TW202036376A - Blockchain-based method and device for performing scene-based deposition on face information - Google Patents

Blockchain-based method and device for performing scene-based deposition on face information Download PDF

Info

Publication number
TW202036376A
TW202036376A TW108132022A TW108132022A TW202036376A TW 202036376 A TW202036376 A TW 202036376A TW 108132022 A TW108132022 A TW 108132022A TW 108132022 A TW108132022 A TW 108132022A TW 202036376 A TW202036376 A TW 202036376A
Authority
TW
Taiwan
Prior art keywords
user
image
scene
face information
storage
Prior art date
Application number
TW108132022A
Other languages
Chinese (zh)
Other versions
TWI710971B (en
Inventor
李艷鵬
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202036376A publication Critical patent/TW202036376A/en
Application granted granted Critical
Publication of TWI710971B publication Critical patent/TWI710971B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • G06V40/53Measures to keep reference information secret, e.g. cancellable biometrics

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A blockchain-based method and device for performing scene-based deposition on face information. Said method comprises: when face information about a user needs to be acquired in a target scene, acquiring a user image; and then submitting the user image to a block chain network for deposition.

Description

基於區塊鏈對人臉資訊進行場景化存證的方法及裝置Method and device for scene-based storage of facial information based on blockchain

本說明書實施例涉及資訊技術領域,尤其涉及一種基於區塊鏈對人臉資訊進行場景化存證的方法及裝置。The embodiments of the present specification relate to the field of information technology, and in particular to a method and device for scene-based storage of facial information based on blockchain.

在有些業務場景下,需要對用戶進行基於人臉識別的身份驗證。例如,在酒店入住場景下,用戶預先在網上預定酒店之後,前往酒店辦理入住,酒店管理方需要採集用戶的人臉資訊,作為待驗證人臉資訊,然後將待驗證人臉資訊與預定入住人的真實人臉資訊進行比對,如果比對一致,就說明用戶是預定入住人本人,可以辦理入住。 然而,在某個場景下採集的用戶的人臉資訊可能被採集方濫用於其他場景,危及用戶的財產和信用安全,而用戶卻難以舉證維權。In some business scenarios, user identity verification based on face recognition is required. For example, in a hotel check-in scenario, after a user has booked a hotel online in advance, he then goes to the hotel to check in. The hotel manager needs to collect the user’s face information as the face information to be verified, and then combine the face information to be verified with the booked check-in The real face information of the person is compared. If the comparison is consistent, it means that the user is the person who is scheduled to check in and can check in. However, the user's face information collected in a certain scene may be abused by the collecting party in other scenes, endangering the user's property and credit safety, but it is difficult for the user to provide evidence to defend his rights.

為了解決用戶的人臉資訊未經用戶授權被濫用的情況出現時,用戶取證難的問題,本說明書實施例提供一種基於區塊鏈對人臉資訊進行場景化存證的方法及裝置,技術方案如下: 根據本說明書實施例的第1態樣,提供一種基於區塊鏈對人臉資訊進行場景化存證的方法,包括: 當需要在目標場景下採集用戶的人臉資訊時,採集用戶圖像;所述用戶圖像顯示有所述用戶的臉部與場景錨定對象,所述場景錨定對象用於證明所述用戶圖像是在所述目標場景下採集的; 將所述用戶圖像提交給區塊鏈網路進行存證。 根據本說明書實施例的第2態樣,提供一種基於區塊鏈對人臉資訊進行場景化存證的裝置,包括: 採集模組,當需要在目標場景下採集用戶的人臉資訊時,採集用戶圖像;所述用戶圖像顯示有所述用戶的臉部與場景錨定對象,所述場景錨定對象用於證明所述用戶圖像是在所述目標場景下採集的; 存證模組,將所述用戶圖像提交給區塊鏈網路進行存證。 本說明書實施例所提供的技術方案,當需要在目標場景下採集用戶的人臉資訊時,採集顯示有用戶的臉部與場景錨定對象的用戶圖像,然後對所述用戶圖像進行區塊鏈存證。如此,由於所述用戶圖像可以證明所述用戶僅授權在目標場景下使用自己的人臉資訊,因此,所述用戶圖像一旦被寫入區塊鏈,就相當於為後續可能出現的人臉資訊濫用事件提供可信的證據,降低所述用戶取證的難度。 應當理解的是,以上的一般描述和後文的細節描述僅是示例性和解釋性的,並不能限制本說明書實施例。 此外,本說明書實施例中的任一實施例並不需要達到上述的全部效果。In order to solve the problem of difficulty for users to obtain evidence when the user's face information is abused without the user's authorization, the embodiments of this specification provide a method and device for scene-based evidence storage of face information based on blockchain, and technical solutions as follows: According to the first aspect of the embodiment of the present specification, a method for scene-based verification of face information based on blockchain is provided, including: When the user’s face information needs to be collected in the target scene, a user image is collected; the user image shows the user’s face and scene anchor objects, and the scene anchor objects are used to prove the user The image is collected in the target scene; Submit the user image to the blockchain network for storage. According to the second aspect of the embodiments of the present specification, a device for scene-based storage of facial information based on blockchain is provided, including: The collection module, when it is necessary to collect the face information of the user in the target scene, collect the user image; the user image displays the user's face and the scene anchor object, and the scene anchor object is used for Prove that the user image was collected in the target scene; The deposit certificate module submits the user image to the blockchain network for deposit certificate. The technical solution provided by the embodiment of this specification, when it is necessary to collect the face information of the user in the target scene, collect the user image showing the user's face and the anchored object of the scene, and then perform the regionalization on the user image. Blockchain deposit certificate. In this way, since the user image can prove that the user is only authorized to use his face information in the target scene, once the user image is written into the blockchain, it is equivalent to the person who may appear in the future. The Facebook abuse incident provides credible evidence and reduces the difficulty of obtaining evidence for the user. It should be understood that the above general description and the following detailed description are only exemplary and explanatory, and cannot limit the embodiments of this specification. In addition, any embodiment in the embodiments of this specification does not need to achieve all the above-mentioned effects.

在某個場景下採集的用戶的人臉資訊可能被採集方濫用於其他場景,危及用戶的財產和信用安全。例如,用戶在辦理酒店入住時向酒店提供的人臉資訊被洩露,不法分子使用用戶的人臉資訊盜刷信用卡,給用戶造成財產損失。 為此,本發明的核心思想是,將顯示有用戶的臉部以及場景錨定對象的用戶圖像提交給區塊鏈進行存證,以證明用戶僅授權在目標場景下使用其人臉資訊。如此,如果用戶在目標場景下提供的人臉資訊被濫用於其他場景,用戶進行維權時並不會遭遇舉證難的問題。 為了使本領域技術人員更好地理解本說明書實施例中的技術方案,下面將結合本說明書實施例中的附圖,對本說明書實施例中的技術方案進行詳細地描述,顯然,所描述的實施例僅僅是本說明書的一部分實施例,而不是全部的實施例。基於本說明書中的實施例,本領域普通技術人員所獲得的所有其他實施例,都應當屬於保護的範圍。 以下結合附圖,詳細說明本說明書各實施例提供的技術方案。 圖1是本說明書實施例提供的一種基於區塊鏈對人臉資訊進行場景化存證的方法的流程示意圖,包括如下步驟: S100:當需要在目標場景下採集用戶的人臉資訊時,採集用戶圖像。 在本說明書實施例中,所述目標場景是指當前需要採集用戶的人臉資訊的業務場景。例如,用戶前往酒店辦理入住,酒店管理方需要採集用戶的人臉資訊進行身份驗證,此業務場景就可以是目標業務場景。 本方法的執行主體可以具有圖像採集功能與資料發送功能的設備,本文將之稱為處理設備。所述處理設備可以是用戶自己擁有的設備,也可以是所述目標場景提供的設備。此外,所述處理設備一般需要安裝與區塊鏈網路進行資料交互的客戶端。 所述用戶圖像是顯示有所述用戶的臉部與場景錨定對象的圖像,所述場景錨定對象用於證明所述用戶圖像是在所述目標場景下採集的。 所述用戶圖像一般是在所述用戶與所述場景錨定對象都位於採集範圍內時進行採集的。所述場景錨定對象可以是能夠證明所述用戶圖像是在所述目標場景下進行的採集的任何人或物。 例如,所述場景錨定對象可以是所述目標場景的管理人,例如酒店的大堂經理(佩戴有工作證,可確定無疑地證明大堂經理的身份)。 又如,所述場景錨定對象可以是用戶書寫的一張聲明,聲明具體為“本次人臉資訊採集僅用於本次酒店入住事宜”。 又如,具體地,所述場景錨定對象可以是展示有所述目標場景的相關資訊的展示設備。 以酒店入住場景為例。酒店可以在大堂擺設一台落地顯示螢幕,所述用戶到達酒店大堂請求辦理入住時,酒店管理方可以控制落地顯示螢幕顯示“用戶A於2019年1月20日到達酒店B辦理入住標準間205”。此落地顯示螢幕就是場景錨定對象。用戶可以與此落地顯示螢幕站在一起,由處理設備採集用戶圖像。 S102:將所述用戶圖像提交給區塊鏈網路進行存證。 處理設備可以透過安裝的區塊鏈客戶端,將所述用戶圖像提交到區塊鏈網路進行存證。 由於所述用戶圖像中顯示有用戶的臉部圖像以及場景錨定對象,而臉部圖像實際上包含有用戶的人臉資訊,因此也就實現了對用戶的人臉資訊進行場景化存證。 透過圖1所示的方法,當需要在目標場景下採集用戶的人臉資訊時,採集顯示有用戶的臉部與場景錨定對象的用戶圖像,然後對所述用戶圖像進行區塊鏈存證。如此,由於所述用戶圖像可以證明所述用戶僅授權在目標場景下使用自己的人臉資訊,因此,所述用戶圖像一旦被寫入區塊鏈,就相當於為後續可能出現的人臉資訊濫用事件提供可信的證據,降低所述用戶取證的難度。 此外,在步驟S102中,處理設備可以獲取當前的時間戳,然後將所述時間戳與所述用戶圖像綁定後提交給區塊鏈網路進行存證。如此,可以明確採集所述用戶圖像的時間,也就是明確所述用戶授權在目標場景下進行人臉採集的時間。 在本說明書實施例中,在目標場景下,對所述用戶進行身份驗證有以下兩種情況: 1、根據所述用戶圖像,確定所述用戶的人臉資訊,確定的人臉資訊用於對所述用戶進行身份驗證。具體地,可以從所述用戶圖像中截取所述用戶的臉部圖像,然後從臉部圖像中提取出所述用戶的人臉資訊。 進一步地,在步驟S102中,可以當確定所述用戶通過身份驗證時,才將所述用戶圖像提交給區塊鏈網路進行存證。 2、在採集用戶圖像之前,先採集用戶的人臉資訊進行身份驗證,如果用戶身份驗證通過進行身份驗證,則採集用戶圖像進行區塊鏈存證。 圖2是本說明書實施例提供的場景化存證示意圖。如圖2所示,如果用戶在目標場景下提供的人臉資訊被濫用於其他場景,用戶可以使用存證于區塊鏈中的用戶圖像向法院舉證,進行維權。 圖3是本說明書實施例提供的一種基於區塊鏈對人臉資訊進行場景化存證的裝置的結構示意圖,包括: 採集模組301,當需要在目標場景下採集用戶的人臉資訊時,採集用戶圖像;所述用戶圖像顯示有所述用戶的臉部與場景錨定對象,所述場景錨定對象用於證明所述用戶圖像是在所述目標場景下採集的; 存證模組302,將所述用戶圖像提交給區塊鏈網路進行存證。 所述場景錨定對象,具體包括: 展示有所述目標場景的相關資訊的展示設備。 所述存證模組302,獲取當前的時間戳;將所述時間戳與所述用戶圖像綁定後提交給區塊鏈網路進行存證。 所述裝置還包括: 人臉資訊確定模組303,根據所述用戶圖像,確定所述用戶的人臉資訊,用於對所述用戶進行身份驗證。 所述存證模組302,當確定所述用戶通過身份驗證時,將所述用戶圖像提交給區塊鏈網路進行存證。 所述裝置還包括: 身份驗證模組304,在採集用戶圖像之前,採集所述用戶的人臉資訊,並根據採集的人臉資訊對所述用戶進行身份驗證; 所述採集模組301,若所述用戶通過身份驗證,則採集用戶圖像。 本說明書實施例還提供一種計算機設備,其至少包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的計算機程式,其中,處理器執行所述程式時實現圖1所示方法的功能。 圖4示出了本說明書實施例所提供的一種更為具體的計算設備硬體結構示意圖,該設備可以包括:處理器1410、記憶體1420、輸入/輸出介面1430、通信介面1440和匯流排1450。其中處理器1410、記憶體1420、輸入/輸出介面1430和通信介面1440透過匯流排1450實現彼此之間在設備內部的通信連接。 處理器1410可以採用通用的CPU(Central Processing Unit,中央處理器)、微處理器、應用專用積體電路(Application Specific Integrated Circuit,ASIC)、或者一個或多個積體電路等方式實現,用於執行相關程式,以實現本說明書實施例所提供的技術方案。 記憶體1420可以採用ROM(Read Only Memory,唯讀記憶體)、RAM(Random Access Memory,隨機存取記憶體)、靜態儲存設備,動態儲存設備等形式實現。記憶體1420可以儲存操作系統和其他應用程式,在透過軟體或者韌體來實現本說明書實施例所提供的技術方案時,相關的程式代碼保存在記憶體1420中,並由處理器1410來調用執行。 輸入/輸出介面1430用於連接輸入/輸出模組,以實現資訊輸入及輸出。輸入輸出/模組可以作為組件配置在設備中(圖中未示出),也可以外接於設備以提供相應功能。其中輸入設備可以包括鍵盤、滑鼠、觸控螢幕、麥克風、各類傳感器等,輸出設備可以包括顯示器、揚聲器、振動器、指示燈等。 通信介面1440用於連接通信模組(圖中未示出),以實現本設備與其他設備的通信交互。其中通信模組可以透過有線方式(例如USB、網線等)實現通信,也可以透過無線方式(例如行動網路、WIFI、藍牙等)實現通信。 匯流排1450包括一通路,在設備的各個組件(例如處理器1410、記憶體1420、輸入/輸出介面1430和通信介面1440)之間傳輸資訊。 需要說明的是,儘管上述設備僅示出了處理器1410、記憶體1420、輸入/輸出介面1430、通信介面1440以及匯流排1450,但是在具體實施過程中,該設備還可以包括實現正常運行所必需的其他組件。此外,本領域的技術人員可以理解的是,上述設備中也可以僅包含實現本說明書實施例方案所必需的組件,而不必包含圖中所示的全部組件。 本說明書實施例還提供一種計算機可讀儲存媒體,其上儲存有計算機程式,該程式被處理器執行時實現圖1所示方法的功能。 計算機可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是計算機可讀指令、資料結構、程式的模組或其他資料。計算機的儲存媒體的例子包括,但不限於相變內存記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可編程唯讀記憶體(EEPROM)、快閃記憶體或其他內存記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備訪問的資訊。按照本文中的界定,計算機可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 透過以上的實施方式的描述可知,本領域的技術人員可以清楚地瞭解到本說明書實施例可借助軟體加必需的通用硬體平台的方式來實現。基於這樣的理解,本說明書實施例的技術方案本質上或者說對現有技術做出貢獻的部分可以以軟體產品的形式體現出來,該計算機軟體產品可以儲存在儲存媒體中,如ROM/RAM、磁碟、光碟等,包括若干指令用以使得一台計算機設備(可以是個人計算機,伺服器,或者網路設備等)執行本說明書實施例各個實施例或者實施例的某些部分所述的方法。 上述實施例闡明的系統、方法、模組或單元,具體可以由計算機芯片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為計算機,計算機的具體形式可以是個人計算機、膝上型計算機、蜂巢式電話、相機電話、智能電話、個人數位助理、媒體播放器、導航設備、電子郵件收發設備、遊戲控制台、平板計算機、可穿戴設備或者這些設備中的任意幾種設備的組合。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於方法和設備實施例而言,由於其基本相似於方法實施例,所以描述得比較簡單,相關之處參見方法實施例的部分說明即可。以上所描述的方法實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是物理上分開的,在實施本說明書實施例方案時可以把各模組的功能在同一個或多個軟體及/或硬體中實現。也可以根據實際的需要選擇其中的部分或者全部模組來實現本實施例方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。 以上所述僅是本說明書實施例的具體實施方式,應當指出,對於本技術領域的普通技術人員來說,在不脫離本說明書實施例原理的前提下,還可以做出若干改進和潤飾,這些改進和潤飾也應視為本說明書實施例的保護範圍。The user's face information collected in a certain scene may be abused by the collecting party in other scenes, endangering the user's property and credit safety. For example, the facial information provided by the user to the hotel during check-in is leaked, and criminals use the user's facial information to steal credit cards, causing property losses to the user. To this end, the core idea of the present invention is to submit the user image showing the user's face and the scene anchored object to the blockchain for storage to prove that the user is only authorized to use his face information in the target scene. In this way, if the face information provided by the user in the target scene is abused in other scenes, the user will not encounter difficulty in proof when defending rights. In order to enable those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be described in detail below in conjunction with the drawings in the embodiments of this specification. Obviously, the described implementation The examples are only a part of the embodiments of this specification, not all the embodiments. Based on the embodiments in this specification, all other embodiments obtained by a person of ordinary skill in the art should fall within the scope of protection. The technical solutions provided by the embodiments of this specification are described in detail below in conjunction with the drawings. Fig. 1 is a schematic flow chart of a method for scene-based storage of facial information based on blockchain according to an embodiment of this specification, including the following steps: S100: When the user's face information needs to be collected in the target scene, the user's image is collected. In the embodiment of this specification, the target scene refers to a business scene in which facial information of a user needs to be collected currently. For example, if a user goes to a hotel to check in, the hotel manager needs to collect the user's face information for identity verification. This business scenario can be the target business scenario. The execution subject of this method can be a device with image acquisition function and data transmission function, which is referred to as processing device in this article. The processing device may be a device owned by the user, or a device provided by the target scene. In addition, the processing equipment generally needs to install a client for data interaction with the blockchain network. The user image is an image showing the face of the user and a scene anchor object, and the scene anchor object is used to prove that the user image is collected in the target scene. The user image is generally collected when both the user and the scene anchored object are within the collection range. The scene anchoring object may be any person or thing that can prove that the user image is collected in the target scene. For example, the scene anchor object may be a manager of the target scene, such as a lobby manager of a hotel (worn with a work card, which can definitely prove the identity of the lobby manager). For another example, the scene anchor object may be a statement written by the user, and the statement is specifically "This face information collection is only used for this hotel stay." For another example, specifically, the scene anchor object may be a display device that displays relevant information of the target scene. Take the hotel check-in scenario as an example. The hotel can set up a floor-to-ceiling display screen in the lobby. When the user arrives at the hotel lobby to request check-in, the hotel manager can control the floor-to-ceiling display screen to display "User A arrives at Hotel B on January 20, 2019 to check in standard room 205" . This landing screen is the anchoring object of the scene. The user can stand with this floor-to-ceiling display screen, and the processing equipment collects user images. S102: Submit the user image to the blockchain network for storage. The processing device can submit the user image to the blockchain network for storage through the installed blockchain client. Since the user image displays the user's face image and the scene anchor object, and the face image actually contains the user's face information, the user's face information is scened. Deposit evidence. Through the method shown in Figure 1, when the user's face information needs to be collected in the target scene, the user image showing the user's face and the scene anchor object is collected, and then the user image is blockchain-chained Deposit evidence. In this way, since the user image can prove that the user is only authorized to use his face information in the target scene, once the user image is written into the blockchain, it is equivalent to the person who may appear in the future. The Facebook abuse incident provides credible evidence and reduces the difficulty of obtaining evidence for the user. In addition, in step S102, the processing device may obtain the current timestamp, and then bind the timestamp with the user image and submit it to the blockchain network for verification. In this way, the time when the user image is collected can be clarified, that is, the time when the user is authorized to collect the face in the target scene. In the embodiment of this specification, in the target scenario, the user is authenticated in the following two situations: 1. Determine the face information of the user according to the user image, and the determined face information is used to authenticate the user. Specifically, the facial image of the user can be intercepted from the user image, and then the facial information of the user can be extracted from the facial image. Further, in step S102, when it is determined that the user passes the identity verification, the user image can be submitted to the blockchain network for verification. 2. Before collecting the user's image, first collect the user's face information for identity verification. If the user's identity is verified, the user's image is collected for blockchain storage. Fig. 2 is a schematic diagram of a scenario-based evidence storage provided by an embodiment of this specification. As shown in Figure 2, if the face information provided by the user in the target scene is abused in other scenes, the user can use the user's image stored in the blockchain to provide evidence to the court for rights protection. Fig. 3 is a schematic structural diagram of a device for scene-based storage of facial information based on blockchain according to an embodiment of the present specification, including: The collection module 301 collects a user image when it needs to collect the user's face information in the target scene; the user image displays the user's face and the scene anchor object, and the scene anchor object is used for To prove that the user image was collected in the target scene; The deposit certificate module 302 submits the user image to the blockchain network for deposit certificate. The scene anchor object specifically includes: A display device displaying relevant information of the target scene. The certification module 302 obtains the current time stamp; binds the time stamp with the user image and submits it to the blockchain network for certification. The device also includes: The facial information determining module 303 determines the facial information of the user according to the user image, and is used to authenticate the user. The certification module 302, when it is determined that the user passes the identity verification, submits the user image to the blockchain network for certification. The device also includes: The identity verification module 304 collects face information of the user before collecting the user image, and performs identity verification on the user according to the collected face information; The collection module 301 collects user images if the user passes the identity verification. The embodiment of this specification also provides a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor executes the program to implement the method shown in FIG. 1 Function. 4 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification. The device may include a processor 1410, a memory 1420, an input/output interface 1430, a communication interface 1440, and a bus 1450. . The processor 1410, the memory 1420, the input/output interface 1430 and the communication interface 1440 realize the communication connection between each other within the device through the bus 1450. The processor 1410 may be implemented by a general CPU (Central Processing Unit, central processing unit), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc., for Execute related programs to realize the technical solutions provided in the embodiments of this specification. The memory 1420 can be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory), static storage device, dynamic storage device, etc. The memory 1420 can store the operating system and other application programs. When the technical solutions provided in the embodiments of this specification are implemented through software or firmware, the relevant program codes are stored in the memory 1420 and called and executed by the processor 1410. . The input/output interface 1430 is used for connecting input/output modules to realize information input and output. The input/output/module can be configured in the device as a component (not shown in the figure), or can be connected to the device to provide corresponding functions. The input devices may include keyboards, mice, touch screens, microphones, various sensors, etc., and output devices may include displays, speakers, vibrators, indicator lights, and so on. The communication interface 1440 is used to connect a communication module (not shown in the figure) to implement communication interaction between the device and other devices. The communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.). The bus 1450 includes a path for transmitting information between various components of the device (such as the processor 1410, the memory 1420, the input/output interface 1430, and the communication interface 1440). It should be noted that although the above device only shows the processor 1410, the memory 1420, the input/output interface 1430, the communication interface 1440, and the bus 1450, in the specific implementation process, the device may also include a device for normal operation. Other required components. In addition, those skilled in the art can understand that the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than all the components shown in the figures. The embodiment of the specification also provides a computer-readable storage medium on which a computer program is stored, and the program is executed by a processor to realize the functions of the method shown in FIG. 1. Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM). ), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory memory technology, read-only CD-ROM (CD-ROM), digital multi Functional optical discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. From the description of the above embodiments, those skilled in the art can clearly understand that the embodiments of this specification can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the embodiments of this specification can be embodied in the form of software products, which can be stored in storage media, such as ROM/RAM, magnetic A disc, an optical disc, etc., include a number of instructions to make a computer device (which can be a personal computer, a server, or a network device, etc.) execute the methods described in the various embodiments or some parts of the embodiments of this specification. The systems, methods, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet computer, a wearable device, or a combination of any of these devices. The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the method and device embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiments. The method embodiments described above are merely illustrative. The modules described as separate components may or may not be physically separated. When implementing the solutions of the embodiments of this specification, the functions of the modules can be Implemented in the same one or more software and/or hardware. It is also possible to select some or all of the modules according to actual needs to achieve the objectives of the solutions of the embodiments. Those of ordinary skill in the art can understand and implement it without creative work. The above are only specific implementations of the embodiments of this specification. It should be pointed out that for those of ordinary skill in the art, without departing from the principle of the embodiments of this specification, several improvements and modifications can be made. These Improvements and modifications should also be regarded as the protection scope of the embodiments of this specification.

301:採集模組 302:存證模組 303:臉資訊確定模組 304:身份驗證模組 1410:處理器 1420:記憶體 1430:輸入/輸出介面 1440:通信介面 1450:匯流排301: Acquisition Module 302: Deposit Module 303: Face Information Confirmation Module 304: Identity Verification Module 1410: processor 1420: memory 1430: input/output interface 1440: Communication interface 1450: bus

為了更清楚地說明本說明書實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的附圖作簡單地介紹,顯而易見地,下面描述中的附圖僅僅是本說明書實施例中記載的一些實施例,對於本領域普通技術人員來講,還可以根據這些附圖獲得其他的附圖。 圖1是本說明書實施例提供的一種基於區塊鏈對人臉資訊進行場景化存證的方法的流程示意圖; 圖2是本說明書實施例提供的對人臉資訊進行場景化存證的示意圖; 圖3是本說明書實施例提供的一種基於區塊鏈對人臉資訊進行場景化存證的裝置的結構示意圖; 圖4是用於配置本說明書實施例裝置的一種計算機設備的結構示意圖。In order to more clearly describe the technical solutions in the embodiments of this specification or the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the drawings in the following description are merely present For some of the embodiments described in the embodiments of the specification, for those of ordinary skill in the art, other drawings may be obtained from these drawings. FIG. 1 is a schematic flowchart of a method for scene-based evidence storage of face information based on blockchain according to an embodiment of this specification; FIG. 2 is a schematic diagram of scene-based storage of facial information provided by an embodiment of this specification; 3 is a schematic structural diagram of a device for scene-based storage of facial information based on blockchain according to an embodiment of this specification; Fig. 4 is a schematic structural diagram of a computer device used to configure the device in the embodiment of this specification.

Claims (13)

一種基於區塊鏈對人臉資訊進行場景化存證的方法,包括: 當需要在目標場景下採集用戶的人臉資訊時,採集用戶圖像;該用戶圖像顯示有該用戶的臉部與場景錨定對象,該場景錨定對象用於證明該用戶圖像是在該目標場景下採集的; 將該用戶圖像提交給區塊鏈網路進行存證。A method for scene-based storage of facial information based on blockchain includes: When it is necessary to collect the user's face information in the target scene, collect the user image; the user image shows the user's face and the scene anchor object, and the scene anchor object is used to prove that the user image is in Collected in the target scene; Submit the user's image to the blockchain network for storage. 如申請專利範圍第1項所述的方法,該場景錨定對象,具體包括: 展示有該目標場景的相關資訊的展示設備。As in the method described in item 1 of the scope of patent application, the scene anchoring object specifically includes: A display device that displays relevant information about the target scene. 如申請專利範圍第1項所述的方法,將該用戶圖像提交給區塊鏈網路進行存證,具體包括: 獲取當前的時間戳; 將該時間戳與該用戶圖像綁定後提交給區塊鏈網路進行存證。For example, the method described in item 1 of the scope of patent application, submitting the user's image to the blockchain network for certification, specifically includes: Get the current timestamp; The timestamp is bound to the user image and submitted to the blockchain network for storage. 如申請專利範圍第1項所述的方法,該方法還包括: 根據該用戶圖像,確定該用戶的人臉資訊,用於對該用戶進行身份驗證。As the method described in item 1 of the scope of patent application, the method also includes: According to the image of the user, the face information of the user is determined, which is used to authenticate the user. 如申請專利範圍第4項所述的方法,將該用戶圖像提交給區塊鏈網路進行存證,具體包括: 當確定該用戶通過身份驗證時,將該用戶圖像提交給區塊鏈網路進行存證。For example, the method described in item 4 of the scope of patent application, submitting the user's image to the blockchain network for storage, specifically includes: When it is determined that the user passes the identity verification, the user image is submitted to the blockchain network for storage. 如申請專利範圍第1項所述的方法,在採集用戶圖像之前,該方法還包括: 採集該用戶的人臉資訊,並根據採集的人臉資訊對該用戶進行身份驗證; 採集用戶圖像,具體包括: 若該用戶通過身份驗證,則採集用戶圖像。As the method described in item 1 of the scope of patent application, before collecting user images, the method also includes: Collect the face information of the user, and authenticate the user based on the collected face information; Collect user images, including: If the user is authenticated, the user image is collected. 一種基於區塊鏈對人臉資訊進行場景化存證的裝置,包括: 採集模組,當需要在目標場景下採集用戶的人臉資訊時,採集用戶圖像;該用戶圖像顯示有該用戶的臉部與場景錨定對象,該場景錨定對象用於證明該用戶圖像是在該目標場景下採集的; 存證模組,將該用戶圖像提交給區塊鏈網路進行存證。A device for scene-based storage of facial information based on blockchain includes: The collection module, when it is necessary to collect the user's face information in the target scene, collect the user image; the user image shows the user's face and the scene anchor object, and the scene anchor object is used to prove the user The image is collected in the target scene; The deposit certificate module submits the user image to the blockchain network for deposit certificate. 如申請專利範圍第7項所述的裝置,該場景錨定對象,具體包括: 展示有該目標場景的相關資訊的展示設備。As for the device described in item 7 of the scope of patent application, the scene anchored object specifically includes: A display device that displays relevant information about the target scene. 如申請專利範圍第7項所述的裝置,該存證模組,獲取當前的時間戳;將該時間戳與該用戶圖像綁定後提交給區塊鏈網路進行存證。For the device described in item 7 of the scope of patent application, the storage module obtains the current time stamp; binds the time stamp with the user image and submits it to the blockchain network for storage. 如申請專利範圍第7項所述的裝置,該裝置還包括: 人臉資訊確定模組,根據該用戶圖像,確定該用戶的人臉資訊,用於對該用戶進行身份驗證。As the device described in item 7 of the scope of patent application, the device also includes: The face information determining module determines the face information of the user according to the user image, which is used to authenticate the user. 如申請專利範圍第10項所述的裝置,該存證模組,當確定該用戶通過身份驗證時,將該用戶圖像提交給區塊鏈網路進行存證。Such as the device described in item 10 of the scope of patent application, the storage module, when it is determined that the user passes the identity verification, submits the user image to the blockchain network for storage. 如申請專利範圍第1項所述的方法,該裝置還包括: 身份驗證模組,在採集用戶圖像之前,採集該用戶的人臉資訊,並根據採集的人臉資訊對該用戶進行身份驗證; 該採集模組,若該用戶通過身份驗證,則採集用戶圖像。As the method described in item 1 of the scope of patent application, the device also includes: The identity verification module collects the user’s face information before collecting the user’s image, and performs identity verification on the user based on the collected face information; The collection module collects user images if the user passes identity verification. 一種計算機設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的計算機程式,其中,該處理器執行該程式時實現如申請專利範圍第1~6項任一項所述的方法。A computer device, including a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor executes the program as described in any one of items 1 to 6 of the scope of patent application The method described.
TW108132022A 2019-01-31 2019-09-05 Method and device for scene-based storage of facial information based on blockchain TWI710971B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910100762.1A CN110020590A (en) 2019-01-31 2019-01-31 The method and device that card is deposited in displaying is carried out to face information based on block chain
CN201910100762.1 2019-01-31

Publications (2)

Publication Number Publication Date
TW202036376A true TW202036376A (en) 2020-10-01
TWI710971B TWI710971B (en) 2020-11-21

Family

ID=67189003

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108132022A TWI710971B (en) 2019-01-31 2019-09-05 Method and device for scene-based storage of facial information based on blockchain

Country Status (3)

Country Link
CN (1) CN110020590A (en)
TW (1) TWI710971B (en)
WO (1) WO2020155839A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020590A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 The method and device that card is deposited in displaying is carried out to face information based on block chain
CN110580415A (en) * 2019-08-14 2019-12-17 阿里巴巴集团控股有限公司 Individual resume information output method and device based on block chain
CN110991253B (en) * 2019-11-08 2023-04-28 中国联合网络通信集团有限公司 Face digital identity recognition method and device based on blockchain
CN111339203B (en) * 2020-02-28 2023-07-14 北京金和网络股份有限公司 Block chain data acquisition method, device and system
DE102020123105A1 (en) 2020-09-04 2022-03-10 GRID INVENT gGmbH traffic system
DE102020123107A1 (en) 2020-09-04 2022-03-10 GRID INVENT gGmbH Authentication element to identify a user
DE102020123106A1 (en) 2020-09-04 2022-03-10 GRID INVENT gGmbH cellular system

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015112108A1 (en) * 2012-11-28 2015-07-30 Visa International Service Association Multi disparate gesture actions and transactions apparatuses, methods and systems
TW201519649A (en) * 2013-11-01 2015-05-16 Alpha Networks Inc Method to accelerate history playback and event locking for network video recorder
TWI552591B (en) * 2015-08-24 2016-10-01 晶睿通訊股份有限公司 Method for tagging an object in video, device and computer-readable medium
US10541818B2 (en) * 2017-04-19 2020-01-21 International Business Machines Corporation Decentralized biometric signing of digital contracts
CN107170068B (en) * 2017-05-18 2019-08-30 中冶华天工程技术有限公司 Movable attendance checking method based on scene and image recognition
CN108347444A (en) * 2018-02-26 2018-07-31 深圳智乾区块链科技有限公司 Identity identifying method, device based on block chain and computer readable storage medium
CN108650231B (en) * 2018-04-04 2021-02-26 广州广电运通金融电子股份有限公司 Block chain-based biological feature acquisition method and system
CN108717431A (en) * 2018-05-11 2018-10-30 中国科学院软件研究所 A kind of electronic evidence based on block chain deposits card, verification method and system
CN108629337A (en) * 2018-06-11 2018-10-09 深圳市益鑫智能科技有限公司 A kind of face recognition door control system based on block chain
CN109255256A (en) * 2018-08-10 2019-01-22 新华三云计算技术有限公司 Distributed attendance record storage method, device and network node
CN109189962B (en) * 2018-08-17 2021-12-21 福建南威软件有限公司 License service implementation system based on block chain
CN108986479A (en) * 2018-09-19 2018-12-11 浙江甬力区块链科技有限公司 Break in traffic rules and regulations processing system and its processing method based on block chain technology
CN110020590A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 The method and device that card is deposited in displaying is carried out to face information based on block chain

Also Published As

Publication number Publication date
TWI710971B (en) 2020-11-21
CN110020590A (en) 2019-07-16
WO2020155839A1 (en) 2020-08-06

Similar Documents

Publication Publication Date Title
TWI710971B (en) Method and device for scene-based storage of facial information based on blockchain
CN108696514B (en) Resource collection task management method, device, storage medium and system
US10664613B2 (en) Virtualization input component
CN108965250B (en) Digital certificate installation method and system
US20200294293A1 (en) Persistent augmented reality objects
US12088566B2 (en) User inviting method and apparatus, computer device, and computer-readable storage medium
CN111340482B (en) Conflict detection method, device, node equipment and storage medium
CN111080443B (en) Block chain-based service processing method, device, equipment and storage medium
CN109804376A (en) User and equipment certification for web application
JP2016540308A (en) Authentication system
WO2021169382A1 (en) Link test method and apparatus, electronic device and storage medium
Mehrnezhad et al. Tap-tap and pay (TTP): Preventing the mafia attack in NFC payment
CN110084034A (en) A kind of cipher set-up method, storage medium and electronic equipment based on weak passwurd detection
CN111339086A (en) Block processing method, and data query method and device based on block chain
WO2023241060A1 (en) Data access method and apparatus
CN105868970A (en) Authentication method and electronic device
US20160283709A1 (en) Pattern-based password with dynamic shape overlay
US20220164789A1 (en) Location based wallets
US11074351B2 (en) Location specific identity verification system
CN111212074B (en) Blockchain-based qualification identification method, device, equipment and storage medium
CN110597906A (en) Block chain-based entrance integral generation method, device, equipment and storage medium
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN110033188A (en) Business scheduling method, device, calculating equipment and medium based on block chain
WO2019041782A1 (en) Control method for use of object, authentication device, terminal device, and system
CN110659975B (en) Resource transfer method, device, equipment and storage medium based on block chain