CN116319100B - Port dangerous source safety admittance method and system based on GIS spatial data analysis - Google Patents

Port dangerous source safety admittance method and system based on GIS spatial data analysis Download PDF

Info

Publication number
CN116319100B
CN116319100B CN202310572284.0A CN202310572284A CN116319100B CN 116319100 B CN116319100 B CN 116319100B CN 202310572284 A CN202310572284 A CN 202310572284A CN 116319100 B CN116319100 B CN 116319100B
Authority
CN
China
Prior art keywords
information
unit
verification
time
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310572284.0A
Other languages
Chinese (zh)
Other versions
CN116319100A (en
Inventor
崔迪
占小跳
张霞
唐海齐
夏庆
周亚飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Waterborne Transport Research Institute
Original Assignee
China Waterborne Transport Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Waterborne Transport Research Institute filed Critical China Waterborne Transport Research Institute
Priority to CN202310572284.0A priority Critical patent/CN116319100B/en
Publication of CN116319100A publication Critical patent/CN116319100A/en
Application granted granted Critical
Publication of CN116319100B publication Critical patent/CN116319100B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a harbor hazard source safety admittance method and system based on GIS space data analysis, the system comprises an information acquisition unit, a face recognition unit and an information output unit, the invention relates to the technical field of information safety transmission and verification, solves the technical problem that information is stolen and is falsified due to the fact that information encryption transmission is not strict for the safety inspection user identity of regular responsible inspection.

Description

Port dangerous source safety admittance method and system based on GIS spatial data analysis
Technical Field
The invention relates to the technical field of information security transmission and verification, in particular to a harbor danger source security access method and system based on GIS space data analysis.
Background
The major dangerous source places in the harbor area generally refer to dangerous cargo container yards or petrochemical storage tank areas, so that a user needs to verify the identity before entering the harbor area, and the danger caused by the user after entering the harbor area is avoided;
GIS space analysis refers to realizing analysis of space data in GIS (geographic information system), namely, obtaining and analyzing information such as space position, distribution, morphology, formation, evolution and the like of a related geographic object from the space data.
At present, before security large inspectors and security assessment personnel of third parties enter a major hazard source place of a petrochemical harbor, firstly, identity verification is needed through a management system, after identity verification is passed, the user of the type is granted to enter the harbor, but the current management system is simple in checking the entering identity of the security inspection user who is in charge of checking regularly, personnel information is impossibly exists, and accordingly the security large inspectors enter the petrochemical harbor, equipment supervision of the major hazard source in the petrochemical harbor is unfavorable, secondly, when the security inspection user information is acquired, the system needs encryption in the process of information transmission, but the problem that part of the information encryption is not strict exists, so that the information is stolen when transmitted, and further the situation that the personnel information is impossibly exists.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a port hazard source safety admittance method and a port hazard source safety admittance system based on GIS space data analysis, which solve the problems that the identity of a safety inspection user responsible for inspection at regular intervals is checked simply, and information is stolen and personnel information is impersonated because the information is not strictly encrypted and transmitted.
In order to achieve the above purpose, the invention is realized by the following technical scheme: harbor danger source safety access system based on GIS space data analysis includes:
the information acquisition unit is used for acquiring basic information of the target object, transmitting the basic information of the target object to the face recognition unit, recognizing the face of the acquired basic information of the target object, transmitting the identification signal and the corresponding target associated information to the identification personnel unit, and transmitting the unidentified signal and the corresponding target associated information to the unidentified personnel unit;
the system comprises an identification personnel unit, an information identification unit, an early warning unit and an information output unit, wherein the identification personnel unit is used for transmitting an acquired identification signal and corresponding target associated information to the information identification unit, the information identification unit is used for identifying the acquired identification signal and the corresponding target associated information, sending a verification code to a target object for verification, inputting the verification code in a limited time to generate an identification passing signal, transmitting the identification passing signal to the information output unit, inputting the verification code in the limited time for more than three times, generating an failed signal and transmitting the failed signal to the early warning unit, and the early warning unit is used for transmitting the acquired early warning signal to the information output unit;
the unidentified personnel unit is used for transmitting the acquired unidentified signals and the associated information of the corresponding target object to the identity verification unit;
the data storage unit encrypts and transmits the associated information of the unidentified personnel;
obtaining checking time JC, dividing n equal parts of checking time JC, dividing the related information of a target object in equal parts, marking the n equal parts of related data as BJk, obtaining the capacity value of the n equal parts of related data, sorting the capacity value from small to large to generate sorting information, labeling the sorting information to generate corresponding labeling information, sorting and integrating the labeling information to generate even-numbered binding packages and non-even-numbered binding packages, and transmitting the even-numbered binding packages and the non-even-numbered binding packages to an identity verification unit;
the identity verification unit is used for decrypting the even binding package and the non-even binding package, generating original association information in a combined mode, verifying the association information input by unidentified personnel and the original association information, generating corresponding verification information and transmitting the verification information to the information output unit.
As a further aspect of the invention: the target object includes: third party security inspection personnel and record staff, the basic information of record staff includes: the face data information and the basic information of the third-party security inspection personnel comprise: face data information;
the data storage unit is used for storing the association information of the target object and the checking time JC, wherein the association information of the record staff comprises the following components: name, common registration mobile phone number, job number and affiliated department, and the associated information of the third party security check personnel comprises: name, belonging department, time value SJi and surpassThe time Tc and the time value SJi are obtained by the following steps: the historical times record checked by the third party security inspector in one year is obtained and marked as CS, the on-time times ZC and the late times CD of the third party security inspector are obtained, and the historical times CS, the on-time times ZC and the late times CD are substituted into a formula:the corresponding time value SJi is calculated, i is expressed as different third party security inspectors, wherein a is an influence factor, and the value of a is set by an operator;
the specific identification mode of the face recognition unit for the associated information of the target object is as follows: when the face data information is judged to be recorded, correspondingly generating a recognition signal, and transmitting the recognition signal and the associated information of the recognition user to a recognition personnel unit by the face recognition unit;
and when the face data information is judged to be not recorded, correspondingly generating an unidentified signal, and transmitting the unidentified signal and the associated information of the unidentified user to an unidentified personnel unit by the face recognition unit.
As a further aspect of the invention: the specific identification mode of the information identification unit for the acquired identification signal and the associated information of the corresponding target object is as follows:
the system identifies the name, the work number, the common registered mobile phone number and the department input by the user, and performs automatic verification in the specific verification mode that:
a1: the system sends a randomly generated verification code to the input common registration mobile phone number, wherein the random generation mode of the verification code is as follows:
the system acquires and identifies the time point of clicking confirmation of the user and reads the numerical values, then sequences the numerical values from small to large, generates verification codes according to the sequence from large to small, and sends the verification codes to the corresponding common registration mobile phone numbers;
a2: identifying that the user needs to input the verification code received into the system according to the prompt of the verification code within the limited time, and canceling the verification code beyond the limited time;
when the identification user inputs the verification code within the limited time, the information identification unit generates an identification passing signal and transmits the identification passing signal to the information output unit;
when the identification user does not input the verification code within the limited time, the identification user needs to be re-verified, the verification code is input within the limited time, and if the input times are more than three times, the information identification unit generates an identification failed signal and transmits the identification failed signal to the early warning signal unit;
a3: and the early warning signal unit is used for carrying out early warning on the acquired identification failed signal and generating an early warning signal, and the early warning signal unit transmits the early warning signal to the information output unit.
As a further aspect of the invention: the specific mode of encrypting and transmitting the associated information of the unidentified personnel by the data storage unit is as follows:
s1: acquiring the association information of a single unidentified person, acquiring an inspection time JC, dividing the inspection time JC by n equal parts, and dividing the inspection time JC into n-1 time intervals, wherein the time length of the single time interval is as followsDividing the related information of the target object in equal parts, inserting dividing marks between two adjacent divided related information, carrying out marking treatment on n equal parts of related data and marking the n equal parts of related data as BJk, obtaining the capacity value of the n equal parts of related data, sequencing the capacity value from small to large, generating corresponding sequencing information, carrying out labeling treatment on the obtained time value SJi corresponding to unidentified personnel and the sequencing information, and generating corresponding labeling information;
s2: the labeling process in the same way S1 labels the associated information of all unidentified personnel and generates corresponding labeling information, then the time values SJi of all unidentified personnel are ordered in a sequence from small to large, labeling information with the sum of the time values SJi of the unidentified personnel being even after the 3 time values SJi are ordered from small to large is obtained, and meanwhile a corresponding even bundle package is generated, and the rest labeling information is integrated to generate an uneven bundle package;
s21: the transmission modes of the even number binding package and the non-even number binding package in n-1 time intervals are as follows:
b1: the non-even number binding packages are circularly and alternately transmitted to the identity verification unit according to the sequence of the front of the even number binding packages and the rear of the non-even number binding packages in the n-1 time interval;
b2: and in the n-2 time interval, the even numbered bundles are circularly and alternately transmitted to the identity verification unit according to the sequence of the front of the non-even numbered bundles, and meanwhile, bundle decryption information corresponding to the generation of the even numbered bundles and the non-even numbered bundles is directly transmitted to the identity verification unit.
As a further aspect of the invention: the specific mode of the identity verification unit for verifying the input association information and the original association information of the unidentified personnel is as follows:
when unidentified personnel input corresponding associated information in the checking time JC, the system automatically checks the input associated information and generates verification information to be transmitted to an information output unit;
when the unidentified person does not input corresponding associated information in the checking time JC, the system acquires the exceeding time Tc of the unidentified person and compares the exceeding time Tc with a preset value YS, wherein the value YS is set by an operator by himself:
if Tc is less than or equal to YS, the system re-reads the encryption transmission mode, verifies the associated information of the unidentified personnel again, generates verification information and transmits the verification information to the information output unit;
if Tc > YS, the system judges that the verification information is invalid and generates verification information to be transmitted to the information output unit.
As a further aspect of the invention: the access method of the harbor dangerous source safety access system based on GIS space data analysis specifically comprises the following steps:
step one: firstly, basic information of a target object is acquired, the target object is classified through face recognition, meanwhile, identification signals and unidentified signals are generated for different classified objects, and analysis is carried out for different signals;
step two: then aiming at the identification user of the identification signal, verifying through the associated information input by the identification user, randomly generating a verification code by the system, verifying through filling the verification code in the specified time by the identification user, and simultaneously inputting the error identification user with the verification code for three times, and finally generating an early warning signal and a passing signal;
step three: then, aiming at the unidentified user of the unidentified signal, analyzing the information of the unidentified user, encrypting and transmitting the associated information of the unidentified user, finally transmitting the encrypted information to an identity verification unit, and transmitting a final verification result to an information output unit;
step four: the information output unit displays the acquired verification result and the early warning signal through the display device.
Advantageous effects
The invention provides a harbor hazard source safety admittance method and system based on GIS space data analysis. Compared with the prior art, the method has the following beneficial effects:
1. the invention judges the identification type of the user by primarily identifying the face, further carries out verification according to the identification personnel, carries out identification verification by sending the verification code to the mobile phone of the identification personnel, and limits the verification in the specified time, thereby ensuring the timeliness of the verification, sending early warning for the condition of overtime of inputting the verification code for three times, reminding the personnel to check, and improving the safety of the verification.
2. According to the invention, through carrying out multi-aspect verification on unidentified personnel and aiming at the information transmission problem of security personnel, a data encryption mode is adopted, and the information of different security inspection personnel is segmented and encrypted, so that on one hand, the situation that the information is stolen and the personnel are faked is avoided, the security in the believing transmission process is improved, on the other hand, the information is transmitted in a cross ordering mode in the transmission process, the security of the whole information transmission is improved, and the accuracy of subsequent information verification is improved.
Drawings
FIG. 1 is a block diagram of a system of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1, the application provides a port area hazard source safety admittance method based on GIS spatial data analysis, which specifically includes the following steps:
the information acquisition unit is used for acquiring basic information of a target object and analyzing and verifying the basic information of the target object, wherein the target object comprises a third party security inspection personnel and a record staff, and the basic information of the record staff comprises the following components: the face data information and the basic information of the third-party security inspection personnel comprise: face data information;
the data storage unit is used for storing the association information of the target object and the checking time JC, wherein the checking time is as follows: a security inspection personnel is dispatched within a specified time to carry out security inspection on the harbor district, and the inspection time is obtained by the following steps: according to the notification issued by the inspection department, the associated information of the record staff comprises: name, common registration mobile phone number, job number and affiliated department, and the associated information of the third party security check personnel comprises: name, belonging department, time value SJi and excess time Tc, and i is denoted as different security inspector, the definition of time value SJi is: the third party security inspector is used for defining illegal time as time which does not reach and exceeds the specified time according to the evaluation value reached by the appointed time, and transmitting the associated information of the target object to the information identification unit and the identity verification unit;
the time value SJi is obtained by the following steps: acquiring a historical time record of the inspection of the third party security inspector within one year and marking as CS, and acquiring an on-time ZC and an late time CD of the third party security inspector, wherein the on-time is defined as within a specified timeThe number of times of arrival, the number of times of delay is defined as the number of times that the arrival has not been achieved within a prescribed time, and the history number CS, the on-time number ZC, and the number of times of delay CD are substituted into the formula:calculating to obtain a corresponding time value SJi, wherein a is an influence factor, the value of a is set by an operator, and the acquired association information of the target object is transmitted to a face recognition unit;
the face recognition unit is used for recognizing the acquired association information of the target object, and the specific recognition mode is as follows:
when the face data information is judged to be recorded, correspondingly generating an identification signal, and transmitting the identification signal and the associated information of the identification user to an identification personnel unit by the face identification unit, wherein the identification user is represented as a recorded worker;
and when the face data information is judged to be not recorded, correspondingly generating an unidentified signal, and transmitting the unidentified signal and the associated information of the unidentified user to an unidentified personnel unit by the face recognition unit, wherein the unidentified user is expressed as a third-party security inspection personnel.
The identifying personnel unit is used for transmitting the acquired identifying signals and the associated information of the corresponding target objects to the information identifying unit, and then the information identifying unit identifies the acquired identifying signals and the associated information of the corresponding target objects in the specific identifying mode that:
the system identifies the name, the work number, the common registered mobile phone number and the department input by the user, and performs automatic verification in the specific verification mode that:
a1: the system sends a randomly generated verification code to the input common registration mobile phone number, wherein the random generation mode of the verification code is as follows:
the system acquires and identifies the time point of clicking confirmation of the user and reads the numerical values, then sequences the numerical values from small to large, generates verification codes according to the sequence from large to small, and sends the verification codes to the corresponding common registration mobile phone numbers;
a2: identifying that the user needs to input the received verification code into the system according to the prompt of the verification code and within a limited time, and canceling the verification code beyond the limited time, wherein the limited time is expressed as within one minute;
when the identification user inputs the verification code within the limited time, the information identification unit generates an identification passing signal and transmits the identification passing signal to the information output unit;
when the identification user does not input the verification code within the limited time, the identification user needs to be re-verified, the verification code is input within the limited time, and if the input times are more than three times, the information identification unit generates an identification failed signal and transmits the identification failed signal to the early warning signal unit;
a3: and the early warning signal unit is used for carrying out early warning on the acquired identification failed signal and generating an early warning signal, and the early warning signal unit transmits the early warning signal to the information output unit.
The unidentified personnel unit is used for transmitting the acquired unidentified signals and the associated information of the corresponding target object to the identity verification unit, and the data storage unit is used for encrypting and transmitting the associated information of the unidentified personnel in the following specific modes:
s1: taking the related information of a single unidentified person as an example for analysis, obtaining an inspection time JC, dividing the inspection time JC by n equal parts, dividing the inspection time JC into n-1 time intervals, wherein the time length of the single time interval is as followsThe time intervals are continuously connected, the related information of the target object is divided in equal parts, a division mark is inserted between two adjacent divided related information, n equal parts of related data are subjected to mark processing and marked as BJk, the capacity value of the n equal parts of related data is obtained, the capacity value is ordered from small to large, corresponding ordering information is generated, the obtained time value SJi corresponding to unidentified personnel and the ordering information are subjected to labeling processing, corresponding labeling information is generated, and the labeling processing is expressed as follows: dividing the n equal parts of associated data, sorting according to the capacity size, and sorting n equal partsThe time values SJi of the corresponding target objects are marked on the share associated data;
s2: the labeling process in the same way S1 labels the associated information of all unidentified persons and generates corresponding labeling information, then the time values SJi of all unidentified persons are ordered in a sequence from small to large, 3 parts of labeling information with the sum of the time values SJi of unidentified persons being even after the time values SJi are ordered from small to large is obtained, 3 parts of labeling information are labeling information of different unidentified persons, the even number is an even number within 30, corresponding even number binding packages are generated at the same time, and the rest labeling information is integrated to generate non-even number binding packages;
s21: the transmission modes of the even number binding package and the non-even number binding package in n-1 time intervals are as follows:
b1: the non-even number binding packages are circularly and alternately transmitted to the identity verification unit according to the sequence of the front of the even number binding packages and the rear of the non-even number binding packages in the n-1 time interval;
b2: in the n-2 time interval, the even numbered bundles are circularly and alternately transmitted to the identity verification unit according to the sequence of the front of the non-even numbered bundles, and meanwhile, bundle decryption information corresponding to the even numbered bundles and the non-even numbered bundles is directly transmitted to the identity verification unit;
and (3) carrying out analysis by combining with an actual application scene: the even bundle is marked as 0, the non-even bundle is marked as 1, the transmission mode in the first time interval is 01010101, and the transmission mode in the second time interval is 10101010.
The identity verification unit is used for decrypting the even number binding package and the uneven number binding package according to the obtained binding package decryption information, combining the even number binding package and the uneven number binding package to generate original association information, wherein the original association information is unidentified personnel association information stored in the data storage unit, and verifying the association information input by unidentified personnel and the original association information, and the specific verification mode is as follows:
when unidentified personnel input corresponding associated information in the checking time JC, the system automatically checks the input associated information and generates verification information to be transmitted to an information output unit;
when the unidentified person does not input corresponding associated information in the checking time JC, the system acquires the exceeding time Tc of the unidentified person and compares the exceeding time Tc with a preset value YS, wherein the value YS is set by an operator by himself:
if Tc is less than or equal to YS, the system re-reads the encryption transmission mode, verifies the associated information of the unidentified personnel again, generates verification information and transmits the verification information to the information output unit;
if Tc > YS, the system judges that the verification information is invalid and generates verification information to be transmitted to the information output unit.
The information output unit acquires the transmitted verification information and allows the verification information to be watched by an operator through the display device, so that the operator can check the correctness of the verification information.
An embodiment II includes all the contents in the embodiment I, and is different in that the access method of the harbor hazard source safety access system based on GIS space data analysis specifically includes the following steps:
step one: firstly, basic information of a target object is acquired, the target object is classified through face recognition, meanwhile, identification signals and unidentified signals are generated for different classified objects, and analysis is carried out for different signals;
step two: then aiming at the identification user of the identification signal, verifying through the associated information input by the identification user, randomly generating a verification code by the system, verifying through filling the verification code in the specified time by the identification user, and simultaneously inputting the error identification user with the verification code for three times, and finally generating an early warning signal and a passing signal;
step three: then, aiming at the unidentified user of the unidentified signal, analyzing the information of the unidentified user, encrypting and transmitting the associated information of the unidentified user, finally transmitting the encrypted information to an identity verification unit, and transmitting a final verification result to an information output unit;
step four: the information output unit displays the acquired verification result and the early warning signal through the display device.
And all that is not described in detail in this specification is well known to those skilled in the art.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.

Claims (2)

1. Harbor danger source safety access system based on GIS space data analysis, which is characterized by comprising:
the information acquisition unit is used for acquiring basic information of a target object, wherein the target object comprises: the system comprises a third-party security inspection personnel and a filing staff, wherein basic information of the filing staff comprises face data information, basic information of the third-party security inspection personnel comprises face data information, and basic information of a target object is transmitted to a face recognition unit;
the face recognition unit is used for recognizing the face of the acquired basic information of the target object, transmitting the recognition signal and the corresponding basic information of the target object to the recognition personnel unit, and transmitting the unidentified signal and the corresponding basic information of the target object to the unidentified personnel unit;
the identification personnel unit is used for transmitting the acquired identification signals and the corresponding target basic information to the information identification unit;
the information identification unit is used for identifying the acquired identification signal and corresponding target basic information, sending a verification code to a target object for verification, inputting the verification code in a limited time to generate an identification passing signal, transmitting the identification passing signal to the information output unit, and generating an failed signal and transmitting the failed signal to the early warning unit if the verification code is not input in the limited time and the number of times of inputting the verification code exceeds three;
the early warning unit is used for transmitting the acquired early warning signals to the information output unit;
the unidentified personnel unit is used for transmitting the obtained unidentified signal and the basic information of the corresponding target object to the identity verification unit;
the system comprises a data storage unit, a verification unit and an identity verification unit, wherein the data storage unit stores basic information of a target object and checking time JC, the basic information of a record staff comprises names, common registration mobile phone numbers, work numbers and affiliated departments, the basic information of a third party security checking staff comprises names, affiliated departments, time values SJi and exceeding time Tc, i are expressed as different third party security checking staff and are used for storing and encrypting and transmitting the basic information of unidentified staff, checking time JC is acquired, n equal parts of the basic information of the target object are divided, the associated data after n equal parts are marked as BJk, capacity values of the n equal parts of the associated data are acquired, the capacity values are ordered from small to large, ordering information is generated, label pasting processing is carried out on the ordering information, corresponding label pasting information is generated, even binding packages and non-even binding packages are integrated by ordering label pasting information, and the even binding packages and the non-even binding packages are transmitted to the identity verification unit;
the time value SJi is obtained by the following steps: the historical times record checked by the third party security inspector in one year is obtained and marked as CS, the on-time times ZC and the late times CD of the third party security inspector are obtained, and the historical times CS, the on-time times ZC and the late times CD are substituted into a formula:the corresponding time value SJi is calculated, i is expressed as different third party security inspectors, wherein a is an influence factor, and the value of a is set by an operator;
the specific recognition mode of the face recognition unit to the basic information of the target object is as follows: when the face data information is judged to be recorded, correspondingly generating a recognition signal, and transmitting the recognition signal and basic information of a recognition user to a recognition personnel unit by a face recognition unit;
when the face data information is judged to be unrecorded, correspondingly generating an unrecognized signal, and transmitting the unrecognized signal and basic information of an unrecognized user to an unrecognized personnel unit by the face recognition unit;
the identity verification unit is used for decrypting the even binding package and the non-even binding package, combining the even binding package and the non-even binding package to generate original basic information, verifying the basic information input by unidentified personnel and the original basic information, generating corresponding verification information and transmitting the corresponding verification information to the information output unit;
the specific identification mode of the information identification unit for the acquired identification signal and the basic information of the corresponding target object is as follows:
the system identifies the name, the work number, the common registered mobile phone number and the department input by the user, and performs automatic verification in the specific verification mode that:
a1: the system sends a randomly generated verification code to the common registration mobile phone number, wherein the random generation mode of the verification code is as follows:
the system acquires and identifies the time point of clicking confirmation of the user and reads the numerical values, then sequences the numerical values from small to large, generates verification codes according to the sequence from large to small, and sends the verification codes to the corresponding common registration mobile phone numbers;
a2: identifying that the user needs to input the received verification code into the system according to the prompt of the verification code and within the limited time, and canceling the verification code beyond the limited time;
when the identification user inputs the verification code within the limited time, the information identification unit generates an identification passing signal and transmits the identification passing signal to the information output unit;
when the identification user does not input the verification code within the limited time, the identification user needs to be re-verified, the verification code is input within the limited time, and if the input times are more than three times, the information identification unit generates an identification failed signal and transmits the identification failed signal to the early warning signal unit;
a3: the early warning signal unit carries out early warning on the acquired recognition failed signal and generates an early warning signal, and the early warning signal unit transmits the early warning signal to the information output unit;
the data storage unit encrypts and transmits the basic information of unidentified personnel in the following specific modes:
s1: acquiring basic information of single unidentified person, acquiring checking time JC, and checkingDividing the checking time JC into n equal parts, dividing the checking time JC into n time intervals, wherein the time length of each time interval is as followsDividing basic information of a target object in equal parts, inserting dividing marks between two adjacent basic information after dividing, carrying out marking processing on n equal parts of associated data and marking the n equal parts of associated data as BJk, obtaining capacity value of the n equal parts of associated data, sequencing the capacity value from small to large, generating corresponding sequencing information, carrying out labeling processing on the obtained time value SJi corresponding to unidentified personnel and the sequencing information, and generating corresponding labeling information;
s2: the labeling process in the same way S1 labels the basic information of all unidentified personnel and generates corresponding labeling information, then the time values SJi of all unidentified personnel are ordered in a sequence from small to large, labeling information with the sum of the time values SJi of the unidentified personnel being even after the 3 time values SJi are ordered from small to large is obtained, and meanwhile corresponding even binding packages are generated, and the rest labeling information is integrated to generate non-even binding packages;
s21: the transmission modes of the even number binding package and the non-even number binding package in n-1 time intervals are as follows:
b1: the non-even number binding packages are circularly and alternately transmitted to the identity verification unit according to the sequence of the front of the even number binding packages and the rear of the non-even number binding packages in the n-1 time interval;
b2: in the n-2 time interval, the even numbered bundles are circularly and alternately transmitted to the identity verification unit according to the sequence of the front of the non-even numbered bundles, and meanwhile, bundle decryption information corresponding to the even numbered bundles and the non-even numbered bundles is directly transmitted to the identity verification unit;
the specific mode of the identity verification unit for verifying the basic information and the original basic information input by the unidentified personnel is as follows:
when unidentified personnel input corresponding basic information in the checking time JC, the system automatically checks the input basic information and generates verification information to be transmitted to an information output unit;
when the unidentified person does not input corresponding basic information in the checking time JC, the system acquires the exceeding time Tc of the unidentified person and compares the exceeding time Tc with a preset value YS, wherein the value YS is set by an operator by himself:
if Tc is less than or equal to YS, the system re-reads the encryption transmission mode, verifies the basic information of unidentified personnel again, generates verification information and transmits the verification information to the information output unit;
if Tc > YS, the system judges that the verification information is invalid and generates verification information to be transmitted to the information output unit.
2. An access method for performing the system for safely admitting a harbor hazard source based on GIS spatial data analysis according to claim 1, comprising the steps of:
step one: firstly, basic information of a target object is acquired, the target object is classified through face recognition, meanwhile, identification signals and unidentified signals are generated for different classified objects, and analysis is carried out for different signals;
step two: then, aiming at the identification user of the identification signal, verifying through basic information input by the identification user, randomly generating a verification code by a system, verifying through filling the verification code in a specified time by the identification user, and simultaneously inputting the verification code for three times of inputting the wrong identification user, and finally generating an early warning signal and a passing signal;
step three: then, aiming at the unidentified user of the unidentified signal, analyzing the information of the unidentified user, encrypting and transmitting the basic information of the unidentified user, finally transmitting the encrypted information to an identity verification unit, and transmitting a final verification result to an information output unit;
step four: the information output unit displays the acquired verification result and the early warning signal through the display device.
CN202310572284.0A 2023-05-22 2023-05-22 Port dangerous source safety admittance method and system based on GIS spatial data analysis Active CN116319100B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310572284.0A CN116319100B (en) 2023-05-22 2023-05-22 Port dangerous source safety admittance method and system based on GIS spatial data analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310572284.0A CN116319100B (en) 2023-05-22 2023-05-22 Port dangerous source safety admittance method and system based on GIS spatial data analysis

Publications (2)

Publication Number Publication Date
CN116319100A CN116319100A (en) 2023-06-23
CN116319100B true CN116319100B (en) 2023-07-28

Family

ID=86817133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310572284.0A Active CN116319100B (en) 2023-05-22 2023-05-22 Port dangerous source safety admittance method and system based on GIS spatial data analysis

Country Status (1)

Country Link
CN (1) CN116319100B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117094022B (en) * 2023-10-20 2024-01-09 山东友恺通信科技有限公司 Encryption system based on computer software development
CN117171694B (en) * 2023-11-02 2024-01-30 北京龙德缘电力科技发展有限公司 Distribution scene safety identification system based on AI technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450850A (en) * 2018-09-26 2019-03-08 深圳壹账通智能科技有限公司 Auth method, device, computer equipment and storage medium
WO2021068616A1 (en) * 2019-10-12 2021-04-15 深圳壹账通智能科技有限公司 Method and device for identity authentication, computer device, and storage medium
CN115688070A (en) * 2022-11-09 2023-02-03 杭州图塘科技有限公司 Product management system and method based on face verification

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170185761A1 (en) * 2014-03-31 2017-06-29 Wi-Lan Labs, Inc. System and method for biometric key management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450850A (en) * 2018-09-26 2019-03-08 深圳壹账通智能科技有限公司 Auth method, device, computer equipment and storage medium
WO2021068616A1 (en) * 2019-10-12 2021-04-15 深圳壹账通智能科技有限公司 Method and device for identity authentication, computer device, and storage medium
CN115688070A (en) * 2022-11-09 2023-02-03 杭州图塘科技有限公司 Product management system and method based on face verification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于主成分分析法的港口企业安全管理要素研究;崔迪等;中国水运;第11卷(第10期);全文 *

Also Published As

Publication number Publication date
CN116319100A (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN116319100B (en) Port dangerous source safety admittance method and system based on GIS spatial data analysis
CN113674484B (en) Self-service medicine selling method and terminal
CN105448103B (en) Vehicle fake-license detection method and system
JP5415266B2 (en) Workflow assurance and authentication system
US20190188732A1 (en) System and method for ensuring credibility of items in a supply chain management
WO2019068893A1 (en) A system and method for authenticating a product
CN111311777A (en) Dynamic inspection method, server, terminal, storage medium and equipment
US20190272908A1 (en) System and method for detecting pharmaceutical counterfeit and fraudulent prescription
CN109214258B (en) Method and device for detecting illegal driving of non-driving personnel
EP2065849A1 (en) Detection of counterfeited products based on sensor measurements
RU2183349C1 (en) Article marking and identification system
CN110471376A (en) A kind of industry spot fault detection method and equipment
EP3171312A1 (en) Methods, a system and an analyze server for verifying an authenticity of an identity document and extracting textual information therefrom
CN110969723B (en) Data management method, detection device, server, and computer-readable storage medium
CN106203551B (en) A kind of Electronic Signature processing method of goods and materials contract services document
CN111242641A (en) Method, device, equipment and medium for determining channel conflict
CN1987962A (en) Disposable patient wrist band and patient identity identifying system
CN115860652B (en) Report generation method and system
US20200311245A1 (en) Authenticating object instances
CN110365656B (en) Data management method, data management device and environment-friendly detection equipment
EP3218712B1 (en) Sobriety test authentication process and device
CN101847341A (en) Method and system for anti-counterfeiting goods by using digital encryption marks
CN111654591A (en) Picture tamper-proofing method, computer equipment and storage medium
CN111669649A (en) Tamper-proof method and system for on-site image data
IT202100011978A1 (en) Method for recording a timed handover of electronically tagged pallets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant