CN115471930A - Laboratory management method and system based on block chain - Google Patents

Laboratory management method and system based on block chain Download PDF

Info

Publication number
CN115471930A
CN115471930A CN202210935110.1A CN202210935110A CN115471930A CN 115471930 A CN115471930 A CN 115471930A CN 202210935110 A CN202210935110 A CN 202210935110A CN 115471930 A CN115471930 A CN 115471930A
Authority
CN
China
Prior art keywords
user
laboratory
identity
finger
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210935110.1A
Other languages
Chinese (zh)
Inventor
陈亚辉
刘东升
刘彦妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN202210935110.1A priority Critical patent/CN115471930A/en
Publication of CN115471930A publication Critical patent/CN115471930A/en
Priority to JP2023002191A priority patent/JP2024022438A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a laboratory management method and a system based on a block chain, which relate to the technical field of laboratory management, wherein the method comprises the steps of managing and authenticating the access authority of a user, and preliminarily determining which finger the fingerprint needing to be verified is by inputting the identity data of an object identity; then generating a characterization value through a random algorithm; then, determining a verification finger by selecting fingers with the sequence corresponding to the representation values from the initial finger, wherein the user needs to input the fingerprint of the finger according to the real representation values, compare the fingerprint with the verification finger, and enter a laboratory after the comparison; the possibility that the fingerprint is stolen and enters a laboratory is greatly reduced, and the safety of the laboratory is improved; the use permission of the laboratory experiment equipment of the user is managed and authenticated, so that the user needs to pass permission authentication when using some key equipment, illegal use of the equipment by some people who are not familiar with or have insufficient permission is avoided, and the safety is further improved.

Description

Laboratory management method and system based on block chain
Technical Field
The invention belongs to the technical field of laboratory management, and particularly relates to a laboratory management method and system based on a block chain.
Background
The patent with publication number CN106408179A discloses a laboratory management system based on two-dimensional codes and a wireless network, which comprises a laboratory management service system and a mobile terminal, wherein the mobile terminal is provided with a laboratory management application system, and comprises a camera and a two-dimensional code recognition system; the laboratory management service system is used for generating corresponding two-dimension code marks for courses and experimental instruments of a laboratory, marking the identities of two-dimension codes for teachers and students of the laboratory, performing experimental registration and providing an inquiry entrance; the laboratory management application system is used for acquiring information set by the laboratory management service system and uploading the acquired personnel and instrument information to the laboratory management service system for storage. Not only can manage laboratory instrument equipment, can manage whole experimentation moreover, can inquire student's condition of attendance and experiment, promote laboratory management work efficiency, integrate, optimize laboratory teaching resource.
However, for the above-mentioned technologies, especially for a key laboratory, in terms of some expensive devices or devices which are difficult to operate and are easy to operate dangerously, there are many confidentiality documents in the laboratory, and then different devices in the laboratory need to be operated by corresponding professionals, and if the safety of the laboratory and the safety of the experimental devices during specific operation are ensured, no reasonable consideration is given, and thus, a solution is provided.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art; therefore, the invention provides a laboratory management method and system based on a block chain.
A blockchain-based laboratory management method, comprising:
the method for managing and authenticating the access authority of the user specifically comprises the following steps:
when entering a laboratory, firstly, inputting identity data representing the identity of an object; then generating a characterization value through a random algorithm; the representation value is determined by a specific data distribution mode of a time-digital group Ti, and the time-digital group is composed of the numbers of time nodes acquired by user-input identity data according to a month-day-time format; then, after the sequence from the thumb to the little finger of the appointed hand of the user is sequentially arranged, the verification finger is determined after the fingers with the sequence corresponding to the representation values are selected from the initial finger, the user needs to input the fingerprint of the finger according to the actual representation values, the fingerprint is compared with the verification finger, and the user can enter a laboratory after the comparison;
the management and authentication of the use authority of the laboratory experiment equipment of the user specifically comprises the following steps:
the method comprises the steps that a starting verification module is arranged on key experimental equipment set by a management unit, when a user needs to use the equipment, the user obtains the object identity of the user by starting the verification module, synchronously obtains the object permission, compares the object permission with the use permission of the key experimental equipment, allows the user to use the equipment if the permission is met, and automatically cuts off the power of the experimental equipment and refuses the work if the permission is not met.
Compared with the prior art, the invention has the beneficial effects that:
the method comprises the steps of managing and authenticating the access authority of a user, and preliminarily determining which finger the fingerprint needing to be verified is by inputting the identity data of the identity of an object; then generating a characterization value through a random algorithm; then, determining a verification finger by selecting fingers with the sequence corresponding to the representation values from the initial finger, wherein the user needs to input the fingerprint of the finger according to the real representation values, compare the fingerprint with the verification finger, and enter a laboratory after the comparison; the possibility that the fingerprint is stolen and enters a laboratory is greatly reduced, and the safety of the laboratory is improved;
the use permission of the laboratory experiment equipment of the user is managed and authenticated, so that the user needs to pass permission authentication when using some key equipment, illegal use of the equipment by some people who are not familiar with or have insufficient permission is avoided, and the safety is further improved.
Drawings
FIG. 1 is a system block diagram of a management system of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The application provides a block chain-based laboratory management method, which specifically comprises the following steps of:
the method comprises the following steps: firstly, basic data entry is carried out for entering a compliance identity, wherein the compliance identity comprises an object identity and object entry data; the object identity is the identity information of personnel who can enter and operate the related equipment in the laboratory; the object access data comprises an object key and an object authority, the object key is a password set by a user corresponding to the object identity, the password is a fingerprint of the user, when the user inputs the password, the fingerprints of all five fingers of a specified hand are required to be input, an initial finger is required to be set synchronously, and the initial finger is any finger in the specified hand;
the object rights are embodied as numbers, a corresponding table of the numbers and the rights is constructed in advance, the larger the number is, the larger the rights are, and the opposite mode can be adopted, and each number represents experimental equipment which can operate the numerical value below;
in the laboratory, the compliance identity of a user and the lower limit of the numerical value of the object authority required by each experimental device during operation are synchronized in a block chain mode;
step two: synchronously chaining the compliant identities, and sharing the compliant identities to obtain on-chain data;
step three: and then, when the user enters a laboratory, carrying out identity authentication, wherein the specific mode of the identity authentication is as follows:
s1: before a user enters a laboratory, identity data representing the identity of an object needs to be input, and when the identity data is initially input by an administrator, the identity data consisting of numbers can be automatically given;
s2: after the identity data is input, generating a characterization value through a random algorithm, wherein the characterization value is a value between one and five, including one and five; the specific way of generating the characterization numerical value is as follows:
s201: acquiring a time node of user input identity data, acquiring according to a month-day time division format, and acquiring eight numbers from front to back according to time points to obtain a time-number group Ti, wherein i = 1. Specifically, for example, if the time is 11, 23, 14, and 43 minutes in 2020, and the time node here is 11, 23, 14, and 43 minutes in 11, 23, and 8, the corresponding time-digital group Ti, i =1, was, and 8, sequentially corresponds to 11231443;
s202: then acquiring the number of the time number group Ti which is more than or equal to five, marking the number as a representation value, and automatically adding one if the representation value reaches 0; because the time node is limited by the acquisition mode of the time node, three numbers in the time number group cannot take values of more than or equal to 5, the representation values are strictly less than or equal to 5, and one is added when 0 is taken, so that the special condition is avoided;
s203: obtaining a characterization numerical value;
s3: then selecting verification fingers according to the representation values, wherein the verification fingers at the moment are sequentially arranged and selected from the thumb to the little finger, and the number of the verification fingers is counted from the initial finger to the finger corresponding to the representation value, and the finger is marked as the verification finger;
s4: the user needs to press the finger corresponding to the representation value onto the access control equipment of the laboratory at the moment, the finger and the corresponding verification finger are verified, the identity can be verified after the finger passes through the verification equipment, and the user is allowed to enter the access control equipment;
step four: after a user enters the laboratory, managing experimental equipment according to the object identity and the object authority of the user, wherein key experimental equipment in the laboratory is provided with a starting verification module, and the key experimental equipment is preset by managers and specifically is some valuable equipment or equipment needing strict operation qualification;
the starting verification module is used for verifying the identity authority of the user and is synchronous with the linked data; the specific mode of experimental equipment management is as follows:
st1: when a user needs to start key experimental equipment, a verification module needs to be started to automatically acquire the fingerprint of any appointed hand of the user, then the object identity of the corresponding fingerprint is automatically acquired, and then the object permission is acquired;
st2: reading the use authority of the experimental equipment, wherein the use authority is the lowest authority value when the experimental equipment is used correspondingly;
st3: comparing the object authority of the object identity with the use authority, and if the object authority is greater than or equal to the use authority, generating a use permission signal; otherwise, generating a power-off signal;
as an embodiment two of the present invention, which is implemented on the basis of the embodiment one, the difference between the embodiment one and the embodiment one is that a specific manner of generating a characterization value is different, and the embodiment provides another manner of generating a characterization value by a random algorithm, specifically:
acquiring a corresponding time node of user input identity data, acquiring according to a monthly and dated format, and acquiring eight numbers from front to back according to time points to obtain a time-number group Ti, wherein i =1, 8;
then, automatically acquiring the sum of Ti, and marking the sum as H; dividing H by 5, then taking the remainder, judging the remainder, if the remainder is zero, then automatically adding one to mark as a representation numerical value; if the remainder is not zero, automatically marking the remainder as a representation numerical value;
of course, there may be many random algorithms, and only two examples are given here;
as the third embodiment of the present invention, the present embodiment is different from the first embodiment in that,
step S4 in the first embodiment, when a user presses a finger corresponding to a characteristic value on an access control device in a laboratory, the finger is verified with a corresponding verification finger, and the identity can be verified after the finger passes through the verification finger, so that the user is allowed to enter the access control device; in this step, if the user does not verify the correct identity twice, the access right of the object identity corresponding to the user is suspended, and the user can enter the system only after the user contacts the manager to remove the right identity.
As shown in fig. 1, a block chain-based laboratory management system includes a processor, an acquisition unit, and a chain loading unit;
the collecting unit is used for collecting data required to be collected in the laboratory management method and carrying out chain loading through the chain loading unit;
and the processor is used for managing the laboratory according to the method recorded in the laboratory management method.
Part of data in the formula is obtained by removing dimensions and calculating the numerical value of the data, and the formula is a formula which is closest to the real condition and obtained by simulating a large amount of collected data through software; the preset parameters and the preset threshold values in the formula are set by those skilled in the art according to actual conditions or obtained through simulation of a large amount of data.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (8)

1. A laboratory management method based on a block chain is characterized by comprising the following steps:
the method for managing and authenticating the access authority of the user specifically comprises the following steps:
when entering a laboratory, firstly, inputting identity data representing the identity of an object; then generating a characterization value through a random algorithm; the representation value is determined by a specific data distribution mode of a time-digital group Ti, and the time-digital group is composed of the numbers of time nodes acquired by user-input identity data according to a month-day-time format; then, after the sequence from the thumb to the little finger of the appointed hand of the user is sequentially arranged, the verification finger is determined after the fingers with the sequence corresponding to the representation numerical values are selected from the initial finger, the user needs to input the fingerprint of the finger according to the actual representation numerical values, the fingerprint is compared with the verification finger, and the user can enter a laboratory after the comparison;
the method for managing and authenticating the use authority of the laboratory experiment equipment of the user specifically comprises the following steps:
the method comprises the steps that a starting verification module is arranged on key experimental equipment set by a management unit, when a user needs to use the equipment, the user obtains the object identity of the user by starting the verification module, synchronously obtains the object permission, compares the object permission with the use permission of the key experimental equipment, allows the user to use the equipment if the permission is met, and automatically cuts off the power of the experimental equipment and refuses the work if the permission is not met.
2. The method for block chain based laboratory management according to claim 1, wherein the following steps are performed before the authentication of the access authority of the user and the usage authority of the experimental device:
performing basic data entry for entering a compliance identity, wherein the compliance identity comprises an object identity and object entry data; the object identity is the identity information of personnel who can enter and operate the related equipment in the laboratory; the object access data comprises an object key and an object authority, wherein the object key is a password set by a user corresponding to the object identity;
the object rights are specifically expressed as numbers, a corresponding table of the numbers and the rights is constructed in advance, the larger the number is, the larger the rights are represented, and each number represents experimental equipment which can be operated below the value;
synchronously chaining the compliant identities, and sharing the compliant identities to obtain on-chain data;
and synchronizing the compliance identities of the users in the laboratory in a block chain mode and the lower limit of the numerical value of the object authority required by each experimental device during operation.
3. The laboratory management method based on the blockchain according to claim 2, wherein the object key is a fingerprint of the user, when the user enters the password, fingerprints of all five fingers of a designated hand need to be entered, and an initial finger needs to be set synchronously, and the initial finger is any finger of the designated hand.
4. The laboratory management method based on the blockchain according to claim 1, wherein the specific way of managing and authenticating the access authority of the user is as follows:
s1: before a user enters a laboratory, identity data representing the identity of an object needs to be input, and when the identity data is initially input by an administrator, the identity data consisting of numbers can be automatically given;
s2: after the identity data is input, a characterization value is generated through a random algorithm, wherein the characterization value is a value between one and five, including one and five;
s3: then selecting verification fingers according to the representation values, wherein the verification fingers at the moment are sequentially arranged and selected from the thumb to the little finger, and the number of the verification fingers is counted from the initial finger to the finger corresponding to the representation value, and the finger is marked as the verification finger;
s4: the user needs to press the finger corresponding to the representation value onto the entrance guard equipment of the laboratory, the finger is verified with the corresponding verification finger, the identity can be verified through the rear part, and the user is allowed to enter.
5. The laboratory management method based on the blockchain according to claim 4, wherein the specific manner of generating the characterization values is as follows:
s201: acquiring a time node of user input identity data, acquiring according to a month-day time division format, and acquiring eight numbers from front to back according to time points to obtain a time-number group Ti, wherein i = 1.
S202: then acquiring the number of the time number group Ti which is more than or equal to five, marking the number as a representation value, and if the representation value reaches 0, automatically adding one;
s203: and obtaining a characterization value.
6. The laboratory management method based on the blockchain according to claim 4, wherein the specific manner of generating the characterization values is as follows:
acquiring a time node of corresponding user input identity data, acquiring according to a month-day time division format, and acquiring eight numbers from front to back according to time points to obtain a time-number group Ti, wherein i =1, 8;
then, automatically acquiring the sum of Ti, and marking the sum as H; dividing H by 5, then taking the remainder, judging the remainder, if the remainder is zero, then automatically adding one to mark as a representation numerical value; if the remainder is not zero, the remainder is automatically marked as a token value.
7. The laboratory management method based on the blockchain as claimed in claim 1, wherein the specific way of managing and authenticating the use authority of the laboratory experiment equipment of the user is as follows:
after a user enters the laboratory, managing experimental equipment according to the identity and the authority of the user object, wherein key experimental equipment in the laboratory is provided with a starting verification module, and the key experimental equipment is preset by a manager;
the starting verification module is used for verifying the identity authority of the user and is synchronous with the linked data; the specific mode of experimental equipment management is as follows:
st1: when a user needs to start key experimental equipment, a verification module needs to be started to automatically acquire the fingerprint of any appointed hand of the user, then an object identity corresponding to the fingerprint is automatically acquired, and then an object permission is acquired;
st2: reading the use authority of the experimental equipment, wherein the use authority is the lowest authority value when the experimental equipment is used correspondingly;
st3: comparing the object authority of the object identity with the use authority, and allowing the user to use the experimental equipment if the object authority is greater than or equal to the use authority; otherwise, the experimental equipment is automatically powered off.
8. A laboratory management system based on a block chain is characterized by comprising a processor, acquisition equipment and a chain loading unit;
the collecting equipment is used for collecting data required to be collected according to any one of claims 1-7 and carrying out uplink transmission through an uplink unit;
a processor for managing a laboratory according to the method as claimed in any one of claims 1 to 7.
CN202210935110.1A 2022-08-05 2022-08-05 Laboratory management method and system based on block chain Pending CN115471930A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210935110.1A CN115471930A (en) 2022-08-05 2022-08-05 Laboratory management method and system based on block chain
JP2023002191A JP2024022438A (en) 2022-08-05 2023-01-11 Block chain-based laboratory management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210935110.1A CN115471930A (en) 2022-08-05 2022-08-05 Laboratory management method and system based on block chain

Publications (1)

Publication Number Publication Date
CN115471930A true CN115471930A (en) 2022-12-13

Family

ID=84365731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210935110.1A Pending CN115471930A (en) 2022-08-05 2022-08-05 Laboratory management method and system based on block chain

Country Status (2)

Country Link
JP (1) JP2024022438A (en)
CN (1) CN115471930A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615738A (en) * 2018-11-30 2019-04-12 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110956720A (en) * 2019-10-31 2020-04-03 金华东贤科技有限公司 Special intelligent lock system for laboratory hazardous article management and operation method
CN112035807A (en) * 2020-08-06 2020-12-04 珠海格力电器股份有限公司 Object authentication method and apparatus, storage medium, and electronic apparatus
CN113010822A (en) * 2021-04-21 2021-06-22 上海交通大学 Information processing method, server and electronic equipment
CN114365146A (en) * 2019-06-28 2022-04-15 实耐宝公司 Automated tool control device managed in tool warehouse management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615738A (en) * 2018-11-30 2019-04-12 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN114365146A (en) * 2019-06-28 2022-04-15 实耐宝公司 Automated tool control device managed in tool warehouse management system
CN110956720A (en) * 2019-10-31 2020-04-03 金华东贤科技有限公司 Special intelligent lock system for laboratory hazardous article management and operation method
CN112035807A (en) * 2020-08-06 2020-12-04 珠海格力电器股份有限公司 Object authentication method and apparatus, storage medium, and electronic apparatus
CN113010822A (en) * 2021-04-21 2021-06-22 上海交通大学 Information processing method, server and electronic equipment

Also Published As

Publication number Publication date
JP2024022438A (en) 2024-02-16

Similar Documents

Publication Publication Date Title
Campisi Security and privacy in biometrics: towards a holistic approach
CN109767534B (en) Access control access method, system, management terminal and access control terminal based on block chain
US8670562B2 (en) Generation and use of a biometric key
JP5852870B2 (en) Biometric authentication system
CN110138726B (en) Method and system for intelligently and optimally managing cloud information
Olaniyi et al. Design of secure electronic voting system using fingerprint biometrics and crypto-watermarking approach
CN105164689A (en) User authentication
DE602004003566D1 (en) METHOD AND DEVICE FOR IDENTIFYING AN AUTHORIZED PERSON BY MEANS OF UNFORESEKABLE ONE-TIME USEFUL PASSWORD
CN112580010B (en) Biological feature sharing method and device, electronic equipment and storage medium
CN115758398B (en) Access control data processing method and device, access control system and storage medium
CN109599152A (en) A kind of certificate chain electron medical treatment certificate system
CN111222172A (en) Electronic signature method and system for mobile terminal based on face real-name authentication protection
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
US20200134167A1 (en) Method of registering and authenticating a user of an online system
CN112329004A (en) Method and device for face recognition and face password
CN115471930A (en) Laboratory management method and system based on block chain
KR101498670B1 (en) The generation method and device of password by using biometrics-based confidence interval sets
Mallikarjuna et al. An efficient vote casting system with Aadhar verification through blockchain
CN112036884B (en) Signature method and related equipment
CN109388930A (en) A kind of fingerprint protocol identification system and its recognition methods based on information in power dispatching center
CN113226864B (en) Processing system
Aramice et al. Secure Code Generation for Multi-Level Mutual Authentication
JP2004013865A (en) Personal identification method by associative memory
Vidhya et al. IoT Based Secured Smart Voting System Using Diffie Hellman Algorithm
JP4884052B2 (en) Biometric authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination