CN112543241B - Construction site safety image data mining method by using block chain - Google Patents

Construction site safety image data mining method by using block chain Download PDF

Info

Publication number
CN112543241B
CN112543241B CN202011140425.4A CN202011140425A CN112543241B CN 112543241 B CN112543241 B CN 112543241B CN 202011140425 A CN202011140425 A CN 202011140425A CN 112543241 B CN112543241 B CN 112543241B
Authority
CN
China
Prior art keywords
haf
int
image
face image
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011140425.4A
Other languages
Chinese (zh)
Other versions
CN112543241A (en
Inventor
胡宇
白金龙
万里
熊榆
洪敏�
唐良艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Hui Hui Information Technology Co ltd
Original Assignee
Chongqing Hui Hui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Hui Hui Information Technology Co ltd filed Critical Chongqing Hui Hui Information Technology Co ltd
Priority to CN202011140425.4A priority Critical patent/CN112543241B/en
Publication of CN112543241A publication Critical patent/CN112543241A/en
Application granted granted Critical
Publication of CN112543241B publication Critical patent/CN112543241B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/38Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
    • G01S19/39Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/42Determining position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • H04M1/0264Details of the structure or mounting of specific components for a camera module assembly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/18Telephone sets specially adapted for use in ships, mines, or other places exposed to adverse environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/22Details of telephonic subscriber devices including a touch pad, a touch sensor or a touch detector
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides a building site safety image data mining system by using a blockchain, which comprises a handheld mobile intelligent terminal, wherein the handheld mobile intelligent terminal comprises a front camera shooting data end of a controller and a camera shooting data end of a front camera driving sub-module, the camera shooting connecting end of the front camera driving sub-module is connected with a front camera shooting connecting socket, a rear camera shooting data end of the controller is connected with the camera shooting data end of a rear camera driving sub-module, the camera shooting connecting end of the rear camera driving sub-module is connected with a rear camera shooting connecting socket, a touch display data end of the controller is connected with a touch display data end of a touch display screen driving module, and a data wireless receiving and transmitting end of the controller is connected with a data receiving and transmitting end of a wireless receiving and transmitting module; the intelligent terminal is used for unlocking the handheld mobile intelligent terminal, and determining whether a target person walking on the construction site is a construction worker or not. The invention can prevent the hand-held mobile intelligent terminal from being stolen and unlocked and is used for verifying whether construction workers are or not.

Description

Construction site safety image data mining method by using block chain
Technical Field
The invention relates to the technical field of construction sites, in particular to a method for mining safety image data of a construction site by using a block chain.
Background
Building site (construction site), guangdong language building floor, construction floor, simply referred to as floor, is a developing building project and is a site for civil engineering, and the scope of the building site is usually enclosed by coamings, wire meshes or enclosing walls, so that personnel, materials, machinery and vehicles are restricted from entering and exiting. Patent application number 2018111432007, entitled "identification and monitoring system for construction site excavator", discloses a system including a monitoring terminal installed at a site where excavation of an excavator is prohibited, and a server and a user terminal used by a worker in communication with the monitoring terminal; the monitoring terminal comprises: the image acquisition module is used for acquiring surrounding image information in real time and sending the surrounding image information to the image recognition module; the image identification module is used for identifying whether the excavator is included in the image information; and the communication module is used for sending the image information to the server when the image recognition module recognizes that the image information comprises the excavator, and sending alarm information to the user terminal after the server receives the image information. The system can more timely prevent the illegal behavior of the excavator.
Disclosure of Invention
The invention aims at least solving the technical problems in the prior art, and particularly creatively provides a method for mining safety image data of a construction site by using a block chain.
In order to achieve the above object, the present invention provides a construction site safety image data mining system using a blockchain, comprising a handheld mobile intelligent terminal, wherein the handheld mobile intelligent terminal comprises a housing, the housing comprises a front housing and a rear housing, a touch display screen mounting seat for fixedly mounting a touch display screen is arranged on the front housing, a front camera mounting seat for fixedly mounting a front camera is arranged on the front housing, a rear camera mounting seat for fixedly mounting a rear camera is arranged on the rear housing, and a PCB board mounting seat for fixedly mounting a PCB board is arranged in the housing; a touch display screen is fixedly arranged on a touch display screen mounting seat, a front camera is fixedly arranged on a front camera mounting seat, a rear camera is fixedly arranged on a rear camera mounting seat, and a PCB board is fixedly arranged on a PCB board mounting seat;
the PCB is provided with a controller, a camera driving module, a touch display screen driving module, a wireless transceiver module and a voice module; the camera driving module comprises a front camera driving sub-module and a rear camera driving sub-module; the voice module comprises a microphone sub-module and a loudspeaker sub-module;
The front camera shooting data end of the controller is connected with the camera shooting data end of the front camera shooting driving sub-module, the camera shooting connecting end of the front camera shooting driving sub-module is connected with the front camera shooting connecting socket, the rear camera shooting data end of the controller is connected with the camera shooting data end of the rear camera shooting driving sub-module, the camera shooting connecting end of the rear camera shooting driving sub-module is connected with the rear camera shooting connecting socket, the touch display data end of the controller is connected with the touch display data end of the touch display screen driving module, and the data wireless receiving and transmitting end of the controller is connected with the data receiving and transmitting end of the wireless receiving and transmitting module; the voice data output end of the microphone sub-module is connected with the voice data input end of the controller, and the voice data input end of the speaker sub-module is connected with the voice data output end of the controller;
the camera data end of the front camera is connected with the front camera connecting socket, the camera data end of the rear camera is connected with the rear camera connecting socket, and the touch display data end of the touch display screen is connected with the touch display connecting socket;
the intelligent terminal is used for unlocking the handheld mobile intelligent terminal, and determining whether a target person walking on the construction site is a construction worker or not.
In a preferred embodiment of the invention, a fingerprint identification module is arranged on the touch display screen, and a fingerprint data output end of the fingerprint identification module is connected with a fingerprint data input end of the controller;
or/and still including setting up the certificate response module that is used for the response certificate that the response extraneous personnel wore on the PCB board, the response data output of certificate response module links to each other with the response data input of controller.
In a preferred embodiment of the invention, a GPS module is further arranged on the PCB, and the position data output end of the GPS module is connected with the position data input end of the controller, so that the hand-held mobile intelligent terminal is prevented from being lost and is convenient to find.
The invention also discloses a mining method of the construction site safety image data mining system by using the block chain, which comprises the following steps:
s1, unlocking a handheld mobile intelligent terminal;
s2, judging the collected target characters in the building site area:
if the collected target person in the construction site area is a construction site constructor, judging the next target person;
if the collected target person in the construction site area is not a construction site constructor, recording a face head image of the target person, and judging the next target person.
In a preferred embodiment of the present invention, the following steps are included in step S1:
s11, the controller judges whether the controller receives a trigger signal sent by the fingerprint module or not:
if the controller receives the trigger signal sent by the fingerprint module, the controller controls the fingerprint data acquired by the fingerprint module to execute the next step;
if the controller does not receive the trigger signal sent by the fingerprint module, the controller continues to wait for the trigger signal sent by the fingerprint module;
s12, encrypting the received fingerprint data, wherein the encryption method comprises the following steps:
HaF(fingerpr int)=Hash Function(fingerpr int),
wherein HaF (fingerpr int) represents a first result of encrypting the received fingerprint data;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
HaF′(fingerpr int)=Hash Function(fingerpr int⊙T 1 ),
wherein HaF' (finger int) represents a second result of the received fingerprint data after the encryption process;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
T 1 representing a current first time when the controller processes;
the ";
s13, sending the encrypted result to the cloud platform for verification:
if the verification is successful, the unlocking of the handheld mobile intelligent terminal is successful;
And if the verification fails, locking the handheld mobile intelligent terminal.
In a preferred embodiment of the present invention, step S10 is included before step S11, and cloud platform fingerprint input processing is performed on staff on a construction site, where the specific steps include the following steps:
s101, sequentially numbering the acquired fingerprint data, wherein the fingerprint data are respectively and sequentially 1 st staff fingerprint data, 2 nd staff fingerprint data, 3 rd staff fingerprint data, … … and M th staff fingerprint data, and M is a positive integer greater than or equal to 1;
s102, carrying out encryption processing on fingerprint data of an mth staff, wherein M is a positive integer less than or equal to M; the encryption processing method comprises the following steps:
HaF(fingerpr int m )=Hash Function(fingerpr int m ),
wherein HaF (finger int m ) Representing a storage result of the fingerprint data of the mth staff after encryption processing;
hash Function () represents a Hash Function operation;
fingerpr int m fingerprint data representing an mth worker;
and S103, storing the encrypted storage result in the cloud platform after corresponding to the data before encryption.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, the cloud platform receives the first result HaF (fingerpr int), the second result HaF' (finger int) and the current first time T 1 The following operations are performed:
s132, querying the same stored result as the first result HaF (fingerpr int) according to the first result HaF (fingerpr int):
if the same storage result as the first result HaF (fingerpr int) exists, performing the next step;
if the same storage result as the first result HaF (fingerpr int) does not exist, the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S133,HaF′(fingerpr int′)=Hash Function(fingerpr int′⊙T 1 ′),
wherein HaF '(finger int') represents the verification result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
T 1 ' represent the current receivedTime T 1
The ";
s134, determining whether the verification result HaF ' (finger int ') and the second result HaF ' (finger int) are consistent:
if the verification result HaF ' (finger pr int ') is consistent with the second result HaF ' (finger pr int), the verification is successful; executing the next step;
if the verification result HaF ' (finger int ') is inconsistent with the second result HaF ' (finger int), the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S135,HaF″(fingerpr int′)=Hash Function(fingerpr int′⊙T),
wherein HaF "(finger int') represents the returned result;
Hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
t represents a time operation result;
the ";
T=T 1 ′+T 2
wherein T represents a time operation result;
T 1 ' represents the current first time T of reception 1
T 2 Representing the current second time when the cloud platform processes;
+ represents an addition operator;
returns the result HaF "(finger int') and the current second time T 2 Transmitting the data to a handheld mobile intelligent terminal;
S136,T′=T 1 +T 2 ′,
wherein T' represents a time operation first result;
T 1 representing the current first time T 1
T 2 ' represents the current second time T received by the controller 2
+ represents an addition operator;
HaF″′(fingerpr int)=Hash Function(fingerpr int⊙T′),
wherein HaF' "(finger pr int) represents return validation;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
t' represents a time operation first result;
the ";
judging whether the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '):
if the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '), the verification is successful, and the handheld mobile intelligent terminal is unlocked;
If the returned verification HaF ' (finger pr int) is inconsistent with the returned result HaF ' (finger pr int '), the verification fails, and the handheld mobile intelligent terminal is locked.
In a preferred embodiment of the present invention, step S1 further includes: when the verification of the handheld mobile intelligent terminal fails and is locked, the position of the handheld mobile intelligent terminal is sent to the cloud platform; the distance calculation method between the two handheld mobile intelligent terminals comprises the following steps:
Figure BDA0002738041030000061
s represents the distance between two handheld mobile intelligent terminals;
(X, Y, Z) represents the position coordinates of a hand-held mobile intelligent terminal;
(X 0 ,Y 0 ,Z 0 ) Representing the position coordinates of another hand-held mobile intelligent terminal.
Eta represents the error rate and eta epsilon 0,35.
In a preferred embodiment of the present invention, the following steps are included in step S2:
s21, sending the shot target person image and the verification value to a cloud platform;
the verification value calculating method comprises the following steps:
HaF(Face Image)=Hash Function(Face Image),
wherein HaF (Face Image) represents a verification value obtained by processing a captured target person image;
hash Function () represents a Hash Function operation;
face Image represents a captured target person Image;
s22, the cloud platform verifies the received target person image:
If the verification value HaF (Face Image') is consistent with the verification value HaF (Face Image), executing the next step;
the verification value calculating method comprises the following steps:
HaF(Face Image′)=Hash Function(Face Image′),
the HaF (Face Image') represents an inspection value obtained by processing a target person Image Face Image received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image' represents a target person Image Face Image received by the cloud platform;
if the verification value HaF (Face Image') is inconsistent with the verification value HaF (Face Image), re-requesting the target person Image and the verification value shot by the handheld mobile intelligent terminal; returning to step S22;
s23, extracting a face image in the target person image, and comparing whether the extracted face image exists in the cloud platform face head portrait set or not:
if the extracted face image exists in the cloud platform face head portrait set, the collected target person in the building site area is a building site building person;
if the extracted face image does not exist in the cloud platform face head portrait set, the collected target person in the building site area is not a building site building person; and recording the face image in the abnormal face head portrait set.
In a preferred embodiment of the present invention, in step S135, the method further includes unlocking the locked handheld mobile smart terminal, and the method for unlocking the locked handheld mobile smart terminal includes the following steps:
S1351, sending the shot unlocking target person image and unlocking verification value to a cloud platform;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″)=Hash Function(Face Image″),
wherein, haF (Face Image ") represents an unlocking verification value obtained after processing a photographed unlocking target person Image;
hash Function () represents a Hash Function operation;
face Image "represents a captured unlock target person Image;
s1352, the cloud platform verifies the received unlocking target person image:
if the unlocking verification value HaF (Face Image' ") is consistent with the unlocking verification value HaF (Face Image"), executing the next step;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″′)=Hash Function(Face Image″′),
the HaF (Face Image' ") represents an unlocking verification value obtained by processing an unlocking target character Image Face Image" received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image '"represents an unlocking target person Image Face Image'" received by the cloud platform;
if the unlocking verification value HaF (Face Image' ") is inconsistent with the unlocking verification value HaF (Face Image"), re-requesting the unlocking target character Image and the unlocking verification value shot by the handheld mobile intelligent terminal; returning to step S1352;
s1353, extracting a face image in the unlocking target person image, and comparing whether the extracted face image exists in the cloud platform unlocking face head portrait set or not:
If the extracted face image exists in the cloud platform unlocking face head portrait set, the hand-held mobile intelligent terminal is successfully unlocked;
if the extracted face image does not exist in the cloud platform unlocking face head portrait set, the unlocking of the handheld mobile intelligent terminal is failed; the face image in the extracted unlocking target person image is recorded in the abnormal unlocking face head portrait set.
In summary, by adopting the technical scheme, the invention can prevent the handheld mobile intelligent terminal from being stolen and unlocked and can be used for verifying whether a construction worker is or not.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and may be better understood from the following description of embodiments taken in conjunction with the accompanying drawings in which:
fig. 1 is a schematic diagram of the structure of the present invention.
Fig. 2 is a schematic structural view of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
The invention provides a construction site safety image data mining system by using a blockchain, which comprises a handheld mobile intelligent terminal, as shown in fig. 1 and 2, wherein the handheld mobile intelligent terminal comprises a shell 1, the shell 1 comprises a front shell and a rear shell, a touch display screen mounting seat for fixedly mounting a touch display screen 3 is arranged on the front shell, a front camera mounting seat for fixedly mounting a front camera 2 is arranged on the front shell, a rear camera mounting seat for fixedly mounting a rear camera 4 is arranged on the rear shell, and a PCB board mounting seat for fixedly mounting a PCB board is arranged in the shell; a touch display screen 3 is fixedly arranged on a touch display screen mounting seat, a front camera 2 is fixedly arranged on a front camera mounting seat, a rear camera 4 is fixedly arranged on a rear camera mounting seat, and a PCB board is fixedly arranged on a PCB board mounting seat;
the PCB is provided with a controller, a camera driving module, a touch display screen driving module, a wireless transceiver module and a voice module; the camera driving module comprises a front camera driving sub-module and a rear camera driving sub-module; the voice module comprises a microphone sub-module and a loudspeaker sub-module;
The front camera shooting data end of the controller is connected with the camera shooting data end of the front camera shooting driving sub-module, the camera shooting connecting end of the front camera shooting driving sub-module is connected with the front camera shooting connecting socket, the rear camera shooting data end of the controller is connected with the camera shooting data end of the rear camera shooting driving sub-module, the camera shooting connecting end of the rear camera shooting driving sub-module is connected with the rear camera shooting connecting socket, the touch display data end of the controller is connected with the touch display data end of the touch display screen driving module, and the data wireless receiving and transmitting end of the controller is connected with the data receiving and transmitting end of the wireless receiving and transmitting module; the voice data output end of the microphone sub-module is connected with the voice data input end of the controller, and the voice data input end of the speaker sub-module is connected with the voice data output end of the controller;
the camera data end of the front camera 2 is connected with the front camera connecting socket, the camera data end of the rear camera 4 is connected with the rear camera connecting socket, and the touch display data end of the touch display screen 3 is connected with the touch display connecting socket;
the intelligent terminal is used for unlocking the handheld mobile intelligent terminal, and determining whether a target person walking on the construction site is a construction worker or not.
In a preferred embodiment of the present invention, a fingerprint recognition module is provided on the touch display screen 3, and a fingerprint data output end of the fingerprint recognition module is connected with a fingerprint data input end of the controller;
or/and still including setting up the certificate response module that is used for the response certificate that the response extraneous personnel wore on the PCB board, the response data output of certificate response module links to each other with the response data input of controller. The induction certificate comprises a rectangular shell and an induction module arranged in the rectangular shell, wherein induction information is preset in the induction module, and the induction information comprises one or any combination of an ID (identification), a name and a telephone of a construction worker. The identity information of the wearer is inquired by acquiring the induction information and displaying the induction information on the touch display screen after the hand-held mobile intelligent terminal senses the induction certificate.
In a preferred embodiment of the invention, a GPS module is further arranged on the PCB, and the position data output end of the GPS module is connected with the position data input end of the controller, so that the hand-held mobile intelligent terminal is prevented from being lost and is convenient to find.
The invention also discloses a mining method of the construction site safety image data mining system by using the block chain, which comprises the following steps:
S1, unlocking a handheld mobile intelligent terminal;
s2, judging the collected target characters in the building site area:
if the collected target person in the construction site area is a construction site constructor, judging the next target person;
if the collected target person in the construction site area is not a construction site constructor, recording a face head image of the target person, and judging the next target person.
In a preferred embodiment of the present invention, the following steps are included in step S1:
s11, the controller judges whether the controller receives a trigger signal sent by the fingerprint module or not:
if the controller receives the trigger signal sent by the fingerprint module, the controller controls the fingerprint data acquired by the fingerprint module to execute the next step;
if the controller does not receive the trigger signal sent by the fingerprint module, the controller continues to wait for the trigger signal sent by the fingerprint module;
s12, encrypting the received fingerprint data, wherein the encryption method comprises the following steps:
HaF(fingerpr int)=Hash Function(fingerpr int),
wherein HaF (fingerpr int) represents a first result of encrypting the received fingerprint data;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
HaF′(fingerpr int)=Hash Function(fingerpr int⊙T 1 ),
wherein HaF' (finger int) represents a second result of the received fingerprint data after the encryption process;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
T 1 representing a current first time when the controller processes;
the ";
s13, sending the encrypted result to the cloud platform for verification:
if the verification is successful, the unlocking of the handheld mobile intelligent terminal is successful;
and if the verification fails, locking the handheld mobile intelligent terminal.
In a preferred embodiment of the present invention, step S10 is included before step S11, and cloud platform fingerprint input processing is performed on staff on a construction site, where the specific steps include the following steps:
s101, sequentially numbering the acquired fingerprint data, wherein the fingerprint data are respectively and sequentially 1 st staff fingerprint data, 2 nd staff fingerprint data, 3 rd staff fingerprint data, … … and M th staff fingerprint data, and M is a positive integer greater than or equal to 1;
s102, carrying out encryption processing on fingerprint data of an mth staff, wherein M is a positive integer less than or equal to M; the encryption processing method comprises the following steps:
HaF(fingerpr int m )=Hash Function(fingerpr int m ),
Wherein HaF (finger int m ) Representing a storage result of the fingerprint data of the mth staff after encryption processing;
hash Function () represents a Hash Function operation;
fingerpr int m fingerprint data representing an mth worker;
s103, storing the encrypted storage result in the cloud platform after corresponding to the data before encryption, and uploading the storage result to the blockchain.
In a preferred embodiment of the present invention, the following steps are included in step S13:
s131, the cloud platform receives the first result HaF (fingerpr int), the second result HaF' (finger int) and the current first time T 1 The following operations are performed:
s132, querying the same stored result as the first result HaF (fingerpr int) according to the first result HaF (fingerpr int):
if the same storage result as the first result HaF (fingerpr int) exists, performing the next step;
if the same storage result as the first result HaF (fingerpr int) does not exist, the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S133,HaF′(fingerpr int′)=Hash Function(fingerpr int′⊙T 1 ′),
wherein HaF '(finger int') represents the verification result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
T 1 ' represents the current first time T of reception 1
The ";
s134, determining whether the verification result HaF ' (finger int ') and the second result HaF ' (finger int) are consistent:
if the verification result HaF ' (finger pr int ') is consistent with the second result HaF ' (finger pr int), the verification is successful; executing the next step;
if the verification result HaF ' (finger int ') is inconsistent with the second result HaF ' (finger int), the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S135,HaF″(fingerpr int′)=Hash Function(fingerpr int′⊙T),
wherein HaF "(finger int') represents the returned result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
t represents a time operation result;
the ";
T=T 1 ′+T 2
wherein T represents a time operation result;
T 1 ' represents the current first time T of reception 1
T 2 Representing the current second time when the cloud platform processes;
+ represents an addition operator;
returns the result HaF "(finger int') and the current second time T 2 Transmitting the data to a handheld mobile intelligent terminal;
S136,T′=T 1 +T 2 ′,
wherein T' represents a time operation first result;
T 1 representing the current first time T 1
T 2 ' represents the current second time T received by the controller 2
+ represents an addition operator;
HaF″′(fingerpr int)=Hash Function(fingerpr int⊙T′),
wherein HaF' "(finger pr int) represents return validation;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
t' represents a time operation first result;
the ";
judging whether the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '):
if the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '), the verification is successful, and the handheld mobile intelligent terminal is unlocked;
if the returned verification HaF ' (finger pr int) is inconsistent with the returned result HaF ' (finger pr int '), the verification fails, and the handheld mobile intelligent terminal is locked.
In a preferred embodiment of the present invention, step S1 further includes: when the verification of the handheld mobile intelligent terminal fails and is locked, the position of the handheld mobile intelligent terminal is sent to the cloud platform; the distance calculation method between the two handheld mobile intelligent terminals comprises the following steps:
Figure BDA0002738041030000141
s represents the distance between two handheld mobile intelligent terminals;
(X, Y, Z) represents the position coordinates of a hand-held mobile intelligent terminal;
(X 0 ,Y 0 ,Z 0 ) Representing the position coordinates of another hand-held mobile intelligent terminal.
Eta represents the error rate and eta epsilon 0,35.
In a preferred embodiment of the present invention, the following steps are included in step S2:
s21, sending the shot target person image and the verification value to a cloud platform;
the verification value calculating method comprises the following steps:
HaF(Face Image)=Hash Function(Face Image),
wherein HaF (Face Image) represents a verification value obtained by processing a captured target person image;
hash Function () represents a Hash Function operation;
face Image represents a captured target person Image;
s22, the cloud platform verifies the received target person image:
if the verification value HaF (Face Image') is consistent with the verification value HaF (Face Image), executing the next step;
the verification value calculating method comprises the following steps:
HaF(Face Image′)=Hash Function(Face Image′),
the HaF (Face Image') represents an inspection value obtained by processing a target person Image Face Image received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image' represents a target person Image Face Image received by the cloud platform;
if the verification value HaF (Face Image') is inconsistent with the verification value HaF (Face Image), re-requesting the target person Image and the verification value shot by the handheld mobile intelligent terminal; returning to step S22;
s23, extracting a face image in the target person image, and comparing whether the extracted face image exists in the cloud platform face head portrait set or not:
The formation of the cloud platform face head portrait set comprises the following steps:
s231, the camera shoots M face images by rotating around the same horizontal plane with the head as the center, wherein M is a positive integer greater than or equal to 3 and is respectively the 1 st image of the face
Figure BDA0002738041030000161
Face
2 nd image->
Figure BDA0002738041030000162
Face 3 rd image->
Figure BDA0002738041030000163
… …, face Mth image +.>
Figure BDA0002738041030000164
α m The camera is deviated from an angle opposite to the rotation of the face around the head, and M is a positive integer less than or equal to M; />
Figure BDA0002738041030000165
Wherein alpha is m When the angle is negative, the angle indicating that the camera deviates rightwards around the head as the center and faces to rotate is |alpha m |;α m In order to be positive, the angle of the camera which deviates leftwards around the head as the center and faces the face is |alpha m |;α m When the angle is 0 DEG, the camera is right against the face around the head; i.e.
Figure BDA0002738041030000166
S232, regarding the nth image of the face acquired in the step S231
Figure BDA0002738041030000167
Performing image preprocessing, wherein n is a positive integer less than or equal to M; in this embodiment, the n-th image of its face +.>
Figure BDA0002738041030000168
The image preprocessing comprises the steps of (a) performing image preprocessing on an nth image of a human face>
Figure BDA0002738041030000169
Image separation processing is performed, which is performed on the n-th image of the face +.>
Figure BDA00027380410300001610
The method for performing image separation processing comprises the following steps:
S2321,
Figure BDA00027380410300001611
wherein w represents the number of target pixel points and the nth image of the human face
Figure BDA00027380410300001612
Is a ratio of (2);
p represents the nth image of the face
Figure BDA00027380410300001613
Is a width of (2);
q represents the nth image of the face
Figure BDA00027380410300001614
Is of a height of (2); />
N represents setting the nth image of face
Figure BDA00027380410300001615
The number of gray values in (a) is smaller than the image separation threshold H;
S2322,
Figure BDA00027380410300001616
w' represents the number of background pixel points and the nth image of the human face
Figure BDA00027380410300001617
Is a ratio of (2);
Figure BDA00027380410300001618
wherein ζ represents an average gray value of the target image;
A i ∈A={A 1 ,A 2 ,A 3 ,...,A N ,A N+1 },A i representing the gray value of the ith pixel point in the target image; a represents a target scene image pixel set;
S2323,
Figure BDA00027380410300001619
wherein ζ represents an average gray value of the background image;
B j ∈B={B 1 ,B 2 ,B 3 ,...,B P×Q-N ,B P×Q-N+1 },B j a gray value representing a j-th pixel point in the background image; b represents a background image pixel set;
S2324,
Figure BDA0002738041030000171
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure BDA0002738041030000172
n-th image representing face->
Figure BDA0002738041030000173
Is a mean gray value of (2);
S2325,
Figure BDA0002738041030000174
wherein η represents an image gray variance value;
using its traversing method to make its image gray level variance value be maximally eta max When the image separation threshold H is obtained;
s2326, judging the nth image of the face
Figure BDA0002738041030000175
Gray value of kth pixel in (2)>
Figure BDA0002738041030000176
Size relation with image separation threshold H:
if it is
Figure BDA0002738041030000177
Make->
Figure BDA0002738041030000178
k=1,2,3,…,P×Q;
If it is
Figure BDA0002738041030000179
Make->
Figure BDA00027380410300001710
S233, extracting the corresponding relation between the right-facing face image and the face image deviating from the right-facing face and/or the face image deviating from the right-facing face.
In a preferred embodiment of the present invention, in step S233, the following steps are included:
Taking the center of the camera lens as the coordinate origin of the XYZ axis, taking the left of the camera lens as the positive direction of the X axis, taking the upward of the camera lens as the positive direction of the Y axis, and pointing to the positive direction of the camera lens as the Z axis;
s2331, extracting the face features of the opposite face image, namely the 1 st feature of the opposite face, the 2 nd feature of the opposite face, the 3 rd feature of the opposite face, … … and the V-th feature of the opposite face in sequence, wherein V is a positive integer greater than or equal to 1, and V represents the number of face pixels in the opposite face image; the coordinates of the pixel points corresponding to the v-th feature of the face are (x) v ,y v ,z v ) V is a positive integer less than or equal to V; the rotation center point coordinates thereof are (x v ′,y v ′,z v ′);
S2332, calculating the coordinates (x) of the v-th feature and the rotation center point of the face v ′,y v ′,z v ') facing the v-th feature of the face and the rotation center point coordinates (x) v ′,y v ′,z v The calculation method of the distance of') is as follows:
Figure BDA0002738041030000181
wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing coordinates of pixel points corresponding to v-th features of face;
S2333, extract left deviation
Figure BDA0002738041030000182
The face features of the right-facing face image are respectively and sequentially a 1 st feature of the right-facing face, a 2 nd feature of the right-facing face, a 3 rd feature of the right-facing face, … … and a V ' feature of the right-facing face, wherein V ' is a positive integer greater than or equal to 1, and V ' represents the number of face pixel points in the right-facing face image; the coordinates of the pixel points corresponding to the v 'th feature of the face which deviates leftwards and is just opposite to the v' th feature of the face are (x) v′ ,y v′ ,z v′ ) V 'is a positive integer less than or equal to V'; />
Figure BDA0002738041030000183
Alpha represents a shooting angle set;
s2334 to deviate it to the left
Figure BDA0002738041030000186
The coordinates of the pixel points corresponding to the v' th feature of the face are (x) v′ ,y v′ ,z v′ ) Converting into pixel coordinates facing the face:
Figure BDA0002738041030000184
i.e.
Figure BDA0002738041030000185
Wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing the coordinates of the pixel points corresponding to the v-th feature of the face;
(x v′ ,y v′ ,z v′ ) Representing pixel point coordinates corresponding to v' features of the right-facing face deviating leftwards;
s2335, determining the pixel coordinates (x v ,y v ,z v ) Whether the corresponding face features deviate from the left
Figure BDA0002738041030000191
The coordinates of the pixel points facing the face (x v′ ,y v′ ,z v′ ) The corresponding face features are consistent:
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features deviate to the left
Figure BDA0002738041030000192
The coordinates of the pixel points facing the face (x v′ ,y v′ ,z v′ ) Corresponding face features are consistent, and deviate leftwards +.>
Figure BDA0002738041030000193
Adding 1 to the face statistics value;
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features deviate to the left
Figure BDA0002738041030000194
The coordinates of the pixel points facing the face (x v′ ,y v′ ,z v′ ) The corresponding face features are inconsistent, and deviate leftwards from +.>
Figure BDA0002738041030000195
Adding 0 to the face statistics value;
s2336, calculating a human face characteristic left-direction proportion value, wherein the calculation method of the human face characteristic left-direction proportion value comprises the following steps:
Figure BDA0002738041030000196
/>
Wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure BDA0002738041030000197
representing the left-direction proportional value of the face characteristics;
Figure BDA0002738041030000198
indicating deviation to the left +.>
Figure BDA0002738041030000199
The number of the face features facing the face image is the same as the number of the face features facing the face image;
F 0 representing the number of face features facing the face image;
s2337, the obtained right-facing face image and the left-facing face feature proportion value are processed
Figure BDA00027380410300001910
And forming a cloud platform face head portrait set.
In a preferred embodiment of the present invention, in step S233, the following steps are included:
taking the center of the camera lens as the coordinate origin of the XYZ axis, taking the left of the camera lens as the positive direction of the X axis, taking the upward of the camera lens as the positive direction of the Y axis, and pointing to the positive direction of the camera lens as the Z axis;
s2331, extracting the face features of the opposite face image, namely the 1 st feature of the opposite face, the 2 nd feature of the opposite face, the 3 rd feature of the opposite face, … … and the V-th feature of the opposite face in sequence, wherein V is a positive integer greater than or equal to 1, and V represents the number of face pixels in the opposite face image; the coordinates of the pixel points corresponding to the v-th feature of the face are (x) v ,y v ,z v ) V is a positive integer less than or equal to V; the rotation center point coordinates thereof are (x v ′,y v ′,z v ′);
S2332, calculating the coordinates (x) of the v-th feature and the rotation center point of the face v ′,y v ′,z v ') facing the v-th feature of the face and the rotation center point coordinates (x) v ′,y v ′,z v The calculation method of the distance of') is as follows:
Figure BDA0002738041030000201
wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing the coordinates of the pixel points corresponding to the v-th feature of the face;
s2333, extract right deviation
Figure BDA0002738041030000202
The face features of the right-facing face image are respectively and sequentially a 1 st feature of the right-facing face, a 2 nd feature of the right-facing face, a 3 rd feature of the right-facing face, … … and a V ' feature of the right-facing face, wherein V ' is a positive integer greater than or equal to 1, and V ' represents the number of face pixel points in the right-facing face image; the coordinates of the pixel points corresponding to the v' th feature of the right-deviated face are (x) v″ ,y v″ ,z v″ ) The V 'is a positive integer less than or equal to V'; />
Figure BDA0002738041030000203
Alpha represents a shooting angle set;
s2334 deviating it to the right
Figure BDA0002738041030000204
The coordinates of the pixel points corresponding to the v' th feature of the face are (x) v″ ,y v″ ,z v″ ) Converting into pixel coordinates facing the face:
Figure BDA0002738041030000205
i.e.
Figure BDA0002738041030000206
Wherein l v Representing the v-th feature of the face and the coordinates (x v ′,y v ′,z v ') distance;
(x v ′,y v ′,z v ') represents rotation center point coordinates;
(x v ,y v ,z v ) Representing the coordinates of the pixel points corresponding to the v-th feature of the face;
(x v″ ,y v″ ,z v″ ) Representing pixel point coordinates corresponding to v' features of the right-facing face deviating leftwards;
s2335, determining the pixel coordinates (x v ,y v ,z v ) Whether the corresponding face features deviate from the right
Figure BDA0002738041030000207
The coordinates of the pixel points facing the face (x v″ ,y v″ ,z v″ ) The corresponding face features are consistent:
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features deviate from the right
Figure BDA0002738041030000208
The coordinates of the pixel points facing the face (x v″ ,y v″ ,z v″ ) Corresponding face features are consistent, and deviate rightwards +.>
Figure BDA0002738041030000209
Adding 1 to the face statistics value;
if the pixel coordinates (x v ,y v ,z v ) The corresponding face features do not deviate from the right
Figure BDA0002738041030000211
Pixel point coordinates facing to human face(x v″ ,y v″ ,z v″ ) Corresponding face features are consistent, and deviate rightwards +.>
Figure BDA0002738041030000212
Adding 0 to the face statistics value;
s2336, calculating a right-direction proportional value of the face feature, wherein the method for calculating the right-direction proportional value of the face feature comprises the following steps:
Figure BDA0002738041030000213
wherein, the liquid crystal display device comprises a liquid crystal display device,
Figure BDA0002738041030000214
representing the right-direction proportional value of the face characteristics;
Figure BDA0002738041030000215
indicating a rightward deviation +.>
Figure BDA0002738041030000216
The number of the face features facing the face image is the same as the number of the face features facing the face image;
F 0 representing the number of face features facing the face image;
s2337, right-direction proportion value of the obtained right-direction face image and face characteristic is obtained
Figure BDA0002738041030000217
And forming a cloud platform face head portrait set.
The comparison method comprises the following steps: s2300, acquiring a facing face image in the cloud platform face head portrait set, and converting the facing face into deviation phi τ Is opposite to the face of the person,
Figure BDA0002738041030000218
which converts the facing face into a deviation phi τ The method for computing the face facing comprises the following steps: the pixel coordinates which are opposite to the face are deviated
Figure BDA0002738041030000219
The corresponding face features are replaced with pixel coordinates (x v ,y v ,z v ) Corresponding face features; (x) v ′,y v ′,z v ' indicates the rotation center point coordinates when +.>
Figure BDA00027380410300002110
φ τ At > 0, phi τ E, alpha represents a shooting angle set; or->
Figure BDA00027380410300002111
φ τ When the number is less than 0, a contrast face head portrait set is obtained; the face head portrait set is used as a cloud platform face head portrait set;
if the extracted face image exists in the cloud platform face head portrait set, the collected target person in the building site area is a building site building person;
if the extracted face image does not exist in the cloud platform face head portrait set, the collected target person in the building site area is not a building site building person; and recording the face image in the abnormal face head portrait set.
In a preferred embodiment of the present invention, in step S135, the method further includes unlocking the locked handheld mobile smart terminal, and the method for unlocking the locked handheld mobile smart terminal includes the following steps:
S1351, sending the shot unlocking target person image and unlocking verification value to a cloud platform;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″)=Hash Function(Face Image″),
wherein, haF (Face Image ") represents an unlocking verification value obtained after processing a photographed unlocking target person Image;
hash Function () represents a Hash Function operation;
face Image "represents a captured unlock target person Image;
s1352, the cloud platform verifies the received unlocking target person image:
if the unlocking verification value HaF (Face Image' ") is consistent with the unlocking verification value HaF (Face Image"), executing the next step;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″′)=Hash Function(Face Image″′),
the HaF (Face Image' ") represents an unlocking verification value obtained by processing an unlocking target character Image Face Image" received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image '"represents an unlocking target person Image Face Image'" received by the cloud platform;
if the unlocking verification value HaF (Face Image' ") is inconsistent with the unlocking verification value HaF (Face Image"), re-requesting the unlocking target character Image and the unlocking verification value shot by the handheld mobile intelligent terminal; returning to step S1352;
s1353, extracting a face image in the unlocking target person image, and comparing whether the extracted face image exists in the cloud platform unlocking face head portrait set or not:
If the extracted face image exists in the cloud platform unlocking face head portrait set, the hand-held mobile intelligent terminal is successfully unlocked;
if the extracted face image does not exist in the cloud platform unlocking face head portrait set, the unlocking of the handheld mobile intelligent terminal is failed; the face image in the extracted unlocking target person image is recorded in the abnormal unlocking face head portrait set.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: many changes, modifications, substitutions and variations may be made to the embodiments without departing from the spirit and principles of the invention, the scope of which is defined by the claims and their equivalents.

Claims (7)

1. The system for mining the safety image data of the construction site by utilizing the blockchain is characterized by comprising a handheld mobile intelligent terminal, wherein the handheld mobile intelligent terminal comprises a shell (1), the shell (1) comprises a front shell and a rear shell, a touch display screen mounting seat for fixedly mounting a touch display screen (3) is arranged on the front shell, a front camera mounting seat for fixedly mounting a front camera (2) is arranged on the front shell, a rear camera mounting seat for fixedly mounting a rear camera (4) is arranged on the rear shell, and a PCB mounting seat for fixedly mounting a PCB is arranged in the shell; a touch display screen (3) is fixedly arranged on a touch display screen mounting seat, a front camera (2) is fixedly arranged on a front camera mounting seat, a rear camera (4) is fixedly arranged on a rear camera mounting seat, and a PCB (printed circuit board) is fixedly arranged on a PCB mounting seat;
The PCB is provided with a controller, a camera driving module, a touch display screen driving module, a wireless transceiver module and a voice module; the camera driving module comprises a front camera driving sub-module and a rear camera driving sub-module; the voice module comprises a microphone sub-module and a loudspeaker sub-module;
the front camera shooting data end of the controller is connected with the camera shooting data end of the front camera shooting driving sub-module, the camera shooting connecting end of the front camera shooting driving sub-module is connected with the front camera shooting connecting socket, the rear camera shooting data end of the controller is connected with the camera shooting data end of the rear camera shooting driving sub-module, the camera shooting connecting end of the rear camera shooting driving sub-module is connected with the rear camera shooting connecting socket, the touch display data end of the controller is connected with the touch display data end of the touch display screen driving module, and the data wireless receiving and transmitting end of the controller is connected with the data receiving and transmitting end of the wireless receiving and transmitting module; the voice data output end of the microphone sub-module is connected with the voice data input end of the controller, and the voice data input end of the speaker sub-module is connected with the voice data output end of the controller;
the camera data end of the front camera (2) is connected with the front camera connecting socket, the camera data end of the rear camera (4) is connected with the rear camera connecting socket, and the touch display data end of the touch display screen (3) is connected with the touch display connecting socket;
The cloud platform is used for determining whether a target person walking on a construction site is a construction worker or not after the handheld mobile intelligent terminal is unlocked;
the mining method for the construction site safety image data mining system by using the block chain comprises the following steps:
s1, unlocking a handheld mobile intelligent terminal;
s2, judging the collected target characters in the building site area:
if the collected target person in the construction site area is a construction site constructor, judging the next target person;
if the collected target person in the construction site area is not a construction site constructor, recording a face head portrait of the target person, and judging the next target person;
further, the step S1 includes the following steps:
s11, the controller judges whether the controller receives a trigger signal sent by the fingerprint module or not:
if the controller receives the trigger signal sent by the fingerprint module, the controller controls the fingerprint data acquired by the fingerprint module to execute the next step;
if the controller does not receive the trigger signal sent by the fingerprint module, the controller continues to wait for the trigger signal sent by the fingerprint module;
s12, encrypting the received fingerprint data, wherein the encryption method comprises the following steps:
HaF(fingerpr int)=Hash Function(fingerpr int),
Wherein HaF (fingerpr int) represents a first result of encrypting the received fingerprint data;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
HaF′(fingerpr int)=Hash Function(fingerpr int⊙T 1 ),
wherein HaF' (finger int) represents a second result of the received fingerprint data after the encryption process;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
T 1 representing a current first time when the controller processes;
the ";
s13, sending the encrypted result to the cloud platform for verification:
if the verification is successful, the unlocking of the handheld mobile intelligent terminal is successful;
if the verification fails, locking the handheld mobile intelligent terminal;
further, in step S13, the following steps are included:
s131, the cloud platform receives the first result HaF (fingerpr int), the second result HaF' (finger int) and the current first time T 1 The following operations are performed:
s132, querying the same stored result as the first result HaF (fingerpr int) according to the first result HaF (fingerpr int):
if the same storage result as the first result HaF (fingerpr int) exists, performing the next step;
If the same storage result as the first result HaF (fingerpr int) does not exist, the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S133,HaF′(fingerpr int′)=Hash Function(fingerpr int′⊙T 1 ′),
wherein HaF '(finger int') represents the verification result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
T 1 ' represents the current first time T of reception 1
The ";
s134, determining whether the verification result HaF ' (finger int ') and the second result HaF ' (finger int) are consistent:
if the verification result HaF ' (finger pr int ') is consistent with the second result HaF ' (finger pr int), the verification is successful; executing the next step;
if the verification result HaF ' (finger int ') is inconsistent with the second result HaF ' (finger int), the verification fails; sending verification failure information to the handheld mobile intelligent terminal;
S135,HaF″(fingerpr int′)=Hash Function(fingerpr int′⊙T),
wherein HaF "(finger int') represents the returned result;
hash Function () represents a Hash Function operation;
finger pr int' represents fingerprint data corresponding to the same stored result as the first result HaF (fingerpr int);
t represents a time operation result;
The ";
T=T 1 ′+T 2
wherein T represents a time operation result;
T 1 ' represents the current first time T of reception 1
T 2 Representing the current second time when the cloud platform processes;
+ represents an addition operator;
returns the result HaF "(finger int') and the current second time T 2 Transmitting the data to a handheld mobile intelligent terminal;
S136,T′=T 1 +T 2 ′,
wherein T' represents a time operation first result;
T 1 representing the current first time T 1
T 2 ' represents the current second time T received by the controller 2
+ represents an addition operator;
HaF″′(fingerpr int)=Hash Function(fingerpr int∈T′),
wherein HaF' "(finger pr int) represents return validation;
hash Function () represents a Hash Function operation;
finger pr int represents the received fingerprint data;
t' represents a time operation first result;
the ";
judging whether the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '):
if the returned verification HaF ' (finger pr int) is consistent with the returned result HaF ' (finger pr int '), the verification is successful, and the handheld mobile intelligent terminal is unlocked;
if the returned verification HaF ' (finger pr int) is inconsistent with the returned result HaF ' (finger pr int '), the verification fails, and the handheld mobile intelligent terminal is locked.
2. The system for mining safety image data of construction site by using blockchain according to claim 1, wherein a fingerprint identification module is arranged on the touch display screen (3), and a fingerprint data output end of the fingerprint identification module is connected with a fingerprint data input end of the controller;
Or/and still including setting up the certificate response module that is used for the response certificate that the response extraneous personnel wore on the PCB board, the response data output of certificate response module links to each other with the response data input of controller.
3. The system for mining safety image data of construction site by using blockchain as in claim 1, wherein a GPS module is further provided on the PCB board, and a position data output terminal of the GPS module is connected to a position data input terminal of the controller, so as to prevent the hand-held mobile intelligent terminal from being lost and facilitate searching.
4. The system for mining safety image data of construction site by using blockchain according to claim 1, wherein the system comprises step S10 before step S11, and the cloud platform fingerprint input process is performed on the staff of the construction site, and the specific steps comprise the following steps:
s101, sequentially numbering the acquired fingerprint data, wherein the fingerprint data are respectively and sequentially 1 st staff fingerprint data, 2 nd staff fingerprint data, 3 rd staff fingerprint data, … … and M th staff fingerprint data, and M is a positive integer greater than or equal to 1;
s102, carrying out encryption processing on fingerprint data of an mth staff, wherein M is a positive integer less than or equal to M; the encryption processing method comprises the following steps:
HaF(fingerpr int m )=Hash Function(fingerpr int m ),
Wherein HaF (finger int m ) Representing a storage result of the fingerprint data of the mth staff after encryption processing;
hash Function () represents a Hash Function operation;
fingerpr int m fingerprint data representing an mth worker;
and S103, storing the encrypted storage result in the cloud platform after corresponding to the data before encryption.
5. The construction site safety image data mining system using blockchain as in claim 1, further comprising in step S1: when the verification of the handheld mobile intelligent terminal fails and is locked, the position of the handheld mobile intelligent terminal is sent to the cloud platform; the distance calculation method between the two handheld mobile intelligent terminals comprises the following steps:
Figure FDA0003930707490000061
s represents the distance between two handheld mobile intelligent terminals;
(X, Y, Z) represents the position coordinates of a hand-held mobile intelligent terminal;
(X 0 ,Y 0 ,Z 0 ) Representing the position coordinates of another handheld mobile intelligent terminal;
eta represents the error rate and eta epsilon 0,35.
6. The construction site safety image data mining system using blockchain as in claim 1, wherein in step S2, the steps of:
s21, sending the shot target person image and the verification value to a cloud platform;
the verification value calculating method comprises the following steps:
HaF(Face Image)=Hash Function(Face Image),
Wherein HaF (Face Image) represents a verification value obtained by processing a captured target person image;
hash Function () represents a Hash Function operation;
face Image represents a captured target person Image;
s22, the cloud platform verifies the received target person image:
if the verification value HaF (Face Image') is consistent with the verification value HaF (Face Image), executing the next step;
the verification value calculating method comprises the following steps:
HaF(Face Image′)=Hash Function(Face Image′),
the HaF (Face Image') represents an inspection value obtained by processing a target person Image Face Image received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image' represents a target person Image Face Image received by the cloud platform;
if the verification value HaF (Face Image') is inconsistent with the verification value HaF (Face Image), re-requesting the target person Image and the verification value shot by the handheld mobile intelligent terminal; returning to step S22;
s23, extracting a face image in the target person image, and comparing whether the extracted face image exists in the cloud platform face head portrait set or not:
if the extracted face image exists in the cloud platform face head portrait set, the collected target person in the building site area is a building site building person;
If the extracted face image does not exist in the cloud platform face head portrait set, the collected target person in the building site area is not a building site building person; and recording the face image in the abnormal face head portrait set.
7. The system for building site security image data mining using blockchain as in claim 1, further comprising unlocking the locked handheld mobile smart terminal in step S135, wherein the method for unlocking the locked handheld mobile smart terminal comprises the steps of:
s1351, sending the shot unlocking target person image and unlocking verification value to a cloud platform;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″)=Hash Function(Face Image″),
wherein, haF (Face Image ") represents an unlocking verification value obtained after processing a photographed unlocking target person Image;
hash Function () represents a Hash Function operation;
face Image "represents a captured unlock target person Image;
s1352, the cloud platform verifies the received unlocking target person image:
if the unlocking verification value HaF (Face Image' ") is consistent with the unlocking verification value HaF (Face Image"), executing the next step;
the calculation method of the unlocking verification value comprises the following steps:
HaF(Face Image″′)=Hash Function(Face Image″′),
The HaF (Face Image' ") represents an unlocking verification value obtained by processing an unlocking target character Image Face Image" received by the cloud platform;
hash Function () represents a Hash Function operation;
the Face Image '"represents an unlocking target person Image Face Image'" received by the cloud platform;
if the unlocking verification value HaF (Face Image' ") is inconsistent with the unlocking verification value HaF (Face Image"), re-requesting the unlocking target character Image and the unlocking verification value shot by the handheld mobile intelligent terminal; returning to step S1352;
s1353, extracting a face image in the unlocking target person image, and comparing whether the extracted face image exists in the cloud platform unlocking face head portrait set or not:
if the extracted face image exists in the cloud platform unlocking face head portrait set, the hand-held mobile intelligent terminal is successfully unlocked;
if the extracted face image does not exist in the cloud platform unlocking face head portrait set, the unlocking of the handheld mobile intelligent terminal is failed; the face image in the extracted unlocking target person image is recorded in the abnormal unlocking face head portrait set.
CN202011140425.4A 2020-10-22 2020-10-22 Construction site safety image data mining method by using block chain Active CN112543241B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011140425.4A CN112543241B (en) 2020-10-22 2020-10-22 Construction site safety image data mining method by using block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011140425.4A CN112543241B (en) 2020-10-22 2020-10-22 Construction site safety image data mining method by using block chain

Publications (2)

Publication Number Publication Date
CN112543241A CN112543241A (en) 2021-03-23
CN112543241B true CN112543241B (en) 2023-05-30

Family

ID=75013913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011140425.4A Active CN112543241B (en) 2020-10-22 2020-10-22 Construction site safety image data mining method by using block chain

Country Status (1)

Country Link
CN (1) CN112543241B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113382204A (en) * 2021-05-22 2021-09-10 特斯联科技集团有限公司 Intelligent processing method and device for fire-fighting hidden danger

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439982A (en) * 2002-02-20 2003-09-03 安时乐公司 Time marking system and progam medium for electronic files
CN102916968A (en) * 2012-10-29 2013-02-06 北京天诚盛业科技有限公司 Identity authentication method, identity authentication server and identity authentication device
CN102932635A (en) * 2012-11-22 2013-02-13 南京明德软件有限公司 Real-time image processing system and method
CN104680389A (en) * 2015-03-13 2015-06-03 杭州沃朴物联科技有限公司 NFC mobile phone terminal anti-fake system and method based on time encryption
US9443108B1 (en) * 2014-06-27 2016-09-13 Amazon Technologies, Inc. Secure timestamping
CN106657166A (en) * 2017-03-09 2017-05-10 腾讯科技(深圳)有限公司 Identity verification method, terminal device and server
CN106850603A (en) * 2017-01-19 2017-06-13 北京洋浦伟业科技发展有限公司 A kind of whitepack password Bidirectional identity authentication method, terminal, service end and system
CN109617669A (en) * 2018-11-30 2019-04-12 广州高清视信数码科技股份有限公司 The authentication method and terminal device of set-top box remote controller based on hash algorithm
EP3605944A1 (en) * 2018-07-31 2020-02-05 Siemens Healthcare GmbH Documenting timestamps within a blockchain

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006311529A (en) * 2005-03-30 2006-11-09 Seiko Epson Corp Authentication system and authentication method therefor, authentication server and authentication method therefor, recording medium, and program
CN101309278B (en) * 2008-06-27 2011-07-06 腾讯科技(深圳)有限公司 Method and system for storing encrypt data on customer
CN202795159U (en) * 2012-08-24 2013-03-13 广东电网公司信息中心 Hand-held mobile terminal
JP2016111660A (en) * 2014-11-27 2016-06-20 パナソニックIpマネジメント株式会社 Authentication server, terminal and authentication method
CN204632305U (en) * 2015-05-26 2015-09-09 成都万维图新信息技术有限公司 A kind of smart travel service terminal based on mobile communication
CN106547465A (en) * 2016-10-14 2017-03-29 青岛海信移动通信技术股份有限公司 A kind of fast operating method and mobile terminal of mobile terminal
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN107731138A (en) * 2017-11-09 2018-02-23 成都优力德新能源有限公司 A kind of smart travel service terminal based on mobile communication
CN108418920B (en) * 2018-03-06 2021-01-26 京东方科技集团股份有限公司 Intelligent terminal and control method thereof
CN108632293B (en) * 2018-05-16 2021-08-06 山东建筑大学 Building equipment Internet of things system and method based on block chain technology
CN110098932B (en) * 2019-05-16 2022-10-28 江苏慧世联网络科技有限公司 Electronic document signing method based on safe electronic notarization technology
CN209980270U (en) * 2019-05-31 2020-01-21 张斯妍 Hand-held biological characteristic recognition terminal based on artificial intelligence
CN111314056B (en) * 2020-03-31 2022-07-01 四川九强通信科技有限公司 Heaven and earth integrated network anonymous access authentication method based on identity encryption system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1439982A (en) * 2002-02-20 2003-09-03 安时乐公司 Time marking system and progam medium for electronic files
CN102916968A (en) * 2012-10-29 2013-02-06 北京天诚盛业科技有限公司 Identity authentication method, identity authentication server and identity authentication device
CN102932635A (en) * 2012-11-22 2013-02-13 南京明德软件有限公司 Real-time image processing system and method
US9443108B1 (en) * 2014-06-27 2016-09-13 Amazon Technologies, Inc. Secure timestamping
CN104680389A (en) * 2015-03-13 2015-06-03 杭州沃朴物联科技有限公司 NFC mobile phone terminal anti-fake system and method based on time encryption
WO2016145705A1 (en) * 2015-03-13 2016-09-22 杭州沃朴物联科技有限公司 Time-based encrypted nfc cell phone terminal anti-counterfeit system and method
CN106850603A (en) * 2017-01-19 2017-06-13 北京洋浦伟业科技发展有限公司 A kind of whitepack password Bidirectional identity authentication method, terminal, service end and system
CN106657166A (en) * 2017-03-09 2017-05-10 腾讯科技(深圳)有限公司 Identity verification method, terminal device and server
EP3605944A1 (en) * 2018-07-31 2020-02-05 Siemens Healthcare GmbH Documenting timestamps within a blockchain
CN109617669A (en) * 2018-11-30 2019-04-12 广州高清视信数码科技股份有限公司 The authentication method and terminal device of set-top box remote controller based on hash algorithm

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Hash函数结合相互认证的智能卡远程双向安全认证方案;周扬;龚畅;徐平平;王伟;;计算机测量与控制(第06期);全文 *
基于散列时间有效性的轻量级完整性监测方法;徐钦桂;秦勇;杨桃栏;;计算机研究与发展(第03期);全文 *
基于身份标识加密的身份认证方案;黄仁季;吴晓平;李洪成;;网络与信息安全学报(第06期);全文 *

Also Published As

Publication number Publication date
CN112543241A (en) 2021-03-23

Similar Documents

Publication Publication Date Title
US11544984B2 (en) Systems and methods for location identification and tracking using a camera
US10599912B2 (en) Analysis of reflections of projected light in varying colors, brightness, patterns, and sequences for liveness detection in biometric systems
US8254642B2 (en) Personal authentication method and personal authentication device
US10915777B2 (en) Communication terminal, communication system, and image processing method
WO2015131712A1 (en) Face recognition method, device and computer readable storage medium
CN111340634B (en) System and method for assisting mobile equipment in implementing screen crush risk
CN104246793A (en) Three-dimensional face recognition for mobile devices
CN109002786B (en) Face detection method, face detection equipment and computer-readable storage medium
US20230076392A1 (en) Electronic device capable of identifying ineligible object
US10395379B2 (en) Image object tracking method and apparatus
CN102197412A (en) Spoofing detection system, spoofing detection method and spoofing detection program
US11245707B2 (en) Communication terminal, communication system, communication control method, and recording medium
WO2007063970A1 (en) Monitor camera system and face image trace recording method
JP2007249586A (en) Authentication device, authentication method, authentication program and computer-readable recording medium
CN112543241B (en) Construction site safety image data mining method by using block chain
EP3457365B1 (en) Personal identity verification system and method for verifying the identity of an individual
US11244182B2 (en) Spoof detection by estimating subject motion from captured image frames
CN113033243A (en) Face recognition method, device and equipment
CN112543252B (en) Work method for capturing construction site behavior image data based on block chain
US20220207947A1 (en) Personal identity verification system and method for verifying the identity of an individual
WO2018179723A1 (en) Facial authentication processing apparatus, facial authentication processing method, and facial authentication processing system
CN113079161B (en) Method and system for sharing monitoring camera
KR102033732B1 (en) Method for recognizing license number of vehicle regardless of direction and device having function thereof
CN114140839A (en) Image sending method, device and equipment for face recognition and storage medium
JP3074214B2 (en) Moving object recognition device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant