CN111198928A - Road damage information authentication method and system based on block chain technology - Google Patents

Road damage information authentication method and system based on block chain technology Download PDF

Info

Publication number
CN111198928A
CN111198928A CN202010009476.7A CN202010009476A CN111198928A CN 111198928 A CN111198928 A CN 111198928A CN 202010009476 A CN202010009476 A CN 202010009476A CN 111198928 A CN111198928 A CN 111198928A
Authority
CN
China
Prior art keywords
information
damage
road
authentication
damage information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010009476.7A
Other languages
Chinese (zh)
Inventor
邹复民
罗思杰
廖律超
郭峰
蔡祈钦
温金娟
张茂林
黄龙云
石志猛
甘振华
胡蓉
朱铨
许伟辉
吴鑫珂
林金梅
吴忠营
陈灏彬
陈子瑜
吴金山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian University of Technology
Original Assignee
Fujian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian University of Technology filed Critical Fujian University of Technology
Priority to CN202010009476.7A priority Critical patent/CN111198928A/en
Publication of CN111198928A publication Critical patent/CN111198928A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Remote Sensing (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method and a system for road damage information authentication based on a block chain technology, wherein the method comprises the following steps: when a road is found to be damaged, the terminal collects address information and damage information of the road; the terminal annotates the abnormal information and sends the annotation, the address information and the abnormal information to each node on the block chain for authentication; and the block link point authenticates the damage information according to the annotation and the address information, feeds back authentication information, and authenticates the damage information as damaged if the number of the damages in the authentication information exceeds a preset number threshold. The authentication of the damage information of the road is jointly participated by the plurality of nodes on the block chain, and the accuracy and the timeliness of the authentication of the damage information are guaranteed.

Description

Road damage information authentication method and system based on block chain technology
Technical Field
The application belongs to the field of block chains, and particularly relates to a method and a system for road damage information authentication based on a block chain technology.
Background
The road is a carrier for people to travel, and any pedestrian or vehicle can walk only by the road. If the road has appeared damaging, if the road appears pot hole, crack, unsmooth etc. all will cause the influence to the trip of pedestrian, vehicle, when the road appears damaging, people usually can not timely judgement, can only rely on professional's inspection to confirm, this has caused the difficulty to the promptness of road damage authentication.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a road damage information authentication method and system based on a block chain technology.
In a first aspect, a method for road damage information authentication based on a block chain technology is provided, including:
when a road is found to be damaged, the terminal collects address information and damage information of the road;
the terminal annotates the abnormal information and sends the annotation, the address information and the abnormal information to each node on the block chain for authentication;
and the block link point authenticates the damage information according to the annotation and the address information, feeds back authentication information, and authenticates the damage information as damaged if the number of the damages in the authentication information exceeds a preset number threshold.
In one possible implementation manner, the acquiring address information and damage information of the road includes:
starting a vehicle-mounted terminal through voice, and acquiring the address information and the damage information through the vehicle-mounted terminal; and/or the presence of a gas in the gas,
and collecting the address information and the damage information by using a mobile terminal.
In another possible implementation manner, the damage information is in the form of one or more of picture information, video information and voice information.
In yet another possible implementation, the annotations are text annotations or voice annotations.
In yet another possible implementation, the damage information includes: ground depressions, ground cracks, and ground bumps.
In a second aspect, a system for road damage information authentication based on a block chain technology is provided, including:
the terminal is used for acquiring the address information and the damage information of the road, annotating the abnormal information and sending the annotation, the address information and the abnormal information to each node on the block chain for authentication when the road is found to be damaged;
and the block chain node is used for authenticating the damage information according to the annotation and the address information and feeding back authentication information, and if the number of the damages in the authentication information is considered to exceed a preset number threshold, the damage information is authenticated as the damages.
In one possible implementation manner, the acquiring address information and damage information of the road includes:
starting a vehicle-mounted terminal through voice, and acquiring the address information and the damage information through the vehicle-mounted terminal; and/or the presence of a gas in the gas,
and collecting the address information and the damage information by using a mobile terminal.
In yet another possible implementation, the damage information is in the form of one or more of picture information, video information, and voice information.
In yet another possible implementation, the annotations are text annotations or voice annotations.
In yet another possible implementation, the damage information includes: ground depressions, ground cracks, and ground bumps.
The beneficial effect that technical scheme that this application provided brought is: the method and the system ensure that the authentication of the damage information of the road is participated by a plurality of nodes on the block chain together, and ensure the accuracy and timeliness of the authentication of the damage information.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a flowchart of a method for road damage information authentication based on a block chain technique according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a system for road damage information authentication based on a block chain technique according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar modules or modules having the same or similar functionality throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, modules, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, modules, components, and/or groups thereof. It will be understood that when a module is referred to as being "connected" or "coupled" to another module, it can be directly connected or coupled to the other module or intervening modules may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The technical solutions of the present application and the technical solutions of the present application, for example, to solve the above technical problems, will be described in detail with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
Fig. 1 is a flowchart illustrating a method for road damage information authentication based on a block chain technique according to an embodiment of the present invention, including:
and S101, when the road is found to be damaged, the terminal collects address information and damage information of the road.
In the embodiment of the present invention, when a person walks on a road or moves on a road using a vehicle, damage information of the road is sensed, and the damage information includes, but is not limited to: ground depressions, ground cracks, and ground bumps. When the road is found to be damaged, the damage information and the address information corresponding to the damage information are collected through equipment.
The collecting the address information and the damage information of the road comprises the following steps:
starting a vehicle-mounted terminal through voice, and acquiring the address information and the damage information through the vehicle-mounted terminal; and/or the presence of a gas in the gas,
and collecting the address information and the damage information by using a mobile terminal.
When the vehicle-mounted mobile terminal is used for walking on a road, the vehicle-mounted mobile terminal is not provided, so that the address information and the damage information can be acquired by using the portable mobile terminal, and the shooting angle can be adjusted through terminal acquisition, so that the acquired damage information of the road is more accurate. And if the vehicle is used for moving, the mobile terminal can be used for collecting the address information and the damage information, and the vehicle-mounted terminal can be started through voice and is used for collecting the address information and the damage information.
The damage information may be in the form of one or more of picture information, video information, and voice information.
And 102, annotating the abnormal information by the terminal, and sending the annotation, the address information and the abnormal information to each node on the block chain for authentication.
In the embodiment of the present invention, each node on the blockchain, that is, a person who can observe and authenticate the road corresponding to the address information, may be a pedestrian who often passes through the road, and may also be a person who can implement authentication, such as a traffic police. The collected damage information may not clearly indicate the damage condition, so the collector can annotate the damage information and send the damage information, together with the address information and the annotation, to each node on the block chain for authentication.
The annotations are text annotations and/or voice annotations.
And step S103, the block link points authenticate the damage information according to the annotation and the address information, feed back authentication information, and authenticate the damage information as damaged if the number of the damage in the authentication information exceeds a preset number threshold.
In the embodiment of the invention, after receiving the annotation, the address information and the damage information, each node on the blockchain can carry out damage authentication according to the address information, the authentication result is uploaded after the authentication is finished, and if the number of the damaged nodes exceeds the preset number threshold value after the authentication, the damaged nodes are confirmed to be damaged.
It should be noted that the quantity threshold may be set according to actual needs, and the invention does not limit the quantity threshold. Preferably, the quantity threshold is greater than or equal to 60%.
According to the embodiment of the invention, when the road damage is found, the damage information and the address information are collected, the damage information is annotated and uploaded to each node on the block chain, the block chain link points authenticate the damage information, and if the damage authentication exceeds the preset number threshold, the damage information is confirmed, so that the authentication of the road damage information is participated by a plurality of nodes on the block chain, and the accuracy and timeliness of the damage information authentication are ensured.
Example two
Fig. 2 is a block diagram of a system for road damage information authentication based on a blockchain technique according to an embodiment of the present invention, where the system includes:
and the terminal 201 is used for acquiring the address information and the damage information of the road, annotating the abnormal information and sending the annotation, the address information and the abnormal information to each node on the block chain for authentication when the road is found to be damaged.
And the block link node 202 is used for authenticating the damage information according to the annotation and the address information and feeding back authentication information, and if the number of the damages in the authentication information is considered to exceed a preset number threshold, the damage information is authenticated as damaged.
In the embodiment of the present invention, when a person walks on a road or moves on a road using a vehicle, damage information of the road is sensed, and the damage information includes, but is not limited to: ground depressions, ground cracks, and ground bumps. When the road is found to be damaged, the damage information and the address information corresponding to the damage information are collected through equipment.
The collecting the address information and the damage information of the road comprises the following steps:
starting a vehicle-mounted terminal through voice, and acquiring the address information and the damage information through the vehicle-mounted terminal; and/or the presence of a gas in the gas,
and collecting the address information and the damage information by using a mobile terminal.
When the vehicle-mounted mobile terminal is used for walking on a road, the vehicle-mounted mobile terminal is not provided, so that the address information and the damage information can be acquired by using the portable mobile terminal, and the shooting angle can be adjusted through terminal acquisition, so that the acquired damage information of the road is more accurate. And if the vehicle is used for moving, the mobile terminal can be used for collecting the address information and the damage information, and the vehicle-mounted terminal can be started through voice and is used for collecting the address information and the damage information.
The damage information may be in the form of one or more of picture information, video information, and voice information.
Each node on the block chain, that is, a person who can observe and authenticate the road corresponding to the address information, may be a pedestrian who often passes through the road, and may also be a person who can implement authentication, such as a traffic police. The collected damage information may not clearly indicate the damage condition, so the collector can annotate the damage information and send the damage information, together with the address information and the annotation, to each node on the block chain for authentication.
The annotations are text annotations and/or voice annotations.
After receiving the annotation, the address information and the damage information, each node on the block chain can proceed damage authentication according to the address information, upload the authentication result after the authentication is finished, and confirm the damage information as damaged if the number of the damaged information exceeds the preset number threshold value after the authentication.
It should be noted that the quantity threshold may be set according to actual needs, and the invention does not limit the quantity threshold. Preferably, the quantity threshold is greater than or equal to 60%.
According to the embodiment of the invention, when the road damage is found, the damage information and the address information are collected, the damage information is annotated and uploaded to each node on the block chain, the block chain link points authenticate the damage information, and if the damage authentication exceeds the preset number threshold, the damage information is confirmed, so that the authentication of the road damage information is participated by a plurality of nodes on the block chain, and the accuracy and timeliness of the damage information authentication are ensured.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A road damage information authentication method based on a block chain technology is characterized by comprising the following steps:
when a road is found to be damaged, the terminal collects address information and damage information of the road;
the terminal annotates the abnormal information and sends the annotation, the address information and the abnormal information to each node on the block chain for authentication;
and the block link point authenticates the damage information according to the annotation and the address information, feeds back authentication information, and authenticates the damage information as damaged if the number of the damages in the authentication information exceeds a preset number threshold.
2. The method of claim 1, wherein the collecting address information and damage information for the road comprises:
starting a vehicle-mounted terminal through voice, and acquiring the address information and the damage information through the vehicle-mounted terminal; and/or the presence of a gas in the gas,
and collecting the address information and the damage information by using a mobile terminal.
3. The method of claim 1, wherein the damage information is in the form of one or more of picture information, video information, and voice information.
4. The method of claim 1, wherein the annotation is a text annotation or a voice annotation.
5. The method of claim 1, wherein the damage information comprises: ground depressions, ground cracks, and ground bumps.
6. A system for road damage information authentication based on block chain technology is characterized by comprising:
the terminal is used for acquiring the address information and the damage information of the road, annotating the abnormal information and sending the annotation, the address information and the abnormal information to each node on the block chain for authentication when the road is found to be damaged;
and the block chain node is used for authenticating the damage information according to the annotation and the address information and feeding back authentication information, and if the number of the damages in the authentication information is considered to exceed a preset number threshold, the damage information is authenticated as the damages.
7. The system of claim 6, wherein said collecting address information and damage information for said roadway comprises:
starting a vehicle-mounted terminal through voice, and acquiring the address information and the damage information through the vehicle-mounted terminal; and/or the presence of a gas in the gas,
and collecting the address information and the damage information by using a mobile terminal.
8. The system of claim 6, wherein the damage information is in the form of one or more of picture information, video information, and voice information.
9. The system of claim 6, wherein the annotation is a text annotation or a voice annotation.
10. The system of claim 6, wherein the damage information comprises: ground depressions, ground cracks, and ground bumps.
CN202010009476.7A 2020-01-06 2020-01-06 Road damage information authentication method and system based on block chain technology Pending CN111198928A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010009476.7A CN111198928A (en) 2020-01-06 2020-01-06 Road damage information authentication method and system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010009476.7A CN111198928A (en) 2020-01-06 2020-01-06 Road damage information authentication method and system based on block chain technology

Publications (1)

Publication Number Publication Date
CN111198928A true CN111198928A (en) 2020-05-26

Family

ID=70746831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010009476.7A Pending CN111198928A (en) 2020-01-06 2020-01-06 Road damage information authentication method and system based on block chain technology

Country Status (1)

Country Link
CN (1) CN111198928A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112633701A (en) * 2020-12-25 2021-04-09 北京天仪百康科贸有限公司 Traffic engineering road crack inspection method and system based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110095908A1 (en) * 2009-10-22 2011-04-28 Nadeem Tamer M Mobile sensing for road safety, traffic management, and road maintenance
CN108269398A (en) * 2017-12-27 2018-07-10 深圳市元征软件开发有限公司 A kind of recording method of highway traffic data and mobile unit
CN109166319A (en) * 2018-10-19 2019-01-08 福建工程学院 A kind of highway illegal activities recognition methods based on block chain technology
CN109360417A (en) * 2018-10-19 2019-02-19 福建工程学院 A kind of dangerous driving behavior identification and method for pushing and system based on block chain
CN109446960A (en) * 2018-10-19 2019-03-08 福建工程学院 A kind of maintenance of surface information collection based on block chain technology and its method for pushing and system
CN109617951A (en) * 2018-11-27 2019-04-12 江苏科创交通安全产业研究院有限公司 A kind of traffic safety facilities acquisition system and acquisition method for Internet of Things control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110095908A1 (en) * 2009-10-22 2011-04-28 Nadeem Tamer M Mobile sensing for road safety, traffic management, and road maintenance
CN108269398A (en) * 2017-12-27 2018-07-10 深圳市元征软件开发有限公司 A kind of recording method of highway traffic data and mobile unit
CN109166319A (en) * 2018-10-19 2019-01-08 福建工程学院 A kind of highway illegal activities recognition methods based on block chain technology
CN109360417A (en) * 2018-10-19 2019-02-19 福建工程学院 A kind of dangerous driving behavior identification and method for pushing and system based on block chain
CN109446960A (en) * 2018-10-19 2019-03-08 福建工程学院 A kind of maintenance of surface information collection based on block chain technology and its method for pushing and system
CN109617951A (en) * 2018-11-27 2019-04-12 江苏科创交通安全产业研究院有限公司 A kind of traffic safety facilities acquisition system and acquisition method for Internet of Things control

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112633701A (en) * 2020-12-25 2021-04-09 北京天仪百康科贸有限公司 Traffic engineering road crack inspection method and system based on block chain
CN112633701B (en) * 2020-12-25 2021-10-26 蚌埠科睿达机械设计有限公司 Traffic engineering road crack inspection method and system based on block chain

Similar Documents

Publication Publication Date Title
EP1411681A3 (en) Mobile communication system, mobile terminal, transfer device, and mobile communication method
CN101620785B (en) Method for recognizing motor vehicle and non-motor vehicle based on mobile phone signal data
EP1876855A3 (en) Method for relocating SRNS in a mobile communication system
DE50211063D1 (en) METHOD AND DEVICE FOR AUTHENTICATED ACCESS OF A STATION ON LOCAL DATA NETWORKS, IN PARTICULAR RADIO DATA NETWORKS
EP1260690A3 (en) System and method for monitoring gas turbine engine starting systems
CN109067835A (en) Casualty data processing method based on block chain
DE602005024000D1 (en) Method and device for establishing a connection between a mobile device and a network
CN111198928A (en) Road damage information authentication method and system based on block chain technology
CN107357894A (en) A kind of road traffic facility data acquisition method for correcting error and system
JP2019500702A (en) Intelligent distributed vision traffic marker and method
DE60222810D1 (en) METHOD, SYSTEM AND DEVICE FOR SELECTING SERVICE VIA A WIRELESS LOCAL NETWORK
CN112737773B (en) Intelligent logistics monitoring method based on mobile user information and blockchain technology
CN110446168A (en) A kind of target vehicle method for tracing and system
ATE477639T1 (en) PROVIDING CHARGE INFORMATION IN A GROUP COMMUNICATIONS SYSTEM
CN104062631B (en) A kind of personnel participating in the meeting's whole process real-time location method reported for work for meeting
CN106330446A (en) Wireless charging authentication method and device
CN105352523B (en) Intelligent route generation method and device
CN111063049A (en) Power grid line engineering attendance checking method and system
CN107527498A (en) Based on the localization method, electronic equipment and storage medium illegally moved
CN106991822A (en) Highway ambiguity path identifying system and recognition methods based on license plate identification
CN110910639A (en) Method and system for traffic facility abnormal information authentication based on block chain technology
CN109887266A (en) A kind of vehicle outdoor positioning method for tracing
CN106535173A (en) Node binding method and system based on LoRa technology
CN108253981A (en) A kind of continuation of the journey method of determining range and device
CN206892348U (en) Trolleybus alignment system and positioner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200526

RJ01 Rejection of invention patent application after publication