Block chain-based access control management method and device and access control equipment

A management method and blockchain technology, applied in the field of access control equipment and access control management based on blockchain, can solve the problems of privacy information leakage and high requirements on the network speed of equipment terminals, achieve efficient transmission, reduce network traffic usage, avoid The effect of personal privacy leakage

Pending Publication Date: 2021-10-19
SHENZHEN QINLIN TECH
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the existing technology is that face photos are sensitive information, and there is a risk of privacy information leakag...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based access control management method and device and access control equipment
  • Block chain-based access control management method and device and access control equipment
  • Block chain-based access control management method and device and access control equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] An example of this application, such as figure 1 As shown, a blockchain-based access control management method includes the following steps:

[0065] S100: Acquire a user face image.

[0066] When the user requests to open the access control, the access control device starts its own face acquisition unit, for example, a camera, uses the camera to acquire the current user's face image, and judges whether the acquired user's face image meets the requirements, for example, whether it is covered by sunglasses, masks Wait for the blocking object to block, if the acquired user's face image is not blocked and the picture is clear, then execute step S200.

[0067] S200: Extract a corresponding feature value matrix of the user's face image from the user's face image.

[0068] Since the face eigenvalue matrix is ​​irreversible (that is, the face eigenvalue matrix obtained by the knowledge-based extraction method and the algebraic feature-based extraction method cannot be restor...

Embodiment 2

[0083] Furthermore, an embodiment of the present application also proposes to delete the user's face image immediately after the access control device obtains the user's face image and extracts the corresponding user's face image eigenvalue matrix from the user's face image. The access control device only stores the eigenvalue matrix of the face image, and does not save the user's face image. On the one hand, it can avoid the face image from occupying too much memory, and a smaller storage module can be set for the access control device to reduce the hardware cost of the access control device. On the other hand, the user's face image is immediately deleted, and the eigenvalue matrix of the face image stored in the access control device is irreversibly restored to the face, thereby effectively preventing the leakage of the user's face information.

Embodiment 3

[0085] An example of this application, such as figure 2 As shown, a blockchain-based access control management device 10 is proposed including: an acquisition module 11 , an extraction module 12 , a comparison module 13 and a control module 14 .

[0086]Obtaining module 11, is used for obtaining user's face image; Extraction module 12, is used for extracting corresponding user's face image eigenvalue matrix from described user's face image; Comparison module 13, is used for described user's face The image eigenvalue matrix is ​​compared with each pre-stored face image eigenvalue matrix in the local library to obtain the first comparison result; it is also used to compare the hash value corresponding to the user's face image eigenvalue matrix with the block chain The respective hash values ​​corresponding to the local library stored in are compared to obtain the second comparison result; the control module 14 is used to control the opening or closing of the gate according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control management method and device based on a block chain and access control equipment. When a user requests to open an access control, a face image is not transmitted by using a network, so that the leakage of personal privacy is avoided, the network traffic use of Internet of Things equipment is greatly reduced, the 4G/5G traffic cost is reduced, and the transmission is more efficient; in addition, when the user requests to open the access control, an access control system verifies whether the user is legal or not, meanwhile, the block chain is used for conducting dual verification on the user, the safe passing of the user can be guaranteed, verification and troubleshooting can be conducted on a local library of the access control equipment, and the safety of the whole access control system is effectively improved.

Description

technical field [0001] The present invention relates to the field of intelligent traffic control, in particular to a block chain-based access control management method, device and access control equipment. Background technique [0002] The principle of face recognition in the existing access control system: the background system enters the basic information of the user, and sends the user's face photo to the device terminal, and the device terminal downloads the picture from the cloud and stores it locally on the device. According to the face recognition algorithm, it is judged whether the face photographed on the scene matches the local database, and if the match is successful, the device terminal is controlled to open the door. The disadvantages of the existing technology are: face photos are sensitive information, and there is a risk of privacy information leakage during network transmission. Moreover, since the device terminal needs to download photos, the network speed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/37G07C9/38G06K9/00G06F16/27G06F21/64
CPCG07C9/37G07C9/38G06F16/27G06F21/64
Inventor 官轲张亲
Owner SHENZHEN QINLIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products