CN111882226A - Score checking system based on prison management - Google Patents

Score checking system based on prison management Download PDF

Info

Publication number
CN111882226A
CN111882226A CN202010757203.0A CN202010757203A CN111882226A CN 111882226 A CN111882226 A CN 111882226A CN 202010757203 A CN202010757203 A CN 202010757203A CN 111882226 A CN111882226 A CN 111882226A
Authority
CN
China
Prior art keywords
terminal
data
scoring
criminal
terminals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010757203.0A
Other languages
Chinese (zh)
Other versions
CN111882226B (en
Inventor
彭峻国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Dongguan Technology Co ltd
Original Assignee
Guizhou Dongguan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Dongguan Technology Co ltd filed Critical Guizhou Dongguan Technology Co ltd
Priority to CN202010757203.0A priority Critical patent/CN111882226B/en
Publication of CN111882226A publication Critical patent/CN111882226A/en
Application granted granted Critical
Publication of CN111882226B publication Critical patent/CN111882226B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Primary Health Care (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of data management, and particularly discloses a scoring and assessing system based on prison management, which comprises a first terminal, a plurality of second terminals and a plurality of third terminals; the first terminal is used for setting the input authority for the plurality of second terminals, and the first terminal is also used for appointing the plurality of second terminals as block chain nodes; the second terminal with the entry authority is used for entering the scoring and assessing data and sending the entered scoring and assessing data to the third terminal; the third terminal is used for verifying the score checking data and broadcasting the verified score checking data to the second terminal serving as a block chain node; the second terminal serving as the block chain node is used for storing the score checking data in the block chain network, and the authenticity of the recorded data can be ensured by adopting the technical scheme of the invention.

Description

Score checking system based on prison management
Technical Field
The invention relates to the technical field of data management, in particular to a scoring and assessing system based on prison management.
Background
People who implement illegal criminal activities often take the criminal in prisons after the criminal is judged. When the prison manages criminals, the criminals need to be scored and checked. The traditional method for scoring and appraising criminals mostly adopts a manual recording mode, and because the criminals have more daily evaluation, weekly evaluation, monthly evaluation and evaluation items in various activities, the recording workload is higher, and the conditions of recording errors and the like are easily caused.
In order to improve the informatization degree of the prisons and improve the accuracy of scoring and appraisal, the prisons are usually digitally transformed at present, and the scoring and appraisal of criminals are recorded in a database for reference and calling.
However, data in the database cannot be traced, authenticity is difficult to guarantee, and data stored in the database may be maliciously tampered, so that confidence of the data is low.
Therefore, a scoring and checking system capable of guaranteeing the authenticity of data is needed.
Disclosure of Invention
The invention provides a scoring and checking system based on prison management, which can ensure the authenticity of recorded data.
In order to solve the technical problem, the present application provides the following technical solutions:
the scoring and assessing system based on prison management comprises a first terminal, a plurality of second terminals and a plurality of third terminals;
the first terminal is used for setting the input authority for the plurality of second terminals, and the first terminal is also used for appointing the plurality of second terminals as block chain nodes;
the second terminal with the entry authority is used for entering the scoring and assessing data and sending the entered scoring and assessing data to the third terminal;
the third terminal is used for verifying the score checking data and broadcasting the verified score checking data to the second terminal serving as a block chain node;
and the second terminal serving as the blockchain node is used for storing the score assessment data in the blockchain network.
The basic scheme principle and the beneficial effects are as follows:
in the scheme, the first terminal is used by a prison manager, the second terminal is used by a prison police, and the third terminal is used by a criminal. The administrator can freely set the second terminal having the entry authority and the second terminal as the blockchain node. After the prison enters the scoring and assessing data through the second terminal, a criminal can verify the scoring and assessing data through the third terminal, and if the prison enters the scoring and assessing data wrongly, the criminal can find the scoring and assessing data in time; if the score checking data passes the verification, the score checking data can be stored in the block chain network, so that the tampering can be effectively prevented, and the authenticity of the score checking data is ensured. And the second terminal is used as the block chain node for distributed storage of the scoring and assessing data, compared with the distributed storage in a single server, the distributed storage has better safety, and the scoring and assessing data cannot be lost due to the damage of one block chain node.
Further, the second terminal and the third terminal are also used for generating independent private keys and generating corresponding public keys based on the private keys; the second terminal with the entry authority is also used for signing the entered scoring assessment data through a private key; the third terminal is also used for checking the data signature of the verified score.
The signature is carried out through the private key, so that the falsification can be effectively prevented, and the tracing is convenient.
Further, the first terminal is further used for appointing a second terminal serving as a block chain node according to a preset rule to pack a plurality of score checking data into a block, broadcasting the packed block to other second terminals serving as the block chain node, verifying the packed block by the other second terminals serving as the block chain node, and adding the block to the tail end of the longest chain of the current block chain when the verification is passed.
And verifying the packed blocks, so that the authenticity of scoring and checking data in the blocks can be ensured.
Further, the second terminal serving as the block chain node is further configured to obtain public keys of all the second terminals and the third terminal; the packed blocks are verified based on the public key.
And verifying the packed blocks based on the public key, wherein if the signature is changed or the signature cannot be found timely.
Further, the second terminal comprises a first login module and an examination management module, wherein the first login module is used for verifying account and password information; the assessment management module is used for inputting scoring assessment data after logging in.
By arranging the first login module, anyone who takes the second terminal can be prevented from randomly inputting the scoring and examining data.
Further, the second terminal also comprises a criminal management module, and the criminal management module is used for inputting and managing the basic information, the social relationship information, the prison date and the criminal period of criminals.
Further, the scoring evaluation data comprises criminal names, scoring evaluation results corresponding to the criminals and recorded prison police names.
Furthermore, the third terminal is also used for logging in after verifying the identity of a criminal and displaying a scoring evaluation result corresponding to the criminal.
The criminal can conveniently check the scoring and evaluating result through the third terminal.
Drawings
Fig. 1 is a logic block diagram of a first embodiment of a score assessment system based on prison management.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
As shown in fig. 1, the score assessment system based on prison management of this embodiment includes a first terminal, a plurality of second terminals, and a third terminal. In this embodiment, the first terminal is used by a prison manager, the second terminal is used by a prison police, and the third terminal is used by a criminal.
The first terminal is used for setting the input authority for the plurality of second terminals, and the first terminal is also used for appointing the plurality of second terminals to serve as block chain nodes.
For example, 10 second terminals with numbers 1-10 are used by different prison polices respectively, the first terminal sets the recording authority for the second terminals with numbers 1-5, and the second terminals with numbers 5-8 are designated as block chain nodes. In other words, the second terminal may have both the entry authority and be a blockchain node, or may have the entry authority or be one of the blockchain nodes. The second terminal comprises a handheld tablet, a smart phone and a PC; since a strong operation power and a large memory space are required as the block link point, the PC is generally designated as a block link node.
The second terminal and the third terminal are also used for generating independent private keys and generating corresponding public keys based on the private keys.
The second terminal with the entry authority is used for entering the scoring and assessing data, signing the entered scoring and assessing data through the private key, and sending the signed scoring and assessing data to the third terminal.
The third terminal is used for verifying the score assessment data, signing the score assessment data passing the verification, and broadcasting the signed score assessment data to the second terminal serving as the block chain node.
And the second terminal serving as the blockchain node is used for storing the score assessment data in the blockchain network.
Specifically, the second terminal serving as the blockchain node is further configured to obtain public keys of all the second terminals and the third terminal. The first terminal is further used for appointing a second terminal serving as a block chain node according to a preset rule to pack a plurality of score checking data into blocks, broadcasting the packed blocks to other second terminals serving as the block chain node, verifying the packed blocks by the other second terminals serving as the block chain node based on the public key, and adding the blocks to the tail end of the longest chain of the current block chain when the verification is passed. The preset rule can be randomly assigned, or can be sorted according to the current residual computing power, and the block chain link points with the most residual computing power are assigned for packaging; the latter is adopted in the present embodiment.
Example two
The difference between the present embodiment and the first embodiment is that the first terminal in the present embodiment includes an authority management module, where the authority management module is configured to set entry authorities for a plurality of second terminals, and designate the plurality of second terminals as block link nodes; the authority management module is also used for configuring and managing information such as menus, departments and the like.
The second terminal comprises a first login module, an examination management module, a criminal management module, a punishment management module, a dry alarm module and a storage module.
The login module is used for verifying account and password information; in this embodiment, each prison police is assigned with an independent account and password.
The assessment management module is used for inputting scoring assessment data after logging in. The scoring evaluation data comprises criminal names, scoring evaluation results corresponding to the criminals and recorded prison police names. The scoring and assessing results comprise daily assessment, weekly assessment, deduction and scoring, labor improvement effect, activity scoring and the like.
The criminal management module is used for inputting and managing basic information, social relations, resumes, prison entering dates, criminal periods, post reconstruction and the like of criminals. Where basic information reports name, gender, age, etc.
The dry alarm module is used for managing the basic information of the prisons (such as names, police numbers, departments, duties, police officers, contact phones, police service numbers and the like).
The storage module is used for storing blocks.
The third terminal is also used for logging in after verifying the identity of a criminal and displaying scoring assessment data corresponding to the criminal. The third terminal can be a public interactive display screen, and criminals log in through fingerprints, face recognition or account passwords and the like; the system can also be a learning tablet computer provided by prisons, and criminals log in through account numbers and passwords.
For example, criminals participate and get a score in prisons who have an activity of "telling a cultural story". After the prison alarm XX logs in through the login module, scoring and checking data are recorded in the checking management module: criminal name YY, scoring assessment results: the 'telling cultural story' tells score 99 and enters prison police name XX. And signing the scoring evaluation data through a private key, and sending the signing result to a third terminal.
After the criminal YY verifies the identity login at the third terminal, the third terminal displays the corresponding scoring and checking data: criminal name YY, scoring assessment results: the 'telling cultural story' tells score 99 and enters prison police name XX. After the criminal YY confirms that the result is correct, clicking confirmation to show that the verification is passed; the third terminal signs the scoring evaluation data through a private key of a criminal YY; and broadcasting the signed score assessment data to a second terminal serving as a block chain node.
EXAMPLE III
The difference between this embodiment and the second embodiment is that the right management module of the first terminal is further configured to set a viewing right of any criminal, where the viewing right includes presence or absence.
The third terminal comprises a second login module, a verification module and an inquiry module;
the second login module is used for verifying the identity of a criminal.
The verification module is used for displaying the scoring assessment data corresponding to the criminal and signing the scoring assessment data after receiving the confirmation information of the criminal.
And the query module is used for acquiring the viewing authority and querying the scoring assessment data of other criminals based on the viewing authority.
Criminals with viewing authority can view scoring assessment data of other criminals through the third terminal, so that the criminals can play a role in mutual supervision, misclassification of the scoring assessment data is avoided, and fairness and justness are guaranteed.
Example four
In this embodiment, still include surveillance camera head, server and intelligent bracelet.
The intelligent bracelet is distributed to criminals by prisons in a unified way. The intelligent bracelet is used for collecting criminal heart rate data and uploading the criminal heart rate data to the server.
The monitoring camera is used for collecting video information in the prison and uploading the video information to the server.
The server is used for analyzing whether the distance between any two criminals is smaller than the preset warning distance or not according to the video information, if so, the server is also used for calculating the holding time of the two criminals in the state of being smaller than the preset warning distance and judging whether the holding time is larger than the preset warning time or not, and if so, the server is marked as abnormal contact.
The server is further used for identifying the identities of the two criminals in abnormal contact and acquiring the heart rate data of the intelligent wristband corresponding to the two criminals based on the identities. The server also determines whether the heart rate data of a criminal exceeds a preset alert heart rate, and if so, the server is marked as suspected conflict.
The server also stores personal data of criminals. The server is also configured to obtain profiles of two criminals at the time of a suspected conflict, mark one of the criminals as high risk of injury based on the profiles, and mark the other criminal as low risk of injury. The personal data includes character, criminal, body data and prison performance information.
The server is also used for sending a light-emitting instruction to an intelligent bracelet of a criminal with low injury risk; and sending a vibration instruction to an intelligent bracelet of a high injury risk criminal. The intelligent bracelet is still used for lasting vibration when receiving the vibration instruction, and the intelligent bracelet is still used for twinkling luminous when receiving luminous instruction.
The server is also used for controlling the monitoring camera to aim at the flickering luminous point when the collision is suspected, so that the scene condition can be accurately captured conveniently.
When two criminals have a conflicting trend, the two criminals approach each other, the calling time is longer compared with the calling time of the face-to-face calling, and the server can identify the abnormal contact; meanwhile, at least one person can increase the heart rate due to emotional fluctuation or stress state, heart rate data are collected by the intelligent wristband, and the server judges that the heart rate data of criminals exceed the preset warning heart rate and records the heart rate data as suspected conflict. By combining the distance and the time with the heart rate data, the false alarm probability can be effectively reduced.
Prison police may not stop in time since struggling against each other's mouth to hands may occur relatively quickly. In this implementation, one of the people is labeled as high risk of injury and the other as low risk of injury by profile. The injury risk of two persons can be characterized, for example, the body data of one criminal is 180cm in height and 80kg in weight, and the body data of the other criminal is 160cm in height and 45kg in weight; the criminals are generally low in height and light in weight and have a high risk of injury. At this moment, the intelligent bracelet of high injury risk criminal continuously vibrates, can play the effect of warning and reminding its cold and quiet, and the intelligent bracelet of low injury risk criminal twinkles luminous simultaneously, is seen by high injury risk criminal more easily, and the high injury risk of suggestion high injury risk criminal is high to this reminds high injury risk criminal to keep away from the scene, avoids the conflict of coming to the very first time, handles the time of striving for follow-up prison police. Criminals with low risk of injury have advantages, and more have no fear, and the intelligent bracelet does not continuously vibrate, so that negative effects are avoided, and criminals with low risk of injury are further prevented from being irritated.
The above are merely examples of the present invention, and the present invention is not limited to the field related to this embodiment, and the common general knowledge of the known specific structures and characteristics in the schemes is not described herein too much, and those skilled in the art can know all the common technical knowledge in the technical field before the application date or the priority date, can know all the prior art in this field, and have the ability to apply the conventional experimental means before this date, and those skilled in the art can combine their own ability to perfect and implement the scheme, and some typical known structures or known methods should not become barriers to the implementation of the present invention by those skilled in the art in light of the teaching provided in the present application. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (8)

1. The scoring and assessing system based on prison management is characterized by comprising a first terminal, a plurality of second terminals and a plurality of third terminals;
the first terminal is used for setting the input authority for the plurality of second terminals, and the first terminal is also used for appointing the plurality of second terminals as block chain nodes;
the second terminal with the entry authority is used for entering the scoring and assessing data and sending the entered scoring and assessing data to the third terminal;
the third terminal is used for verifying the score checking data and broadcasting the verified score checking data to the second terminal serving as a block chain node;
and the second terminal serving as the blockchain node is used for storing the score assessment data in the blockchain network.
2. The prison management-based score assessment system of claim 1, wherein: the second terminal and the third terminal are also used for generating independent private keys and generating corresponding public keys based on the private keys; the second terminal with the entry authority is also used for signing the entered scoring assessment data through a private key; the third terminal is also used for checking the data signature of the verified score.
3. The prison management-based score assessment system of claim 2, wherein: the first terminal is further used for appointing a second terminal serving as a block chain node according to a preset rule to pack a plurality of score checking data into blocks, broadcasting the packed blocks to other second terminals serving as the block chain node, verifying the packed blocks by the other second terminals serving as the block chain node, and adding the blocks to the tail end of the longest chain of the current block chain when the verification is passed.
4. The prison management-based score assessment system of claim 3, wherein: the second terminal serving as the block chain node is further configured to obtain public keys of all the second terminals and the third terminal; the packed blocks are verified based on the public key.
5. The prison management-based score assessment system of claim 4, wherein: the second terminal comprises a first login module and an examination management module, wherein the first login module is used for verifying account and password information; the assessment management module is used for inputting scoring assessment data after logging in.
6. The prison management-based score assessment system of claim 5, wherein: the second terminal also comprises a criminal management module, and the criminal management module is used for inputting and managing the basic information, the social relationship information, the prisoner entry date and the criminal period of a criminal.
7. The prison management-based score assessment system of claim 6, wherein: the scoring evaluation data comprises criminal names, scoring evaluation results corresponding to the criminals and recorded prison police names.
8. The prison management-based score assessment system of claim 7, wherein: and the third terminal is also used for logging in after verifying the identity of a criminal and displaying a scoring evaluation result corresponding to the criminal.
CN202010757203.0A 2020-07-31 2020-07-31 Scoring and checking system based on specific place management Active CN111882226B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010757203.0A CN111882226B (en) 2020-07-31 2020-07-31 Scoring and checking system based on specific place management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010757203.0A CN111882226B (en) 2020-07-31 2020-07-31 Scoring and checking system based on specific place management

Publications (2)

Publication Number Publication Date
CN111882226A true CN111882226A (en) 2020-11-03
CN111882226B CN111882226B (en) 2024-01-05

Family

ID=73205554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010757203.0A Active CN111882226B (en) 2020-07-31 2020-07-31 Scoring and checking system based on specific place management

Country Status (1)

Country Link
CN (1) CN111882226B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050190061A1 (en) * 2002-11-20 2005-09-01 Trela Richard S. Anti terrorist and homeland security public safety warning system
JP2005242601A (en) * 2004-02-26 2005-09-08 Hitachi Ltd Personnel evaluating method for subject person belonging to two or more groups
WO2013178010A1 (en) * 2012-05-28 2013-12-05 ***通信集团公司 Multimedia content distribution method, device and system
CN104346698A (en) * 2014-11-05 2015-02-11 无锡雅座在线科技发展有限公司 Catering member big data analysis and checking system based on cloud computing and data mining
US20170124497A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. System for automated capture and analysis of business information for reliable business venture outcome prediction
CN107317672A (en) * 2017-05-10 2017-11-03 广东网金控股股份有限公司 A kind of light weight terminating machine block catenary system
CN207440786U (en) * 2017-08-11 2018-06-01 贵州东冠科技有限公司 A kind of intelligent face recognition system
US20180220278A1 (en) * 2017-02-01 2018-08-02 BriefTrace Ltd. System and method for securing and verifying information from transportation monitors
CN108881203A (en) * 2018-06-08 2018-11-23 浙江捷尚人工智能研究发展有限公司 Data managing method, electronic equipment, storage medium and system based on block chain
US20180349968A1 (en) * 2017-06-02 2018-12-06 Walmart Apollo, Llc Systems and methods for product review management with distributed database
CN109271810A (en) * 2018-08-01 2019-01-25 冼钇冰 A kind of exam information record system and exam information recording method based on block chain
CN109740923A (en) * 2018-12-29 2019-05-10 杭州趣链科技有限公司 A kind of students ' quality examination application system and method and information collecting device based on block chain
CN110008212A (en) * 2019-02-26 2019-07-12 平安科技(深圳)有限公司 Examinee's Data Input method, apparatus, system and computer storage medium
CN110647756A (en) * 2019-08-05 2020-01-03 广东工业大学 Online examination management system based on block chain and CP-ABE and application method thereof
KR20200014610A (en) * 2018-08-01 2020-02-11 주식회사 우리은행 Server for providing online bulletin board
CN111008397A (en) * 2019-11-27 2020-04-14 山东爱城市网信息技术有限公司 Method, device and medium for managing scores based on block chain
KR102103553B1 (en) * 2019-08-07 2020-06-01 주식회사 요트북 Server and system for provding history log and registeration service using blockchain
KR20200081735A (en) * 2018-12-28 2020-07-08 주식회사 글로스퍼 System for Evaluating a Proposal Based Block Chain and Method for Storing Data

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050190061A1 (en) * 2002-11-20 2005-09-01 Trela Richard S. Anti terrorist and homeland security public safety warning system
JP2005242601A (en) * 2004-02-26 2005-09-08 Hitachi Ltd Personnel evaluating method for subject person belonging to two or more groups
WO2013178010A1 (en) * 2012-05-28 2013-12-05 ***通信集团公司 Multimedia content distribution method, device and system
CN104346698A (en) * 2014-11-05 2015-02-11 无锡雅座在线科技发展有限公司 Catering member big data analysis and checking system based on cloud computing and data mining
US20170124497A1 (en) * 2015-10-28 2017-05-04 Fractal Industries, Inc. System for automated capture and analysis of business information for reliable business venture outcome prediction
US20180220278A1 (en) * 2017-02-01 2018-08-02 BriefTrace Ltd. System and method for securing and verifying information from transportation monitors
CN107317672A (en) * 2017-05-10 2017-11-03 广东网金控股股份有限公司 A kind of light weight terminating machine block catenary system
US20180349968A1 (en) * 2017-06-02 2018-12-06 Walmart Apollo, Llc Systems and methods for product review management with distributed database
CN207440786U (en) * 2017-08-11 2018-06-01 贵州东冠科技有限公司 A kind of intelligent face recognition system
CN108881203A (en) * 2018-06-08 2018-11-23 浙江捷尚人工智能研究发展有限公司 Data managing method, electronic equipment, storage medium and system based on block chain
CN109271810A (en) * 2018-08-01 2019-01-25 冼钇冰 A kind of exam information record system and exam information recording method based on block chain
KR20200014610A (en) * 2018-08-01 2020-02-11 주식회사 우리은행 Server for providing online bulletin board
KR20200081735A (en) * 2018-12-28 2020-07-08 주식회사 글로스퍼 System for Evaluating a Proposal Based Block Chain and Method for Storing Data
CN109740923A (en) * 2018-12-29 2019-05-10 杭州趣链科技有限公司 A kind of students ' quality examination application system and method and information collecting device based on block chain
CN110008212A (en) * 2019-02-26 2019-07-12 平安科技(深圳)有限公司 Examinee's Data Input method, apparatus, system and computer storage medium
CN110647756A (en) * 2019-08-05 2020-01-03 广东工业大学 Online examination management system based on block chain and CP-ABE and application method thereof
KR102103553B1 (en) * 2019-08-07 2020-06-01 주식회사 요트북 Server and system for provding history log and registeration service using blockchain
CN111008397A (en) * 2019-11-27 2020-04-14 山东爱城市网信息技术有限公司 Method, device and medium for managing scores based on block chain

Also Published As

Publication number Publication date
CN111882226B (en) 2024-01-05

Similar Documents

Publication Publication Date Title
Ferguson Predictive prosecution
US7299152B1 (en) Correlating event data for large geographic area
US10896321B2 (en) Monitoring inmate movement with facial recognition
US8960541B2 (en) Dynamic identity matching in response to threat levels
US20040066276A1 (en) Biometric identification and reporting system
JP5141048B2 (en) Risk monitoring device, risk monitoring system, and risk monitoring method
US20120130937A1 (en) Security at a facility
Livingston The unfulfilled promise of citizen review
EP3828837A1 (en) Frictionless security processing
Gorden et al. A Systematic Literature Review of Doorstep Crime: Are the Crime‐Prevention Strategies More Harmful than the Crime?
CN111861267A (en) Scoring assessment method based on prison management
Bullee Experimental social engineering: Investigation and prevention
CN111882226A (en) Score checking system based on prison management
CN111724270A (en) Wedding and love friend making system based on block chain
CN111914050A (en) Visual 3D monitoring platform based on specific places
KR101974973B1 (en) Social reporting system for crime and method thereof
Braithwaite et al. Differences in the conflict resolution tactics of male and female police patrol officers
Bowie Current trends and emerging issues in workplace violence
CN109660765A (en) Community Watch system and Community Watch method
Robbins Tased and confused: From social exclusion to shock in the war on youth
CN113128843A (en) Remote visual supervision system and supervision method for project supervision
US20230027643A1 (en) Officer safety using computer vision
CN114743298B (en) One-stop type vehicle clearance system
Hafer et al. Managers’ and Senior Executives’ Perceptions of Frequency and Type of Employee-Perpetrated Information Sabotage and Their Attitudes toward It-The Results of a Pilot Study
Palarea An empirical analysis of stalking as a risk factor in domestic violence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant