Community security application method based on block chain and portrait recognition technology
A portrait recognition and application method technology, applied in the Internet field, can solve the problems of complete data leakage, increase and stop of malicious data tampering, etc., to improve data security, enhance legal effectiveness, and reduce data leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] The citizen identity information management module first performs modeling operations on citizens, and provides a unique ID for each citizen information in the system for identification. The citizen image information management module collects images of citizens from various front-end devices, and then binds the images with the corresponding citizen information through the existing face recognition algorithm. When binding, information such as image acquisition time stamp and location are attached. This part of the information and the citizen access record information obtained by the citizen trajectory analysis data management module are encrypted in a specific way and stored in the blockchain. Utilizing the distributed deployment, decentralization, non-tampering and infinite traceability of the blockchain, the system depicts a complete trajectory of citizens' activities through the records of citizens' trajectories at different times.
Embodiment 2
[0028] Citizen information needs to be modeled first. Then through the online consumption record management module, citizen payment information and citizen identity information are combined to integrate the payment method, payment account number, flow, order information, time stamp, location, etc. of each transaction of citizens. If citizens pay by swiping their faces, information such as the image comparison results at that time will also be added. A complete transaction record is formed and stored in the blockchain through specific encryption technology. Utilize the distributed deployment, decentralization, non-tampering and infinite traceability of the blockchain to form a complete historical record of citizen transaction activities.
[0029] Such as Figure 1-2 , the implementation method of the present invention is divided into three processes, which are respectively the in-chain processes of three different records of citizen pictures, access control records, and trans...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

