CN113516807A - Access control management method and device based on block chain and access control equipment - Google Patents

Access control management method and device based on block chain and access control equipment Download PDF

Info

Publication number
CN113516807A
CN113516807A CN202110541310.4A CN202110541310A CN113516807A CN 113516807 A CN113516807 A CN 113516807A CN 202110541310 A CN202110541310 A CN 202110541310A CN 113516807 A CN113516807 A CN 113516807A
Authority
CN
China
Prior art keywords
face image
user
access control
comparison result
characteristic value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110541310.4A
Other languages
Chinese (zh)
Inventor
官轲
张亲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qinlin Science & Technology Co ltd
Original Assignee
Shenzhen Qinlin Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qinlin Science & Technology Co ltd filed Critical Shenzhen Qinlin Science & Technology Co ltd
Priority to CN202110541310.4A priority Critical patent/CN113516807A/en
Publication of CN113516807A publication Critical patent/CN113516807A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application discloses an access control management method and device based on a block chain and access control equipment, when a user requests to open an access control, a face image is not transmitted by using a network, personal privacy disclosure is avoided, network flow of equipment of the Internet of things is greatly reduced, 4G/5G flow cost is reduced, and transmission is more efficient; in addition, when the user requests to open the access control, the access control system verifies whether the user is legal or not, and simultaneously, the block chain is used for carrying out double verification on the user, so that the safety of the user can be ensured to pass, the local library of the access control equipment can be verified and checked, and the safety of the whole access control system is effectively improved.

Description

Access control management method and device based on block chain and access control equipment
Technical Field
The invention relates to the field of intelligent exchange, in particular to a block chain-based access control management method and device and access control equipment.
Background
The face recognition principle in the existing access control system is as follows: the background system inputs basic information of the user and issues the face picture of the user to the equipment terminal, and the equipment terminal downloads the picture from the cloud and stores the picture to the local equipment. And judging whether the field photographed face is matched with the local library according to a face recognition algorithm, and if the matching is successful, controlling the equipment terminal to open the door. The prior art has the following disadvantages: the face photos belong to sensitive information, so that the risk of privacy information leakage exists during network transmission, and the requirement on the network speed of the equipment terminal is high because the equipment terminal needs to download the photos.
Disclosure of Invention
In view of the above problems, the present invention provides a block chain-based access control management method, an apparatus and an access control device.
The application provides an access control management method based on a block chain, which comprises the following steps:
acquiring a face image of a user;
extracting a corresponding user face image characteristic value matrix from the user face image;
comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result;
comparing the hash value corresponding to the user face image characteristic value matrix with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result;
and controlling the entrance guard to open or close according to the first comparison result and the second comparison result.
The application discloses an entrance guard management method based on block chain, according to first comparison result with the second comparison result control entrance guard, include:
and if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as the hash value corresponding to the local library stored in the block chain, controlling the entrance guard to be opened.
The application discloses an entrance guard management method based on block chains, further comprising:
if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain; or if the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as one hash value corresponding to the local library stored in the block chain, and the first comparison result is that the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold;
and controlling the entrance guard to open and reporting the first comparison result and the second comparison result to a management end.
The application discloses an entrance guard management method based on block chains, further comprising:
if the first comparison result indicates that the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold value, and the second comparison result indicates that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain;
and keeping the entrance guard closed and reporting the first comparison result and the second comparison result to a management end.
According to the access control management method based on the block chain, the user face image is deleted after the corresponding user face image characteristic value matrix is extracted from the user face image.
This application still provides an entrance guard management device based on block chain, the device includes:
the acquisition module is used for acquiring a face image of a user;
the extraction module is used for extracting a corresponding user face image characteristic value matrix from the user face image;
the comparison module is used for comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result; the hash value corresponding to the user face image characteristic value matrix is compared with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result;
and the control module is used for controlling the entrance guard to be opened or closed according to the first comparison result and the second comparison result.
The application also provides access control equipment, which comprises a face acquisition unit, a memory and a processor, wherein the face acquisition unit is used for acquiring a face image of a user, the memory stores a computer program, and the computer program executes the access control management method based on the block chain when running on the processor.
The present application further proposes a readable storage medium storing a computer program, where the computer program, when executed on a processor, executes the block chain-based access control management method described in the present application.
The application also provides an access control system, which comprises a cloud end, a plurality of servers and a plurality of access control devices, wherein the plurality of servers are used for building block chains;
when the user applies for the access right:
the access control equipment is used for acquiring the face image of the user and uploading the face image of the user to the cloud; deleting the user face image after uploading the user face image to the cloud;
the cloud is used for:
determining whether the quality of the face image of the user meets a preset requirement;
if the user face image meets the preset requirement, extracting a corresponding user face image characteristic value matrix from the user face image and determining a hash value corresponding to the user face image characteristic value matrix;
deleting the face image of the user;
encrypting the eigenvalue matrix of the user face image and then sending the encrypted eigenvalue matrix to each access control device;
and uploading the hash value corresponding to the user face image characteristic value matrix to the block chain.
The application access control system, when the user requests to open the entrance guard, the entrance guard equipment is used for:
acquiring a face image of a user;
extracting a corresponding user face image characteristic value matrix from the user face image;
deleting the face image of the user;
comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result;
comparing the hash value corresponding to the user face image characteristic value matrix with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result;
and controlling the entrance guard to open or close according to the first comparison result and the second comparison result.
When a user requests to open the access control, the method does not involve the transmission of the face image by using the network, avoids the leakage of personal privacy, greatly reduces the network flow usage of the Internet of things equipment, reduces the 4G/5G flow cost, reduces the dependence on the network, and enables the transmission to be more efficient; in addition, when the user requests to open the access control, the access control system verifies whether the user is legal or not, and simultaneously, the block chain is used for carrying out double verification on the user, so that the safety of the user can be ensured to pass, the local library of the access control equipment can be verified and checked, and the safety of the whole access control system is effectively improved.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention. Like components are numbered similarly in the various figures.
Fig. 1 shows a schematic flow chart of a block chain-based access control management method proposed in the present application;
fig. 2 is a schematic structural diagram of an access control management device proposed in the present application;
fig. 3 is a schematic structural diagram of an access control device proposed in the present application;
fig. 4 shows a schematic structural diagram of an access control system proposed in the present application.
Description of the main element symbols:
10-block chain based access control management device; 11-an acquisition module; 12-an extraction module; 13-an alignment module; 14-a control module; 100-access control equipment; 110-a face acquisition unit; 120-a memory; 130-a processor.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Hereinafter, the terms "including", "having", and their derivatives, which may be used in various embodiments of the present invention, are only intended to indicate specific features, numbers, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the existence of, or adding to, one or more other features, numbers, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
With the continuous progress of society and the rapid development of identity recognition technology, the biometric technology becomes the most ideal mode of identity authentication, and the face recognition is widely applied due to the characteristics of convenience, safety and difficult copying.
Face feature extraction is a process of performing feature modeling on a face. The extraction method of the human face features can be summarized into a knowledge-based extraction method and an algebraic feature-based extraction method, wherein the knowledge-based extraction method is to directly extract the human face features according to images such as the structural features of the five sense organs of the human face and the like to establish a database; the face recognition based on algebraic features is to regard each face image as a matrix taking the gray level of pixel points as elements and to express the features of the face by using data features reflecting certain properties. In consideration of the fact that the face eigenvalue matrix has the characteristic of being irreversible (namely, the face eigenvalue matrix acquired by the extraction method based on knowledge and the extraction method based on algebraic features cannot be restored to a face image), and the storage space is small, the face eigenvalue matrix acquired by the face recognition technology can be applied to the access control system, so that the access control system can use less storage space to store the face eigenvalue matrix corresponding to the face image of the user, and the user is recognized according to the face eigenvalue matrix.
Furthermore, considering that the block chain technology has the characteristics of decentralization, tamper resistance, traceability and the like, the block chain technology can be applied to the access control system to enhance the safety of the access control system.
The access control system that this application provided has following advantage:
first, high in the clouds and entrance guard's equipment do not store the face image photo, only store face eigenvalue matrix, effectively save the storage space of high in the clouds and entrance guard's equipment, can set up less storage module for entrance guard's equipment, reduce entrance guard's equipment's hardware cost.
Secondly, after the cloud acquires the face image and identifies the quality of the face image, a face characteristic value matrix is extracted from the face image meeting the quality requirement, the face characteristic value matrix is encrypted and then is sent to each entrance guard device, the face characteristic value matrix is guaranteed not to be reversely restored to form a face photo, and the privacy safety of a user is greatly protected.
Thirdly, when the user requests to open the entrance guard, the method does not involve the use of a network to transmit the face image, greatly reduces the network flow usage of the equipment of the internet of things, reduces the 4G/5G flow cost, and enables the transmission to be more efficient.
Fourthly, chaining and storing the hash values corresponding to the extracted face characteristic value matrixes, and performing chaining verification after the entrance guard equipment successfully identifies, so that the extracted face characteristic value matrixes are not tampered, and the traffic safety is improved.
Example 1
An embodiment of the present application, as shown in fig. 1, provides a block chain-based access control management method, including the following steps:
s100: and acquiring a face image of the user.
When a user requests to open the access control, the access control device starts a self-contained face obtaining unit, for example, a camera, obtains a face image of the current user by using the camera, and judges whether the obtained face image of the user meets requirements, for example, whether the obtained face image of the user is shielded by shielding objects such as sunglasses and a mask, if the obtained face image of the user is not shielded and the picture is clear, the step S200 is executed.
S200: and extracting a corresponding user face image characteristic value matrix from the user face image.
Because the face eigenvalue matrix has the characteristic of being irreversible (namely, the face eigenvalue matrix obtained by the extraction method based on knowledge and the extraction method based on algebraic features cannot be restored into a face image), and the storage space is small, the face eigenvalue matrix obtained by the face recognition technology can be applied to the access control system, so that the access control system can use less storage space to store the face eigenvalue matrix corresponding to the face image of the user, and the user is recognized according to the face eigenvalue matrix. Exemplarily, the face eigenvalue matrix of the current user can be extracted according to a knowledge-based extraction method or an algebraic feature-based extraction method.
S300: and comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result.
It can be understood that, for one access control device, there may be a plurality of users having an opening authority, and a plurality of face image characteristic value matrices are pre-stored in a local library of the access control device, so that the face image characteristic value matrices of the users need to be compared with the pre-stored face image characteristic value matrices in the local library to obtain a first comparison result.
Further, the first comparison result comprises: the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, which indicates that the access control equipment is successfully verified; the first comparison result further comprises: and the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold value, and the access control equipment verification failure is represented.
S400: and comparing the hash value corresponding to the user face image characteristic value matrix with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result.
It can be understood that the block chain includes a plurality of blocks, each block is disposed on a different server at a different location, hash values corresponding to face feature value matrices of a plurality of users in a plurality of cells are pre-stored in each block of the block chain, the plurality of hash values pre-stored in each block of the block chain can be divided into a plurality of groups by local libraries corresponding to a plurality of access control devices, when a second comparison result is determined, a local library corresponding to the current access control device needs to be determined, a corresponding group of hash values is determined from the block chain according to the current local library, and then, whether a hash value identical to a hash value corresponding to a face image feature value matrix of the current user exists in the group of hash values is determined.
The local library corresponding to the current access control equipment is used for determining the hash value for comparison in the block chain, so that only the user with the opening authority of the current access control equipment can be verified through the block chain, and the successful verification of the hash value corresponding to the current user by the hash value corresponding to the face characteristic value matrix of the user for opening other access control equipment stored in the block chain is avoided.
Further, the second alignment result comprises: the hash value corresponding to the user face image characteristic value matrix is the same as one hash value corresponding to the local library stored in the block chain, which indicates that the block chain verification is successful and the corresponding local library is not tampered; the second alignment result further comprises: and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain, which indicates that the block chain verification fails and the corresponding local library is possibly tampered.
S500: and controlling the entrance guard to open or close according to the first comparison result and the second comparison result.
Exemplarily, if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as the hash value corresponding to the local library stored in the block chain, it indicates that the local library of the current access control device is not tampered, and when the current user requests to open the access control device, the valid user of the current access control device can control the access control device to open, so that the user can normally pass.
Exemplarily, if the first comparison result is that the similarity between the user face image characteristic value matrix and one pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain, the access control device verifies that the current user is a legal user, but the verification of the block chain indicates that the current user is illegal, and for the case that the access control device and the block chain verification result are not uniform, the access control device can be started first, the user is allowed to normally pass, the user is prevented from normally passing due to the access control device, and the user experience is reduced. And reporting the abnormal condition to a management place, so that the reason for the abnormal condition in the management place is that the access control equipment is abnormal or the local library corresponding to the access control equipment is tampered.
Exemplarily, if the second comparison result is that the hash value corresponding to the user face image feature value matrix is the same as one hash value corresponding to the local library stored in the blockchain, and the first comparison result is that the similarity between the user face image feature value matrix and each pre-stored face image feature value matrix in the local library is smaller than a preset similarity threshold. At the moment, the access control equipment verifies that the current user is not a legal user, but the verification of the block chain shows that the current user is legal, and the access control equipment can be opened firstly under the condition that the verification results of the access control equipment and the block chain are not uniform, so that the user can normally pass, the condition that the user cannot normally pass due to the reason of the access control equipment is avoided, and the user experience is reduced. And reporting the abnormal condition to a management place, so that the reason for the abnormal condition in the management place is that the access control equipment is abnormal or the local library corresponding to the access control equipment is tampered.
Exemplarily, if the first comparison result indicates that the similarity between the user face image eigenvalue matrix and each pre-stored face image eigenvalue matrix in the local library is smaller than a preset similarity threshold, and the second comparison result indicates that the hash value corresponding to the user face image eigenvalue matrix is different from each hash value corresponding to the local library stored in the block chain, the access control device verifies that the current user is not a legal user, and the verification of the block chain also indicates that the current user is not a legal user, the access control device keeps the access control closed and reports the first comparison result and the second comparison result to the management terminal.
According to the embodiment, when a user requests to open the access control, the face image is not transmitted by using a network, so that the personal privacy disclosure is avoided, the network flow of the Internet of things equipment is greatly reduced, the 4G/5G flow cost is reduced, and the transmission is more efficient; in addition, when the user requests to open the access control, the access control system verifies whether the user is legal or not, and simultaneously, the block chain is used for carrying out double verification on the user, so that the safety of the user can be ensured to pass, the local library of the access control equipment can be verified and checked, and the safety of the whole access control system is effectively improved.
Example 2
Further, in an embodiment of the present application, after obtaining a face image of a user, the access control device extracts a corresponding face image feature value matrix from the face image of the user, and immediately deletes the face image of the user. Only the face image characteristic value matrix is stored in the access control equipment, and the face image of the user is not stored, so that on one hand, the face image can be prevented from occupying too much memory, a smaller storage module can be arranged for the access control equipment, and the hardware cost of the access control equipment is reduced; on the other hand, the face image of the user is immediately deleted, and the face image characteristic value matrix stored in the access control equipment can not be reversely restored into the face, so that the face information of the user can be effectively prevented from being leaked.
Example 3
In an embodiment of the present application, as shown in fig. 2, an access control device 10 based on a block chain includes: the device comprises an acquisition module 11, an extraction module 12, a comparison module 13 and a control module 14.
The acquisition module 11 is used for acquiring a face image of a user; an extraction module 12, configured to extract a corresponding user face image feature value matrix from the user face image; a comparison module 13, configured to compare the user face image eigenvalue matrix with each pre-stored face image eigenvalue matrix in a local library to obtain a first comparison result; the hash value corresponding to the user face image characteristic value matrix is compared with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result; and the control module 14 is used for controlling the entrance guard to be opened or closed according to the first comparison result and the second comparison result.
Further, according to the first comparison result and the second comparison result, controlling the access control device includes: and if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as the hash value corresponding to the local library stored in the block chain, controlling the entrance guard to be opened.
Further, according to the first comparison result and the second comparison result, controlling the access control device further comprises: if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain; or if the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as one hash value corresponding to the local library stored in the block chain, and the first comparison result is that the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold; and controlling the entrance guard to open and reporting the first comparison result and the second comparison result to a management end.
Further, according to the first comparison result and the second comparison result, controlling the access control device further comprises: if the first comparison result indicates that the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold value, and the second comparison result indicates that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain; and keeping the entrance guard closed and reporting the first comparison result and the second comparison result to a management end.
Further, after extracting a corresponding user face image feature value matrix from the user face image, deleting the user face image.
The embodiment discloses an access control management device 10 based on a block chain, which is used for executing the access control management method based on the block chain according to the embodiment through the cooperation of an obtaining module 11, an extracting module 12, a comparing module 13 and a control module 14.
An embodiment of the present application. As shown in fig. 3, an access control device 100 is disclosed, which includes a face obtaining unit 110, a memory 120 and a processor 130, where the face obtaining unit 110 is configured to obtain a face image of a user, the memory 120 stores a computer program, and the computer program executes the block chain-based access control management method described in this application when running on the processor 130.
It is to be understood that the present application relates to a readable storage medium, which stores a computer program that, when executed on a processor, performs the block chain based access control method described herein.
Example 3
One embodiment of the present application, as shown in fig. 4, provides an access control system, which includes a cloud, a plurality of servers, and a plurality of access control devices described in the present application, where the plurality of servers are used to build a block chain;
when the user applies for the access right:
the access control equipment is used for: acquiring the user face image and uploading the user face image to the cloud; and deleting the user face image after uploading the user face image to the cloud.
The cloud is used for: determining whether the quality of the face image of the user meets a preset requirement; if the user face image meets the preset requirement, extracting a corresponding user face image characteristic value matrix from the user face image and determining a hash value corresponding to the user face image characteristic value matrix; deleting the face image of the user; encrypting the eigenvalue matrix of the user face image and then sending the encrypted eigenvalue matrix to each access control device; and uploading the hash value corresponding to the user face image characteristic value matrix to the block chain.
When a user requests to open the access control:
the access control equipment is used for: acquiring a face image of a user; extracting a corresponding user face image characteristic value matrix from the user face image; deleting the face image of the user; comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result; comparing the hash value corresponding to the user face image characteristic value matrix with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result; and controlling the entrance guard to open or close according to the first comparison result and the second comparison result.
Furthermore, a server in the block chain can be installed in a public security department, so that on one hand, the content in the block chain is prevented from being tampered, the security of data in the block chain is ensured, on the other hand, the public security department can conveniently supervise the access control equipment of each cell, and the security of the access control system is ensured.
It is understood that a plurality of servers for forming the block chain may be respectively disposed in each security agency or cooperative mechanism, for example, community security department, street public security bureau, district public security bureau, and city public security bureau, and may be disposed according to requirements.
The access control system that this application provided has following advantage: firstly, the cloud and the access control equipment do not store face image photos, only a face characteristic value matrix is stored, the storage space of the cloud and the access control equipment is effectively saved, the waste of memory space is avoided, a smaller storage module can be arranged for the access control equipment, and the hardware cost of the access control equipment is reduced; secondly, after the cloud acquires the face image and identifies the quality of the face image, a face characteristic value matrix is extracted from the face image meeting the quality requirement, the face characteristic value matrix is encrypted and then is sent to each entrance guard device, the face characteristic value matrix is guaranteed not to be reversely restored to form a face photo, and the privacy safety of a user is greatly protected. Thirdly, when the user requests to open the entrance guard, the method does not involve the use of a network to transmit the face image, greatly reduces the network flow usage of the equipment of the internet of things, reduces the 4G/5G flow cost, and enables the transmission to be more efficient. Fourthly, chaining and storing the hash values corresponding to the extracted face characteristic value matrixes, and performing chaining verification after the entrance guard equipment successfully identifies, so that the extracted face characteristic value matrixes are not tampered, and the traffic safety is improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solution of the present invention or a part of the technical solution that contributes to the prior art in essence can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned readable storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.

Claims (10)

1. A block chain-based access control management method is characterized by comprising the following steps:
acquiring a face image of a user;
extracting a corresponding user face image characteristic value matrix from the user face image;
comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result;
comparing the hash value corresponding to the user face image characteristic value matrix with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result;
and controlling the entrance guard to open or close according to the first comparison result and the second comparison result.
2. The block chain-based access control management method according to claim 1, wherein controlling access control according to the first comparison result and the second comparison result comprises:
and if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as the hash value corresponding to the local library stored in the block chain, controlling the entrance guard to be opened.
3. The block chain-based access control management method according to claim 1, further comprising:
if the first comparison result is that the similarity between the user face image characteristic value matrix and a pre-stored face image characteristic value matrix in the local library is greater than or equal to a preset similarity threshold value, and the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain; or if the second comparison result is that the hash value corresponding to the user face image characteristic value matrix is the same as one hash value corresponding to the local library stored in the block chain, and the first comparison result is that the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold, controlling the entrance guard to be opened, and reporting the first comparison result and the second comparison result to a management terminal.
4. The block chain-based access control management method according to claim 1, further comprising:
if the first comparison result indicates that the similarity between the user face image characteristic value matrix and each pre-stored face image characteristic value matrix in the local library is smaller than a preset similarity threshold value, and the second comparison result indicates that the hash value corresponding to the user face image characteristic value matrix is different from each hash value corresponding to the local library stored in the block chain, the access control is kept closed, and the first comparison result and the second comparison result are reported to a management terminal.
5. The block chain-based access control management method according to any one of claims 1 to 4, wherein the user face image is deleted after extracting a corresponding user face image feature value matrix from the user face image.
6. The utility model provides an entrance guard management device based on block chain which characterized in that, the device includes:
the acquisition module is used for acquiring a face image of a user;
the extraction module is used for extracting a corresponding user face image characteristic value matrix from the user face image;
the comparison module is used for comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result; the hash value corresponding to the user face image characteristic value matrix is compared with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result;
and the control module is used for controlling the entrance guard to be opened or closed according to the first comparison result and the second comparison result.
7. An access control device comprising a face acquisition unit for acquiring a face image of a user, a memory and a processor, wherein the memory stores a computer program which, when run on the processor, executes the block chain based access control method of any one of claims 1 to 5.
8. A readable storage medium storing a computer program which, when executed on a processor, performs the block chain based access control method according to any one of claims 1 to 5.
9. An access control system comprising a cloud, a plurality of servers and a plurality of access control devices of claim 7, the plurality of servers being configured to build a block chain;
when the user applies for the access right:
the access control equipment is used for acquiring the face image of the user and uploading the face image of the user to the cloud; deleting the user face image after uploading the user face image to the cloud;
the cloud is used for:
determining whether the quality of the face image of the user meets a preset requirement;
if the user face image meets the preset requirement, extracting a corresponding user face image characteristic value matrix from the user face image and determining a hash value corresponding to the user face image characteristic value matrix;
deleting the face image of the user;
encrypting the eigenvalue matrix of the user face image and then sending the encrypted eigenvalue matrix to each access control device;
and uploading the hash value corresponding to the user face image characteristic value matrix to the block chain.
10. The access control system of claim 9, wherein when the user requests to open the access control, the access control device is configured to:
acquiring a face image of a user;
extracting a corresponding user face image characteristic value matrix from the user face image;
deleting the face image of the user;
comparing the user face image characteristic value matrix with each pre-stored face image characteristic value matrix in a local library to obtain a first comparison result;
comparing the hash value corresponding to the user face image characteristic value matrix with each hash value corresponding to the local library stored in a block chain to obtain a second comparison result;
and controlling the entrance guard to open or close according to the first comparison result and the second comparison result.
CN202110541310.4A 2021-05-18 2021-05-18 Access control management method and device based on block chain and access control equipment Pending CN113516807A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110541310.4A CN113516807A (en) 2021-05-18 2021-05-18 Access control management method and device based on block chain and access control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110541310.4A CN113516807A (en) 2021-05-18 2021-05-18 Access control management method and device based on block chain and access control equipment

Publications (1)

Publication Number Publication Date
CN113516807A true CN113516807A (en) 2021-10-19

Family

ID=78064593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110541310.4A Pending CN113516807A (en) 2021-05-18 2021-05-18 Access control management method and device based on block chain and access control equipment

Country Status (1)

Country Link
CN (1) CN113516807A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080775A (en) * 2022-08-24 2022-09-20 深圳市亲邻科技有限公司 Access control equipment face data storage method and device, server and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101875725B1 (en) * 2017-04-12 2018-07-06 서강대학교산학협력단 Smart door lock system, smart door lock and terminal for controlling the smart door lock
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN108846925A (en) * 2018-06-04 2018-11-20 深圳云天励飞技术有限公司 Face recognition door control system
CN109493470A (en) * 2018-10-16 2019-03-19 广州源贸易有限公司 A kind of intelligent access control system based on block chain
CN110059552A (en) * 2019-03-12 2019-07-26 上海大学 A kind of identity identifying method of block chain in conjunction with biological characteristic
CN111489478A (en) * 2020-04-24 2020-08-04 英华达(上海)科技有限公司 Access control method, system, device and storage medium
CN111506591A (en) * 2020-04-13 2020-08-07 名商科技有限公司 Block chain-based vehicle identity authentication method, device, computer and medium
CN112149088A (en) * 2020-09-02 2020-12-29 中标慧安信息技术股份有限公司 Permission management device based on face recognition
CN112258720A (en) * 2020-10-20 2021-01-22 熵基科技股份有限公司 Access control system based on block chain and control method thereof
CN112530053A (en) * 2019-09-02 2021-03-19 中移物联网有限公司 Control method and system of intelligent lock, lock equipment, server and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101875725B1 (en) * 2017-04-12 2018-07-06 서강대학교산학협력단 Smart door lock system, smart door lock and terminal for controlling the smart door lock
CN108521418A (en) * 2018-04-04 2018-09-11 广州广电运通金融电子股份有限公司 A kind of identity identifying method and system merging block chain and living things feature recognition
CN108846925A (en) * 2018-06-04 2018-11-20 深圳云天励飞技术有限公司 Face recognition door control system
CN109493470A (en) * 2018-10-16 2019-03-19 广州源贸易有限公司 A kind of intelligent access control system based on block chain
CN110059552A (en) * 2019-03-12 2019-07-26 上海大学 A kind of identity identifying method of block chain in conjunction with biological characteristic
CN112530053A (en) * 2019-09-02 2021-03-19 中移物联网有限公司 Control method and system of intelligent lock, lock equipment, server and storage medium
CN111506591A (en) * 2020-04-13 2020-08-07 名商科技有限公司 Block chain-based vehicle identity authentication method, device, computer and medium
CN111489478A (en) * 2020-04-24 2020-08-04 英华达(上海)科技有限公司 Access control method, system, device and storage medium
CN112149088A (en) * 2020-09-02 2020-12-29 中标慧安信息技术股份有限公司 Permission management device based on face recognition
CN112258720A (en) * 2020-10-20 2021-01-22 熵基科技股份有限公司 Access control system based on block chain and control method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080775A (en) * 2022-08-24 2022-09-20 深圳市亲邻科技有限公司 Access control equipment face data storage method and device, server and storage medium

Similar Documents

Publication Publication Date Title
CN107239713B (en) Sensitive content data information protection method and system
US20230034040A1 (en) Face liveness detection method, system, and apparatus, computer device, and storage medium
CN112804196A (en) Log data processing method and device
Struppek et al. Learning to break deep perceptual hashing: The use case neuralhash
CN107077570A (en) System and method for detecting the trial that sensitive information is sent by data distribution passage
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
KR101977178B1 (en) Method for file forgery check based on block chain and computer readable recording medium applying the same
CN105956469A (en) Method and device for identifying file security
CN112465513A (en) Network security system and method based on identity authentication
Li et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection
CN113516807A (en) Access control management method and device based on block chain and access control equipment
CN111209600A (en) Block chain-based data processing method and related product
WO2018060863A1 (en) Method and device for covering private data
Zhelezov Modified algorithm for steganalysis
KR101763184B1 (en) File recovery method using backup
CN111539028B (en) File storage method and device, storage medium and electronic equipment
CN114417397A (en) Behavior portrait construction method and device, storage medium and computer equipment
CN108650099B (en) Method, device and storage medium for picture authorization authentication and opening lookup
CN111508095A (en) Mobile phone remote card punching method and device
CN115586990B (en) Intelligent data multiple backup system
CN110648048A (en) Applet signing event processing method, device, server and readable storage medium
CN113409051B (en) Risk identification method and device for target service
CN117688616B (en) Information security processing method, device, equipment and storage medium based on big data
CN114398606B (en) Face verification method, equipment and computer readable storage medium based on block chain
KR102301295B1 (en) Evaluating method on the robustness of watermarks embedded in neural networks against model stealing attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211019

RJ01 Rejection of invention patent application after publication