, it is considered not to be the same person, otherwise it is considered to be the same person.
In the technical solution provided in step S102, the terminal acquires health information of the target object when the target object passes the authentication.
Optionally, the terminal is further integrated with a module for acquiring health information, such as an infrared module, and acquiring the health information of the target object includes: under the condition that the target object is positioned in an information acquisition area of a module for acquiring health information, the health information of the target object is acquired in a non-contact mode, namely, the temperature is determined by utilizing infrared light emitted by an infrared module and received infrared light, and the temperature is not acquired in a contact mode.
The infrared module consists of an optical system, a photoelectric detector, a signal amplifier, a signal processing part, a temperature output part and the like. The optical system converges the infrared radiation energy of the target in the visual field, the size of the visual field is determined by the optical parts and the position of the thermometer, the infrared energy is focused on the photoelectric detector and converted into corresponding electric signals, and the signals are converted into the temperature value of the target to be measured after passing through the amplifier and the signal processing circuit and being corrected according to the algorithm in the instrument and the target emissivity.
Optionally, the health information includes body temperature information, and after the health information of the target object is collected, the integrated terminal may be installed at an entrance and an exit of an office building, a community, public transportation and other places, and the target object is allowed to pass through when the body temperature information is within a preset range; and in the case that the body temperature information exceeds the preset range, the target object is not allowed to pass.
And under the condition that the body temperature information exceeds the preset range, alarm information can be generated and used for prompting that the body temperature information of the target object exceeds the preset range so as to monitor the health condition of the target object.
In the technical solution provided in step S103, the health information of the target object is linked to the block chain.
Optionally, the linking the health information of the target object to the blockchain comprises steps 1-2:
step 1, a first hash value of target identity information of a target object (for example, a hash value obtained by calculating the target identity information by using a hash algorithm) is obtained, and a second hash value of the target identity information, health information and acquisition time of the target object is obtained.
And 2, sending the key value pair which takes the first hash value as a key word and takes the second hash value as a key value to a network where the block chain is located.
In the above embodiment, when sending the key value pair with the first hash value as the key and the second hash value as the key value to the network where the block chain is located, the key value pair may be sent to the network where the block chain is located by using an intelligent contract; each node in the blockchain saves the key-value pair in a local block, with the node in the blockchain agreeing on the key-value pair.
Optionally, before sending the key value pair with the first hash value as the key and the second hash value as the key value to the network where the blockchain is located, sending a target public key matched with the target private key to the network where the blockchain is located, where one of the target public key and the target private key is used to decrypt data encrypted by the other.
When the key value pair taking the first hash value as the key word and the second hash value as the key value is sent to the network where the block chain is located, the key value pair can be encrypted by using the target private key, and the encrypted key value pair is sent to the network where the block chain is located.
As an alternative example, the following description will take the application of the technical solution of the present application to body temperature detection in epidemic situations as an example.
In the related technology, the body temperature scanning gun is slow in scanning, and data cannot be directly stored in equipment or a system, so that a large amount of value data is lost; in addition, although some devices for automatically identifying the body temperature after scanning codes by using an identity card are used for actual detection, the body temperature needs to be manually input by a tester, and whether the data is changed or not is unknown.
Therefore, the detection systems have the following defects that the problem of low efficiency exists in manual body temperature gun scanning, or identity identification is used, an identity card is needed to be swiped, after the body temperature of a detected person is identified, the image cannot be automatically recorded, the detected person needs to scan the two-dimensional code again for recording, and whether the data is recorded and changed cannot be known.
In order to solve the problems, the scheme combines a block chain technology, an AI image recognition technology and an infrared body temperature detection technology, and provides an epidemic situation detection scheme combining the AI image recognition technology and the block chain technology, wherein in the scheme, the body temperature detection technology and the block chain technology are combined, so that body temperature detection data are credible, reliable and searchable; the AI image recognition technology is used for face recognition, so that the efficiency of personal identity verification is improved; binding the personal identity data and the body temperature data into a block chain, wherein the data can not be tampered and traced; after the abnormal body temperature is detected, the intelligent contract in the node equipment starts an alarm, the fence (gate) is not opened, and the fence (gate) with the normal body temperature is opened, so that the passing efficiency is further improved.
This scheme mainly includes: the method comprises the steps of entering a chain of identity information of a person to be tested, including AI image recognition to obtain facial features, identity information verification and storing into a block chain; a detection flow, including the combination of the detected body temperature of the user and the identity information and storing the combination into a block chain; the system does not enter a detection area for the first time, directly inquires the identity and the body temperature of the last time from the chain, and enters the chain again after updating, so that the frequency of requesting the national citizen identity system interface to acquire data each time is reduced.
As shown in fig. 3, each integrated terminal device is a node in a block chain, where each device has an equal identity and equal effectiveness, participates in consensus, and greatly increases the reliability of data according to the principle of how much a small number of devices are obeyed.
The modules of the integrated terminal device are shown in fig. 4 and comprise modules for infrared body temperature detection, AI face recognition, alarm and the like, the modules of the integrated terminal device are sequentially executed, one module is started after the next function module is used, as shown in fig. 5, after the identity card is swiped, the AI face recognition module is started to perform face recognition, the infrared body temperature detection module is started after the authentication is successful, if the detected identity card is normal, an inlet is automatically opened, and if the identity card is not normal, the alarm module is started.
The overall scheme realized by the application is shown in fig. 6 and 7:
step S201, a tested person swipes an identity card, a card swiping device acquires personal identity information, last data is inquired from a block chain, and if the personal identity information does not exist, a request is sent to carry out identity verification.
Step S202, the national identity information system feeds back personal identity information (identity card number, head portrait and the like) to the integrated equipment terminal.
And step S203, the integrated terminal equipment automatically performs AI face recognition, automatically performs body temperature detection of the infrared equipment, and compares the recognition image characteristics with the head portrait characteristic information returned by the identity system.
And step S204, the integrated terminal equipment calculates the Hash (name + identity card number) and generates the Hash as a key.
And step S205, calculating the Hash (name, identity card number, body temperature and time stamp), and generating the Hash as value.
Step S206, sending the information key and value of the tested personnel to the block chain network for chain loading, wherein the chain loading data can also generate a public key and a private key for encryption.
And step S207, the terminal equipment locally stores the key and the value.
If the person to be detected is not detected for the first time, the identity information is linked as shown in fig. 7:
step S301, it is detected that the user does not enter the detection device area for the first time.
Step S302, after the identity card is brushed, the equipment acquires personal information, and calculates hash (name + identity card number) as key.
Step S303, inquiring and acquiring value from the chain through the personal information key, and decrypting to acquire personal detailed information (name + identity card number + last body temperature + face feature information + last time timestamp).
Step S304, the infrared device automatically detects the body temperature (within a certain distance range, depending on the specific device).
In step S305, whether the temperature is within the normal range (abnormal if exceeding 37.5, normal if less than), if yes, step S306 is executed, otherwise, step S310 is executed.
And S306, the intelligent contract encrypts the new body temperature instead of the old body temperature, updates the time stamp and obtains common identification of each node of the key and value evidence data sending part.
In step S307, the block chain is stored after the consensus is passed.
And step S308, the integrated equipment automatically opens a gate.
And step S309, the detected person passes through.
Step S310, an alarm is started.
And S311, the intelligent contract encrypts the new body temperature instead of the old body temperature, updates the time stamp and obtains common identification of each node of the key and value evidence data sending part.
In step S312, the block chain is stored after the consensus passes.
And step 313, the integrated equipment does not open a gate and waits for the processing of workers.
The scheme combines the face recognition technology and the infrared body temperature detection technology of the block chain and the AI image recognition, and provides an epidemic situation detection scheme of the AI image recognition and block chain technology, wherein in the scheme: the body temperature detection and the block chain technology are combined, so that the body temperature detection data is credible, reliable and searchable; the AI face recognition and epidemic situation body temperature detection are used, the personal identity verification efficiency is improved, and the authenticity is further improved; binding the personal identity data and the body temperature data into a block chain, wherein the data can not be tampered and traced; when the first detection is not carried out, the identity information is directly obtained from the chain, so that the interface pressure of frequently requesting the national identity information system is reduced; after the abnormal body temperature is detected, the intelligent contract in the node equipment starts an alarm, a fence (gate) is not opened, and a fence (gate) with normal body temperature is opened, so that the passing efficiency is further improved; the intelligent contract of the block chain is used in the detection process, and the automation rate is improved.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
According to another aspect of the present invention, there is also provided a health information uplink apparatus for implementing the health information uplink method. Fig. 8 is a schematic diagram of an optional uplink device for health information according to an embodiment of the present application, as shown in fig. 8, the device may include:
the verification unit 11 is configured to perform identity verification on a target object by using a first biological characteristic, where the first biological characteristic is acquired by collecting the target object, and the target object is an object to be obtained with health information;
the acquisition unit 12 is configured to acquire health information of the target object when the target object passes identity authentication;
a linking unit 13, configured to link the health information of the target object into a block chain.
It should be noted that the verification unit 11 in this embodiment may be configured to execute the step S101 in this embodiment, the acquisition unit 12 in this embodiment may be configured to execute the step S102 in this embodiment, and the uplink unit 13 in this embodiment may be configured to execute the step S103 in this embodiment.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may operate in a hardware environment as shown in fig. 1, and may be implemented by software or hardware.
Through the module, the first biological characteristic is utilized to carry out identity verification on the target object, the terminal acquires the health information of the target object under the condition that the target object passes through the identity verification, the acquired health information can be ensured to be matched with an actual acquired object of the health information, the terminal directly links the health information of the target object to a block chain after the acquisition is completed, the health information is not required to be recorded manually, the technical problem that the accuracy of the recorded health information in the related technology is low can be solved, and the situations of writing errors, filling leakage, wrong position filling and the like caused by manual recording are avoided.
Optionally, the verification unit includes: a receiving module, configured to receive target identity information input for the target object; the searching module is used for searching for a second biological characteristic matched with the target identity information; and the verification module is used for verifying the identity of the target object by comparing the first biological characteristic with the second biological characteristic, wherein the target object is determined to pass the identity verification under the condition that the matching degree between the first biological characteristic and the second biological characteristic reaches a target threshold value.
Optionally, the lookup module is further configured to: acquiring a biological characteristic which takes the target identity information as an identifier from the block chain as the second biological characteristic, wherein the identity information and the corresponding biological characteristic of the uplink object are stored in the block chain; or, when the biological feature identified by the target identity information is not acquired from the blockchain, searching the second biological feature matched with the target identity information from a target system.
The verification unit is further configured to: before identity verification is carried out on a target object by using first biological characteristics, under the condition that the target object is located in an image acquisition area, acquiring image information of the target object; and extracting the first biological feature from the image information by adopting an image recognition scheme.
Optionally, the uplink unit may be further configured to: acquiring a first hash value of target identity information of the target object, and acquiring target identity information, health information and a second hash value of acquisition time of the target object; and sending the key value pair which takes the first hash value as a key word and the second hash value as a key value to a network where the block chain is located.
Optionally, the uplink unit may be further configured to: encrypting the key value pair by using a target private key, and sending the encrypted key value pair to a network where the block chain is located;
optionally, the uplink unit may be further configured to: and before sending the key value pair which takes the first hash value as a key and the second hash value as a key value to the network where the blockchain is located, sending a target public key matched with the target private key to the network where the blockchain is located, wherein one of the target public key and the target private key is used for decrypting data encrypted by the other one.
Optionally, the uplink unit may be further configured to: sending the key-value pairs to a network where the block chain is located by adopting an intelligent contract; wherein each node in the blockchain saves the key-value pair in a local block if the node in the blockchain agrees on the key-value pair.
Optionally, the acquisition unit may be further operable to: and under the condition that the target object is located in an information acquisition area, acquiring health information of the target object in a non-contact mode.
Optionally, the apparatus of the present application may further comprise: the control unit is used for allowing the target object to pass under the condition that the body temperature information is within a preset range after the health information of the target object is collected; and under the condition that the body temperature information exceeds the preset range, the target object is not allowed to pass.
Optionally, the apparatus of the present application may further comprise: and the alarm unit is used for generating alarm information under the condition that the body temperature information exceeds the preset range, wherein the alarm information is used for prompting that the body temperature information of the target object exceeds the preset range.
The scheme combines the face recognition technology and the infrared body temperature detection technology of the block chain and the AI image recognition, and provides an epidemic situation detection scheme of the AI image recognition and block chain technology, wherein in the scheme: the body temperature detection and the block chain technology are combined, so that the body temperature detection data is credible, reliable and searchable; the AI face recognition and epidemic situation body temperature detection are used, the personal identity verification efficiency is improved, and the authenticity is further improved; binding the personal identity data and the body temperature data into a block chain, wherein the data can not be tampered and traced; when the first detection is not carried out, the identity information is directly obtained from the chain, so that the interface pressure of frequently requesting the national identity information system is reduced; after the abnormal body temperature is detected, the intelligent contract in the node equipment starts an alarm, a fence (gate) is not opened, and a fence (gate) with normal body temperature is opened, so that the passing efficiency is further improved; the intelligent contract of the block chain is used in the detection process, and the automation rate is improved.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may be operated in a hardware environment as shown in fig. 1, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to another aspect of the embodiments of the present application, there is also provided a server or a terminal for implementing the uplink method for health information.
Fig. 9 is a block diagram of a terminal according to an embodiment of the present application, and as shown in fig. 9, the terminal may include: one or more processors 21 (only one of which is shown in fig. 9), a memory 22, and a transmission means 23. as shown in fig. 9, the terminal may further include an input-output device 24.
The memory 22 may be used for storing software programs and modules, such as program instructions/modules corresponding to the method and apparatus for uplink transmission of health information in the embodiment of the present application, and the processor 21 executes various functional applications and data processing by running the software programs and modules stored in the memory 22, so as to implement the above-mentioned method for uplink transmission of health information. The memory 22 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 22 may further include memory located remotely from the processor 21, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The above-mentioned transmission means 23 are used for receiving or sending data via a network and may also be used for data transmission between the processor and the memory. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 23 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices so as to communicate with the internet or a local area Network. In one example, the transmission device 23 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Wherein the memory 22 is used for storing, in particular, application programs.
The processor 21 may call the application stored in the memory 22 via the transmission means 23 to perform the following steps:
performing identity verification on a target object by using a first biological characteristic, wherein the first biological characteristic is acquired by acquiring the target object, and the target object is an object to be obtained with health information;
acquiring health information of the target object under the condition that the target object passes identity authentication;
and linking the health information of the target object into a block chain.
The processor 21 is further configured to perform the following steps:
before sending a key value pair which takes the first hash value as a key and the second hash value as a key value to a network where the blockchain is located, sending a target public key matched with the target private key to the network where the blockchain is located, wherein one of the target public key and the target private key is used for decrypting data encrypted by the other one;
and when the key value pair taking the first hash value as a keyword and the second hash value as a key value is sent to the network where the block chain is located, encrypting the key value pair by using a target private key, and sending the encrypted key value pair to the network where the block chain is located.
By adopting the embodiment of the application, the identity of the target object is verified by utilizing the first biological characteristic, and under the condition that the target object passes through the identity verification, the terminal acquires the health information of the target object, the acquired health information can be matched with an actual acquired object of the health information, and the terminal directly links the health information of the target object to the block chain after the acquisition is completed without manually recording the health information, so that the technical problem that the accuracy of the recorded health information in the related technology is low is solved, and the situations of pen error, filling leakage, wrong position filling and the like caused by manual recording are avoided.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
It can be understood by those skilled in the art that the structure shown in fig. 9 is only an illustration, and the terminal may be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, etc. Fig. 9 is a diagram illustrating a structure of the electronic device. For example, the terminal may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 9, or have a different configuration than shown in FIG. 9.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Embodiments of the present application also provide a storage medium. Optionally, in this embodiment, the storage medium may be a program code for executing a uplink method of health information.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
performing identity verification on a target object by using a first biological characteristic, wherein the first biological characteristic is acquired by acquiring the target object, and the target object is an object to be obtained with health information;
acquiring health information of the target object under the condition that the target object passes identity authentication;
and linking the health information of the target object into a block chain.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
before sending a key value pair which takes the first hash value as a key and the second hash value as a key value to a network where the blockchain is located, sending a target public key matched with the target private key to the network where the blockchain is located, wherein one of the target public key and the target private key is used for decrypting data encrypted by the other one;
and when the key value pair taking the first hash value as a keyword and the second hash value as a key value is sent to the network where the block chain is located, encrypting the key value pair by using a target private key, and sending the encrypted key value pair to the network where the block chain is located.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (14)

1. A method for uplink of health information, comprising:
carrying out identity verification on a target object by utilizing a first biological characteristic, wherein the first biological characteristic is acquired from the target object;
acquiring health information of the target object under the condition that the target object passes identity authentication;
and linking the health information of the target object into a block chain.
2. The method of claim 1, wherein authenticating the target subject using the first biometric characteristic comprises:
receiving target identity information input for the target object;
searching a second biological characteristic matched with the target identity information;
authenticating the target object by comparing the first biometric characteristic and the second biometric characteristic, wherein the target object is determined to be authenticated if a degree of match between the first biometric characteristic and the second biometric characteristic reaches a target threshold.
3. The method of claim 2, wherein finding the second biometric that matches the target identity information comprises:
acquiring a biological characteristic which takes the target identity information as an identifier from the block chain as the second biological characteristic, wherein the identity information and the corresponding biological characteristic of the uplink object are stored in the block chain; or the like, or, alternatively,
and under the condition that the biological characteristics taking the target identity information as the identification are not acquired from the block chain, searching the second biological characteristics matched with the target identity information from a target system.
4. The method of claim 1, wherein prior to authenticating the target subject with the first biometric, the method further comprises:
under the condition that the target object is located in an image acquisition area, acquiring image information of the target object;
and extracting the first biological feature from the image information by adopting an image recognition scheme.
5. The method of claim 1, wherein the chaining the health information of the target object into a blockchain comprises:
acquiring a first hash value of target identity information of the target object, and acquiring target identity information, health information and a second hash value of acquisition time of the target object;
and sending the key value pair which takes the first hash value as a key word and the second hash value as a key value to a network where the block chain is located.
6. The method of claim 5,
sending the key value pair with the first hash value as a key and the second hash value as a key to the network where the block chain is located includes: encrypting the key value pair by using a target private key, and sending the encrypted key value pair to a network where the block chain is located;
before sending the key-value pair with the first hash value as a key and the second hash value as a key to the network where the blockchain is located, the method further includes: and sending a target public key matched with the target private key to a network where the blockchain is located, wherein one of the target public key and the target private key is used for decrypting data encrypted by the other one.
7. The method of claim 5, wherein sending the key-value pair keyed by the first hash value and the second hash value to the network where the blockchain resides comprises:
sending the key-value pairs to a network where the block chain is located by adopting an intelligent contract;
wherein each node in the blockchain saves the key-value pair in a local block if the node in the blockchain agrees on the key-value pair.
8. The method of claim 1, wherein acquiring health information of the target subject comprises:
and under the condition that the target object is located in an information acquisition area, acquiring health information of the target object in a non-contact mode.
9. The method of any one of claims 1 to 8, wherein the health information comprises body temperature information, wherein after acquiring the health information of the target subject, the method further comprises:
allowing the target object to pass if the body temperature information is within a preset range;
and under the condition that the body temperature information exceeds the preset range, the target object is not allowed to pass.
10. An apparatus for uplink of health information, comprising:
the verification unit is used for verifying the identity of a target object by utilizing a first biological characteristic, wherein the first biological characteristic is acquired by collecting the target object;
the acquisition unit is used for acquiring the health information of the target object under the condition that the target object passes identity authentication;
a uplink unit, configured to uplink the health information of the target object into a block chain.
11. The apparatus of claim 10, wherein the authentication unit comprises:
a receiving module, configured to receive target identity information input for the target object;
the searching module is used for searching for a second biological characteristic matched with the target identity information;
and the verification module is used for verifying the identity of the target object by comparing the first biological characteristic with the second biological characteristic, wherein the target object is determined to pass the identity verification under the condition that the matching degree between the first biological characteristic and the second biological characteristic reaches a target threshold value.
12. The apparatus of claim 11, wherein the lookup module is further configured to:
acquiring a biological characteristic which takes the target identity information as an identifier from the block chain as the second biological characteristic, wherein the identity information and the corresponding biological characteristic of the uplink object are stored in the block chain; or the like, or, alternatively,
and under the condition that the biological characteristics taking the target identity information as the identification are not acquired from the block chain, searching the second biological characteristics matched with the target identity information from a target system.
13. A storage medium, characterized in that the storage medium comprises a stored program, wherein the program when executed performs the method of any of the preceding claims 1 to 9.
14. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the method of any of the preceding claims 1 to 9 by means of the computer program.
CN202010623236.6A 2020-06-30 2020-06-30 Health information uplink method and device, storage medium and electronic device Pending CN111815842A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010623236.6A CN111815842A (en) 2020-06-30 2020-06-30 Health information uplink method and device, storage medium and electronic device
PCT/CN2021/101792 WO2022001778A1 (en) 2020-06-30 2021-06-23 Method and device for uploading health information, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010623236.6A CN111815842A (en) 2020-06-30 2020-06-30 Health information uplink method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN111815842A true CN111815842A (en) 2020-10-23

Family

ID=72855961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010623236.6A Pending CN111815842A (en) 2020-06-30 2020-06-30 Health information uplink method and device, storage medium and electronic device

Country Status (2)

Country Link
CN (1) CN111815842A (en)
WO (1) WO2022001778A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112288894A (en) * 2020-12-30 2021-01-29 北京三快在线科技有限公司 Method, device and equipment for displaying entrance ticket information and readable storage medium
CN112597512A (en) * 2020-12-21 2021-04-02 杭州趣链科技有限公司 Temperature data control method and device based on block chain and storage medium
CN113113094A (en) * 2021-03-15 2021-07-13 广州零端科技有限公司 Medical information processing method, system, device and medium based on face recognition
CN113221159A (en) * 2021-04-19 2021-08-06 湖北邮电规划设计有限公司 Epidemic situation reporting system based on block chain
CN113297553A (en) * 2021-04-19 2021-08-24 四川华迪信息技术有限公司 Vital sign data acquisition, management and storage method and system
WO2022001778A1 (en) * 2020-06-30 2022-01-06 京东科技信息技术有限公司 Method and device for uploading health information, storage medium and electronic device
CN114885092A (en) * 2022-03-23 2022-08-09 青岛海尔科技有限公司 Control method and device of image acquisition device, storage medium and electronic device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117421605B (en) * 2023-10-27 2024-04-30 绍兴清研微科技有限公司 Gait recognition method and system based on block chain technology

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971043A (en) * 2014-05-28 2014-08-06 李雪 Identity authentication method and authentication information acquisition method
CN208210017U (en) * 2018-06-14 2018-12-07 诺雪(重庆)科技有限公司 A kind of patient data monitoring device based on block chain and online diagnostic equipment
CN109215792A (en) * 2018-11-07 2019-01-15 佛山市米惠高机器人有限公司 A kind of student health analysis method, analysis system and recording pen based on block chain
CN109584977A (en) * 2018-08-21 2019-04-05 广东博云公共平台网络科技有限公司 A kind of double net cloud health platforms and health data processing method
CN110008715A (en) * 2019-01-31 2019-07-12 阿里巴巴集团控股有限公司 The method and node, storage medium of secret protection are realized in block chain
CN110674531A (en) * 2019-10-11 2020-01-10 腾讯科技(深圳)有限公司 Residence information management method, device, server and medium based on block chain
CN111275866A (en) * 2020-02-20 2020-06-12 佳乐科技有限责任公司 Access control system with body temperature detection function

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10635801B2 (en) * 2017-10-30 2020-04-28 Walmart Apollo, Llc Systems and methods for securing access to storage and retrieval systems
US11907354B2 (en) * 2018-08-09 2024-02-20 Cyberark Software Ltd. Secure authentication
CN111815842A (en) * 2020-06-30 2020-10-23 北京海益同展信息科技有限公司 Health information uplink method and device, storage medium and electronic device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971043A (en) * 2014-05-28 2014-08-06 李雪 Identity authentication method and authentication information acquisition method
CN208210017U (en) * 2018-06-14 2018-12-07 诺雪(重庆)科技有限公司 A kind of patient data monitoring device based on block chain and online diagnostic equipment
CN109584977A (en) * 2018-08-21 2019-04-05 广东博云公共平台网络科技有限公司 A kind of double net cloud health platforms and health data processing method
CN109215792A (en) * 2018-11-07 2019-01-15 佛山市米惠高机器人有限公司 A kind of student health analysis method, analysis system and recording pen based on block chain
CN110008715A (en) * 2019-01-31 2019-07-12 阿里巴巴集团控股有限公司 The method and node, storage medium of secret protection are realized in block chain
CN110674531A (en) * 2019-10-11 2020-01-10 腾讯科技(深圳)有限公司 Residence information management method, device, server and medium based on block chain
CN111275866A (en) * 2020-02-20 2020-06-12 佳乐科技有限责任公司 Access control system with body temperature detection function

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022001778A1 (en) * 2020-06-30 2022-01-06 京东科技信息技术有限公司 Method and device for uploading health information, storage medium and electronic device
CN112597512A (en) * 2020-12-21 2021-04-02 杭州趣链科技有限公司 Temperature data control method and device based on block chain and storage medium
CN112288894A (en) * 2020-12-30 2021-01-29 北京三快在线科技有限公司 Method, device and equipment for displaying entrance ticket information and readable storage medium
CN113113094A (en) * 2021-03-15 2021-07-13 广州零端科技有限公司 Medical information processing method, system, device and medium based on face recognition
CN113221159A (en) * 2021-04-19 2021-08-06 湖北邮电规划设计有限公司 Epidemic situation reporting system based on block chain
CN113297553A (en) * 2021-04-19 2021-08-24 四川华迪信息技术有限公司 Vital sign data acquisition, management and storage method and system
CN114885092A (en) * 2022-03-23 2022-08-09 青岛海尔科技有限公司 Control method and device of image acquisition device, storage medium and electronic device

Also Published As

Publication number Publication date
WO2022001778A1 (en) 2022-01-06

Similar Documents

Publication Publication Date Title
CN111815842A (en) Health information uplink method and device, storage medium and electronic device
TWI707244B (en) Block chain cross-chain authentication method, system, server and readable storage medium
CN108306876B (en) Client identity authentication method, device, computer equipment and storage medium
CN102714591B (en) Proximity based biometric identification systems and methods
US20160246981A1 (en) Data secrecy statistical processing system, server device for presenting statistical processing result, data input device, and program and method therefor
CN108153858B (en) Information pushing method and device, storage medium and computer equipment
CN110099047B (en) Registration information processing method and device, computer equipment and storage medium
JP2012088944A5 (en)
CN110784493B (en) Comprehensive meteorological data acquisition system based on NB-IoT communication
US20160189395A1 (en) Information processing apparatus, recording medium, and information processing method
CN104751105A (en) Fingerprint data verification method, fingerprint data verification device, related equipment and system
JP2023549934A (en) Method and apparatus for user recognition
CN105704133A (en) Method, terminal and server for data synchronism
CN115758398A (en) Access control data processing method and device, access control system and storage medium
CN107294981B (en) Authentication method and equipment
CN114048453A (en) User feature generation method and device, computer equipment and storage medium
CN112016526B (en) Behavior monitoring and analyzing system, method, device and equipment for site activity object
US9735966B2 (en) Secure transmission
US20240163267A1 (en) Data transmission method, internet of things system, electronic device, and storage medium
CN105701392B (en) Information processing method and electronic equipment
CN113132106B (en) User identity recognition system
CN111552949B (en) Encryption method and device for Internet of things equipment and electronic equipment
CN111524000B (en) Identity authentication method and system
CN113555093A (en) Tracking method, system, medium, and electronic device for biological sample detection information
CN112702566A (en) Power line patrol unmanned aerial vehicle communication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Beijing Economic and Technological Development Zone, Beijing 100176

Applicant before: BEIJING HAIYI TONGZHAN INFORMATION TECHNOLOGY Co.,Ltd.

Applicant before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Information Technology Co.,Ltd.

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201023