CN112991123A - Block chain-based information security processing method and system - Google Patents

Block chain-based information security processing method and system Download PDF

Info

Publication number
CN112991123A
CN112991123A CN202110089410.8A CN202110089410A CN112991123A CN 112991123 A CN112991123 A CN 112991123A CN 202110089410 A CN202110089410 A CN 202110089410A CN 112991123 A CN112991123 A CN 112991123A
Authority
CN
China
Prior art keywords
information
child
identification code
nth
obtaining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110089410.8A
Other languages
Chinese (zh)
Inventor
边婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110089410.8A priority Critical patent/CN112991123A/en
Publication of CN112991123A publication Critical patent/CN112991123A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects

Abstract

The invention discloses an information safety processing method and system based on a block chain, wherein first basic information of a first child is obtained, a first identification code is obtained according to the first basic information, second basic information of a second child is obtained, a second identification code is obtained according to the first identification code and the second basic information, Nth basic information of the Nth child is obtained, an Nth identification code is obtained according to the Nth basic information and an N-1 identification code, and the basic information of the child in a first kindergarten and a corresponding verification code are respectively subjected to block storage; obtaining first calling information of the client; obtaining a first verification instruction; verifying the first calling information according to the first verification instruction; and after the verification is passed, sending the child information corresponding to the client. The technical problems that information protection for children is not safe enough, information leakage of the children is caused, healthy growth of the children is influenced, and even personal safety is endangered in the prior art are solved.

Description

Block chain-based information security processing method and system
Technical Field
The present invention relates to the field of information security processing, and in particular, to a block chain-based information security processing method and system.
Background
The personal information of the infant, the basic rights and interests of the infant in affairs, the physical and mental development and the personal safety. The privacy of the children is protected, and the firewall for information security of the children is built, so that the children can be a social consensus.
However, in the process of implementing the technical solution of the invention in the embodiments of the present application, the inventors of the present application find that the above-mentioned technology has at least the following technical problems:
the technical problems that information protection of children is not safe enough, information of the children is leaked, healthy growth of the children is influenced, and even personal safety is endangered exist in the prior art.
Disclosure of Invention
The embodiment of the application provides an information security processing method and system based on a block chain, solves the technical problems that in the prior art, information protection for children is not safe enough, child information leakage is caused, healthy growth of children is influenced, and even personal safety is endangered, and achieves the technical effects of carrying out security management on information of children and further improving information security of children.
In view of the foregoing problems, embodiments of the present application provide a method and a system for processing information security based on a block chain.
In a first aspect, an embodiment of the present application provides an information security processing method based on a blockchain, where the method is applied to a baby information security control system, where the baby information security control system is in communication connection with a client, and the method includes: obtaining first basic information of a first child, wherein the first child is a child who learns in a first kindergarten; obtaining a first identification code according to the first basic information, wherein the first identification code corresponds to the first basic information one by one; obtaining second basic information of a second child, and obtaining a second identification code according to the first identification code and the second basic information, wherein the second child is a child who learns in a first kindergarten, the first child and the second child are not children in the same class, and the second identification codes correspond to the second child one to one; acquiring Nth basic information of an Nth child, wherein N is a natural number greater than 1, and acquiring an Nth identification code according to the Nth basic information and an N-1 th identification code, wherein the Nth identification code corresponds to the Nth basic information one by one; respectively storing the basic information of the children in the first kindergarten and the corresponding verification codes in blocks; obtaining first calling information of the client; obtaining a first verification instruction according to the first calling information; according to the first verification instruction, the child information safety control system verifies the first calling information; and after the verification is passed, sending the child information corresponding to the client.
In another aspect, the present application further provides a block chain-based information security processing system, where the system includes: a first obtaining unit configured to obtain first basic information of a first child, the first child being a child who has learned in a first kindergarten; a second obtaining unit, configured to obtain a first identification code according to the first basic information, where the first identification code corresponds to the first basic information one to one; a third obtaining unit, configured to obtain second basic information of a second child, and obtain a second identification code according to the first identification code and the second basic information, where the second child is also a child that has learned in a first kindergarten, and the first child and the second child are not children of the same class, and the second identification code corresponds to the second child one to one; a fourth obtaining unit, configured to obtain nth basic information of an nth child, where N is a natural number greater than 1, obtain an nth identification code according to the nth basic information and an nth-1 identification code, where the nth identification code corresponds to the nth basic information one to one; the first storage unit is used for respectively carrying out block storage on the basic information of the children of the first kindergarten and the corresponding verification codes; a fifth obtaining unit, configured to obtain first invocation information of the client; a sixth obtaining unit, configured to obtain a first verification instruction according to the first call information; the first verification unit is used for verifying the first calling information by the infant information safety control system according to the first verification instruction; and the first sending unit is used for sending the child information corresponding to the client after the verification is passed.
In a third aspect, the present invention provides a block chain based information security processing system, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method according to the first aspect when executing the program.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
the method comprises the steps of obtaining a first identification code according to first basic information of a first child, obtaining a second identification code according to basic information and the first identification code of a second child, analogizing, obtaining an Nth identification code according to the Nth basic information and the N-1 th identification code, carrying out block storage on the child information and the identification code, verifying calling information of a client, and sending the child information corresponding to the client after verification is passed, so that the information of the child is safely managed, and the technical effect of improving the information safety of the child is further improved.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented in accordance with the content of the description in order to make the technical means of the present application more clearly understood, and the detailed description of the present application will be given below in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
Fig. 1 is a schematic flow chart of an information security processing method based on a block chain according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an information security processing system based on a blockchain according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an exemplary electronic device according to an embodiment of the present application.
Description of reference numerals: a first obtaining unit 11, a second obtaining unit 12, a third obtaining unit 13, a fourth obtaining unit 14, a first storage unit 15, a fifth obtaining unit 16, a sixth obtaining unit 17, a first verification unit 18, a first sending unit 19, a bus 300, a receiver 301, a processor 302, a sender 303, a memory 304, and a bus interface 306.
Detailed Description
The embodiment of the application provides an information security processing method and system based on a block chain, solves the technical problems that in the prior art, information protection for children is not safe enough, child information leakage is caused, healthy growth of children is influenced, and even personal safety is endangered, and achieves the technical effects of carrying out security management on information of children and further improving information security of children. Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be understood that the described embodiments are only some embodiments of the present application, and not all embodiments of the present application, and that the present application is not limited by the example embodiments described herein.
Summary of the application
The personal information of the infant, the basic rights and interests of the infant in affairs, the physical and mental development and the personal safety. The privacy of the children is protected, and the firewall for information security of the children is built, so that the children can be a social consensus. However, the technical problems that information protection for children is not safe enough, information leakage of children is caused, healthy growth of the children is influenced, and even personal safety is endangered exist in the prior art.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
the embodiment of the application provides an information security processing method based on a block chain, which is applied to a child information security control system, wherein the child information security control system is in communication connection with a client, and the method comprises the following steps: obtaining first basic information of a first child, wherein the first child is a child who learns in a first kindergarten; obtaining a first identification code according to the first basic information, wherein the first identification code corresponds to the first basic information one by one; obtaining second basic information of a second child, and obtaining a second identification code according to the first identification code and the second basic information, wherein the second child is a child who learns in a first kindergarten, the first child and the second child are not children of the same class, and the second identification codes correspond to the second child one to one; acquiring Nth basic information of an Nth child, wherein N is a natural number greater than 1, and acquiring an Nth identification code according to the Nth basic information and an N-1 th identification code, wherein the Nth identification code corresponds to the Nth basic information one by one; respectively storing the basic information of the children in the first kindergarten and the corresponding verification codes in blocks; obtaining first calling information of the client; obtaining a first verification instruction according to the first calling information; according to the first verification instruction, the infant information safety control system verifies the first calling information; and after the verification is passed, sending the child information corresponding to the client.
Having thus described the general principles of the present application, various non-limiting embodiments thereof will now be described in detail with reference to the accompanying drawings.
Example one
As shown in fig. 1, an embodiment of the present application provides a block chain-based information security processing method, where the method is applied to a baby information security control system, and the baby information security control system is communicatively connected to a client, and the method includes:
step S100: obtaining first base information of a first child, the first child being a child who learns in a first kindergarten;
specifically, the kindergarten information security control system is a system for managing and controlling information of children in the kindergarten for a first kindergarten, the kindergarten information security control system is in communication connection with a client, the client is a user port which is related to information exchange and processing of the children in the kindergarten, and the client includes but is not limited to parents of the children. Obtaining basic information of a first child of the first kindergarten, wherein the basic information comprises family information, hobbies and the like of the first child.
Step S200: obtaining a first identification code according to the first basic information, wherein the first identification code corresponds to the first basic information one by one;
specifically, the first identification code is an identification code corresponding to the first basic information one to one, and the first basic information is input into a system which is formed by a hash function and can output information uniquely corresponding to the input information, so as to obtain first identification information, wherein the first identification information is unique information corresponding to the first basic information, original information cannot be reversely calculated by the identification information, and the original information is input into the system after any slight change, so that the output identification information and the first identification information are completely different.
Step S300: obtaining second basic information of a second child, and obtaining a second identification code according to the first identification code and the second basic information, wherein the second child is a child who learns in a first kindergarten, the first child and the second child are not children in the same class, and the second identification code corresponds to the second child one by one;
specifically, the second child is the child who learns in the first kindergarten, and the second child is the child of different classes with first child, will second basic information and first identification code regard as second input information, will second input information input by hash function as the system that supports, obtain the second identification code, the second identification code be with the identification code of second basic information one-to-one.
Step S400: acquiring Nth basic information of an Nth child, wherein N is a natural number greater than 1, and acquiring an Nth identification code according to the Nth basic information and an N-1 th identification code, wherein the Nth identification code corresponds to the Nth basic information one by one;
in particular, the technology, also called distributed ledger, is an emerging technology that several computing devices participate in "accounting" together, and maintain a complete distributed database together. The block chain technology has been widely applied in many fields due to its characteristics of decentralization, transparency, participation of each computing device in database recording, and rapid data synchronization among the computing devices. The identification information N is obtained by the Nth basic information and the (N-1) th identification code, so that when the identification information N is tampered, the Nth basic information and the (N-1) th identification code need to be changed, and further, by analogy, when the (N-1) th identification code is modified, the (N-1) th basic information and the (N-2) th identification code need to be changed, namely when the (N) th identification information is modified, the first basic information, the second basic information and the (N) th basic information are buckled to form a mutually dependent chain, and therefore the safety of the basic information is guaranteed.
Step S500: respectively storing the basic information of the children in the first kindergarten and the corresponding identification codes in blocks;
specifically, the basic information and the identification code information are acquired into corresponding storage units, and the storage units are stored on the electronic equipment.
Further, in the step S500 of storing the basic information of the child in the first kindergarten and the corresponding identification code, the method further includes:
step S510: taking the Nth basic information and the Nth identification code as an Nth storage unit;
step S520: and obtaining the first electronic equipment with the fastest transport capacity in the M pieces of electronic equipment, and sending the recording right of the Nth storage unit to the first electronic equipment.
Specifically, a first storage unit is obtained according to the first basic information and the first identification code, wherein the first storage unit includes the first basic information and the first identification code, the first electronic device with the fastest transport capacity in the M electronic devices is obtained, the recording right of the first storage unit is sent to the first electronic device, the second storage unit is obtained according to the second basic information and the second identification code, the second electronic device with the fastest transport capacity in the M electronic devices is obtained (wherein the first electronic device is the electronic device after recording the first storage unit), the recording right of the second storage unit is sent to the second electronic device, and by analogy, the nth basic information and the nth identification code are also stored as described above.
Step S600: obtaining first calling information of the client;
step S700: obtaining a first verification instruction according to the first calling information;
specifically, the client may be a home terminal of the child, or may be another client performing information interaction with the first kindergarten, and obtain first call information of the client, where the first call information includes information for calling some children in the first kindergarten, and the kindergarten information security control system obtains a first verification instruction through the first call information, and verifies the first call information according to the first verification instruction.
Step S800: according to the first verification instruction, the infant information safety control system verifies the first calling information;
step S900: and after the verification is passed, sending the child information corresponding to the client.
Specifically, the first calling information is verified according to the first verification instruction, whether the part of the first calling information for verification is correct is judged, and after the verification part of the first calling information is consistent with the verification information of the first verification instruction, the verification is passed, and the information required by the client is sent to the client. The technical effects of carrying out safety management on the information of the children and further improving the information safety of the children are achieved.
Further, the child information security control system includes a first camera device and a second camera device, and the obtaining of the first basic information of the first child further includes:
step S110: acquiring first image information of the first child through a first camera device, wherein the first camera device is arranged in the first kindergarten;
step S120: obtaining second image information of the first child through a second camera device, wherein the second camera device is a camera device arranged at the family of the first child;
step S130: inputting the first image information and the second image information into a first training model, wherein the first training model is obtained by training a plurality of groups of training data, and each group of the plurality of groups of training data comprises: the first image information, the second image information and identification information for identifying the interest of the child;
step S140: obtaining first output information of the first training model, wherein the first output information comprises interest information of the first child;
step S150: and taking the interest information of the first child as the basic information of the first child.
Specifically, the first and second imaging devices are devices having an imaging function, wherein the second imaging device is installed in a home of the first child, the first imaging device is installed in the first kindergarten, second image information of the second imaging device is obtained, the second image information includes second image information of the first child in the home, first image information of the first child in the first kindergarten is obtained by the first imaging device, the first image information includes image information of the first child in the first kindergarten, the first image information and the second image information are input into a first training model, the first training model is a Neural network model in machine learning, and a Neural Network (NN) is a complex Neural network system formed by widely connecting a large number of simple processing units (called neurons), it reflects many basic features of human brain function and is a highly complex nonlinear dynamical learning system. The neural network model is described based on a mathematical model of neurons. Artificial Neural Networks (Artificial Neural Networks) are a description of the first-order properties of the human brain system. Briefly, it is a mathematical model. And through training of a large amount of training data, inputting the first image information and the second image information into a neural network model, and outputting interest information containing the first child.
More specifically, the training process is essentially a supervised learning process, each group of supervised data includes the first image information, the second image information and identification information for identifying interest of children, the first input information and the second input information are input into a neural network model, the neural network model performs continuous self-correction and adjustment according to the identification information for identifying interest of children, and the group of supervised learning is ended and the next group of data supervised learning is performed until an obtained output result is consistent with the identification information; when the output information of the neural network model reaches a preset accuracy rate/reaches a convergence state, the supervised learning process is ended. Through the supervised learning of the neural network model, the neural network model can process the input information more accurately, so that more accurate interest and hobby results of the first child can be obtained, and the interest and hobby of the first child can be used as basic information of the first child.
Further, in the obtaining of the first basic information of the first child, step S100 in this embodiment of the present application further includes:
step S160: obtaining family information of the first child;
step S170: obtaining first route information of the first child, the first route being a route to and from the first kindergarten and a family of the first child;
step S180: and taking the family information and the first route information as basic information of the first child.
Specifically, the family information of the first child includes the family address information of the first child, the contact information of the guardian of the first child, and the like, the first route information is that the first child follows the route information of returning home of the first kindergarten, the first route information includes different route labels when the first child is delivered by different guardians, the estimated time of arriving home of the first child under different routes is obtained, the estimated time is delayed for 10 minutes, confirmation information is sent to the family of the first child for confirming whether the first child arrives safely, and all the information is taken as the basic information of the first child.
Further, according to the first verification instruction, the infant information security control system verifies the first call information, and step S800 in this embodiment of the present application further includes:
step S810: acquiring a child corresponding to the first calling information according to the first calling information;
step S820: acquiring identification code information corresponding to the child;
step S830: acquiring first temporary verification code information according to the first verification instruction, wherein the first temporary verification code is a verification code generated according to the identification code;
step S840: the child information security control system matches verification information in the first calling information through the first temporary verification code;
step S850: and when the first temporary verification code is matched with verification information in the first calling information, sending child information corresponding to the client.
Specifically, for example, when the guardian of the first child returns home after receiving the first child, the first guardian sends a first call instruction, the infant information security control system is triggered to send a first verification instruction according to the first call instruction, a first temporary verification code is obtained according to a first identification code of the first child, and a second temporary verification code is obtained at the same time, where the second temporary verification code is different from the first temporary verification code, but the second temporary verification code and the first temporary verification code have a first matching relationship, that is, the first temporary verification code is input into a system formed based on a hash function, so that a child uniquely matched with the first temporary verification code can be obtained, And the child information safety control system verifies the first calling information, judges whether the first calling information can be matched with the first temporary verification code, and permits the guardian of the first child to take away the first child after the face authentication of the guardian of the first child passes after the verification passes.
Further, the embodiment of the present application further includes:
step S151: identifying the second image information according to the infant information safety control system;
step S152: when a person with a first integral type abnormality is identified in the second image information, obtaining a first fuzzy instruction;
step S153: and performing mosaic processing on the abnormal people of the first type according to the first fuzzy instruction.
Specifically, the first type abnormality criterion is a body type criterion which is customized according to the body type of the first child, all persons whose body type height differs by more than 10cm and whose width differs by more than 15cm from the body type of the first child are determined as persons with abnormal body type, and before content recognition is performed on the second image information, firstly, body type abnormality recognition is performed on the second image information, whether persons with abnormal body type exist in the second image information is determined, but when the persons with abnormal body type exist in the second image information, mosaic processing is performed on the parts of the second image information related to the persons with abnormal body type, image content recognition is performed on the parts except the mosaic processing, and the family image information of the first child is obtained.
Further, the embodiment of the present application further includes:
step S154: scene recognition is carried out on the first image information through the infant information safety control system;
step S155: when the first image information includes a privacy scene, processing the first image information into infrared thermal image information.
Specifically, before the first image information is input into a first training model, scene recognition is carried out on the first image information, the scene recognition comprises privacy scene recognition, when the scene is recognized as a privacy scene, the first image is processed into infrared thermal image information, the processing is carried out by obtaining the infrared thermal image information which is the same in time and the same in position as the first image through a third camera device, and the third camera device is a camera device with a thermal infrared scanner.
To sum up, the block chain-based information security processing method and system provided by the embodiment of the present application have the following technical effects:
1. the technical effect of carrying out safety management on the information of the children is achieved by adopting a mode of obtaining a first identification code according to the first basic information of the first child, obtaining a second identification code according to the basic information and the first identification code of the second child, pushing the first identification code by the type, obtaining an Nth identification code according to the Nth basic information and an N-1 th identification code, carrying out block storage on the information of the children and the identification codes, verifying calling information of a client, and sending the information of the children corresponding to the client after the verification is passed.
2. Due to the fact that the mode of supervising and learning the neural network model is adopted, the neural network model can process the input information more accurately, and then more accurate interest and hobby results of the first child are obtained, and the interest and hobby of the first child are used as basic information of the first child.
Example two
Based on the same inventive concept as the information security processing method based on the block chain in the foregoing embodiment, the present invention further provides an information security processing system based on the block chain, as shown in fig. 2, where the system includes:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain first basic information of a first child, where the first child is a child who learns in a first kindergarten;
a second obtaining unit 12, where the second obtaining unit 12 is configured to obtain a first identification code according to the first basic information, where the first identification code corresponds to the first basic information one by one;
a third obtaining unit 13, configured to obtain second basic information of a second child, and obtain a second identification code according to the first identification code and the second basic information, where the second child is also a child that has learned in a first kindergarten, the first child and the second child are not children in the same class, and the second identification code corresponds to the second child one to one;
a fourth obtaining unit 14, where the fourth obtaining unit 14 is configured to obtain nth basic information of an nth child, where N is a natural number greater than 1, and obtain an nth identification code according to the nth basic information and an nth-1 identification code, where the nth identification code corresponds to the nth basic information one to one;
a first storage unit 15, where the first storage unit 15 is configured to store the basic information of the child in the first nursery and the corresponding verification codes in blocks;
a fifth obtaining unit 16, where the fifth obtaining unit 16 is configured to obtain first invocation information of the client;
a sixth obtaining unit 17, where the sixth obtaining unit 17 is configured to obtain a first verification instruction according to the first calling information;
a first verification unit 18, where the first verification unit 18 is configured to verify, according to the first verification instruction, the infant information security control system verifies the first call information;
and the first sending unit 19 is configured to send the child information corresponding to the client after the verification is passed.
Further, the system further comprises:
a seventh obtaining unit, configured to obtain first image information of the first child through a first image capturing device, where the first image capturing device is an image capturing device disposed in the first kindergarten;
an eighth obtaining unit, configured to obtain second image information of the first child through a second imaging device, where the second imaging device is an imaging device that is disposed at a home of the first child;
a first input unit, configured to input the first image information and the second image information into a first training model, where the first training model is obtained by training multiple sets of training data, and each of the multiple sets of training data includes: the first image information, the second image information and identification information for identifying the interest of the child;
a ninth obtaining unit, configured to obtain first output information of the first training model, where the first output information includes interest information of the first child;
a tenth obtaining unit, configured to use the interest information of the first child as basic information of the first child.
Further, the system further comprises:
an eleventh obtaining unit configured to obtain family information of the first child;
a twelfth obtaining unit configured to obtain first route information of the first child, the first route being a route to and from the first kindergarten and a family of the first child;
a thirteenth obtaining unit configured to use the family information and the first route information as basic information of the first child.
Further, the system further comprises:
a fourteenth obtaining unit configured to use the nth basic information and the nth identification code as an nth storage unit;
a fifteenth obtaining unit, configured to obtain a first electronic device with the fastest transportation capability among the M electronic devices, and send the recording right of the nth storage unit to the first electronic device.
Further, the system further comprises:
a sixteenth obtaining unit, configured to obtain, according to the first call information, a child corresponding to the first call information;
a seventeenth obtaining unit, configured to obtain identification code information corresponding to the child;
an eighteenth obtaining unit, configured to obtain first temporary verification code information according to the first verification instruction, where the first temporary verification code is a verification code generated according to the identification code;
a first matching unit, configured to match, by the child information security control system, verification information in the first calling information through the first temporary verification code;
and the second sending unit is used for sending the child information corresponding to the client when the first temporary verification code is matched with the verification information in the first calling information.
Further, the system further comprises:
a first identification unit, configured to identify the second image information according to the child information security control system;
a nineteenth obtaining unit configured to obtain a first blur instruction when a person having a first integral abnormality is identified in the second image information;
and the first processing unit is used for carrying out mosaic processing on the abnormal persons in the first integral type according to the first fuzzy instruction.
Further, the system further comprises:
a second recognition unit configured to perform scene recognition on the first image information by the child information security control system;
a second processing unit configured to process the first image information into thermal image information when the first image information contains a privacy scene.
Various changes and specific examples of the information security processing method based on the blockchain in the first embodiment of fig. 1 are also applicable to the information security processing system based on the blockchain in this embodiment, and through the foregoing detailed description of the information security processing method based on the blockchain, those skilled in the art can clearly know the implementation method of the information security processing system based on the blockchain in this embodiment, so for the brevity of the description, detailed descriptions are not repeated here.
Exemplary electronic device
The electronic device of the embodiment of the present application is described below with reference to fig. 3.
Fig. 3 illustrates a schematic structural diagram of an electronic device according to an embodiment of the present application.
Based on the inventive concept of a block chain based information security processing method in the foregoing embodiments, the present invention further provides a block chain based information security processing system, on which a computer program is stored, which when executed by a processor implements the steps of any one of the foregoing block chain based information security processing methods.
Where in fig. 3 a bus architecture (represented by bus 300) is shown, bus 300 may include any number of interconnected buses and bridges, with bus 300 linking various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
The embodiment of the invention provides an information security processing method based on a block chain, which is applied to a child information security control system, wherein the child information security control system is in communication connection with a client, and the method comprises the following steps: obtaining first basic information of a first child, wherein the first child is a child who learns in a first kindergarten; obtaining a first identification code according to the first basic information, wherein the first identification code corresponds to the first basic information one by one; obtaining second basic information of a second child, and obtaining a second identification code according to the first identification code and the second basic information, wherein the second child is a child who learns in a first kindergarten, the first child and the second child are not children of the same class, and the second identification codes correspond to the second child one to one; acquiring Nth basic information of an Nth child, wherein N is a natural number greater than 1, and acquiring an Nth identification code according to the Nth basic information and an N-1 th identification code, wherein the Nth identification code corresponds to the Nth basic information one by one; respectively storing the basic information of the children in the first kindergarten and the corresponding verification codes in blocks; obtaining first calling information of the client; obtaining a first verification instruction according to the first calling information; according to the first verification instruction, the infant information safety control system verifies the first calling information; and after the verification is passed, sending the child information corresponding to the client. The technical problems that information protection of children is not safe enough, information leakage of the children is caused, healthy growth of the children is influenced, and personal safety is even endangered in the prior art are solved, safety management of information of the children is achieved, and accordingly the technical effect of improving information safety of the children is achieved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create systems for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A blockchain-based information security processing method, wherein the method is applied to a child information security control system, the child information security control system is in communication connection with a client, and the method includes:
obtaining first base information of a first child, the first child being a child who learns in a first kindergarten;
obtaining a first identification code according to the first basic information, wherein the first identification code corresponds to the first basic information one by one;
obtaining second basic information of a second child, and obtaining a second identification code according to the first identification code and the second basic information, wherein the second child is a child who learns in a first kindergarten, the first child and the second child are not children in the same class, and the second identification codes correspond to the second child one to one;
acquiring Nth basic information of an Nth child, wherein N is a natural number greater than 1, and acquiring an Nth identification code according to the Nth basic information and an N-1 th identification code, wherein the Nth identification code corresponds to the Nth basic information one by one;
respectively storing the basic information of the children in the first kindergarten and the corresponding identification codes in blocks;
obtaining first calling information of the client;
obtaining a first verification instruction according to the first calling information;
according to the first verification instruction, the infant information safety control system verifies the first calling information;
and after the verification is passed, sending the child information corresponding to the client.
2. The method of claim 1, wherein the child information security control system includes a first camera and a second camera, the obtaining a first base of information for a first child, the method further comprising:
acquiring first image information of the first child through a first camera device, wherein the first camera device is arranged in the first kindergarten;
acquiring second image information of the first child through a second camera device, wherein the second camera device is a camera device arranged at the family of the first child;
inputting the first image information and the second image information into a first training model, wherein the first training model is obtained by training a plurality of groups of training data, and each group of the plurality of groups of training data comprises: the first image information, the second image information and identification information for identifying the interest of the child;
obtaining first output information of the first training model, wherein the first output information comprises interest information of the first child;
and taking the interest information of the first child as the basic information of the first child.
3. The method of claim 2, wherein the obtaining of the first base information of the first child further comprises:
obtaining family information of the first child;
obtaining first route information of the first child, the first route being a route to and from the first kindergarten and a family of the first child;
and taking the family information and the first route information as basic information of the first child.
4. The method of claim 1, wherein the storing of the base information and corresponding identification codes for the first kindergarten's children comprises:
taking the Nth basic information and the Nth identification code as an Nth storage unit;
and obtaining the first electronic equipment with the fastest capacity in the M pieces of electronic equipment, and sending the recording right of the Nth storage unit to the first electronic equipment.
5. The method of claim 1, wherein the child information security control system verifies the first call information according to the first verification instruction, the method comprising:
acquiring a child corresponding to the first calling information according to the first calling information;
acquiring identification code information corresponding to the child;
acquiring first temporary verification code information according to the first verification instruction, wherein the first temporary verification code is a verification code generated according to the identification code;
the child information security control system matches verification information in the first calling information through the first temporary verification code;
and when the first temporary verification code is matched with verification information in the first calling information, sending child information corresponding to the client.
6. The method of claim 2, wherein the method further comprises:
identifying the second image information according to the infant information safety control system;
when a person with a first integral type abnormality is identified in the second image information, obtaining a first fuzzy instruction;
and performing mosaic processing on the abnormal people of the first type according to the first fuzzy instruction.
7. The method of claim 6, the method further comprising:
scene recognition is carried out on the first image information through the infant information safety control system;
when the first image information includes a privacy scene, processing the first image information into infrared thermal image information.
8. A block chain based information security processing system, wherein the system comprises:
a first obtaining unit configured to obtain first basic information of a first child, the first child being a child who has learned in a first kindergarten;
a second obtaining unit, configured to obtain a first identification code according to the first basic information, where the first identification code corresponds to the first basic information one to one;
a third obtaining unit, configured to obtain second basic information of a second child, and obtain a second identification code according to the first identification code and the second basic information, where the second child is also a child who learns in a first kindergarten, the first child and the second child are not children in the same class, and the second identification code corresponds to the second child one to one;
a fourth obtaining unit, configured to obtain nth basic information of an nth child, where N is a natural number greater than 1, obtain an nth identification code according to the nth basic information and an nth-1 identification code, where the nth identification code corresponds to the nth basic information one to one;
the first storage unit is used for respectively carrying out block storage on the basic information of the children of the first kindergarten and the corresponding verification codes;
a fifth obtaining unit, configured to obtain first invocation information of the client;
a sixth obtaining unit, configured to obtain a first verification instruction according to the first call information;
the first verification unit is used for verifying the first calling information by the infant information safety control system according to the first verification instruction;
and the first sending unit is used for sending the child information corresponding to the client after the verification is passed.
9. A block chain based information security processing system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the program.
CN202110089410.8A 2021-01-22 2021-01-22 Block chain-based information security processing method and system Pending CN112991123A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110089410.8A CN112991123A (en) 2021-01-22 2021-01-22 Block chain-based information security processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110089410.8A CN112991123A (en) 2021-01-22 2021-01-22 Block chain-based information security processing method and system

Publications (1)

Publication Number Publication Date
CN112991123A true CN112991123A (en) 2021-06-18

Family

ID=76344662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110089410.8A Pending CN112991123A (en) 2021-01-22 2021-01-22 Block chain-based information security processing method and system

Country Status (1)

Country Link
CN (1) CN112991123A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683667A (en) * 2018-05-16 2018-10-19 深圳市网心科技有限公司 Account protection method, device, system and storage medium
CN111954209A (en) * 2020-08-12 2020-11-17 江苏商贸职业学院 Information processing method and device for improving security of wireless sensor node
CN112035879A (en) * 2020-09-04 2020-12-04 昆明理工大学 Information processing method and system for improving confidentiality of automatic logistics of cell
CN112069527A (en) * 2020-11-10 2020-12-11 大象慧云信息技术有限公司 Tax control invoice protection method and system based on multiple safety protection measures
CN112084509A (en) * 2020-08-19 2020-12-15 喻婷婷 Block chain key generation method and system based on biological identification technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683667A (en) * 2018-05-16 2018-10-19 深圳市网心科技有限公司 Account protection method, device, system and storage medium
CN111954209A (en) * 2020-08-12 2020-11-17 江苏商贸职业学院 Information processing method and device for improving security of wireless sensor node
CN112084509A (en) * 2020-08-19 2020-12-15 喻婷婷 Block chain key generation method and system based on biological identification technology
CN112035879A (en) * 2020-09-04 2020-12-04 昆明理工大学 Information processing method and system for improving confidentiality of automatic logistics of cell
CN112069527A (en) * 2020-11-10 2020-12-11 大象慧云信息技术有限公司 Tax control invoice protection method and system based on multiple safety protection measures

Similar Documents

Publication Publication Date Title
WO2019138128A1 (en) Method and system for providing secure access to artifacts in a cloud computing environment
Banerjee et al. An efficient, anonymous and robust authentication scheme for smart home environments
CN102171969B (en) A method for operating a network, a system management device, a network and a computer program therefor
WO2018020370A1 (en) Blockchain-implemented method and system
Batmani et al. On the design of observer for nonlinear time‐delay systems
EP3742304A1 (en) Validation of measurement datasets in a distributed database
CN112289423A (en) Method and system for double-diagnosis and rehabilitation based on intelligent community patients
Lee et al. Anonymous dynamic group authenticated key agreements using physical unclonable functions for internet of medical things
CN112991123A (en) Block chain-based information security processing method and system
Anna et al. State regulation of the IoT in the Russian Federation: Fundamentals and challenges
CN116489637B (en) Mobile edge computing method oriented to meta universe and based on privacy protection
CN110874638B (en) Behavior analysis-oriented meta-knowledge federation method, device, electronic equipment and system
CN112084509A (en) Block chain key generation method and system based on biological identification technology
Zhu et al. Fault detection for nonlinear networked control systems based on fuzzy observer
CN116743743A (en) Metadata universe data sharing method and system
CN110222187A (en) Protect joint activity detection and the data sharing method of privacy of user
KR102273629B1 (en) Did-based blockchain smart unit and unmanned automated robot security system using biometrics(facial and iris) recognition
CN112148978A (en) Internet-based amusement park project recommendation method and system
CN113689603A (en) Access control authority management method and device
CN111950987A (en) Remote education training method and system based on Internet
CN116325647A (en) Authentication chain using public key infrastructure
Xia et al. Game-based security proofs for secret sharing schemes
Yu et al. Distributed formation control of networked passive systems with event-driven communication
US20160321439A1 (en) Connection Prediction As Identity Verification
CN112367360B (en) Method and device for expanding public cloud data processing capacity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210618