CN114785609A - Data transmission safety detection system and method under block chain scene - Google Patents

Data transmission safety detection system and method under block chain scene Download PDF

Info

Publication number
CN114785609A
CN114785609A CN202210500477.0A CN202210500477A CN114785609A CN 114785609 A CN114785609 A CN 114785609A CN 202210500477 A CN202210500477 A CN 202210500477A CN 114785609 A CN114785609 A CN 114785609A
Authority
CN
China
Prior art keywords
data
module
person
monitoring
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210500477.0A
Other languages
Chinese (zh)
Other versions
CN114785609B (en
Inventor
陈玉林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tibet Gaochi Information Security Technology Co ltd
Original Assignee
Inner Mongolia Chengpin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inner Mongolia Chengpin Technology Co ltd filed Critical Inner Mongolia Chengpin Technology Co ltd
Priority to CN202210500477.0A priority Critical patent/CN114785609B/en
Publication of CN114785609A publication Critical patent/CN114785609A/en
Application granted granted Critical
Publication of CN114785609B publication Critical patent/CN114785609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a data transmission safety detection system and a data transmission safety detection method under a block chain scene, which comprise a monitoring data acquisition module, a monitoring data analysis module, a data encryption module, a data storage module, a data decryption module and an encrypted information comparison module, wherein the monitoring data analysis module is used for analyzing monitoring data, and the encrypted information detection module is used for comparing data after transmission with data before transmission. The method analyzes the monitoring data to predict the risk of robbery, stores the data through the blockchain, improves the safety of the data by using the decentralized characteristic of the blockchain, improves the uncertainty of the password by using the IP address, the time information and the weather information, improves the difficulty of deciphering the password, performs secondary encryption on the password by using a Hash algorithm, and prevents the password from being directly cracked after being stolen by the non-reciprocal property of the Hash value.

Description

Data transmission safety detection system and method under block chain scene
Technical Field
The invention relates to the field of data security, in particular to a data transmission security detection system and a data transmission security detection method under a block chain scene.
Background
Data transmission is the communication process by which data is transferred from one place to another. Data transmission systems typically consist of a transmission channel and data circuit terminating equipment at both ends of the channel, and in some cases, multiplexing equipment at both ends of the channel. The transmission channel may be a dedicated communication channel or may be provided by a data switching network, a telephone switching network or other types of switching networks. The input and output devices of a data transmission system are terminals or computers, which are collectively called data terminal devices, and the data information sent by the data terminal devices is generally a combination of letters, numbers and symbols, and each letter, number or symbol needs to be represented by a binary code in order to transmit the information.
The safety of data transmission refers to the effective prevention of database damage or data loss caused by human misoperation, program defect, virus or hacker in the data transmission process, and the data leakage and other consequences caused by reading of certain sensitive or confidential data by persons or operators who may not have qualification.
Disclosure of Invention
The present invention is directed to a system and a method for detecting data transmission security in a blockchain scenario, so as to solve the problems in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: a data transmission safety detection system under a block chain scene is characterized by comprising: the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encrypted information detection module is used for comparing the data after transmission with the data before transmission.
Further, the monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for analyzing the face shielding rate of the monitored personnel, and the monitoring data analysis module is used for analyzing the face shielding rate of the monitored personnel through a formula:
Figure BDA0003634127980000021
wherein A represents the face shielding rate of a monitored person T, S1The method comprises the steps of representing the shielded area of a T face part of a person under monitoring, S representing the total area of the T face part of the person under monitoring, and T representing any person in monitoring data;
when a complete frontal face of person T is not present in the monitoring, by the formula:
Figure BDA0003634127980000022
wherein A represents the face shielding rate of the monitored person T, S2The method comprises the steps that the exposed area of the face of a monitored person T is shown, S shows the total area of the face of the monitored person T, alpha shows the slope of a face image of the monitored person T relative to a complete face image, and when the face shielding rate A of the monitored person T exceeds a threshold value, all monitoring data of the monitored person T are transmitted to an observation analysis module;
the observation and analysis module is used for analyzing the head and eye actions of the monitored person T, and the observation and analysis module is used for analyzing the head and eye actions of the monitored person T according to a formula:
Figure BDA0003634127980000023
wherein B represents the observation index of the person T under monitoring, T1The time that the sight of the person T is concentrated outside the counter is represented, T represents the total time that the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of B are transmitted to the sight analysis module;
the sight line analysis module is used for analyzing the sight line position of a monitored person T, and the sight line position is determined according to a formula:
Figure BDA0003634127980000024
determining the angle of the line of sight from the neutral position, where beta represents the angle of the line of sight from the neutral position, and LWhite colour (Bai)Indicating the length of the white of the eye on the side of the transverse midline of the eye adjacent the camera, LSign boardIndicating the length of the white of the eye, L, at the side of the transverse midline of the eye close to the camera when the eye is looking forwardERepresents the eye transverse midline length; when the beta is a negative number, the deviation of the T sight of the person to the direction of the monitoring camera is shown, and when the beta is a positive number, the deviation of the T sight of the person to the direction far away from the monitoring camera is shown;
and determining the position of the T sight of the person according to the angle beta of the T sight of the person deviating from the center position of the sight, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a danger threshold value. The angle of 60 degrees is half of the effective visual field range of human eyes, the half of the effective visual field range is selected to be analyzed in consideration of the fact that the whole frontal image of a person T cannot be shot each time in surveillance camera shooting, the horizontal middle line length of the eyes and the eye white length in the eyes are approximately equal to the circumference length of eyeballs and the eye white because the human eyes are irregular in shape, the key positions comprise the position of a surveillance camera, the position of a safety channel and the position of an alarm button, and whether the person T has illegal intentions or not can be predicted through the face shielding rate of the person T and the observation times of the key positions, so that risks can be predicted in advance, and risks are reduced.
Further, the data encryption module comprises a dynamic password module and a hash operation module, the dynamic password module is used for encrypting and protecting data, and the hash operation module is used for performing hash operation on the data to obtain an original hash value. Data are protected through the dynamic password module, data transmission safety is greatly enhanced, a hash algorithm is used for recording the data, when the data are changed, obtained hash values can be completely different, the data cannot be reversely pushed from the hash values, and the safety of the front data and the rear data is guaranteed.
Further, the dynamic password module comprises an IP information obtaining module, a real-time information reading module and a dynamic password production module, the IP information obtaining module is used for obtaining the IP address of the decryption device, the real-time information reading module is used for obtaining the weather information of the actual position of the IP address of the decryption device and the time information during decryption, and the dynamic password production module produces the dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption. The three items of information, namely the IP address, the weather information and the time information, are used as the decrypted password, so that the randomness of the password can be greatly improved, the difficulty of password decryption is improved, and the safety of data is improved.
Further, the data storage module is used for storing the information to be stored in the block chain node. The data are stored through the blockchain, and due to the decentralized characteristic of the blockchain, the safety of the data is greatly improved, so that the privacy of a client can be better protected, the client can view the data only when the monitoring is called, and the possibility that the monitoring data is tampered and deleted is reduced.
Further, the data decryption module is configured to perform hash operation on the password input during decoding to obtain a dynamic password hash value, and use the dynamic password hash value as a second dynamic password to decrypt the encryption of the data. And the dynamic password is encrypted by using a Hash algorithm, so that password data is prevented from being stolen.
And the encrypted information comparison module performs hash operation on the data to obtain a detection hash value after acquiring the data subjected to decryption, and compares the detection hash value with the original hash value.
Further, a data transmission safety detection method under a block chain scene is characterized by comprising the following steps:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: performing hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing information to be stored in a block chain node;
s5: carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and using the dynamic password hash value as a second dynamic password to decrypt the encryption of data;
s6: and after the data which is decrypted and encrypted is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with the original hash value.
Further, the step S1 includes the following steps:
s101: acquiring monitoring data;
s102: acquiring the shielded area S of the T face of a person in monitoring1The total area S of the face of the person T in the monitoring process;
s103: calculating the facial shielding rate A of the monitored person T;
s104: when the complete face image of the person T does not exist in the monitoring process, the exposed area S of the face of the person T in the monitoring process is obtained2Acquiring the total face area S of a monitored person T, and acquiring the slope alpha of the face image of the monitored person T relative to the complete positive face image;
s105: calculating the face shielding rate A of the monitored person T,
s106: acquiring time T when the sight of person T is concentrated outside counter1Acquiring the total time T for the person T to enter the monitoring area;
s107: calculating an observation index B of a monitored person T;
s108: when B reaches a threshold value, acquiring the white length L of one side of the transverse midline of the eye close to the cameraWhite colour (Bai)Obtaining the length L of the white of the eye when the eye is in front of the front vision on one side close to the camera in the transverse midline of the eyeSign boardObtaining the transverse midline length L of the eyeE
S109: calculating an angle beta of the sight line deviating from the middle position;
s110: and determining the position of the T sight of the person, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a time threshold.
Further, the step S2 includes the following steps:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of the IP address of the decryption equipment;
s203: obtaining local weather information by reading the information of the weather bureau at the actual position of the IP address of the decryption device;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each section of the four sections of numbers in the IP address A of the decryption device and acquiring a four-digit number C;
s206: obtaining a three-bit code B through local weather informationn
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: form dynamic password CBnD。
Compared with the prior art, the invention has the following beneficial effects: whether the person T has illegal intentions or not is predicted by the face shielding rate of the person T and the times of observing the positions of the counterweight positions, so that the danger can be predicted in advance, and the risk is reduced; the data are stored through the blockchain, the data security is improved by using the decentralized feature of the blockchain, the uncertainty of the password is improved by using the IP address, the time information and the weather information, the password decryption difficulty is improved, the password is encrypted for the second time by using the Hash algorithm, and the password is prevented from being directly decrypted after being stolen through the non-reverse deductibility of the Hash value.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic structural diagram of a data transmission security detection system in a blockchain scenario according to the present invention;
FIG. 2 is a schematic diagram illustrating steps of a method for detecting data transmission security in a blockchain scenario according to the present invention;
fig. 3 is a schematic diagram illustrating a step of performing encryption protection on data by using a dynamic password in the data transmission security detection method under a blockchain scenario according to the present invention;
fig. 4 is a schematic diagram illustrating a step of monitoring data analysis in the data transmission security detection method under the block chain scenario.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, the present invention provides a technical solution: a data transmission safety detection system under a block chain scene is characterized by comprising: the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encrypted information detection module is used for comparing the data after transmission with the data before transmission.
The monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for analyzing the face shielding rate of the monitored personnel, and the face analysis module is used for analyzing the face shielding rate of the monitored personnel through a formula:
Figure BDA0003634127980000061
wherein A represents the face shielding rate of the monitored person T, S1The method comprises the following steps of representing the shielded area of a T face part of a monitored person, S representing the total area of the T face part of the monitored person, and T representing any one person in monitoring data;
when a complete frontal face of person T is not present in the monitoring, by the formula:
Figure BDA0003634127980000062
wherein A represents the face shielding rate of the monitored person T, S2The method comprises the steps that the exposed area of the face of a monitored person T is represented, S represents the total area of the face of the monitored person T, alpha represents the slope of the face image of the monitored person T relative to a complete face image, and when the face shielding rate A of the monitored person T exceeds a threshold value, all monitoring data of the monitored person T are transmitted to an observation analysis module;
the observation and analysis module is used for analyzing the head and eye actions of the monitored person T, and the observation and analysis module is used for analyzing the head and eye actions of the monitored person T according to a formula:
Figure BDA0003634127980000063
wherein B represents the observation index of the person T under monitoring, T1The time that the sight of the person T is concentrated outside the counter is represented, T represents the total time that the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of the person T are transmitted to the sight analysis module;
the sight line analysis module is used for analyzing the sight line position of a monitored person T, and the sight line position is determined according to a formula:
Figure BDA0003634127980000064
determining the angle of the line of sight from the neutral position, where beta represents the angle of the line of sight from the neutral position, and LWhite colour (Bai)Indicating the length of the white of the eye on the side of the transverse midline of the eye adjacent the camera, LSignIndicating the length of the white of the eye, L, on the side of the transverse midline of the eye near the camera when the eye is looking forwardERepresents the eye transverse midline length;
and determining the position of the T sight of the person according to the angle beta of the T sight of the person deviating from the center position of the sight, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a danger threshold value.
In this embodiment, the shielded area S of the T-face of the person under monitoring1=160cm2The total area S of the T face of the person under monitoring is 200cm2When the face blocking rate a of the person T during monitoring is 0.8 and exceeds the face blocking rate threshold value 0.67, the person T is observed and analyzed, and the sight line of the person T is concentrated at a time T at a place other than the counter1The total time T of the person T entering the monitoring area is 30min when 21min is reached, the observation index B of the person T in monitoring is 0.7 and exceeds the threshold value 0.5, sight line analysis is carried out on the person T, and the length L of white eyes on one side, close to the camera, of the transverse midline of the eyesWhite colour (Bai)2.5mm, the length L of white of the eye when the eye is in front of the orthopaedics on one side of the transverse midline of the eye close to the cameraSign board5mm, transverse midline length L of eyeE15mm, the angle beta of the sight line deviating from the center of the sight line is-45 degrees, the sight line position is located on the in-store safety channel, the time that the sight line position is located on the in-store safety channel is 3min, the time that the sight line position is located at other key positions in the store is 12min, the coincidence time of the position of the T sight line of the person and the key position is 15min, the danger threshold value is exceeded, the monitoring data of the person are uploaded to the block chain node, and early warning information is sent to the system.
The data encryption module comprises a dynamic password module and a Hash operation module, the dynamic password module is used for carrying out encryption protection on data, and the Hash operation module is used for carrying out Hash operation on the data to obtain an original Hash value.
In this embodiment, the original hash value of a piece of data is 202cb962ac59075b964b07152d234b70
The dynamic password module comprises an IP information acquisition module, a real-time information reading module and a dynamic password production module, wherein the IP information acquisition module is used for acquiring the IP address of the decryption device, the real-time information reading module is used for acquiring weather information of the actual position of the IP address of the decryption device and time information during decryption, and the dynamic password production module is used for producing the dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption.
The data storage module is used for storing the information to be stored in the block chain node.
The data decryption module is used for carrying out Hash operation on the input password during decoding to obtain a dynamic password Hash value, and the dynamic password Hash value is used as a second dynamic password to decrypt the encryption of the data.
And the encrypted information comparison module performs hash operation on the data to obtain a detection hash value after acquiring the data subjected to decryption, and compares the detection hash value with the original hash value.
A data transmission safety detection method under a block chain scene is characterized by comprising the following steps:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: performing hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing information to be stored in a block chain node;
s5: carrying out Hash operation on the input password during decoding to obtain a dynamic password Hash value, and using the dynamic password Hash value as a second dynamic password to decrypt the encryption of data;
s6: and after the data which is decrypted and encrypted is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with the original hash value.
The step S1 includes the steps of:
s101: acquiring monitoring data;
s102: acquiring the shielded area S of the T face of a person in monitoring1The total area S of the face of the person T under monitoring;
s103: calculating the facial shielding rate A of the monitored person T;
s104: when the complete face image of the person T does not exist in the monitoring process, the naked face area S of the face of the person T in the monitoring process is obtained2Acquiring the total face area S of a monitored person T, and acquiring the slope alpha of the face image of the monitored person T relative to the complete positive face image;
s105: calculating the face shielding rate A of the monitored person T,
s106: acquiring time T when the sight of person T is concentrated outside counter1Acquiring the total time T for the personnel T to enter the monitoring area;
s107: calculating an observation index B of a monitored person T;
s108: when B reaches a threshold value, acquiring the white length L of one side of the transverse midline of the eye close to the cameraWhite colour (Bai)Obtaining the length L of the white of the eye when the eye is in front of the front vision on one side close to the camera in the transverse midline of the eyeSignObtaining the transverse midline length L of the eyeE
S109: calculating an angle beta of the sight line deviating from the center position;
s110: and determining the position of the T sight of the person, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a time threshold.
The step S2 includes the steps of:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of the IP address of the decryption equipment;
s203: the method comprises the steps of reading information of a weather bureau at the actual position of an IP address of decryption equipment to obtain local weather information;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each section of the four sections of numbers in the IP address A of the decryption equipment and acquiring a four-digit number C;
s206: obtaining a three-bit code B through local weather informationn
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: form dynamic password CBnD。
In this embodiment, the IP address of a decryption device is 110.112.8.257, the actual location is in hangzhou, zhejiang, the decryption time is 2019.03.08, the weather of the current day is queried by the weather bureau as sunny, B1Obtain dynamic coding CB ═ sunnAnd D is 0287sun20190308, the hash value is obtained by carrying out hash operation, namely 202cb962ac59075b964b07152D234b70 is equal to the original hash value, and the data is detected to be safe.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data transmission safety detection system under a block chain scene is characterized by comprising: the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encrypted information detection module is used for comparing the transmitted data with the data before transmission.
2. The system according to claim 1, wherein the system comprises: the monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for analyzing the face shielding rate of the monitored personnel, and the face analysis module is used for analyzing the face shielding rate of the monitored personnel through a formula:
Figure FDA0003634127970000011
wherein A represents the face shielding rate of the monitored person T, S1The method comprises the steps of representing the shielded area of a T face part of a person under monitoring, S representing the total area of the T face part of the person under monitoring, and T representing any person in monitoring data;
when a complete frontal face of person T is not present in the monitoring, by the formula:
Figure FDA0003634127970000012
wherein A represents the face shielding rate of a monitored person T, S2The method comprises the steps that the exposed area of the face of a monitored person T is shown, S shows the total area of the face of the monitored person T, alpha shows the slope of a face image of the monitored person T relative to a complete face image, and when the face shielding rate A of the monitored person T exceeds a threshold value, all monitoring data of the monitored person T are transmitted to an observation analysis module;
the observation and analysis module is used for analyzing the head and eye actions of the monitored person T, and the observation and analysis module is used for analyzing the head and eye actions of the monitored person T according to a formula:
Figure FDA0003634127970000013
wherein B represents the observation index of the person T under monitoring, T1The time that the sight of the person T is concentrated outside the counter is represented, T represents the total time that the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of B are transmitted to the sight analysis module;
the sight line analysis module is used for analyzing the sight line position of a monitored person T, and the sight line position is determined according to a formula:
Figure FDA0003634127970000021
determining the angle of the line of sight deviating from the centre position, wherein beta represents the angle of the line of sight deviating from the centre position, LWhite colour (Bai)Indicating the length of the white of the eye on the side of the transverse midline of the eye adjacent the camera, LSign boardIndicating the length of the white of the eye, L, on the side of the transverse midline of the eye near the camera when the eye is looking forwardERepresents the transverse midline length of the eye;
and when the coincidence time of the position of the T sight of the person and the key position exceeds a danger threshold value, encrypting and uploading the monitoring data to a block chain node and sending early warning information to a system.
3. The system according to claim 1, wherein the system comprises: the data encryption module comprises a dynamic password module and a hash operation module, the dynamic password module is used for encrypting and protecting data, and the hash operation module is used for carrying out hash operation on the data to obtain an original hash value.
4. The system according to claim 2, wherein the data transmission security detection system under a blockchain scenario comprises: the dynamic password module comprises an IP information acquisition module, a real-time information reading module and a dynamic password production module, wherein the IP information acquisition module is used for acquiring the IP address of the decryption equipment, the real-time information reading module is used for acquiring the weather information of the actual position of the IP address of the decryption equipment and the time information during decryption, and the dynamic password production module is used for producing the dynamic password through the IP address of the decryption equipment, the weather information of the actual position of the IP address of the decryption equipment and the time information during decryption.
5. The system according to claim 1, wherein the system comprises: the data storage module is used for storing the information to be stored in the block chain node.
6. The system according to claim 1, wherein the system comprises: the data decryption module is used for carrying out hash operation on the input password during decoding to obtain a dynamic password hash value, and the dynamic password hash value is used as a second dynamic password to decrypt the encryption of the data.
7. The system according to claim 1, wherein the system comprises: and the encrypted information comparison module performs hash operation on the data to obtain a detection hash value after acquiring the data subjected to encryption unlocking, and compares the detection hash value with the original hash value.
8. A data transmission safety detection method under a block chain scene is characterized by comprising the following steps:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: performing hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing information to be stored in a block chain node;
s5: carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and using the dynamic password hash value as a second dynamic password to decrypt the encryption of data;
s6: and after the data which is decrypted and encrypted is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with the original hash value.
9. The method of claim 8, wherein the method further comprises: the step S1 includes the steps of:
s101: acquiring monitoring data;
s102: acquiring the shielded area S of the T face of a person in monitoring1The total area S of the face of the person T under monitoring;
s103: calculating the facial shielding rate A of the monitored person T;
s104: when the complete face image of the person T does not exist in the monitoring process, the naked face area S of the face of the person T in the monitoring process is obtained2Acquiring the total face area S of a monitored person T, and acquiring the slope alpha of the face image of the monitored person T relative to the complete positive face image;
s105: calculating the face shielding rate A of the monitored person T,
s106: acquiring time T when the sight of person T is concentrated outside counter1Acquiring the total time T for the person T to enter the monitoring area;
s107: calculating an observation index B of a monitored person T;
s108: when B reaches a threshold value, acquiring a first lens close to the camera in the transverse midline of the eyeLateral white length LWhite colour (Bai)Acquiring the length L of the white of the eye on the side close to the camera in the transverse midline of the eye when the eye is in front of the front viewSign boardObtaining the transverse midline length L of the eyeE
S109: calculating an angle beta of the sight line deviating from the middle position;
s110: and determining the position of the T sight of the person, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a time threshold.
10. The method of claim 8, wherein the method comprises: the step S2 includes the steps of:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of the IP address of the decryption equipment;
s203: the method comprises the steps of reading information of a weather bureau at the actual position of an IP address of decryption equipment to obtain local weather information;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each section of the four sections of numbers in the IP address A of the decryption device and acquiring a four-digit number C;
s206: obtaining a three-bit code B through local weather informationn
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: form dynamic password CBnD。
CN202210500477.0A 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene Active CN114785609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210500477.0A CN114785609B (en) 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210500477.0A CN114785609B (en) 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene

Publications (2)

Publication Number Publication Date
CN114785609A true CN114785609A (en) 2022-07-22
CN114785609B CN114785609B (en) 2024-02-06

Family

ID=82436709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210500477.0A Active CN114785609B (en) 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene

Country Status (1)

Country Link
CN (1) CN114785609B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348184A (en) * 2022-08-16 2022-11-15 江苏商贸职业学院 Internet of things data security event prediction method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102610035A (en) * 2012-04-05 2012-07-25 广州广电运通金融电子股份有限公司 Financial self-service device and anti-peeping system and anti-peeping method thereof
CN105681539A (en) * 2015-12-28 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Unlocking method and device and terminal
CN106780009A (en) * 2016-12-07 2017-05-31 云赛智联股份有限公司 A kind of self-help bank's crime prevention system
CN106792674A (en) * 2016-12-19 2017-05-31 奇酷互联网络科技(深圳)有限公司 Mobile terminal and WiFi sharing methods and device
WO2019134246A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Facial recognition-based security monitoring method, device, and storage medium
CN111131795A (en) * 2020-01-20 2020-05-08 江苏荣泽信息科技股份有限公司 City safety monitoring platform based on block chain
CN112702582A (en) * 2021-01-06 2021-04-23 贵州大学 Secure transmission method and device for monitoring video based on SM2
CN113868685A (en) * 2021-10-08 2021-12-31 安徽施耐德成套电气有限公司 Electric power monitoring data encryption storage system based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102610035A (en) * 2012-04-05 2012-07-25 广州广电运通金融电子股份有限公司 Financial self-service device and anti-peeping system and anti-peeping method thereof
CN105681539A (en) * 2015-12-28 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Unlocking method and device and terminal
CN106780009A (en) * 2016-12-07 2017-05-31 云赛智联股份有限公司 A kind of self-help bank's crime prevention system
CN106792674A (en) * 2016-12-19 2017-05-31 奇酷互联网络科技(深圳)有限公司 Mobile terminal and WiFi sharing methods and device
WO2019134246A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Facial recognition-based security monitoring method, device, and storage medium
CN111131795A (en) * 2020-01-20 2020-05-08 江苏荣泽信息科技股份有限公司 City safety monitoring platform based on block chain
CN112702582A (en) * 2021-01-06 2021-04-23 贵州大学 Secure transmission method and device for monitoring video based on SM2
CN113868685A (en) * 2021-10-08 2021-12-31 安徽施耐德成套电气有限公司 Electric power monitoring data encryption storage system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周仁琴;: "视频监控场景下的面部遮挡检测" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348184A (en) * 2022-08-16 2022-11-15 江苏商贸职业学院 Internet of things data security event prediction method and system
CN115348184B (en) * 2022-08-16 2024-01-26 江苏商贸职业学院 Internet of things data security event prediction method and system

Also Published As

Publication number Publication date
CN114785609B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
KR20120035299A (en) Image protection processing apparatus for privacy protection, and image security system and method using the same
FI86486B (en) FOERFARANDE FOER ATT ARRANGERA TELEROESTNINGEN PAO ETT SAEKERT SAETT.
CN114785609B (en) System and method for detecting data transmission safety in block chain scene
CN110298196A (en) A kind of electronic information security storage system and storage method
CN111970498A (en) Public safety video monitoring networking information safety system
CN106982204A (en) Credible and secure platform
CN116132989A (en) Industrial Internet security situation awareness system and method
CN116663047A (en) Fine-granularity safe data sharing method for privacy protection of patient health record
CN114390316A (en) Processing method and device for image acquisition synchronous encryption privacy protection
CN116248406B (en) Information security storage method and information security device thereof
CN105812338B (en) Data access control method and network management equipment
CN108965310A (en) The anti-tamper encryption implementation method of crossing and device on a kind of batch data
Han et al. The privacy protection framework for biometric information in network based CCTV environment
CN112637172A (en) Novel data security and confidentiality method
CN108023884A (en) A kind of encryption method of Networks and information security
CN113949591B (en) Data encryption protection method and system based on block chain
CN115600189A (en) Commercial password application security evaluation system
CN114338007A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN114374773A (en) Method for encrypting image acquisition synchronization information and decrypting, restoring and recovering image acquisition synchronization information at using end
CN117541318B (en) Offline consumption intelligent evaluation and supervision method, system and medium
CN112380544A (en) Data security protection method of software system
Shane et al. Legislation seeks to bar NSA tactic in encryption
CN117294537B (en) Computer network security protection method and system applying quantum encryption
Chuks-Okeke et al. Scope of the National Security Exemption for Data Processing under Nigerian Privacy Law: A Review of the 2021 National Identity Policy for SIM Card Registration
CN112995220A (en) Security data security system for computer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240403

Address after: Floor 4, Building 1, No. 9, Boda Road, Zone A, Lhasa Economic and Technological Development Zone, Lhasa, Tibet Autonomous Region 850030

Patentee after: Tibet gaochi Information Security Technology Co.,Ltd.

Country or region after: China

Address before: 010050 1301, building 2-3, Shunhe International Garden, Chahar street, Xincheng District, Hohhot, Inner Mongolia Autonomous Region

Patentee before: Inner Mongolia Chengpin Technology Co.,Ltd.

Country or region before: China