CN112543241B - Construction site safety image data mining method by using block chain - Google Patents
Construction site safety image data mining method by using block chain Download PDFInfo
- Publication number
- CN112543241B CN112543241B CN202011140425.4A CN202011140425A CN112543241B CN 112543241 B CN112543241 B CN 112543241B CN 202011140425 A CN202011140425 A CN 202011140425A CN 112543241 B CN112543241 B CN 112543241B
- Authority
- CN
- China
- Prior art keywords
- haf
- int
- image
- face image
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/0202—Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
- H04M1/026—Details of the structure or mounting of specific components
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S19/00—Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
- G01S19/38—Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
- G01S19/39—Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
- G01S19/42—Determining position
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/0202—Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
- H04M1/026—Details of the structure or mounting of specific components
- H04M1/0264—Details of the structure or mounting of specific components for a camera module assembly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/18—Telephone sets specially adapted for use in ships, mines, or other places exposed to adverse environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/22—Details of telephonic subscriber devices including a touch pad, a touch sensor or a touch detector
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention provides a building site safety image data mining system by using a blockchain, which comprises a handheld mobile intelligent terminal, wherein the handheld mobile intelligent terminal comprises a front camera shooting data end of a controller and a camera shooting data end of a front camera driving sub-module, the camera shooting connecting end of the front camera driving sub-module is connected with a front camera shooting connecting socket, a rear camera shooting data end of the controller is connected with the camera shooting data end of a rear camera driving sub-module, the camera shooting connecting end of the rear camera driving sub-module is connected with a rear camera shooting connecting socket, a touch display data end of the controller is connected with a touch display data end of a touch display screen driving module, and a data wireless receiving and transmitting end of the controller is connected with a data receiving and transmitting end of a wireless receiving and transmitting module; the intelligent terminal is used for unlocking the handheld mobile intelligent terminal, and determining whether a target person walking on the construction site is a construction worker or not. The invention can prevent the hand-held mobile intelligent terminal from being stolen and unlocked and is used for verifying whether construction workers are or not.
Description
Technical Field
The invention relates to the technical field of construction sites, in particular to a method for mining safety image data of a construction site by using a block chain.
Background
Building site (construction site), guangdong language building floor, construction floor, simply referred to as floor, is a developing building project and is a site for civil engineering, and the scope of the building site is usually enclosed by coamings, wire meshes or enclosing walls, so that personnel, materials, machinery and vehicles are restricted from entering and exiting. Patent application number 2018111432007, entitled "identification and monitoring system for construction site excavator", discloses a system including a monitoring terminal installed at a site where excavation of an excavator is prohibited, and a server and a user terminal used by a worker in communication with the monitoring terminal; the monitoring terminal comprises: the image acquisition module is used for acquiring surrounding image information in real time and sending the surrounding image information to the image recognition module; the image identification module is used for identifying whether the excavator is included in the image information; and the communication module is used for sending the image information to the server when the image recognition module recognizes that the image information comprises the excavator, and sending alarm information to the user terminal after the server receives the image information. The system can more timely prevent the illegal behavior of the excavator.
Disclosure of Invention
The invention aims at least solving the technical problems in the prior art, and particularly creatively provides a method for mining safety image data of a construction site by using a block chain.
In order to achieve the above object, the present invention provides a construction site safety image data mining system using a blockchain, comprising a handheld mobile intelligent terminal, wherein the handheld mobile intelligent terminal comprises a housing, the housing comprises a front housing and a rear housing, a touch display screen mounting seat for fixedly mounting a touch display screen is arranged on the front housing, a front camera mounting seat for fixedly mounting a front camera is arranged on the front housing, a rear camera mounting seat for fixedly mounting a rear camera is arranged on the rear housing, and a PCB board mounting seat for fixedly mounting a PCB board is arranged in the housing; a touch display screen is fixedly arranged on a touch display screen mounting seat, a front camera is fixedly arranged on a front camera mounting seat, a rear camera is fixedly arranged on a rear camera mounting seat, and a PCB board is fixedly arranged on a PCB board mounting seat;
the PCB is provided with a controller, a camera driving module, a touch display screen driving module, a wireless transceiver module and a voice module; the camera driving module comprises a front camera driving sub-module and a rear camera driving sub-module; the voice module comprises a microphone sub-module and a loudspeaker sub-module;
The front camera shooting data end of the controller is connected with the camera shooting data end of the front camera shooting driving sub-module, the camera shooting connecting end of the front camera shooting driving sub-module is connected with the front camera shooting connecting socket, the rear camera shooting data end of the controller is connected with the camera shooting data end of the rear camera shooting driving sub-module, the camera shooting connecting end of the rear camera shooting driving sub-module is connected with the rear camera shooting connecting socket, the touch display data end of the controller is connected with the touch display data end of the touch display screen driving module, and the data wireless receiving and transmitting end of the controller is connected with the data receiving and transmitting end of the wireless receiving and transmitting module; the voice data output end of the microphone sub-module is connected with the voice data input end of the controller, and the voice data input end of the speaker sub-module is connected with the voice data output end of the controller;
the camera data end of the front camera is connected with the front camera connecting socket, the camera data end of the rear camera is connected with the rear camera connecting socket, and the touch display data end of the touch display screen is connected with the touch display connecting socket;
the intelligent terminal is used for unlocking the handheld mobile intelligent terminal, and determining whether a target person walking on the construction site is a construction worker or not.
In a preferred embodiment of the invention, a fingerprint identification module is arranged on the touch display screen, and a fingerprint data output end of the fingerprint identification module is connected with a fingerprint data input end of the controller;
or/and still including setting up the certificate response module that is used for the response certificate that the response extraneous personnel wore on the PCB board, the response data output of certificate response module links to each other with the response data input of controller.
In a preferred embodiment of the invention, a GPS module is further arranged on the PCB, and the position data output end of the GPS module is connected with the position data input end of the controller, so that the hand-held mobile intelligent terminal is prevented from being lost and is convenient to find.
The invention also discloses a mining method of the construction site safety image data mining system by using the block chain, which comprises the following steps:
s1, unlocking a handheld mobile intelligent terminal;
s2, judging the collected target characters in the building site area:
if the collected target person in the construction site area is a construction site constructor, judging the next target person;
if the collected target person in the construction site area is not a construction site constructor, recording a face head image of the target person, and judging the next target person.
In a preferred embodiment of the present invention, the following steps are included in step S1:
s11, the controller judges whether the controller receives a trigger signal sent by the fingerprint module or not:
if the controller receives the trigger signal sent by the fingerprint module, the controller controls the fingerprint data acquired by the fingerprint module to execute the next step;
if the controller does not receive the trigger signal sent by the fingerprint module, the controller continues to wait for the trigger signal sent by the fingerprint module;
s12, encrypting the received fingerprint data, wherein the encryption method comprises the following steps:
HaF(fingerpr int)=Hash Function(fingerpr int),
wherein HaF (fingerpr int) represents a first result of encrypting the received fingerprint data;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
HaF′(fingerpr int)=Hash Function(fingerpr int⊙T 1 ),
wherein HaF' (finger int) represents a second result of the received fingerprint data after the encryption process;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
T 1 representing a current first time when the controller processes;
the ";
s13, sending the encrypted result to the cloud platform for verification:
if the verification is successful, the unlocking of the handheld mobile intelligent terminal is successful;
And if the verification fails, locking the handheld mobile intelligent terminal.
In a preferred embodiment of the present invention, step S10 is included before step S11, and cloud platform fingerprint input processing is performed on staff on a construction site, where the specific steps include the following steps:
s101, sequentially numbering the acquired fingerprint data, wherein the fingerprint data are respectively and sequentially 1 st staff fingerprint data, 2 nd staff fingerprint data, 3 rd staff fingerprint data, … … and M th staff fingerprint data, and M is a positive integer greater than or equal to 1;
s102, carrying out encryption processing on fingerprint data of an mth staff, wherein M is a positive integer less than or equal to M; the encryption processing method comprises the following steps:
HaF(fingerpr int m )=Hash Function(fingerpr int m ),
wherein HaF (finger int m ) Representing a storage result of the fingerprint data of the mth staff after encryption processing;
hash Function () represents a Hash Function operation;
fingerpr int m fingerprint data representing an mth worker;
and S103, storing the encrypted storage result in the cloud platform after corresponding to the data before encryption.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, the cloud platform receives the first result HaF (fingerpr int), the second result HaF' (finger int) and the current first time T 1 The following operations are performed:
s132, querying the same stored result as the first result HaF (fingerpr int) according to the first result HaF (fingerpr int):
if the same storage result as the first result HaF (fingerpr int) exists, performing the next step;
if the same storage result as the first result HaF (fingerpr int) does not exist, the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S133,HaF′(fingerpr int′)=Hash Function(fingerpr int′⊙T 1 ′),
wherein HaF '(finger int') represents the verification result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
T 1 ' represent the current receivedTime T 1 ;
The ";
s134, determining whether the verification result HaF ' (finger int ') and the second result HaF ' (finger int) are consistent:
if the verification result HaF ' (finger pr int ') is consistent with the second result HaF ' (finger pr int), the verification is successful; executing the next step;
if the verification result HaF ' (finger int ') is inconsistent with the second result HaF ' (finger int), the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S135,HaF″(fingerpr int′)=Hash Function(fingerpr int′⊙T),
wherein HaF "(finger int') represents the returned result;
Hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
t represents a time operation result;
the ";
T=T 1 ′+T 2 ,
wherein T represents a time operation result;
T 1 ' represents the current first time T of reception 1 ;
T 2 Representing the current second time when the cloud platform processes;
+ represents an addition operator;
returns the result HaF "(finger int') and the current second time T 2 Transmitting the data to a handheld mobile intelligent terminal;
S136,T′=T 1 +T 2 ′,
wherein T' represents a time operation first result;
T 1 representing the current first time T 1 ;
T 2 ' represents the current second time T received by the controller 2 ;
+ represents an addition operator;
HaF″′(fingerpr int)=Hash Function(fingerpr int⊙T′),
wherein HaF' "(finger pr int) represents return validation;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
t' represents a time operation first result;
the ";
judging whether the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '):
if the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '), the verification is successful, and the handheld mobile intelligent terminal is unlocked;
If the returned verification HaF ' (finger pr int) is inconsistent with the returned result HaF ' (finger pr int '), the verification fails, and the handheld mobile intelligent terminal is locked.
In a preferred embodiment of the present invention, step S1 further includes: when the verification of the handheld mobile intelligent terminal fails and is locked, the position of the handheld mobile intelligent terminal is sent to the cloud platform; the distance calculation method between the two handheld mobile intelligent terminals comprises the following steps:
s represents the distance between two handheld mobile intelligent terminals;
(X, Y, Z) represents the position coordinates of a hand-held mobile intelligent terminal;
(X 0 ,Y 0 ,Z 0 ) Representing the position coordinates of another hand-held mobile intelligent terminal.
Eta represents the error rate and eta epsilon 0,35.
In a preferred embodiment of the present invention, the following steps are included in step S2:
s21, sending the shot target person image and the verification value to a cloud platform;
the verification value calculating method comprises the following steps:
HaF(Face Image)=Hash Function(Face Image),
wherein HaF (Face Image) represents a verification value obtained by processing a captured target person image;
hash Function () represents a Hash Function operation;
face Image represents a captured target person Image;
s22, the cloud platform verifies the received target person image:
If the verification value HaF (Face Image') is consistent with the verification value HaF (Face Image), executing the next step;
the verification value calculating method comprises the following steps:
HaF(Face Image′)=Hash Function(Face Image′),
the HaF (Face Image') represents an inspection value obtained by processing a target person Image Face Image received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image' represents a target person Image Face Image received by the cloud platform;
if the verification value HaF (Face Image') is inconsistent with the verification value HaF (Face Image), re-requesting the target person Image and the verification value shot by the handheld mobile intelligent terminal; returning to step S22;
s23, extracting a face image in the target person image, and comparing whether the extracted face image exists in the cloud platform face head portrait set or not:
if the extracted face image exists in the cloud platform face head portrait set, the collected target person in the building site area is a building site building person;
if the extracted face image does not exist in the cloud platform face head portrait set, the collected target person in the building site area is not a building site building person; and recording the face image in the abnormal face head portrait set.
In a preferred embodiment of the present invention, in step S135, the method further includes unlocking the locked handheld mobile smart terminal, and the method for unlocking the locked handheld mobile smart terminal includes the following steps:
S1351, sending the shot unlocking target person image and unlocking verification value to a cloud platform;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″)=Hash Function(Face Image″),
wherein, haF (Face Image ") represents an unlocking verification value obtained after processing a photographed unlocking target person Image;
hash Function () represents a Hash Function operation;
face Image "represents a captured unlock target person Image;
s1352, the cloud platform verifies the received unlocking target person image:
if the unlocking verification value HaF (Face Image' ") is consistent with the unlocking verification value HaF (Face Image"), executing the next step;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″′)=Hash Function(Face Image″′),
the HaF (Face Image' ") represents an unlocking verification value obtained by processing an unlocking target character Image Face Image" received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image '"represents an unlocking target person Image Face Image'" received by the cloud platform;
if the unlocking verification value HaF (Face Image' ") is inconsistent with the unlocking verification value HaF (Face Image"), re-requesting the unlocking target character Image and the unlocking verification value shot by the handheld mobile intelligent terminal; returning to step S1352;
s1353, extracting a face image in the unlocking target person image, and comparing whether the extracted face image exists in the cloud platform unlocking face head portrait set or not:
If the extracted face image exists in the cloud platform unlocking face head portrait set, the hand-held mobile intelligent terminal is successfully unlocked;
if the extracted face image does not exist in the cloud platform unlocking face head portrait set, the unlocking of the handheld mobile intelligent terminal is failed; the face image in the extracted unlocking target person image is recorded in the abnormal unlocking face head portrait set.
In summary, by adopting the technical scheme, the invention can prevent the handheld mobile intelligent terminal from being stolen and unlocked and can be used for verifying whether a construction worker is or not.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a schematic diagram of the structure of the present invention.
Fig. 2 is a schematic structural view of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention provides a construction site safety image data mining system by using a blockchain, which comprises a handheld mobile intelligent terminal, as shown in fig. 1 and 2, wherein the handheld mobile intelligent terminal comprises a shell 1, the shell 1 comprises a front shell and a rear shell, a touch display screen mounting seat for fixedly mounting a touch display screen 3 is arranged on the front shell, a front camera mounting seat for fixedly mounting a front camera 2 is arranged on the front shell, a rear camera mounting seat for fixedly mounting a rear camera 4 is arranged on the rear shell, and a PCB board mounting seat for fixedly mounting a PCB board is arranged in the shell; a touch display screen 3 is fixedly arranged on a touch display screen mounting seat, a front camera 2 is fixedly arranged on a front camera mounting seat, a rear camera 4 is fixedly arranged on a rear camera mounting seat, and a PCB board is fixedly arranged on a PCB board mounting seat;
the PCB is provided with a controller, a camera driving module, a touch display screen driving module, a wireless transceiver module and a voice module; the camera driving module comprises a front camera driving sub-module and a rear camera driving sub-module; the voice module comprises a microphone sub-module and a loudspeaker sub-module;
The front camera shooting data end of the controller is connected with the camera shooting data end of the front camera shooting driving sub-module, the camera shooting connecting end of the front camera shooting driving sub-module is connected with the front camera shooting connecting socket, the rear camera shooting data end of the controller is connected with the camera shooting data end of the rear camera shooting driving sub-module, the camera shooting connecting end of the rear camera shooting driving sub-module is connected with the rear camera shooting connecting socket, the touch display data end of the controller is connected with the touch display data end of the touch display screen driving module, and the data wireless receiving and transmitting end of the controller is connected with the data receiving and transmitting end of the wireless receiving and transmitting module; the voice data output end of the microphone sub-module is connected with the voice data input end of the controller, and the voice data input end of the speaker sub-module is connected with the voice data output end of the controller;
the camera data end of the front camera 2 is connected with the front camera connecting socket, the camera data end of the rear camera 4 is connected with the rear camera connecting socket, and the touch display data end of the touch display screen 3 is connected with the touch display connecting socket;
the intelligent terminal is used for unlocking the handheld mobile intelligent terminal, and determining whether a target person walking on the construction site is a construction worker or not.
In a preferred embodiment of the present invention, a fingerprint recognition module is provided on the touch display screen 3, and a fingerprint data output end of the fingerprint recognition module is connected with a fingerprint data input end of the controller;
or/and still including setting up the certificate response module that is used for the response certificate that the response extraneous personnel wore on the PCB board, the response data output of certificate response module links to each other with the response data input of controller. The induction certificate comprises a rectangular shell and an induction module arranged in the rectangular shell, wherein induction information is preset in the induction module, and the induction information comprises one or any combination of an ID (identification), a name and a telephone of a construction worker. The identity information of the wearer is inquired by acquiring the induction information and displaying the induction information on the touch display screen after the hand-held mobile intelligent terminal senses the induction certificate.
In a preferred embodiment of the invention, a GPS module is further arranged on the PCB, and the position data output end of the GPS module is connected with the position data input end of the controller, so that the hand-held mobile intelligent terminal is prevented from being lost and is convenient to find.
The invention also discloses a mining method of the construction site safety image data mining system by using the block chain, which comprises the following steps:
S1, unlocking a handheld mobile intelligent terminal;
s2, judging the collected target characters in the building site area:
if the collected target person in the construction site area is a construction site constructor, judging the next target person;
if the collected target person in the construction site area is not a construction site constructor, recording a face head image of the target person, and judging the next target person.
In a preferred embodiment of the present invention, the following steps are included in step S1:
s11, the controller judges whether the controller receives a trigger signal sent by the fingerprint module or not:
if the controller receives the trigger signal sent by the fingerprint module, the controller controls the fingerprint data acquired by the fingerprint module to execute the next step;
if the controller does not receive the trigger signal sent by the fingerprint module, the controller continues to wait for the trigger signal sent by the fingerprint module;
s12, encrypting the received fingerprint data, wherein the encryption method comprises the following steps:
HaF(fingerpr int)=Hash Function(fingerpr int),
wherein HaF (fingerpr int) represents a first result of encrypting the received fingerprint data;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
HaF′(fingerpr int)=Hash Function(fingerpr int⊙T 1 ),
wherein HaF' (finger int) represents a second result of the received fingerprint data after the encryption process;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
T 1 representing a current first time when the controller processes;
the ";
s13, sending the encrypted result to the cloud platform for verification:
if the verification is successful, the unlocking of the handheld mobile intelligent terminal is successful;
and if the verification fails, locking the handheld mobile intelligent terminal.
In a preferred embodiment of the present invention, step S10 is included before step S11, and cloud platform fingerprint input processing is performed on staff on a construction site, where the specific steps include the following steps:
s101, sequentially numbering the acquired fingerprint data, wherein the fingerprint data are respectively and sequentially 1 st staff fingerprint data, 2 nd staff fingerprint data, 3 rd staff fingerprint data, … … and M th staff fingerprint data, and M is a positive integer greater than or equal to 1;
s102, carrying out encryption processing on fingerprint data of an mth staff, wherein M is a positive integer less than or equal to M; the encryption processing method comprises the following steps:
HaF(fingerpr int m )=Hash Function(fingerpr int m ),
Wherein HaF (finger int m ) Representing a storage result of the fingerprint data of the mth staff after encryption processing;
hash Function () represents a Hash Function operation;
fingerpr int m fingerprint data representing an mth worker;
s103, storing the encrypted storage result in the cloud platform after corresponding to the data before encryption, and uploading the storage result to the blockchain.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, the cloud platform receives the first result HaF (fingerpr int), the second result HaF' (finger int) and the current first time T 1 The following operations are performed:
s132, querying the same stored result as the first result HaF (fingerpr int) according to the first result HaF (fingerpr int):
if the same storage result as the first result HaF (fingerpr int) exists, performing the next step;
if the same storage result as the first result HaF (fingerpr int) does not exist, the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S133,HaF′(fingerpr int′)=Hash Function(fingerpr int′⊙T 1 ′),
wherein HaF '(finger int') represents the verification result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
T 1 ' represents the current first time T of reception 1 ;
The ";
s134, determining whether the verification result HaF ' (finger int ') and the second result HaF ' (finger int) are consistent:
if the verification result HaF ' (finger pr int ') is consistent with the second result HaF ' (finger pr int), the verification is successful; executing the next step;
if the verification result HaF ' (finger int ') is inconsistent with the second result HaF ' (finger int), the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S135,HaF″(fingerpr int′)=Hash Function(fingerpr int′⊙T),
wherein HaF "(finger int') represents the returned result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
t represents a time operation result;
the ";
T=T 1 ′+T 2 ,
wherein T represents a time operation result;
T 1 ' represents the current first time T of reception 1 ;
T 2 Representing the current second time when the cloud platform processes;
+ represents an addition operator;
returns the result HaF "(finger int') and the current second time T 2 Transmitting the data to a handheld mobile intelligent terminal;
S136,T′=T 1 +T 2 ′,
wherein T' represents a time operation first result;
T 1 representing the current first time T 1 ;
T 2 ' represents the current second time T received by the controller 2 ;
+ represents an addition operator;
HaF″′(fingerpr int)=Hash Function(fingerpr int⊙T′),
wherein HaF' "(finger pr int) represents return validation;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
t' represents a time operation first result;
the ";
judging whether the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '):
if the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '), the verification is successful, and the handheld mobile intelligent terminal is unlocked;
if the returned verification HaF ' (finger pr int) is inconsistent with the returned result HaF ' (finger pr int '), the verification fails, and the handheld mobile intelligent terminal is locked.
In a preferred embodiment of the present invention, step S1 further includes: when the verification of the handheld mobile intelligent terminal fails and is locked, the position of the handheld mobile intelligent terminal is sent to the cloud platform; the distance calculation method between the two handheld mobile intelligent terminals comprises the following steps:
s represents the distance between two handheld mobile intelligent terminals;
(X, Y, Z) represents the position coordinates of a hand-held mobile intelligent terminal;
(X 0 ,Y 0 ,Z 0 ) Representing the position coordinates of another hand-held mobile intelligent terminal.
Eta represents the error rate and eta epsilon 0,35.
In a preferred embodiment of the present invention, the following steps are included in step S2:
s21, sending the shot target person image and the verification value to a cloud platform;
the verification value calculating method comprises the following steps:
HaF(Face Image)=Hash Function(Face Image),
wherein HaF (Face Image) represents a verification value obtained by processing a captured target person image;
hash Function () represents a Hash Function operation;
face Image represents a captured target person Image;
s22, the cloud platform verifies the received target person image:
if the verification value HaF (Face Image') is consistent with the verification value HaF (Face Image), executing the next step;
the verification value calculating method comprises the following steps:
HaF(Face Image′)=Hash Function(Face Image′),
the HaF (Face Image') represents an inspection value obtained by processing a target person Image Face Image received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image' represents a target person Image Face Image received by the cloud platform;
if the verification value HaF (Face Image') is inconsistent with the verification value HaF (Face Image), re-requesting the target person Image and the verification value shot by the handheld mobile intelligent terminal; returning to step S22;
s23, extracting a face image in the target person image, and comparing whether the extracted face image exists in the cloud platform face head portrait set or not:
The formation of the cloud platform face head portrait set comprises the following steps:
s231, the camera shoots M face images by rotating around the same horizontal plane with the head as the center, wherein M is a positive integer greater than or equal to 3 and is respectively the 1 st image of the faceFace 2 nd image-> Face 3 rd image->… …, face Mth image +.>α m The camera is deviated from an angle opposite to the rotation of the face around the head, and M is a positive integer less than or equal to M; />
Wherein alpha is m When the angle is negative, the angle indicating that the camera deviates rightwards around the head as the center and faces to rotate is |alpha m |;α m In order to be positive, the angle of the camera which deviates leftwards around the head as the center and faces the face is |alpha m |;α m When the angle is 0 DEG, the camera is right against the face around the head; i.e.
S232, regarding the nth image of the face acquired in the step S231Performing image preprocessing, wherein n is a positive integer less than or equal to M; in this embodiment, the n-th image of its face +.>The image preprocessing comprises the steps of (a) performing image preprocessing on an nth image of a human face>Image separation processing is performed, which is performed on the n-th image of the face +.>The method for performing image separation processing comprises the following steps:
wherein w represents the number of target pixel points and the nth image of the human faceIs a ratio of (2);
N represents setting the nth image of faceThe number of gray values in (a) is smaller than the image separation threshold H;
w' represents the number of background pixel points and the nth image of the human faceIs a ratio of (2);
wherein ζ represents an average gray value of the target image;
A i ∈A={A 1 ,A 2 ,A 3 ,...,A N ,A N+1 },A i representing the gray value of the ith pixel point in the target image; a represents a target scene image pixel set;
wherein ζ represents an average gray value of the background image;
B j ∈B={B 1 ,B 2 ,B 3 ,...,B P×Q-N ,B P×Q-N+1 },B j a gray value representing a j-th pixel point in the background image; b represents a background image pixel set;
wherein, the liquid crystal display device comprises a liquid crystal display device,n-th image representing face->Is a mean gray value of (2);
wherein η represents an image gray variance value;
using its traversing method to make its image gray level variance value be maximally eta max When the image separation threshold H is obtained;
s2326, judging the nth image of the faceGray value of kth pixel in (2)>Size relation with image separation threshold H:
S233, extracting the corresponding relation between the right-facing face image and the face image deviating from the right-facing face and/or the face image deviating from the right-facing face.
In a preferred embodiment of the present invention, in step S233, the following steps are included:
Taking the center of the camera lens as the coordinate origin of the XYZ axis, taking the left of the camera lens as the positive direction of the X axis, taking the upward of the camera lens as the positive direction of the Y axis, and pointing to the positive direction of the camera lens as the Z axis;
s2331, extracting the face features of the opposite face image, namely the 1 st feature of the opposite face, the 2 nd feature of the opposite face, the 3 rd feature of the opposite face, … … and the V-th feature of the opposite face in sequence, wherein V is a positive integer greater than or equal to 1, and V represents the number of face pixels in the opposite face image; the coordinates of the pixel points corresponding to the v-th feature of the face are (x) v ,y v ,z v ) V is a positive integer less than or equal to V; the rotation center point coordinates thereof are (x v ′,y v ′,z v ′);
S2332, calculating the coordinates (x) of the v-th feature and the rotation center point of the face v ′,y v ′,z v ') facing the v-th feature of the face and the rotation center point coordinates (x) v ′,y v ′,z v The calculation method of the distance of') is as follows:
wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing coordinates of pixel points corresponding to v-th features of face;
S2333, extract left deviationThe face features of the right-facing face image are respectively and sequentially a 1 st feature of the right-facing face, a 2 nd feature of the right-facing face, a 3 rd feature of the right-facing face, … … and a V ' feature of the right-facing face, wherein V ' is a positive integer greater than or equal to 1, and V ' represents the number of face pixel points in the right-facing face image; the coordinates of the pixel points corresponding to the v 'th feature of the face which deviates leftwards and is just opposite to the v' th feature of the face are (x) v′ ,y v′ ,z v′ ) V 'is a positive integer less than or equal to V'; />Alpha represents a shooting angle set;
s2334 to deviate it to the leftThe coordinates of the pixel points corresponding to the v' th feature of the face are (x) v′ ,y v′ ,z v′ ) Converting into pixel coordinates facing the face:
Wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing the coordinates of the pixel points corresponding to the v-th feature of the face;
(x v′ ,y v′ ,z v′ ) Representing pixel point coordinates corresponding to v' features of the right-facing face deviating leftwards;
s2335, determining the pixel coordinates (x v ,y v ,z v ) Whether the corresponding face features deviate from the leftThe coordinates of the pixel points facing the face (x v′ ,y v′ ,z v′ ) The corresponding face features are consistent:
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features deviate to the leftThe coordinates of the pixel points facing the face (x v′ ,y v′ ,z v′ ) Corresponding face features are consistent, and deviate leftwards +.>Adding 1 to the face statistics value;
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features deviate to the leftThe coordinates of the pixel points facing the face (x v′ ,y v′ ,z v′ ) The corresponding face features are inconsistent, and deviate leftwards from +.>Adding 0 to the face statistics value;
s2336, calculating a human face characteristic left-direction proportion value, wherein the calculation method of the human face characteristic left-direction proportion value comprises the following steps:
Wherein, the liquid crystal display device comprises a liquid crystal display device,representing the left-direction proportional value of the face characteristics;
indicating deviation to the left +.>The number of the face features facing the face image is the same as the number of the face features facing the face image;
F 0 representing the number of face features facing the face image;
s2337, the obtained right-facing face image and the left-facing face feature proportion value are processedAnd forming a cloud platform face head portrait set.
In a preferred embodiment of the present invention, in step S233, the following steps are included:
taking the center of the camera lens as the coordinate origin of the XYZ axis, taking the left of the camera lens as the positive direction of the X axis, taking the upward of the camera lens as the positive direction of the Y axis, and pointing to the positive direction of the camera lens as the Z axis;
s2331, extracting the face features of the opposite face image, namely the 1 st feature of the opposite face, the 2 nd feature of the opposite face, the 3 rd feature of the opposite face, … … and the V-th feature of the opposite face in sequence, wherein V is a positive integer greater than or equal to 1, and V represents the number of face pixels in the opposite face image; the coordinates of the pixel points corresponding to the v-th feature of the face are (x) v ,y v ,z v ) V is a positive integer less than or equal to V; the rotation center point coordinates thereof are (x v ′,y v ′,z v ′);
S2332, calculating the coordinates (x) of the v-th feature and the rotation center point of the face v ′,y v ′,z v ') facing the v-th feature of the face and the rotation center point coordinates (x) v ′,y v ′,z v The calculation method of the distance of') is as follows:
wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing the coordinates of the pixel points corresponding to the v-th feature of the face;
s2333, extract right deviationThe face features of the right-facing face image are respectively and sequentially a 1 st feature of the right-facing face, a 2 nd feature of the right-facing face, a 3 rd feature of the right-facing face, … … and a V ' feature of the right-facing face, wherein V ' is a positive integer greater than or equal to 1, and V ' represents the number of face pixel points in the right-facing face image; the coordinates of the pixel points corresponding to the v' th feature of the right-deviated face are (x) v″ ,y v″ ,z v″ ) The V 'is a positive integer less than or equal to V'; />Alpha represents a shooting angle set;
s2334 deviating it to the rightThe coordinates of the pixel points corresponding to the v' th feature of the face are (x) v″ ,y v″ ,z v″ ) Converting into pixel coordinates facing the face:
Wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing the coordinates of the pixel points corresponding to the v-th feature of the face;
(x v″ ,y v″ ,z v″ ) Representing pixel point coordinates corresponding to v' features of the right-facing face deviating leftwards;
s2335, determining the pixel coordinates (x v ,y v ,z v ) Whether the corresponding face features deviate from the rightThe coordinates of the pixel points facing the face (x v″ ,y v″ ,z v″ ) The corresponding face features are consistent:
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features deviate from the rightThe coordinates of the pixel points facing the face (x v″ ,y v″ ,z v″ ) Corresponding face features are consistent, and deviate rightwards +.>Adding 1 to the face statistics value;
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features do not deviate from the rightPixel point coordinates facing to human face(x v″ ,y v″ ,z v″ ) Corresponding face features are consistent, and deviate rightwards +.>Adding 0 to the face statistics value;
s2336, calculating a right-direction proportional value of the face feature, wherein the method for calculating the right-direction proportional value of the face feature comprises the following steps:
wherein, the liquid crystal display device comprises a liquid crystal display device,representing the right-direction proportional value of the face characteristics;
indicating a rightward deviation +.>The number of the face features facing the face image is the same as the number of the face features facing the face image;
F 0 representing the number of face features facing the face image;
s2337, right-direction proportion value of the obtained right-direction face image and face characteristic is obtained And forming a cloud platform face head portrait set.
The comparison method comprises the following steps: s2300, acquiring a facing face image in the cloud platform face head portrait set, and converting the facing face into deviation phi τ Is opposite to the face of the person,which converts the facing face into a deviation phi τ The method for computing the face facing comprises the following steps: the pixel coordinates which are opposite to the face are deviatedThe corresponding face features are replaced with pixel coordinates (x v ,y v ,z v ) Corresponding face features; (x) v ′,y v ′,z v ' indicates the rotation center point coordinates when +.>φ τ At > 0, phi τ E, alpha represents a shooting angle set; or->φ τ When the number is less than 0, a contrast face head portrait set is obtained; the face head portrait set is used as a cloud platform face head portrait set;
if the extracted face image exists in the cloud platform face head portrait set, the collected target person in the building site area is a building site building person;
if the extracted face image does not exist in the cloud platform face head portrait set, the collected target person in the building site area is not a building site building person; and recording the face image in the abnormal face head portrait set.
In a preferred embodiment of the present invention, in step S135, the method further includes unlocking the locked handheld mobile smart terminal, and the method for unlocking the locked handheld mobile smart terminal includes the following steps:
S1351, sending the shot unlocking target person image and unlocking verification value to a cloud platform;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″)=Hash Function(Face Image″),
wherein, haF (Face Image ") represents an unlocking verification value obtained after processing a photographed unlocking target person Image;
hash Function () represents a Hash Function operation;
face Image "represents a captured unlock target person Image;
s1352, the cloud platform verifies the received unlocking target person image:
if the unlocking verification value HaF (Face Image' ") is consistent with the unlocking verification value HaF (Face Image"), executing the next step;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″′)=Hash Function(Face Image″′),
the HaF (Face Image' ") represents an unlocking verification value obtained by processing an unlocking target character Image Face Image" received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image '"represents an unlocking target person Image Face Image'" received by the cloud platform;
if the unlocking verification value HaF (Face Image' ") is inconsistent with the unlocking verification value HaF (Face Image"), re-requesting the unlocking target character Image and the unlocking verification value shot by the handheld mobile intelligent terminal; returning to step S1352;
s1353, extracting a face image in the unlocking target person image, and comparing whether the extracted face image exists in the cloud platform unlocking face head portrait set or not:
If the extracted face image exists in the cloud platform unlocking face head portrait set, the hand-held mobile intelligent terminal is successfully unlocked;
if the extracted face image does not exist in the cloud platform unlocking face head portrait set, the unlocking of the handheld mobile intelligent terminal is failed; the face image in the extracted unlocking target person image is recorded in the abnormal unlocking face head portrait set.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.
Claims (7)
1. The system for mining the safety image data of the construction site by utilizing the blockchain is characterized by comprising a handheld mobile intelligent terminal, wherein the handheld mobile intelligent terminal comprises a shell (1), the shell (1) comprises a front shell and a rear shell, a touch display screen mounting seat for fixedly mounting a touch display screen (3) is arranged on the front shell, a front camera mounting seat for fixedly mounting a front camera (2) is arranged on the front shell, a rear camera mounting seat for fixedly mounting a rear camera (4) is arranged on the rear shell, and a PCB mounting seat for fixedly mounting a PCB is arranged in the shell; a touch display screen (3) is fixedly arranged on a touch display screen mounting seat, a front camera (2) is fixedly arranged on a front camera mounting seat, a rear camera (4) is fixedly arranged on a rear camera mounting seat, and a PCB (printed circuit board) is fixedly arranged on a PCB mounting seat;
The PCB is provided with a controller, a camera driving module, a touch display screen driving module, a wireless transceiver module and a voice module; the camera driving module comprises a front camera driving sub-module and a rear camera driving sub-module; the voice module comprises a microphone sub-module and a loudspeaker sub-module;
the front camera shooting data end of the controller is connected with the camera shooting data end of the front camera shooting driving sub-module, the camera shooting connecting end of the front camera shooting driving sub-module is connected with the front camera shooting connecting socket, the rear camera shooting data end of the controller is connected with the camera shooting data end of the rear camera shooting driving sub-module, the camera shooting connecting end of the rear camera shooting driving sub-module is connected with the rear camera shooting connecting socket, the touch display data end of the controller is connected with the touch display data end of the touch display screen driving module, and the data wireless receiving and transmitting end of the controller is connected with the data receiving and transmitting end of the wireless receiving and transmitting module; the voice data output end of the microphone sub-module is connected with the voice data input end of the controller, and the voice data input end of the speaker sub-module is connected with the voice data output end of the controller;
the camera data end of the front camera (2) is connected with the front camera connecting socket, the camera data end of the rear camera (4) is connected with the rear camera connecting socket, and the touch display data end of the touch display screen (3) is connected with the touch display connecting socket;
The cloud platform is used for determining whether a target person walking on a construction site is a construction worker or not after the handheld mobile intelligent terminal is unlocked;
the mining method for the construction site safety image data mining system by using the block chain comprises the following steps:
s1, unlocking a handheld mobile intelligent terminal;
s2, judging the collected target characters in the building site area:
if the collected target person in the construction site area is a construction site constructor, judging the next target person;
if the collected target person in the construction site area is not a construction site constructor, recording a face head portrait of the target person, and judging the next target person;
further, the step S1 includes the following steps:
s11, the controller judges whether the controller receives a trigger signal sent by the fingerprint module or not:
if the controller receives the trigger signal sent by the fingerprint module, the controller controls the fingerprint data acquired by the fingerprint module to execute the next step;
if the controller does not receive the trigger signal sent by the fingerprint module, the controller continues to wait for the trigger signal sent by the fingerprint module;
s12, encrypting the received fingerprint data, wherein the encryption method comprises the following steps:
HaF(fingerpr int)=Hash Function(fingerpr int),
Wherein HaF (fingerpr int) represents a first result of encrypting the received fingerprint data;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
HaF′(fingerpr int)=Hash Function(fingerpr int⊙T 1 ),
wherein HaF' (finger int) represents a second result of the received fingerprint data after the encryption process;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
T 1 representing a current first time when the controller processes;
the ";
s13, sending the encrypted result to the cloud platform for verification:
if the verification is successful, the unlocking of the handheld mobile intelligent terminal is successful;
if the verification fails, locking the handheld mobile intelligent terminal;
further, in step S13, the following steps are included:
s131, the cloud platform receives the first result HaF (fingerpr int), the second result HaF' (finger int) and the current first time T 1 The following operations are performed:
s132, querying the same stored result as the first result HaF (fingerpr int) according to the first result HaF (fingerpr int):
if the same storage result as the first result HaF (fingerpr int) exists, performing the next step;
If the same storage result as the first result HaF (fingerpr int) does not exist, the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S133,HaF′(fingerpr int′)=Hash Function(fingerpr int′⊙T 1 ′),
wherein HaF '(finger int') represents the verification result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
T 1 ' represents the current first time T of reception 1 ;
The ";
s134, determining whether the verification result HaF ' (finger int ') and the second result HaF ' (finger int) are consistent:
if the verification result HaF ' (finger pr int ') is consistent with the second result HaF ' (finger pr int), the verification is successful; executing the next step;
if the verification result HaF ' (finger int ') is inconsistent with the second result HaF ' (finger int), the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S135,HaF″(fingerpr int′)=Hash Function(fingerpr int′⊙T),
wherein HaF "(finger int') represents the returned result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
t represents a time operation result;
The ";
T=T 1 ′+T 2 ,
wherein T represents a time operation result;
T 1 ' represents the current first time T of reception 1 ;
T 2 Representing the current second time when the cloud platform processes;
+ represents an addition operator;
returns the result HaF "(finger int') and the current second time T 2 Transmitting the data to a handheld mobile intelligent terminal;
S136,T′=T 1 +T 2 ′,
wherein T' represents a time operation first result;
T 1 representing the current first time T 1 ;
T 2 ' represents the current second time T received by the controller 2 ;
+ represents an addition operator;
HaF″′(fingerpr int)=Hash Function(fingerpr int∈T′),
wherein HaF' "(finger pr int) represents return validation;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
t' represents a time operation first result;
the ";
judging whether the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '):
if the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '), the verification is successful, and the handheld mobile intelligent terminal is unlocked;
if the returned verification HaF ' (finger pr int) is inconsistent with the returned result HaF ' (finger pr int '), the verification fails, and the handheld mobile intelligent terminal is locked.
2. The system for mining safety image data of construction site by using blockchain according to claim 1, wherein a fingerprint identification module is arranged on the touch display screen (3), and a fingerprint data output end of the fingerprint identification module is connected with a fingerprint data input end of the controller;
Or/and still including setting up the certificate response module that is used for the response certificate that the response extraneous personnel wore on the PCB board, the response data output of certificate response module links to each other with the response data input of controller.
3. The system for mining safety image data of construction site by using blockchain as in claim 1, wherein a GPS module is further provided on the PCB board, and a position data output terminal of the GPS module is connected to a position data input terminal of the controller, so as to prevent the hand-held mobile intelligent terminal from being lost and facilitate searching.
4. The system for mining safety image data of construction site by using blockchain according to claim 1, wherein the system comprises step S10 before step S11, and the cloud platform fingerprint input process is performed on the staff of the construction site, and the specific steps comprise the following steps:
s101, sequentially numbering the acquired fingerprint data, wherein the fingerprint data are respectively and sequentially 1 st staff fingerprint data, 2 nd staff fingerprint data, 3 rd staff fingerprint data, … … and M th staff fingerprint data, and M is a positive integer greater than or equal to 1;
s102, carrying out encryption processing on fingerprint data of an mth staff, wherein M is a positive integer less than or equal to M; the encryption processing method comprises the following steps:
HaF(fingerpr int m )=Hash Function(fingerpr int m ),
Wherein HaF (finger int m ) Representing a storage result of the fingerprint data of the mth staff after encryption processing;
hash Function () represents a Hash Function operation;
fingerpr int m fingerprint data representing an mth worker;
and S103, storing the encrypted storage result in the cloud platform after corresponding to the data before encryption.
5. The construction site safety image data mining system using blockchain as in claim 1, further comprising in step S1: when the verification of the handheld mobile intelligent terminal fails and is locked, the position of the handheld mobile intelligent terminal is sent to the cloud platform; the distance calculation method between the two handheld mobile intelligent terminals comprises the following steps:
s represents the distance between two handheld mobile intelligent terminals;
(X, Y, Z) represents the position coordinates of a hand-held mobile intelligent terminal;
(X 0 ,Y 0 ,Z 0 ) Representing the position coordinates of another handheld mobile intelligent terminal;
eta represents the error rate and eta epsilon 0,35.
6. The construction site safety image data mining system using blockchain as in claim 1, wherein in step S2, the steps of:
s21, sending the shot target person image and the verification value to a cloud platform;
the verification value calculating method comprises the following steps:
HaF(Face Image)=Hash Function(Face Image),
Wherein HaF (Face Image) represents a verification value obtained by processing a captured target person image;
hash Function () represents a Hash Function operation;
face Image represents a captured target person Image;
s22, the cloud platform verifies the received target person image:
if the verification value HaF (Face Image') is consistent with the verification value HaF (Face Image), executing the next step;
the verification value calculating method comprises the following steps:
HaF(Face Image′)=Hash Function(Face Image′),
the HaF (Face Image') represents an inspection value obtained by processing a target person Image Face Image received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image' represents a target person Image Face Image received by the cloud platform;
if the verification value HaF (Face Image') is inconsistent with the verification value HaF (Face Image), re-requesting the target person Image and the verification value shot by the handheld mobile intelligent terminal; returning to step S22;
s23, extracting a face image in the target person image, and comparing whether the extracted face image exists in the cloud platform face head portrait set or not:
if the extracted face image exists in the cloud platform face head portrait set, the collected target person in the building site area is a building site building person;
If the extracted face image does not exist in the cloud platform face head portrait set, the collected target person in the building site area is not a building site building person; and recording the face image in the abnormal face head portrait set.
7. The system for building site security image data mining using blockchain as in claim 1, further comprising unlocking the locked handheld mobile smart terminal in step S135, wherein the method for unlocking the locked handheld mobile smart terminal comprises the steps of:
s1351, sending the shot unlocking target person image and unlocking verification value to a cloud platform;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″)=Hash Function(Face Image″),
wherein, haF (Face Image ") represents an unlocking verification value obtained after processing a photographed unlocking target person Image;
hash Function () represents a Hash Function operation;
face Image "represents a captured unlock target person Image;
s1352, the cloud platform verifies the received unlocking target person image:
if the unlocking verification value HaF (Face Image' ") is consistent with the unlocking verification value HaF (Face Image"), executing the next step;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″′)=Hash Function(Face Image″′),
The HaF (Face Image' ") represents an unlocking verification value obtained by processing an unlocking target character Image Face Image" received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image '"represents an unlocking target person Image Face Image'" received by the cloud platform;
if the unlocking verification value HaF (Face Image' ") is inconsistent with the unlocking verification value HaF (Face Image"), re-requesting the unlocking target character Image and the unlocking verification value shot by the handheld mobile intelligent terminal; returning to step S1352;
s1353, extracting a face image in the unlocking target person image, and comparing whether the extracted face image exists in the cloud platform unlocking face head portrait set or not:
if the extracted face image exists in the cloud platform unlocking face head portrait set, the hand-held mobile intelligent terminal is successfully unlocked;
if the extracted face image does not exist in the cloud platform unlocking face head portrait set, the unlocking of the handheld mobile intelligent terminal is failed; the face image in the extracted unlocking target person image is recorded in the abnormal unlocking face head portrait set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011140425.4A CN112543241B (en) | 2020-10-22 | 2020-10-22 | Construction site safety image data mining method by using block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011140425.4A CN112543241B (en) | 2020-10-22 | 2020-10-22 | Construction site safety image data mining method by using block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112543241A CN112543241A (en) | 2021-03-23 |
CN112543241B true CN112543241B (en) | 2023-05-30 |
Family
ID=75013913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011140425.4A Active CN112543241B (en) | 2020-10-22 | 2020-10-22 | Construction site safety image data mining method by using block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112543241B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113382204A (en) * | 2021-05-22 | 2021-09-10 | 特斯联科技集团有限公司 | Intelligent processing method and device for fire-fighting hidden danger |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1439982A (en) * | 2002-02-20 | 2003-09-03 | 安时乐公司 | Time marking system and progam medium for electronic files |
CN102916968A (en) * | 2012-10-29 | 2013-02-06 | 北京天诚盛业科技有限公司 | Identity authentication method, identity authentication server and identity authentication device |
CN102932635A (en) * | 2012-11-22 | 2013-02-13 | 南京明德软件有限公司 | Real-time image processing system and method |
CN104680389A (en) * | 2015-03-13 | 2015-06-03 | 杭州沃朴物联科技有限公司 | NFC mobile phone terminal anti-fake system and method based on time encryption |
US9443108B1 (en) * | 2014-06-27 | 2016-09-13 | Amazon Technologies, Inc. | Secure timestamping |
CN106657166A (en) * | 2017-03-09 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Identity verification method, terminal device and server |
CN106850603A (en) * | 2017-01-19 | 2017-06-13 | 北京洋浦伟业科技发展有限公司 | A kind of whitepack password Bidirectional identity authentication method, terminal, service end and system |
CN109617669A (en) * | 2018-11-30 | 2019-04-12 | 广州高清视信数码科技股份有限公司 | The authentication method and terminal device of set-top box remote controller based on hash algorithm |
EP3605944A1 (en) * | 2018-07-31 | 2020-02-05 | Siemens Healthcare GmbH | Documenting timestamps within a blockchain |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006311529A (en) * | 2005-03-30 | 2006-11-09 | Seiko Epson Corp | Authentication system and authentication method therefor, authentication server and authentication method therefor, recording medium, and program |
CN101309278B (en) * | 2008-06-27 | 2011-07-06 | 腾讯科技(深圳)有限公司 | Method and system for storing encrypt data on customer |
CN202795159U (en) * | 2012-08-24 | 2013-03-13 | 广东电网公司信息中心 | Hand-held mobile terminal |
JP2016111660A (en) * | 2014-11-27 | 2016-06-20 | パナソニックIpマネジメント株式会社 | Authentication server, terminal and authentication method |
CN204632305U (en) * | 2015-05-26 | 2015-09-09 | 成都万维图新信息技术有限公司 | A kind of smart travel service terminal based on mobile communication |
CN106547465A (en) * | 2016-10-14 | 2017-03-29 | 青岛海信移动通信技术股份有限公司 | A kind of fast operating method and mobile terminal of mobile terminal |
CN107579817A (en) * | 2017-09-12 | 2018-01-12 | 广州广电运通金融电子股份有限公司 | User ID authentication method, apparatus and system based on block chain |
CN107731138A (en) * | 2017-11-09 | 2018-02-23 | 成都优力德新能源有限公司 | A kind of smart travel service terminal based on mobile communication |
CN108418920B (en) * | 2018-03-06 | 2021-01-26 | 京东方科技集团股份有限公司 | Intelligent terminal and control method thereof |
CN108632293B (en) * | 2018-05-16 | 2021-08-06 | 山东建筑大学 | Building equipment Internet of things system and method based on block chain technology |
CN110098932B (en) * | 2019-05-16 | 2022-10-28 | 江苏慧世联网络科技有限公司 | Electronic document signing method based on safe electronic notarization technology |
CN209980270U (en) * | 2019-05-31 | 2020-01-21 | 张斯妍 | Hand-held biological characteristic recognition terminal based on artificial intelligence |
CN111314056B (en) * | 2020-03-31 | 2022-07-01 | 四川九强通信科技有限公司 | Heaven and earth integrated network anonymous access authentication method based on identity encryption system |
-
2020
- 2020-10-22 CN CN202011140425.4A patent/CN112543241B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1439982A (en) * | 2002-02-20 | 2003-09-03 | 安时乐公司 | Time marking system and progam medium for electronic files |
CN102916968A (en) * | 2012-10-29 | 2013-02-06 | 北京天诚盛业科技有限公司 | Identity authentication method, identity authentication server and identity authentication device |
CN102932635A (en) * | 2012-11-22 | 2013-02-13 | 南京明德软件有限公司 | Real-time image processing system and method |
US9443108B1 (en) * | 2014-06-27 | 2016-09-13 | Amazon Technologies, Inc. | Secure timestamping |
CN104680389A (en) * | 2015-03-13 | 2015-06-03 | 杭州沃朴物联科技有限公司 | NFC mobile phone terminal anti-fake system and method based on time encryption |
WO2016145705A1 (en) * | 2015-03-13 | 2016-09-22 | 杭州沃朴物联科技有限公司 | Time-based encrypted nfc cell phone terminal anti-counterfeit system and method |
CN106850603A (en) * | 2017-01-19 | 2017-06-13 | 北京洋浦伟业科技发展有限公司 | A kind of whitepack password Bidirectional identity authentication method, terminal, service end and system |
CN106657166A (en) * | 2017-03-09 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Identity verification method, terminal device and server |
EP3605944A1 (en) * | 2018-07-31 | 2020-02-05 | Siemens Healthcare GmbH | Documenting timestamps within a blockchain |
CN109617669A (en) * | 2018-11-30 | 2019-04-12 | 广州高清视信数码科技股份有限公司 | The authentication method and terminal device of set-top box remote controller based on hash algorithm |
Non-Patent Citations (3)
Title |
---|
Hash函数结合相互认证的智能卡远程双向安全认证方案;周扬;龚畅;徐平平;王伟;;计算机测量与控制(第06期);全文 * |
基于散列时间有效性的轻量级完整性监测方法;徐钦桂;秦勇;杨桃栏;;计算机研究与发展(第03期);全文 * |
基于身份标识加密的身份认证方案;黄仁季;吴晓平;李洪成;;网络与信息安全学报(第06期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112543241A (en) | 2021-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11544984B2 (en) | Systems and methods for location identification and tracking using a camera | |
US10599912B2 (en) | Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems | |
US8254642B2 (en) | Personal authentication method and personal authentication device | |
US10915777B2 (en) | Communication terminal, communication system, and image processing method | |
WO2015131712A1 (en) | Face recognition method, device and computer readable storage medium | |
CN111340634B (en) | System and method for assisting mobile equipment in implementing screen crush risk | |
CN104246793A (en) | Three-dimensional face recognition for mobile devices | |
CN109002786B (en) | Face detection method, face detection equipment and computer-readable storage medium | |
US20230076392A1 (en) | Electronic device capable of identifying ineligible object | |
US10395379B2 (en) | Image object tracking method and apparatus | |
CN102197412A (en) | Spoofing detection system, spoofing detection method and spoofing detection program | |
US11245707B2 (en) | Communication terminal, communication system, communication control method, and recording medium | |
WO2007063970A1 (en) | Monitor camera system and face image trace recording method | |
JP2007249586A (en) | Authentication device, authentication method, authentication program and computer-readable recording medium | |
CN112543241B (en) | Construction site safety image data mining method by using block chain | |
EP3457365B1 (en) | Personal identity verification system and method for verifying the identity of an individual | |
US11244182B2 (en) | Spoof detection by estimating subject motion from captured image frames | |
CN113033243A (en) | Face recognition method, device and equipment | |
CN112543252B (en) | Work method for capturing construction site behavior image data based on block chain | |
US20220207947A1 (en) | Personal identity verification system and method for verifying the identity of an individual | |
WO2018179723A1 (en) | Facial authentication processing apparatus, facial authentication processing method, and facial authentication processing system | |
CN113079161B (en) | Method and system for sharing monitoring camera | |
KR102033732B1 (en) | Method for recognizing license number of vehicle regardless of direction and device having function thereof | |
CN114140839A (en) | Image sending method, device and equipment for face recognition and storage medium | |
JP3074214B2 (en) | Moving object recognition device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |