Data transmission safety detection system and method under block chain scene
Technical Field
The invention relates to the field of data security, in particular to a data transmission security detection system and a data transmission security detection method under a block chain scene.
Background
Data transmission is the communication process by which data is transferred from one place to another. Data transmission systems typically consist of a transmission channel and data circuit terminating equipment at both ends of the channel, and in some cases, multiplexing equipment at both ends of the channel. The transmission channel may be a dedicated communication channel or may be provided by a data switching network, a telephone switching network or other types of switching networks. The input and output devices of a data transmission system are terminals or computers, which are collectively called data terminal devices, and the data information sent by the data terminal devices is generally a combination of letters, numbers and symbols, and each letter, number or symbol needs to be represented by a binary code in order to transmit the information.
The safety of data transmission refers to the effective prevention of database damage or data loss caused by human misoperation, program defect, virus or hacker in the data transmission process, and the data leakage and other consequences caused by reading of certain sensitive or confidential data by persons or operators who may not have qualification.
Disclosure of Invention
The present invention is directed to a system and a method for detecting data transmission security in a blockchain scenario, so as to solve the problems in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: a data transmission safety detection system under a block chain scene is characterized by comprising: the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encrypted information detection module is used for comparing the data after transmission with the data before transmission.
Further, the monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for analyzing the face shielding rate of the monitored personnel, and the monitoring data analysis module is used for analyzing the face shielding rate of the monitored personnel through a formula:
wherein A represents the face shielding rate of a monitored person T, S1The method comprises the steps of representing the shielded area of a T face part of a person under monitoring, S representing the total area of the T face part of the person under monitoring, and T representing any person in monitoring data;
when a complete frontal face of person T is not present in the monitoring, by the formula:
wherein A represents the face shielding rate of the monitored person T, S2The method comprises the steps that the exposed area of the face of a monitored person T is shown, S shows the total area of the face of the monitored person T, alpha shows the slope of a face image of the monitored person T relative to a complete face image, and when the face shielding rate A of the monitored person T exceeds a threshold value, all monitoring data of the monitored person T are transmitted to an observation analysis module;
the observation and analysis module is used for analyzing the head and eye actions of the monitored person T, and the observation and analysis module is used for analyzing the head and eye actions of the monitored person T according to a formula:
wherein B represents the observation index of the person T under monitoring, T1The time that the sight of the person T is concentrated outside the counter is represented, T represents the total time that the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of B are transmitted to the sight analysis module;
the sight line analysis module is used for analyzing the sight line position of a monitored person T, and the sight line position is determined according to a formula:
determining the angle of the line of sight from the neutral position, where beta represents the angle of the line of sight from the neutral position, and LWhite colour (Bai)Indicating the length of the white of the eye on the side of the transverse midline of the eye adjacent the camera, LSign boardIndicating the length of the white of the eye, L, at the side of the transverse midline of the eye close to the camera when the eye is looking forwardERepresents the eye transverse midline length; when the beta is a negative number, the deviation of the T sight of the person to the direction of the monitoring camera is shown, and when the beta is a positive number, the deviation of the T sight of the person to the direction far away from the monitoring camera is shown;
and determining the position of the T sight of the person according to the angle beta of the T sight of the person deviating from the center position of the sight, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a danger threshold value. The angle of 60 degrees is half of the effective visual field range of human eyes, the half of the effective visual field range is selected to be analyzed in consideration of the fact that the whole frontal image of a person T cannot be shot each time in surveillance camera shooting, the horizontal middle line length of the eyes and the eye white length in the eyes are approximately equal to the circumference length of eyeballs and the eye white because the human eyes are irregular in shape, the key positions comprise the position of a surveillance camera, the position of a safety channel and the position of an alarm button, and whether the person T has illegal intentions or not can be predicted through the face shielding rate of the person T and the observation times of the key positions, so that risks can be predicted in advance, and risks are reduced.
Further, the data encryption module comprises a dynamic password module and a hash operation module, the dynamic password module is used for encrypting and protecting data, and the hash operation module is used for performing hash operation on the data to obtain an original hash value. Data are protected through the dynamic password module, data transmission safety is greatly enhanced, a hash algorithm is used for recording the data, when the data are changed, obtained hash values can be completely different, the data cannot be reversely pushed from the hash values, and the safety of the front data and the rear data is guaranteed.
Further, the dynamic password module comprises an IP information obtaining module, a real-time information reading module and a dynamic password production module, the IP information obtaining module is used for obtaining the IP address of the decryption device, the real-time information reading module is used for obtaining the weather information of the actual position of the IP address of the decryption device and the time information during decryption, and the dynamic password production module produces the dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption. The three items of information, namely the IP address, the weather information and the time information, are used as the decrypted password, so that the randomness of the password can be greatly improved, the difficulty of password decryption is improved, and the safety of data is improved.
Further, the data storage module is used for storing the information to be stored in the block chain node. The data are stored through the blockchain, and due to the decentralized characteristic of the blockchain, the safety of the data is greatly improved, so that the privacy of a client can be better protected, the client can view the data only when the monitoring is called, and the possibility that the monitoring data is tampered and deleted is reduced.
Further, the data decryption module is configured to perform hash operation on the password input during decoding to obtain a dynamic password hash value, and use the dynamic password hash value as a second dynamic password to decrypt the encryption of the data. And the dynamic password is encrypted by using a Hash algorithm, so that password data is prevented from being stolen.
And the encrypted information comparison module performs hash operation on the data to obtain a detection hash value after acquiring the data subjected to decryption, and compares the detection hash value with the original hash value.
Further, a data transmission safety detection method under a block chain scene is characterized by comprising the following steps:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: performing hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing information to be stored in a block chain node;
s5: carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and using the dynamic password hash value as a second dynamic password to decrypt the encryption of data;
s6: and after the data which is decrypted and encrypted is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with the original hash value.
Further, the step S1 includes the following steps:
s101: acquiring monitoring data;
s102: acquiring the shielded area S of the T face of a person in monitoring1The total area S of the face of the person T in the monitoring process;
s103: calculating the facial shielding rate A of the monitored person T;
s104: when the complete face image of the person T does not exist in the monitoring process, the exposed area S of the face of the person T in the monitoring process is obtained2Acquiring the total face area S of a monitored person T, and acquiring the slope alpha of the face image of the monitored person T relative to the complete positive face image;
s105: calculating the face shielding rate A of the monitored person T,
s106: acquiring time T when the sight of person T is concentrated outside counter1Acquiring the total time T for the person T to enter the monitoring area;
s107: calculating an observation index B of a monitored person T;
s108: when B reaches a threshold value, acquiring the white length L of one side of the transverse midline of the eye close to the cameraWhite colour (Bai)Obtaining the length L of the white of the eye when the eye is in front of the front vision on one side close to the camera in the transverse midline of the eyeSign boardObtaining the transverse midline length L of the eyeE;
S109: calculating an angle beta of the sight line deviating from the middle position;
s110: and determining the position of the T sight of the person, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a time threshold.
Further, the step S2 includes the following steps:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of the IP address of the decryption equipment;
s203: obtaining local weather information by reading the information of the weather bureau at the actual position of the IP address of the decryption device;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each section of the four sections of numbers in the IP address A of the decryption device and acquiring a four-digit number C;
s206: obtaining a three-bit code B through local weather informationn;
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: form dynamic password CBnD。
Compared with the prior art, the invention has the following beneficial effects: whether the person T has illegal intentions or not is predicted by the face shielding rate of the person T and the times of observing the positions of the counterweight positions, so that the danger can be predicted in advance, and the risk is reduced; the data are stored through the blockchain, the data security is improved by using the decentralized feature of the blockchain, the uncertainty of the password is improved by using the IP address, the time information and the weather information, the password decryption difficulty is improved, the password is encrypted for the second time by using the Hash algorithm, and the password is prevented from being directly decrypted after being stolen through the non-reverse deductibility of the Hash value.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic structural diagram of a data transmission security detection system in a blockchain scenario according to the present invention;
FIG. 2 is a schematic diagram illustrating steps of a method for detecting data transmission security in a blockchain scenario according to the present invention;
fig. 3 is a schematic diagram illustrating a step of performing encryption protection on data by using a dynamic password in the data transmission security detection method under a blockchain scenario according to the present invention;
fig. 4 is a schematic diagram illustrating a step of monitoring data analysis in the data transmission security detection method under the block chain scenario.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, the present invention provides a technical solution: a data transmission safety detection system under a block chain scene is characterized by comprising: the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encrypted information detection module is used for comparing the data after transmission with the data before transmission.
The monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for analyzing the face shielding rate of the monitored personnel, and the face analysis module is used for analyzing the face shielding rate of the monitored personnel through a formula:
wherein A represents the face shielding rate of the monitored person T, S1The method comprises the following steps of representing the shielded area of a T face part of a monitored person, S representing the total area of the T face part of the monitored person, and T representing any one person in monitoring data;
when a complete frontal face of person T is not present in the monitoring, by the formula:
wherein A represents the face shielding rate of the monitored person T, S2The method comprises the steps that the exposed area of the face of a monitored person T is represented, S represents the total area of the face of the monitored person T, alpha represents the slope of the face image of the monitored person T relative to a complete face image, and when the face shielding rate A of the monitored person T exceeds a threshold value, all monitoring data of the monitored person T are transmitted to an observation analysis module;
the observation and analysis module is used for analyzing the head and eye actions of the monitored person T, and the observation and analysis module is used for analyzing the head and eye actions of the monitored person T according to a formula:
wherein B represents the observation index of the person T under monitoring, T1The time that the sight of the person T is concentrated outside the counter is represented, T represents the total time that the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of the person T are transmitted to the sight analysis module;
the sight line analysis module is used for analyzing the sight line position of a monitored person T, and the sight line position is determined according to a formula:
determining the angle of the line of sight from the neutral position, where beta represents the angle of the line of sight from the neutral position, and LWhite colour (Bai)Indicating the length of the white of the eye on the side of the transverse midline of the eye adjacent the camera, LSignIndicating the length of the white of the eye, L, on the side of the transverse midline of the eye near the camera when the eye is looking forwardERepresents the eye transverse midline length;
and determining the position of the T sight of the person according to the angle beta of the T sight of the person deviating from the center position of the sight, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a danger threshold value.
In this embodiment, the shielded area S of the T-face of the person under monitoring1=160cm2The total area S of the T face of the person under monitoring is 200cm2When the face blocking rate a of the person T during monitoring is 0.8 and exceeds the face blocking rate threshold value 0.67, the person T is observed and analyzed, and the sight line of the person T is concentrated at a time T at a place other than the counter1The total time T of the person T entering the monitoring area is 30min when 21min is reached, the observation index B of the person T in monitoring is 0.7 and exceeds the threshold value 0.5, sight line analysis is carried out on the person T, and the length L of white eyes on one side, close to the camera, of the transverse midline of the eyesWhite colour (Bai)2.5mm, the length L of white of the eye when the eye is in front of the orthopaedics on one side of the transverse midline of the eye close to the cameraSign board5mm, transverse midline length L of eyeE15mm, the angle beta of the sight line deviating from the center of the sight line is-45 degrees, the sight line position is located on the in-store safety channel, the time that the sight line position is located on the in-store safety channel is 3min, the time that the sight line position is located at other key positions in the store is 12min, the coincidence time of the position of the T sight line of the person and the key position is 15min, the danger threshold value is exceeded, the monitoring data of the person are uploaded to the block chain node, and early warning information is sent to the system.
The data encryption module comprises a dynamic password module and a Hash operation module, the dynamic password module is used for carrying out encryption protection on data, and the Hash operation module is used for carrying out Hash operation on the data to obtain an original Hash value.
In this embodiment, the original hash value of a piece of data is 202cb962ac59075b964b07152d234b70
The dynamic password module comprises an IP information acquisition module, a real-time information reading module and a dynamic password production module, wherein the IP information acquisition module is used for acquiring the IP address of the decryption device, the real-time information reading module is used for acquiring weather information of the actual position of the IP address of the decryption device and time information during decryption, and the dynamic password production module is used for producing the dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption.
The data storage module is used for storing the information to be stored in the block chain node.
The data decryption module is used for carrying out Hash operation on the input password during decoding to obtain a dynamic password Hash value, and the dynamic password Hash value is used as a second dynamic password to decrypt the encryption of the data.
And the encrypted information comparison module performs hash operation on the data to obtain a detection hash value after acquiring the data subjected to decryption, and compares the detection hash value with the original hash value.
A data transmission safety detection method under a block chain scene is characterized by comprising the following steps:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: performing hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing information to be stored in a block chain node;
s5: carrying out Hash operation on the input password during decoding to obtain a dynamic password Hash value, and using the dynamic password Hash value as a second dynamic password to decrypt the encryption of data;
s6: and after the data which is decrypted and encrypted is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with the original hash value.
The step S1 includes the steps of:
s101: acquiring monitoring data;
s102: acquiring the shielded area S of the T face of a person in monitoring1The total area S of the face of the person T under monitoring;
s103: calculating the facial shielding rate A of the monitored person T;
s104: when the complete face image of the person T does not exist in the monitoring process, the naked face area S of the face of the person T in the monitoring process is obtained2Acquiring the total face area S of a monitored person T, and acquiring the slope alpha of the face image of the monitored person T relative to the complete positive face image;
s105: calculating the face shielding rate A of the monitored person T,
s106: acquiring time T when the sight of person T is concentrated outside counter1Acquiring the total time T for the personnel T to enter the monitoring area;
s107: calculating an observation index B of a monitored person T;
s108: when B reaches a threshold value, acquiring the white length L of one side of the transverse midline of the eye close to the cameraWhite colour (Bai)Obtaining the length L of the white of the eye when the eye is in front of the front vision on one side close to the camera in the transverse midline of the eyeSignObtaining the transverse midline length L of the eyeE;
S109: calculating an angle beta of the sight line deviating from the center position;
s110: and determining the position of the T sight of the person, marking the key position, encrypting and uploading the monitoring data to the block chain node and sending early warning information to the system when the coincidence time of the position of the T sight of the person and the key position exceeds a time threshold.
The step S2 includes the steps of:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of the IP address of the decryption equipment;
s203: the method comprises the steps of reading information of a weather bureau at the actual position of an IP address of decryption equipment to obtain local weather information;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each section of the four sections of numbers in the IP address A of the decryption equipment and acquiring a four-digit number C;
s206: obtaining a three-bit code B through local weather informationn;
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: form dynamic password CBnD。
In this embodiment, the IP address of a decryption device is 110.112.8.257, the actual location is in hangzhou, zhejiang, the decryption time is 2019.03.08, the weather of the current day is queried by the weather bureau as sunny, B1Obtain dynamic coding CB ═ sunnAnd D is 0287sun20190308, the hash value is obtained by carrying out hash operation, namely 202cb962ac59075b964b07152D234b70 is equal to the original hash value, and the data is detected to be safe.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described above, or equivalents may be substituted for elements thereof. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.