Unlock instant, AI-driven research and patent intelligence for your innovation.

Community security application method based on block chain and portrait recognition technology

A portrait recognition and application method technology, applied in the Internet field, can solve the problems of complete data leakage, increase and stop of malicious data tampering, etc., to improve data security, enhance legal effectiveness, and reduce data leakage.

Pending Publication Date: 2021-01-19
广东金杭科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. In terms of data management in traditional smart communities or digital communities, they basically stay in the storage and management of data through centralized server clusters. There is a high risk of data security management. In the case of hacker attacks or insufficient management and monitoring , the data is likely to be completely leaked or lost, resulting in irreparable data loss
[0005] 2. As described in the first point, due to the centralized storage and management of traditional data, the probability of data being maliciously tampered with will also be greatly increased
In terms of management, it is easy for data sources to be tampered or deleted by hackers or other personnel. To a certain extent, the legality and security of data cannot be effectively guaranteed, resulting in a series of social and legal problems.
[0006] 3. The construction of traditional smart communities or digital communities is too independent in design, and the above-mentioned data storage management is too centralized. When there is a network link failure, power supply problem or server failure of the data storage cluster, the overall system and practical services will immediately affected or even stopped
In this way, the stability of the entire service system is quite fragile, which will greatly affect the user's willingness to use the platform, thereby affecting the construction and marketing promotion of smart communities or digital communities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Community security application method based on block chain and portrait recognition technology
  • Community security application method based on block chain and portrait recognition technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] The citizen identity information management module first performs modeling operations on citizens, and provides a unique ID for each citizen information in the system for identification. The citizen image information management module collects images of citizens from various front-end devices, and then binds the images with the corresponding citizen information through the existing face recognition algorithm. When binding, information such as image acquisition time stamp and location are attached. This part of the information and the citizen access record information obtained by the citizen trajectory analysis data management module are encrypted in a specific way and stored in the blockchain. Utilizing the distributed deployment, decentralization, non-tampering and infinite traceability of the blockchain, the system depicts a complete trajectory of citizens' activities through the records of citizens' trajectories at different times.

Embodiment 2

[0028] Citizen information needs to be modeled first. Then through the online consumption record management module, citizen payment information and citizen identity information are combined to integrate the payment method, payment account number, flow, order information, time stamp, location, etc. of each transaction of citizens. If citizens pay by swiping their faces, information such as the image comparison results at that time will also be added. A complete transaction record is formed and stored in the blockchain through specific encryption technology. Utilize the distributed deployment, decentralization, non-tampering and infinite traceability of the blockchain to form a complete historical record of citizen transaction activities.

[0029] Such as Figure 1-2 , the implementation method of the present invention is divided into three processes, which are respectively the in-chain processes of three different records of citizen pictures, access control records, and trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a community security application method based on a block chain and a portrait recognition technology, and the method comprises the following steps that a citizen identity information management module carries out modeling operation of a citizen, and provides a unique ID for each citizen information in a system for identification; the citizen image information management module collects images of citizens from various front-end devices, then binds the images with corresponding citizen information through an existing face recognition algorithm, encrypts citizen access control record information obtained by the timestamp, place and citizen trajectory analysis data management module in a specific mode and stores the citizen access control record information in a block chain. The system depicts a complete citizen activity track through track records of citizens at different time. According to the invention, the blockchain technology is combined with the citizen identity information security management service, the data security and legality of the citizen identity information are improved, the blockchain technology is combined with the citizen transaction paymentsecurity service, and structured processing is carried out on the daily transaction data of the citizens.

Description

technical field [0001] The invention relates to the field of Internet technology, in particular to a community security application method based on block chain and portrait recognition technology. Background technique [0002] In recent years, "Internet + community service" has become a trend in the construction and development of smart communities. With the development of blockchain technology, the smart community service model of "blockchain + community service" has been gradually applied. The "blockchain + community service" service model uses blockchain and big data as an important starting point to solve the information security issues associated with open data sharing and community public concerns about privacy and confidentiality. While providing community management capabilities, this service model ensures the accuracy of personal privacy data and prevents it from being stolen, and strengthens the robustness of the overall community service system. [0003] Defects...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/64G06Q50/16G06F21/32
CPCG06F21/64G06F21/602G06Q50/163G06F21/32
Inventor 吴建忠
Owner 广东金杭科技有限公司