CN114785609B - System and method for detecting data transmission safety in block chain scene - Google Patents

System and method for detecting data transmission safety in block chain scene Download PDF

Info

Publication number
CN114785609B
CN114785609B CN202210500477.0A CN202210500477A CN114785609B CN 114785609 B CN114785609 B CN 114785609B CN 202210500477 A CN202210500477 A CN 202210500477A CN 114785609 B CN114785609 B CN 114785609B
Authority
CN
China
Prior art keywords
data
monitoring
person
module
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210500477.0A
Other languages
Chinese (zh)
Other versions
CN114785609A (en
Inventor
陈玉林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tibet Gaochi Information Security Technology Co ltd
Original Assignee
Inner Mongolia Chengpin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inner Mongolia Chengpin Technology Co ltd filed Critical Inner Mongolia Chengpin Technology Co ltd
Priority to CN202210500477.0A priority Critical patent/CN114785609B/en
Publication of CN114785609A publication Critical patent/CN114785609A/en
Application granted granted Critical
Publication of CN114785609B publication Critical patent/CN114785609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a data transmission safety detection system and method in a blockchain scene, wherein the system comprises a monitoring data acquisition module, a monitoring data analysis module, a data encryption module, a data storage module, a data decryption module and an encryption information comparison module, wherein the monitoring data analysis module is used for analyzing monitoring data, and the encryption information detection module is used for comparing transmitted data with data before transmission. The invention analyzes the monitoring data to predict the risk of robbing, stores the data through the blockchain, improves the safety of the data by using the decentralization characteristic of the blockchain, improves the uncertainty of the password by using the IP address, the time information and the weather information, improves the difficulty of password decoding, and then encrypts the password for the second time by using the hash algorithm, and prevents the password from being directly decoded after being stolen through the irreconcilability of the hash value.

Description

System and method for detecting data transmission safety in block chain scene
Technical Field
The invention relates to the field of data security, in particular to a system and a method for detecting data transmission security in a block chain scene.
Background
Data transmission is a communication process in which data is transferred from one place to another. Data transmission systems typically consist of a transmission channel and data circuit termination devices at both ends of the channel, and in some cases multiplexing devices at both ends of the channel. The transmission channel may be a dedicated communication channel or may be provided by a data switching network, a telephone switching network or other type of switching network. The input/output devices of the data transmission system are terminals or computers, collectively called data terminal devices, which transmit data information, typically a combination of letters, numbers and symbols, and in order to transmit the data information, each letter, number or symbol is represented by a binary code.
The security of data transmission refers to effectively preventing database damage or data loss phenomenon caused by man-made misoperation, program defect, virus or hacker in the data transmission process, and some sensitive or confidential data may not be read by qualified personnel or operators, thereby causing data disclosure and other consequences.
Disclosure of Invention
The invention aims to provide a data transmission safety detection system and method in a blockchain scene, so as to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: a data transmission security detection system in a blockchain scenario, comprising: the system comprises a monitoring data acquisition module, a monitoring data analysis module, a data encryption module, a data storage module, a data decryption module and an encryption information comparison module, wherein the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encryption information detection module is used for comparing the transmitted data with the data before transmission.
Further, the monitoring data acquisition module is used for acquiring monitoring data needing to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for obtaining a monitoring data through the formula of A=S 1 the/S analyzes the face shielding rate of the person in monitoring,
wherein A represents the face shielding rate of the person T in monitoring and S 1 The method comprises the steps that the area of a face of a person T in monitoring is shielded, S represents the total area of the face of the person T in monitoring, and the person T represents any person in monitoring data;
when there is no complete positive face image of the person T in the monitoring, the method is represented by the formula a= (S-S 2 ) Analysis of the face occlusion rate of the person under monitoring is performed by a/alpha S,
wherein A represents the face shielding rate of the person T in monitoring and S 2 Representing the exposure of the face of the person T in monitoringS represents the total area of the face of the person T in monitoring, alpha represents the slope of the face image of the person T in monitoring relative to the complete positive face image, and when the face shielding rate A of the person T in monitoring exceeds a threshold value, all monitoring data of the person T are transmitted to an observation analysis module;
the observation analysis module is used for obtaining the formula b=t 1 T to analyze the head and eye movements of the person T under monitoring,
wherein B represents the observation index of the person T in monitoring, T 1 The time when the sight line of the person T is concentrated in a place beyond the counter is represented, T represents the total time when the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of the B are transmitted to the sight line analysis module;
the sight line analysis module is used for passing the formula beta= { (L) White color -L Label (C) )/L E }/(L Label (C) /L E ) Analyzing the sight line position of the person T in monitoring by x 60 DEG to determine the angle of the sight line deviating from the median position, wherein beta represents the angle of the sight line deviating from the median position of the sight line, L White color Represents the white length of one side of the lateral midline of the eye, which is close to the camera, L Label (C) Representing the white length of the side of the lateral midline of the eye, which is close to the camera, when the eye is in front of the front view, L E Represents the lateral midline length of the eye; when beta is a negative number, the sight line of the person T is deflected to the direction of the monitoring camera, and when beta is a positive number, the sight line of the person T is deflected to the direction away from the monitoring camera;
and determining the position of the sight line of the person T through the angle beta of the sight line of the person T deviated from the central position of the sight line, marking the key position, and uploading the monitoring data to the block chain link point and sending the early warning information to the system when the superposition time of the position of the sight line of the person T and the key position exceeds a dangerous threshold value. The method is characterized in that 60 degrees are half of the effective visual field range of eyes, considering that the monitoring camera cannot shoot the front image of the complete person T every time, half of the effective visual field range is selected for analysis, because eyes are irregularly shaped, the length of the transverse middle line of the eyes is selected, the length of the white of the eyes is approximately equal to the circumferential length of eyeballs and the white of the eyes, the important positions comprise the positions of the monitoring camera, the positions of the safety channels and the positions of alarm buttons, and the danger can be predicted in advance and the risk is reduced by predicting whether the person T has illegal intention or not through the face shielding rate of the person T and the times of observing the positions of the important points.
Further, the data encryption module comprises a dynamic password module and a hash operation module, wherein the dynamic password module is used for encrypting and protecting data, and the hash operation module is used for carrying out hash operation on the data to obtain an original hash value. The data is protected through the dynamic password module, the safety of data transmission is greatly enhanced, the data is recorded by using the hash algorithm, when the data is changed, the obtained hash values are quite different, the data cannot be pushed back from the hash values, and the safety of the front data and the rear data is ensured.
Further, the dynamic password module comprises an IP information acquisition module, a real-time information reading module and a dynamic password production module, wherein the IP information acquisition module is used for acquiring the IP address of the decryption device, the real-time information reading module is used for acquiring weather information of the actual position of the IP address of the decryption device and time information during decryption, and the dynamic password production module is used for producing a dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption. The three information of the IP address, the weather information and the time information are used as the decrypted passwords, so that the randomness of the passwords can be greatly improved, the difficulty of decrypting the passwords is improved, the safety of data is improved, weather can be used as the passwords, and other random characteristics can be selected as the passwords, such as the regional population number and the regional school number.
Further, the data storage module is configured to store information to be stored in the blockchain node. By storing the data through the blockchain, the security of the data is greatly improved due to the decentralization characteristic of the blockchain, so that the privacy of a client can be better protected, the client can only see when the monitoring is called, and the possibility of falsifying and deleting the monitored data is reduced.
Further, the data decryption module is configured to perform hash operation on the password input during decoding to obtain a dynamic password hash value, and use the dynamic password hash value as encryption of second dynamic password unlock data. And encrypting the dynamic password by using a hash algorithm to prevent password data from being stolen.
And the encryption information comparison module performs hash operation on the data after obtaining the data after unlocking the encryption to obtain a detection hash value, and compares the detection hash value with the original hash value.
Further, a data transmission security detection method in a blockchain scenario, applied to a data transmission security detection system in a blockchain scenario as set forth in any one of claims 1 to 4, is characterized by comprising the steps of:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: carrying out hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing the information to be stored in the blockchain node;
s5: carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and taking the dynamic password hash value as encryption of second dynamic password unlocking data;
s6: after the data after the encryption is released is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with an original hash value.
Further, the step S1 includes the following steps:
s101: acquiring monitoring data;
s102: acquiring area S of blocked face of person T in monitoring 1 The total face area S of the person T in monitoring;
s103: calculating the face shielding rate A of the person T in monitoring;
s104: when the complete face image of the person T does not exist in the monitoring, acquiring the exposed area S of the face of the person T in the monitoring 2 Acquiring the total face area S of the person T in monitoring and acquiring the face image of the person T in monitoringSlope α relative to the full face image;
s105: the face shielding rate a of the person T in the monitoring is calculated,
s106: acquiring time T when the line of sight of person T is concentrated in a place other than the counter 1 Acquiring the total time T of the personnel T entering the monitoring area;
s107: calculating an observation index B of a person T in monitoring;
s108: when B reaches the threshold value, acquiring the eye white length L of one side of the transverse midline of the eye, which is close to the camera White color Acquiring the white length L of one side of the lateral midline of the eye, which is close to the camera, when the eye is in front of the front view Label (C) Acquiring the length L of the lateral midline of the eye E
S109: calculating an angle beta of the sight line deviating from the center position;
s110: and determining the position of the sight line of the person T, marking the key position, and when the overlapping time of the position of the sight line of the person T and the key position exceeds a time threshold, encrypting and uploading the monitoring data to the block chain link point and sending the early warning information to the system.
Further, the step S2 includes the following steps:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of an IP address of decryption equipment;
s203: acquiring local weather information by reading information of a weather bureau at an actual position where an IP address of the decryption equipment is located;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each segment in four segments of numbers in an IP address A of decryption equipment and obtaining a four-digit number C;
s206: obtaining a three-bit code B through local weather information n
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: forming dynamic password CB n D。
Compared with the prior art, the invention has the following beneficial effects: the danger can be predicted in advance by predicting whether the person T has illegal intention or not through the face shielding rate of the person T and the times of observing the positions of the heavy points, so that the risk is reduced; the data is stored through the block chain, the security of the data is improved by using the decentralization characteristic of the block chain, the uncertainty of the password is improved by using the IP address, the time information and the weather information, the difficulty of password decoding is improved, the password is encrypted for the second time by using the hash algorithm, and the password is prevented from being directly decoded after being stolen by the irrelevance of the hash value.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a schematic diagram of a system for detecting data transmission security in a blockchain scenario according to the present invention;
FIG. 2 is a schematic diagram illustrating steps of a method for detecting security of data transmission in a blockchain scenario according to the present invention;
FIG. 3 is a schematic diagram illustrating the steps of encrypting and protecting data by using dynamic passwords in a data transmission security detection method in a blockchain scenario according to the present invention;
fig. 4 is a schematic diagram illustrating steps of monitoring data analysis in a data transmission security detection method in a blockchain scenario according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-4, the present invention provides the following technical solutions: a data transmission security detection system in a blockchain scenario, comprising: the system comprises a monitoring data acquisition module, a monitoring data analysis module, a data encryption module, a data storage module, a data decryption module and an encryption information comparison module, wherein the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encryption information detection module is used for comparing the transmitted data with the data before transmission.
The monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight line analysis module, wherein the face analysis module is used for obtaining a monitoring data through the formula of A=S 1 the/S analyzes the face shielding rate of the person in monitoring,
wherein A represents the face shielding rate of the person T in monitoring and S 1 The method comprises the steps that the area of a face of a person T in monitoring is shielded, S represents the total area of the face of the person T in monitoring, and the person T represents any person in monitoring data;
when there is no complete positive face image of the person T in the monitoring, the method is represented by the formula a= (S-S 2 ) Analysis of the face occlusion rate of the person under monitoring is performed by a/alpha S,
wherein A represents the face shielding rate of the person T in monitoring and S 2 The method comprises the steps that the exposed area of the face of a person T in monitoring is represented, S represents the total area of the face of the person T in monitoring, alpha represents the slope of the face image of the person T in monitoring relative to the complete face image, and when the face shielding rate A of the person T in monitoring exceeds a threshold value, all monitoring data of the person T are transmitted to an observation analysis module;
the observation analysis module is used for obtaining the formula b=t 1 T to analyze the head and eye movements of the person T under monitoring,
wherein B represents the observation index of the person T in monitoring, T 1 Indicating the time when the line of sight of the person T is concentrated in the place outside the counter, T indicating the total time for the person T to enter the monitoring area, and when B reaches the threshold value, the person T is taken to beThe monitoring data are transmitted to the sight analysis module;
the sight line analysis module is used for passing the formula beta= { (L) White color -L Label (C) )/L E }/(L Label (C) /L E ) Analyzing the sight line position of the person T in monitoring by x 60 DEG to determine the angle of the sight line deviating from the median position, wherein beta represents the angle of the sight line deviating from the median position of the sight line, L White color Represents the white length of one side of the lateral midline of the eye, which is close to the camera, L Label (C) Representing the white length of the side of the lateral midline of the eye, which is close to the camera, when the eye is in front of the front view, L E Represents the lateral midline length of the eye;
and determining the position of the sight line of the person T through the angle beta of the sight line of the person T deviated from the central position of the sight line, marking the key position, and uploading the monitoring data to the block chain link point and sending the early warning information to the system when the superposition time of the position of the sight line of the person T and the key position exceeds a dangerous threshold value.
In this embodiment, the area S of the person T in monitoring that is blocked 1 =160cm 2 Total area s=200cm of face of person T in monitoring 2 The face shielding rate A=0.8 of the person T in monitoring exceeds the face shielding rate threshold value 0.67, the person T is observed and analyzed, and the time T when the sight of the person T is concentrated in the place outside the counter 1 The total time t=30min of the person T entering the monitoring area is=21 min, the observation index b=0.7 of the person T in monitoring exceeds the threshold value 0.5, the line of sight analysis is performed on the person T, and the white length L of the side of the eyes close to the camera in the lateral midline of the eyes White color Eye white length L at the side near the camera in the lateral midline of the eye when the eye is looking forward =2.5 mm Label (C) Eye lateral midline length L =5 mm E The method comprises the steps that an angle beta= -45 degrees of a sight line deviating from a sight line center position is 15mm, the sight line position is located on a shop safety channel, the time of the sight line position on the shop safety channel is 3min, the time of the sight line position on other key positions in the shop is 12min, the superposition time of the sight line position of a person T and the key positions is 15min, and the sight line position exceeds a danger threshold value, monitoring data of the person is uploaded to block chain link points and early warning information is sent to a system.
The data encryption module comprises a dynamic password module and a hash operation module, wherein the dynamic password module is used for encrypting and protecting data, and the hash operation module is used for carrying out hash operation on the data to obtain an original hash value.
In this embodiment, the original hash value of a piece of data is 202cb962ac59075b964b07152d234b70
The dynamic password production module is used for producing a dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption.
The data storage module is used for storing information to be stored in the blockchain node.
The data decryption module is used for carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and taking the dynamic password hash value as encryption of second dynamic password unlocking data.
And the encryption information comparison module performs hash operation on the data after obtaining the data after unlocking the encryption to obtain a detection hash value, and compares the detection hash value with the original hash value.
A data transmission security detection method in a blockchain scenario, applied to a data transmission security detection system in a blockchain scenario as defined in any one of claims 1 to 4, comprising the steps of:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: carrying out hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing the information to be stored in the blockchain node;
s5: carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and taking the dynamic password hash value as encryption of second dynamic password unlocking data;
s6: after the data after the encryption is released is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with an original hash value.
The step S1 includes the steps of:
s101: acquiring monitoring data;
s102: acquiring area S of blocked face of person T in monitoring 1 The total face area S of the person T in monitoring;
s103: calculating the face shielding rate A of the person T in monitoring;
s104: when the complete face image of the person T does not exist in the monitoring, acquiring the exposed area S of the face of the person T in the monitoring 2 Acquiring the total face area S of a person T in monitoring, and acquiring the slope alpha of a face image of the person T in monitoring relative to a complete face image;
s105: the face shielding rate a of the person T in the monitoring is calculated,
s106: acquiring time T when the line of sight of person T is concentrated in a place other than the counter 1 Acquiring the total time T of the personnel T entering the monitoring area;
s107: calculating an observation index B of a person T in monitoring;
s108: when B reaches the threshold value, acquiring the eye white length L of one side of the transverse midline of the eye, which is close to the camera White color Acquiring the white length L of one side of the lateral midline of the eye, which is close to the camera, when the eye is in front of the front view Label (C) Acquiring the length L of the lateral midline of the eye E
S109: calculating an angle beta of the sight line deviating from the center position;
s110: and determining the position of the sight line of the person T, marking the key position, and when the overlapping time of the position of the sight line of the person T and the key position exceeds a time threshold, encrypting and uploading the monitoring data to the block chain link point and sending the early warning information to the system.
The step S2 includes the steps of:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of an IP address of decryption equipment;
s203: acquiring local weather information by reading information of a weather bureau at an actual position where an IP address of the decryption equipment is located;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each segment in four segments of numbers in an IP address A of decryption equipment and obtaining a four-digit number C;
s206: obtaining a three-bit code B through local weather information n
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: forming dynamic password CB n D。
In this embodiment, the IP address of a decryption device is 110.112.8.257, the actual location is in the state of hangzhou, zhejiang, the decryption time is 2019.03.08, the weather of the day is a sunny day by the weather exchange query, B 1 =sun, obtaining dynamic coded CB n D=0287 sun20190308, the hash value is 202cb962ac59075b964b07152D234b70 obtained by hash operation, and the hash value is equal to the original hash value, and the data is detected as safe.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A data transmission security detection system in a blockchain scenario, comprising: the system comprises a monitoring data acquisition module, a monitoring data analysis module, a data encryption module, a data storage module, a data decryption module and an encryption information comparison module, wherein the monitoring data acquisition module is used for reading monitoring data, the monitoring data analysis module is used for analyzing the monitoring data, the data encryption module is used for encrypting the data, the data storage module is used for storing target data, the data decryption module is used for processing passwords input during decoding and decrypting the data, and the encryption information detection module is used for comparing the transmitted data with the data before transmission;
the data encryption module comprises a dynamic password module and a hash operation module, wherein the dynamic password module is used for encrypting and protecting data, and the hash operation module is used for carrying out hash operation on the data to obtain an original hash value;
the dynamic password module comprises an IP information acquisition module, a real-time information reading module and a dynamic password production module, wherein the IP information acquisition module is used for acquiring the IP address of the decryption device, the real-time information reading module is used for acquiring weather information of the actual position of the IP address of the decryption device and time information during decryption, and the dynamic password production module is used for producing a dynamic password through the IP address of the decryption device, the weather information of the actual position of the IP address of the decryption device and the time information during decryption;
the monitoring data acquisition module is used for acquiring monitoring data to be analyzed; the monitoring data analysis module comprises a face analysis module, an observation analysis module and a sight analysis module, wherein the face is provided with a display screenThe part analysis module is used for passing the formula a=s 1 the/S analyzes the face shielding rate of the person in monitoring,
wherein A represents the face shielding rate of the person T in monitoring and S 1 The method comprises the steps that the area of a face of a person T in monitoring is shielded, S represents the total area of the face of the person T in monitoring, and the person T represents any person in monitoring data;
when there is no complete positive face image of the person T in the monitoring, the method is represented by the formula a= (S-S 2 ) Analysis of the face occlusion rate of the person under monitoring is performed by a/alpha S,
wherein A represents the face shielding rate of the person T in monitoring and S 2 The method comprises the steps that the exposed area of the face of a person T in monitoring is represented, S represents the total area of the face of the person T in monitoring, alpha represents the slope of the face image of the person T in monitoring relative to the complete face image, and when the face shielding rate A of the person T in monitoring exceeds a threshold value, all monitoring data of the person T are transmitted to an observation analysis module;
the observation analysis module is used for obtaining the formula b=t 1 T to analyze the head and eye movements of the person T under monitoring,
wherein B represents the observation index of the person T in monitoring, T 1 The time when the sight line of the person T is concentrated in a place beyond the counter is represented, T represents the total time when the person T enters the monitoring area, and when B reaches a threshold value, all monitoring data of the B are transmitted to the sight line analysis module;
the sight line analysis module is used for passing the formula beta= { (L) White color -L Label (C) )/L E }/(L Label (C) /L E ) The line of sight position of the person T under monitoring is analyzed by x 60,
determining the angle of the line of sight from the neutral position, wherein beta represents the angle of the line of sight from the neutral position of the line of sight, L White color Represents the white length of one side of the lateral midline of the eye, which is close to the camera, L Label (C) Representing the white length of the side of the lateral midline of the eye, which is close to the camera, when the eye is in front of the front view, L E Represents the lateral midline length of the eye;
and determining the position of the sight line of the person T through the angle beta of the sight line of the person T deviated from the central position of the sight line, marking the key position, and uploading the monitoring data to the block chain link point and sending the early warning information to the system when the superposition time of the position of the sight line of the person T and the key position exceeds a dangerous threshold value.
2. The system for detecting data transmission security in a blockchain scenario of claim 1, wherein: the data storage module is used for storing information to be stored in the blockchain node.
3. The system for detecting data transmission security in a blockchain scenario of claim 2, wherein: the data decryption module is used for carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and taking the dynamic password hash value as encryption of second dynamic password unlocking data.
4. A data transmission security detection system in a blockchain scenario as in claim 3, wherein: and the encryption information comparison module performs hash operation on the data after obtaining the data after unlocking the encryption to obtain a detection hash value, and compares the detection hash value with the original hash value.
5. A data transmission security detection method in a blockchain scenario, applied to a data transmission security detection system in a blockchain scenario as defined in any one of claims 1 to 4, comprising the steps of:
s1: acquiring monitoring data and analyzing the monitoring data;
s2: encrypting and protecting data by using a dynamic password;
s3: carrying out hash operation on the data by using a hash algorithm to obtain an original hash value;
s4: storing the information to be stored in the blockchain node;
s5: carrying out hash operation on the password input during decoding to obtain a dynamic password hash value, and taking the dynamic password hash value as encryption of second dynamic password unlocking data;
s6: after the data after the encryption is released is obtained, carrying out hash operation on the data to obtain a detection hash value, and comparing the detection hash value with an original hash value.
6. The method for detecting data transmission security in a blockchain scenario as in claim 5, wherein: the step S1 includes the steps of:
s101: acquiring monitoring data;
s102: acquiring area S of blocked face of person T in monitoring 1 The total face area S of the person T in monitoring;
s103: calculating the face shielding rate A of the person T in monitoring;
s104: when the complete face image of the person T does not exist in the monitoring, acquiring the exposed area S of the face of the person T in the monitoring 2 Acquiring the total face area S of a person T in monitoring, and acquiring the slope alpha of a face image of the person T in monitoring relative to a complete face image;
s105: the face shielding rate a of the person T in the monitoring is calculated,
s106: acquiring time T when the line of sight of person T is concentrated in a place other than the counter 1 Acquiring the total time T of the personnel T entering the monitoring area;
s107: calculating an observation index B of a person T in monitoring;
s108: when B reaches the threshold value, acquiring the eye white length L of one side of the transverse midline of the eye, which is close to the camera White color Acquiring the white length L of one side of the lateral midline of the eye, which is close to the camera, when the eye is in front of the front view Label (C) Acquiring the length L of the lateral midline of the eye E
S109: calculating an angle beta of the sight line deviating from the center position;
s110: and determining the position of the sight line of the person T, marking the key position, and when the overlapping time of the position of the sight line of the person T and the key position exceeds a time threshold, encrypting and uploading the monitoring data to the block chain link point and sending the early warning information to the system.
7. The method for detecting data transmission security in a blockchain scenario as in claim 6, wherein: the step S2 includes the steps of:
s201: acquiring an IP address A of decryption equipment;
s202: acquiring the actual position of an IP address of decryption equipment;
s203: acquiring local weather information by reading information of a weather bureau at an actual position where an IP address of the decryption equipment is located;
s204: acquiring time information T during decryption;
s205: acquiring the last digit of each segment in four segments of numbers in an IP address A of decryption equipment and obtaining a four-digit number C;
s206: obtaining a three-bit code B through local weather information n
S207: obtaining an eight-bit code D through the time information T during decryption;
s208: forming dynamic password CB n D。
CN202210500477.0A 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene Active CN114785609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210500477.0A CN114785609B (en) 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210500477.0A CN114785609B (en) 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene

Publications (2)

Publication Number Publication Date
CN114785609A CN114785609A (en) 2022-07-22
CN114785609B true CN114785609B (en) 2024-02-06

Family

ID=82436709

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210500477.0A Active CN114785609B (en) 2022-05-09 2022-05-09 System and method for detecting data transmission safety in block chain scene

Country Status (1)

Country Link
CN (1) CN114785609B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348184B (en) * 2022-08-16 2024-01-26 江苏商贸职业学院 Internet of things data security event prediction method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102610035A (en) * 2012-04-05 2012-07-25 广州广电运通金融电子股份有限公司 Financial self-service device and anti-peeping system and anti-peeping method thereof
CN105681539A (en) * 2015-12-28 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Unlocking method and device and terminal
CN106780009A (en) * 2016-12-07 2017-05-31 云赛智联股份有限公司 A kind of self-help bank's crime prevention system
CN106792674A (en) * 2016-12-19 2017-05-31 奇酷互联网络科技(深圳)有限公司 Mobile terminal and WiFi sharing methods and device
WO2019134246A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Facial recognition-based security monitoring method, device, and storage medium
CN111131795A (en) * 2020-01-20 2020-05-08 江苏荣泽信息科技股份有限公司 City safety monitoring platform based on block chain
CN112702582A (en) * 2021-01-06 2021-04-23 贵州大学 Secure transmission method and device for monitoring video based on SM2
CN113868685A (en) * 2021-10-08 2021-12-31 安徽施耐德成套电气有限公司 Electric power monitoring data encryption storage system based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102610035A (en) * 2012-04-05 2012-07-25 广州广电运通金融电子股份有限公司 Financial self-service device and anti-peeping system and anti-peeping method thereof
CN105681539A (en) * 2015-12-28 2016-06-15 宇龙计算机通信科技(深圳)有限公司 Unlocking method and device and terminal
CN106780009A (en) * 2016-12-07 2017-05-31 云赛智联股份有限公司 A kind of self-help bank's crime prevention system
CN106792674A (en) * 2016-12-19 2017-05-31 奇酷互联网络科技(深圳)有限公司 Mobile terminal and WiFi sharing methods and device
WO2019134246A1 (en) * 2018-01-03 2019-07-11 平安科技(深圳)有限公司 Facial recognition-based security monitoring method, device, and storage medium
CN111131795A (en) * 2020-01-20 2020-05-08 江苏荣泽信息科技股份有限公司 City safety monitoring platform based on block chain
CN112702582A (en) * 2021-01-06 2021-04-23 贵州大学 Secure transmission method and device for monitoring video based on SM2
CN113868685A (en) * 2021-10-08 2021-12-31 安徽施耐德成套电气有限公司 Electric power monitoring data encryption storage system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周仁琴 ; .视频监控场景下的面部遮挡检测.计算机工程与应用.2013,(第04期),全文. *

Also Published As

Publication number Publication date
CN114785609A (en) 2022-07-22

Similar Documents

Publication Publication Date Title
KR101252707B1 (en) Method and apparatus for detecting unauthorized access to a computing device and securely communicating information about such unauthorized access
CN105338120B (en) A kind of fixed security method of the electronic evidence based on cloud storage
FI86486B (en) FOERFARANDE FOER ATT ARRANGERA TELEROESTNINGEN PAO ETT SAEKERT SAETT.
CN1778065B (en) Security method and apparatus using biometric data
CN114785609B (en) System and method for detecting data transmission safety in block chain scene
CN111708658A (en) Judicial-assisted case data risk management system and application method thereof
CN111970498A (en) Public safety video monitoring networking information safety system
CN112100662A (en) Regional data safety monitoring system
CN111553689A (en) Matching correlation method and system based on quadratic hash
CN117113199A (en) File security management system and method based on artificial intelligence
CN116132989B (en) Industrial Internet security situation awareness system and method
CN116248406B (en) Information security storage method and information security device thereof
CN112383504A (en) Electric power thing networking block chain data management system
CN112637172A (en) Novel data security and confidentiality method
CN116663047A (en) Fine-granularity safe data sharing method for privacy protection of patient health record
CN113949591B (en) Data encryption protection method and system based on block chain
CN115600189A (en) Commercial password application security evaluation system
CN112800454B (en) Case data processing method, related device and computer readable medium
Jena et al. SSS-PRNU: privacy-preserving PRNU based camera attribution using shamir secret sharing
CN112380544A (en) Data security protection method of software system
CN111553690A (en) Block chain system supporting multipoint transaction
CN111553694A (en) Distributed storage block chain method and system
CN112995096A (en) Data encryption and decryption method, device and equipment
CN117294537B (en) Computer network security protection method and system applying quantum encryption
CN116579005B (en) User data safety storage management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240403

Address after: Floor 4, Building 1, No. 9, Boda Road, Zone A, Lhasa Economic and Technological Development Zone, Lhasa, Tibet Autonomous Region 850030

Patentee after: Tibet gaochi Information Security Technology Co.,Ltd.

Country or region after: China

Address before: 010050 1301, building 2-3, Shunhe International Garden, Chahar street, Xincheng District, Hohhot, Inner Mongolia Autonomous Region

Patentee before: Inner Mongolia Chengpin Technology Co.,Ltd.

Country or region before: China