CN111163034B - Block chain network, electronic lock control method thereof, terminal device and storage medium - Google Patents

Block chain network, electronic lock control method thereof, terminal device and storage medium Download PDF

Info

Publication number
CN111163034B
CN111163034B CN201811232561.9A CN201811232561A CN111163034B CN 111163034 B CN111163034 B CN 111163034B CN 201811232561 A CN201811232561 A CN 201811232561A CN 111163034 B CN111163034 B CN 111163034B
Authority
CN
China
Prior art keywords
electronic lock
authorization
request
message
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811232561.9A
Other languages
Chinese (zh)
Other versions
CN111163034A (en
Inventor
王�义
孙海波
刘春伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201811232561.9A priority Critical patent/CN111163034B/en
Publication of CN111163034A publication Critical patent/CN111163034A/en
Application granted granted Critical
Publication of CN111163034B publication Critical patent/CN111163034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The embodiment of the invention provides a block chain network, an electronic lock control method thereof, terminal equipment and a storage medium; the electronic lock control method of the block chain network comprises the following steps: receiving an unlocking request message of a request end, wherein the unlocking request message carries a request end identifier and an electronic lock identifier; calling an authorization terminal identity query contract to query an authorization terminal corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization terminal; receiving an authentication request message sent by an authorization terminal after the authorization confirmation message is confirmed, wherein the authentication request message is used for authenticating the identity of a request terminal; calling a request end identity authentication contract to authenticate the identity of the request end according to the request end identification in the authentication request message; when the verification is passed, sending a verification success message to the authorization terminal so as to receive an unlocking instruction sent by the authorization terminal after receiving the verification success message; and transmitting the unlocking instruction signature to the electronic lock.

Description

Block chain network, electronic lock control method thereof, terminal device and storage medium
Technical Field
The present invention relates to communications technologies, and in particular, to a block chain network, an electronic lock control method thereof, a terminal device, and a storage medium.
Background
At present, the domestic express industry is rapidly developed, but the express receiving and sending basically adopts a mode that a courier sends and gets a piece, so that a receiver receiving and sending the piece is required to be at home, secondly, the mode easily provides a riding opportunity for some lawbreakers to crime by imitating the courier, and the hidden danger of personal injury to the receiver exists.
In addition, there is a method of installing a fixed express cabinet near a residence point of a recipient or setting a fixed express storage point, however, this method greatly increases the cost on the one hand, and on the other hand, the recipient still needs to go to a designated express cabinet or express storage point, wherein the link includes timely notifying the recipient to go to a corresponding address, which is not only easy to make mistakes, but also causes inconvenience to the recipient.
Disclosure of Invention
The embodiment of the invention provides a block chain network, an electronic lock control method thereof, terminal equipment and a storage medium, which can control the opening of an electronic lock under the condition of ensuring the safety and are convenient for authorizing others to complete the circulation of articles through the opening of the electronic lock.
The technical scheme of the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an electronic lock control method for a block chain network, where the method includes: receiving an unlocking request message of a request terminal, wherein the unlocking request message carries a request terminal identifier and an electronic lock identifier; calling an authorization terminal identity query contract to query an authorization terminal corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization terminal, wherein the authorization terminal identity query contract is an intelligent contract deployed in a block chain network; receiving an authentication request message sent by the authorization terminal after the authorization confirmation message is confirmed, wherein the authentication request message is used for authenticating the identity of the request terminal; calling a request end identity authentication contract to authenticate the identity of the request end according to the request end identification in the authentication request message, wherein the request end identity authentication contract is an intelligent contract deployed in a block chain network; when the verification is passed, sending a verification success message to the authorization terminal so as to receive an unlocking instruction sent by the authorization terminal after receiving the verification success message; and transmitting the unlocking instruction signature to the electronic lock.
In a second aspect, an embodiment of the present invention provides an electronic lock control method, where the method includes: generating a position request message according to the request end identification, the related information of the transmitted article and the authorization end identification, and sending the position request message to the block chain network; the position request message is used for sending the position related information of the electronic lock to the request end after the block chain network notification authorization end confirms the position request message; receiving electronic lock position related information sent by an authorization end; and when the electronic lock is determined to be the target electronic lock according to the electronic lock position related information, sending an unlocking request message to the block chain network, wherein the unlocking request message is used for the block chain network to call an authorization terminal identity query contract and send an authorization confirmation message to the authorization terminal, and the authorization terminal identity query contract is an intelligent contract deployed in the block chain network.
In a third aspect, an embodiment of the present invention provides an electronic lock control method, where the method includes: receiving an authorization confirmation message sent by a block chain network; after receiving an instruction for confirming the authorization confirmation message, generating a verification request message according to the request end identifier and the authorization end identifier, and sending the verification request message to a block chain network; the verification request message is used for the blockchain network to call a request end identity verification contract to verify the identity of the request end; and receiving a verification success message returned by the blockchain network, and sending an unlocking instruction to the blockchain network, wherein the identity verification contract of the request end is an intelligent contract in the deployment blockchain network.
In a fourth aspect, an embodiment of the present invention provides an electronic lock control method, where the method includes: and receiving an unlocking instruction forwarded by the block chain network, and controlling the current state to be open after verifying that the block chain network signature and the authorization terminal signature are both valid according to the unlocking instruction.
In a fifth aspect, an embodiment of the present invention provides a blockchain network, including: the authorization confirmation module is used for receiving an unlocking request message of a request end, wherein the unlocking request message carries a request end identifier and an electronic lock identifier; calling an authorization end identity query contract to query an authorization end corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization end; the identity authentication module is used for receiving an authentication request message sent by the authorization terminal after the authorization confirmation message is confirmed, the authentication request message is used for authenticating the identity of the request terminal, and the request terminal identity authentication contract is an intelligent contract deployed in a block chain network; calling a request end identity authentication contract to authenticate the identity of the request end according to the request end identification in the authentication request message; the unlocking module is used for sending a verification success message to the authorization terminal when the verification is passed so as to receive an unlocking instruction sent by the authorization terminal after receiving the verification success message; and transmitting the unlocking instruction signature to the electronic lock.
In a sixth aspect, an embodiment of the present invention provides a request end, where the request end includes a location request module, configured to generate a location request message according to a request end identifier, information related to a delivered article, and an authorization end identifier, and send the location request message to a block chain network; the position request message is used for sending the position related information of the electronic lock to the request end after the block chain network notification authorization end confirms the position request message; the position receiving module is used for receiving the position related information of the electronic lock sent by the authorization end; and the unlocking request module is used for sending an unlocking request message to the block chain network when the electronic lock is determined to be the target electronic lock according to the position related information of the electronic lock, the unlocking request message is used for calling an authorization terminal identity query contract by the block chain network to send an authorization confirmation message to the authorization terminal, and the authorization terminal identity query contract is an intelligent contract deployed in the block chain network.
In a seventh aspect, an embodiment of the present invention provides an authorization end, where the authorization end includes: the authorization confirmation module is used for receiving an authorization confirmation message sent by the block chain network; after receiving an instruction for confirming the authorization confirmation message, generating a verification request message according to the request end identifier and the authorization end identifier, and sending the verification request message to a block chain network; the verification request message is used for the blockchain network to call a request end identity verification contract to verify the identity of the request end, and the request end identity verification contract is an intelligent contract deployed in the blockchain network; and the unlocking control module is used for receiving the verification success message returned by the block chain network and sending an unlocking instruction to the block chain network.
In an eighth aspect, an embodiment of the present invention provides an electronic lock, where the electronic lock includes an unlocking module, configured to receive an unlocking instruction forwarded by a blockchain network, and control a current state to be unlocked after verifying that both a blockchain network signature and an authorization terminal signature are valid according to the unlocking instruction.
In a ninth aspect, an embodiment of the present invention provides a blockchain network, including:
a first memory for storing executable instructions;
the first processor is configured to execute the executable instructions stored in the memory, and implement the electronic lock control method for the block chain network provided in the embodiment of the present invention.
In a tenth aspect, an embodiment of the present invention provides a terminal device, where the terminal device is a request end, and the request end includes a second memory, configured to store an executable instruction; the second processor is used for executing the executable instructions stored in the second memory and realizing the electronic lock control method applied to the request end provided by the embodiment of the invention;
or, the terminal device is an authorized terminal, and the authorized terminal includes a third memory for storing executable instructions; the third processor is used for executing the executable instructions stored in the third memory to realize the electronic lock control method applied to the authorization terminal provided by the embodiment of the invention;
or, the terminal device is an electronic lock, and the electronic lock comprises a fourth memory for storing executable instructions; and the fourth processor is configured to execute the executable instruction stored in the fourth memory, so as to implement the electronic lock control method applied to the electronic lock provided by the embodiment of the present invention.
In an eleventh aspect, an embodiment of the present invention provides a storage medium, where the storage medium stores executable instructions, and when the executable instructions are executed, the storage medium is configured to cause a processor to execute an electronic lock control method provided by an embodiment of the present invention.
The embodiment of the invention has the following beneficial effects:
the block chain network supports communication between the request end and the authorization end based on an intelligent contract mechanism, before the authorization end sends an unlocking instruction, the authorization end confirms whether an event corresponding to an unlocking request message sent by the request end is real or not, and the block chain network confirms whether the identity of the request end is legal or not, so that safety guarantee is provided for the problem of lack of trust between the request end and the authorization end, the authorization end remotely controls the electronic lock to be unlocked under the condition that the identity of the request end is ensured to be safe, the authorization end is convenient to authorize the request end to unlock equipment to which the electronic lock belongs after the request end is unlocked through the electronic lock, and circulation of articles between the authorization end and the request end is completed.
Drawings
Fig. 1 is a schematic functional architecture diagram of a block chain network according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an organization architecture of a block chain network according to an embodiment of the present invention;
fig. 3 is an alternative structural schematic diagram of a consensus node according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a blockchain network according to an embodiment of the present invention;
FIG. 5 is a block diagram of a request end according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an authorization end according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an electronic lock according to an embodiment of the present invention;
fig. 8 is a flowchart of an electronic lock control method of a block chain network according to an embodiment of the present invention;
FIG. 9 is a flowchart of an electronic lock control method applied to a requesting end according to an embodiment of the present invention;
fig. 10 is a flowchart of an electronic lock control method applied to an authorization terminal according to an embodiment of the present invention;
fig. 11 is a flowchart of an electronic lock control method applied to an electronic lock according to an embodiment of the present invention;
fig. 12 is a timing chart of a control method of an electronic lock according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail with reference to the accompanying drawings, the described embodiments should not be construed as limiting the present invention, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of the invention.
Before further detailed description of the embodiments of the present invention, terms and expressions mentioned in the embodiments of the present invention are explained, and the terms and expressions mentioned in the embodiments of the present invention are applied to the following explanations.
1) Transactions (transactions), equivalent to the computer term "Transaction," does not refer solely to transactions in the business context, and embodiments of the present invention follow this convention in view of the convention in blockchain technology that colloquially uses the term "Transaction. In a blockchain network employing an account-based model, transactions include three different transaction types: deployment (deployment), invocation (Invoke) and Query (Query). The deployment transaction is used for installing a specified chain code to a node of the blockchain network, and the call and query type transaction is used for calling the chain code of the deployment number so as to realize the operation on the relevant data of the target account in the account book, wherein the operation comprises the operation of adding, searching and changing to modify the data in the form of Key Value pairs in the account book, or add a new account in the account book.
2) A Block (Block) recording a data structure of the ledger data updated by the exchange within a period of time, marked with a timestamp and a unique mark (e.g. a digital fingerprint) of a previous Block, and after the Block is subjected to consensus verification by nodes in the Block chain network, the Block is appended to the end of the Block chain to become a new Block.
3) A chain of blocks (Blockchain), a chain of data structures in which blocks are assembled in a sequentially contiguous manner, each block having a hash value of a previous block or a subset thereof referenced therein, to cryptographically secure the recorded transaction against tampering and forgery.
4) A blockchain network incorporates new blocks into a set of centerless nodes of the blockchain in a consensus manner.
5) The account book (Legger) is the sum of data recorded by taking an account as a dimension in a block chain network, and comprises the elements of the account book data, the state of the account book, the state certification of the account book, a block index and the like.
6) The ledger data, the actual block data storage, i.e. the record of a series of ordered and non-falsifiable transactions recorded in the block chain, may be expressed in the form of a file system, and the update of the data in the account/account is realized when an intelligent contract called in the transaction is executed.
7) The ledger state, also referred to as state data, i.e. the state of the ledger data, may be in the form of key-value pairs in the database terminal, where the real-time ledger state is used to represent the latest record of key-value pairs updated by the agreed-upon exchange and the historical ledger state is used to represent the historical record of key-value pairs.
8) Presence attestation is attestation of authenticity of presence of the account data implemented in cryptographic manner, such as attestation of the way the account data computes a merkel (Merkle) tree.
9) Consensus (Consensus), a process in a blockchain network, is used to agree on transaction results among multiple nodes involved, and the mechanisms for achieving Consensus include Proof of workload (PoW), Proof of rights and interests (PoS, Proof of stamp), Proof of equity authority (DPoS), Proof of Elapsed Time (PoET, Proof of Elapsed Time), and so on.
10) Intelligent Contracts (Smart Contracts), also called chain codes (chaincodes), are deployed in the blockchain network, and trigger the execution of programs according to conditions, and are used for operating the ledger through query, addition and modification so as to realize query or update of the ledger.
In the embodiment of the application, the intelligent contract comprises an identity query contract calling authorization end, an identity verification contract calling request end, an unlocking contract and an electronic lock position acquisition contract.
11) In response to the condition or state on which the performed operation depends, one or more of the performed operations may be in real-time or may have a set delay when the dependent condition or state is satisfied; there is no restriction on the order of execution of the operations performed unless otherwise specified.
Referring to fig. 1, fig. 1 is a schematic functional architecture diagram of a block chain network according to an embodiment of the present invention, where the block chain network includes an application layer 101, a consensus layer 102, a network layer 103, a data layer 104, and a resource layer 105, which are described below.
The resource layer 105 encapsulates various available computing and storage resources, such as those in computers, servers/clusters, and clouds, abstracts and provides a uniform interface to the data layer 104 to mask the variability of the underlying hardware implementing the resource layer 105.
The computing resources include various forms of processors such as a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), and a Field-Programmable Gate Array (FPGA).
The storage resources include various types of storage media such as various volatile memories and nonvolatile memories. The nonvolatile Memory may be a Read Only Memory (ROM) or a Programmable Read-Only Memory (PROM). Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory.
The computing resources and storage resources of the resource layer 105 may be mapped to various types of nodes in a blockchain network, and the storage medium implementing an embodiment of the present invention stores executable instructions for implementing the blockchain network deployment method of an embodiment of the present invention, and once the executable instructions deployed to the nodes are executed, the underlying resources (e.g., various types of processors) implementing the nodes will implement the deployment of various types of nodes in the blockchain network and perform the functions of the various types of nodes, thereby implementing ledgers for transactions in business processes and various applications based on the ledgers.
By way of example, executable instructions may be written in any form of programming language, including compiled or interpreted languages, or declarative or procedural languages, in the form of software (including system programs and applications), software modules, scripts, plug-ins, and the like, and may be deployed in any form, including as a stand-alone program or as a module, component, or other unit suitable for use in a computing environment.
Data layer 104 encapsulates various data structures that implement the ledger, including ledger data implemented in a file system, ledger state and presence proofs implemented in a database form.
Network layer 103 encapsulates point-to-point (P2P) network protocols, data propagation and verification mechanisms, access and authentication mechanisms, and service agent identities. The P2P network protocol realizes communication among nodes in the blockchain network, a data propagation mechanism ensures the propagation of transaction/transaction results in the blockchain network, and a data verification mechanism is used for realizing the reliability of data transmission among the nodes based on an encryption method (such as a digital certificate, a digital signature and a public/private key pair); the access and authentication mechanism is used for managing the access and authentication of the terminal based on the identity of the service subject.
The consensus layer 102 encapsulates mechanisms for achieving consistency of transaction results propagated in the block chain, including POS, POW, DPOS, etc., and supports pluggable consensus mechanisms.
The application layer 101 encapsulates various services that the blockchain network can implement, including transaction settlement, tracing, and evidence storage.
An exemplary functional architecture of a node in a blockchain network implementing an embodiment of the present invention is described below, referring to fig. 2, fig. 2 is an organization architecture schematic diagram of a blockchain network provided by an embodiment of the present invention, and includes at least two nodes 110, and as an example, only a node 110-1 and a node 110-2 are shown in fig. 2. Blockchain network 100 responds to transactions submitted by terminal devices from business entities over network 200 to update or query the ledger and displays various intermediate or final results on the user interface of the terminal devices. The terminal device includes a requesting terminal 400, an authorizing terminal 500, and an electronic lock 600 provided on the vehicle.
In some embodiments, nodes in the blockchain network 100 are classified according to function; taking a block chain network based on a super book as an example, the block chain network can comprise an endorsement node, an accounting node, a sequencing service node and a main node.
An exemplary structure of a node of a blockchain network implementing an embodiment of the present invention is described below, and it is understood that the hardware structure of any type of node in the blockchain network 100 may be implemented according to the hardware structure described below.
Referring to fig. 3, fig. 3 is an optional structural schematic diagram of the consensus node 110 according to an embodiment of the present invention, where the consensus node 110 may be one or more servers, and according to the structure of the consensus node 110, other exemplary structures of the consensus node 110 may be foreseen, so that the structure described herein should not be considered as a limitation, for example, some components described below may be omitted, or components not described below may be added to adapt to special requirements of some application scenarios.
The consensus node 110 shown in fig. 3 comprises: at least one processor 1101, memory 1104, and at least one network interface 1102. The various components in the consensus node 110 are coupled together by a bus system 1103. It is understood that the bus system 1103 is used to enable communications among the components connected. The bus system 1103 includes a power bus, a control bus, and a status signal bus, in addition to the data bus. For clarity of illustration, however, the various buses are designated as the bus system 1103 in fig. 3.
The memory 1104 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. The memory 1104 described in connection with the embodiments of the invention is intended to comprise these and any other suitable types of memory.
The Processor 1101 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like.
The memory 1104 is capable of storing executable instructions to support the operation of the consensus node 110, examples of which include: various forms of software modules, such as programs, plug-ins, and scripts, for operating on the consensus node 110 may include, for example, an operating system and application programs, where the operating system contains various system programs and drivers, such as a framework layer, a core library layer, a driver layer, etc., for implementing various underlying services and handling hardware-based tasks. The application programs may include programs that implement various functions of the consensus node 110.
In combination with the above, the blockchain network implementing the embodiment of the present invention is provided in the form of a series of memories 1104 and a processor 1101, where the memories 1104 store executable instructions, and when the executable instructions are executed by the processor 1101, the method for controlling unlocking of the blockchain network provided by the embodiment of the present invention is implemented. As an example that the unlocking control method of the blockchain network provided by the embodiment of the present invention is implemented by combining software and hardware, the unlocking control method provided by the embodiment of the present invention may be directly embodied as the software module of the above different form executed by the first processor, the software module may be located in a storage medium, the storage medium is located in the first memory, and the first processor reads executable instructions included in the software module in the first memory and completes the functions of the blockchain network by combining necessary hardware (for example, the first processor is the processor 1101 in the aforementioned common node, the first memory is the memory 1104 in the aforementioned common node, and the necessary hardware further includes a processor and other components connected to the bus system).
Referring to fig. 4, as a software implementation example of the unlocking control method of the block chain network, for example, the software modules may be implemented to include an authorization confirmation module 1105, an identity verification module 1106, and an unlocking module 1107, where the authorization confirmation module 1105 is configured to receive an unlocking request message of a request end, where the unlocking request message carries a request end identifier and an electronic lock identifier; calling an authorization terminal identity query contract to query an authorization terminal corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization terminal, wherein the authorization terminal identity query contract is an intelligent contract deployed in a block chain network; an identity authentication module 1106, configured to receive an authentication request message sent by the authorization side after confirming the authorization confirmation message, where the authentication request message is used to authenticate an identity of the requesting side; calling a request end identity authentication contract to authenticate the identity of the request end according to the request end identification in the authentication request message, wherein the request end identity authentication contract is an intelligent contract deployed in a block chain network; the unlocking module 1107 is configured to send a verification success message to the authorization end when the verification is passed, so as to receive an unlocking instruction sent by the authorization end after receiving the verification success message; and transmitting the unlocking instruction signature to the electronic lock.
In some embodiments, the unlocking module 1107 is specifically configured to receive an unlocking instruction carrying an authorization end signature sent by the authorization end; and calling an unlocking contract when the signature of the authorization end is verified to be valid, and forwarding the signature of the unlocking instruction to the electronic lock according to the electronic lock identifier corresponding to the signature of the authorization end in the unlocking instruction, wherein the unlocking contract is an intelligent contract deployed in a block chain network.
In some embodiments, the blockchain network further comprises: a notification module 1108, where the notification module 1108 is configured to receive a location request message sent by a request end and carrying a request end signature before receiving an unlocking request message of the request end, where the location request message includes a request end identifier, information related to articles to be transferred, and an authorization end identifier; and when the signature of the request end is verified to be valid, calling an electronic lock position acquisition contract, and sending a notification message to a corresponding authorization end according to the position request message, wherein the notification message is used for the authorization end to confirm and then sending the related information of the electronic lock position to the request end, and the electronic lock position acquisition contract is an intelligent contract deployed in a block chain network.
In some embodiments, the information related to the delivered article includes waybill information and expected delivery time corresponding to the delivered article, and the notifying module 1108 sends a notification message to a corresponding authorization terminal according to the location request message, specifically including: and sending a notification message containing the request end identification, the waybill information and the estimated delivery time to a corresponding authorization end according to the position request message.
In some embodiments, the blockchain network further includes a status updating module 1109, configured to receive a lock status message carrying an electronic lock signature sent by the electronic lock; and when the signature of the electronic lock is verified to be valid, updating the state of the corresponding electronic lock according to the electronic lock identifier in the locking state message and informing the authorization end.
In some embodiments, the blockchain network further includes an image processing module 1110, configured to receive multimedia information sent by an image device and carrying an image device signature; and when the signature of the image equipment is verified to be valid, the multimedia information and the image equipment identification are stored in an associated manner.
Referring to fig. 5, fig. 5 is an optional structural diagram of the request end 400 according to the embodiment of the present invention, where the request end 400 may be one or more user terminals, and the request end 400 includes: a second processor 2201, a second memory 2204 and a second network interface 2202. The various components in the requestor 400 are coupled together by a bus system 2203. The second memory 2204 can be either volatile memory or nonvolatile memory, and can also include both volatile and nonvolatile memory. The second memory 2204 described in connection with the embodiments of the invention is intended to comprise these and any other suitable types of memory.
The second Processor 2201 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor, or the like. The second memory 2204 is capable of storing executable instructions to support operations of the requesting end, examples of which include: various forms of software modules, such as programs, plug-ins, and scripts, for operating on the requestor 400 may include, for example, an operating system and application programs, where the operating system contains various system programs and drivers, such as a framework layer, a core library layer, a driver layer, etc., for implementing various underlying services and handling hardware-based tasks. The application programs may include programs that implement various functions of the requesting end 400.
In conjunction with the above, the requesting terminal 400 implementing the embodiment of the present invention is provided in the form of a series of memories and processors, in which executable instructions are stored, and when the executable instructions are executed by the processors, the electronic lock control method applied to the requesting terminal 400 is performed. As an example that the unlocking control method applied to the request end provided by the embodiment of the present invention is implemented by combining software and hardware, the unlocking control method applied to the request end provided by the embodiment of the present invention may be directly embodied as the above-mentioned different forms of software modules executed by the second processor 2201, the software modules may be located in a storage medium located in the second memory 2204, and the second processor 2201 reads executable instructions included in the software modules in the second memory 2204 and completes the functions of the request end 400 by combining necessary hardware (for example, including a processor and other components connected to the bus system). As an example of a software implementation of the unlocking control method applied to the request side, for example, the software module may be implemented to include: the position request module is used for generating a position request message according to the request end identifier, the related information of the transmitted article and the authorization end identifier and sending the position request message to the block chain network; the position request message is used for sending the position related information of the electronic lock to the request end after the block chain network notification authorization end confirms the position request message; the position receiving module 2205 is used for receiving the position related information of the electronic lock sent by the authorization end; an unlocking request module 2206, configured to send an unlocking request message to the blockchain network when it is determined that the electronic lock is the target electronic lock according to the position-related information of the electronic lock, where the unlocking request message is used for the blockchain network to call an authorization terminal identity query contract to send an authorization confirmation message to the authorization terminal.
In some embodiments, the information related to the position of the electronic lock is used to indicate that the request end reaches the position of the electronic lock; the unlocking request module 2206, determining that the electronic lock is the target electronic lock according to the position-related information of the electronic lock, specifically includes: and acquiring the graphic code information corresponding to the electronic lock, and determining that the electronic lock is the target electronic lock when the equipment information to which the electronic lock belongs in the graphic code information is matched with the equipment information to which the electronic lock belongs in the position related information of the electronic lock.
Referring to fig. 6, fig. 6 is an optional structural schematic diagram of an authorization peer 500 according to an embodiment of the present invention, where the authorization peer 500 may be one or more user terminals, and the authorization peer 500 includes: a third processor 3301, a third memory 3304, and a third network interface 3302. The various components in the authority 500 are coupled together by a bus system 3303. The third memory 3304 may be either volatile memory or nonvolatile memory, and may also include both volatile and nonvolatile memory. The third memory 3304 described in connection with the embodiments of the invention is intended to comprise these and any other suitable types of memory.
The third Processor 3301 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, etc., wherein the general purpose Processor may be a microprocessor or any conventional Processor, etc. The third memory 3304 can store executable instructions to support operations of the requesting end, examples of which include: various forms of software modules such as programs, plug-ins, and scripts for operating on the authorization peer 500 may include, for example, an operating system and application programs, where the operating system includes various system programs and drivers, such as a framework layer, a core library layer, a driver layer, etc., for implementing various underlying services and handling hardware-based tasks. The application programs may include programs that implement various functions of the authority 500.
In conjunction with the above, the requesting terminal 400 implementing the embodiment of the present invention is provided in the form of a series of memories and processors, in which executable instructions are stored, and when the executable instructions are executed by the processors, the electronic lock control method applied to the authorizing terminal 500 is executed. As an example that the unlocking control method applied to the authorization side provided by the embodiment of the present invention is implemented by combining software and hardware, the unlocking control method applied to the authorization side provided by the embodiment of the present invention may be directly embodied as the above-mentioned different forms of software modules executed by the third processor 3301, the software modules may be located in a storage medium located in the third memory 3304, and the third processor 3301 reads executable instructions included in the software modules in the third memory 3304, and completes the functions of the authorization side 500 in combination with necessary hardware (for example, including a processor and other components connected to the bus system). As an example of a software implementation of the unlocking control method applied to the authorization terminal 500, for example, a software module may be implemented to include: an authorization confirmation module 3305, configured to receive an authorization confirmation message sent by the blockchain network; after receiving an instruction for confirming the authorization confirmation message, generating a verification request message according to the request end identifier and the authorization end identifier, and sending the verification request message to a block chain network; the verification request message is used for the blockchain network to call a request end identity verification contract to verify the identity of the request end; and the unlocking control module 3306 is configured to receive a verification success message returned by the block chain network, and send an unlocking instruction to the block chain network.
In some embodiments, the authorization end further comprises: a location sending module 3307, configured to receive a notification message sent by a block chain network, where the notification message includes a request end identifier, waybill information, and expected delivery time; and when the confirmation operation carried out according to the notification message is detected, sending the position related information of the electronic lock to a corresponding request end.
Referring to fig. 7, fig. 7 is a schematic diagram of an alternative structure of an electronic lock 600 according to an embodiment of the present invention, where the electronic lock 600 may be one or more user terminals, and the electronic lock 600 includes: a fourth processor 4401, a fourth memory 4404, and a fourth network interface 4402. The various components in electronic lock 600 are coupled together by bus system 4403. The fourth memory 4404 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. The fourth memory 4404 described in connection with embodiments of the present invention is intended to include these and any other suitable types of memory.
The fourth Processor 4401 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like. The fourth memory 4404 can store executable instructions to support operations of the requesting end, examples of which include: various forms of software modules such as programs, plug-ins, and scripts for operating on the electronic lock 600 may include, for example, an operating system and application programs, where the operating system includes various system programs and drivers, such as a framework layer, a core library layer, a driver layer, etc., for implementing various underlying services and handling hardware-based tasks. The application programs may include programs that implement various functions of the electronic lock 600.
In conjunction with the above, the electronic lock 600 implementing an embodiment of the present invention is implemented by being provided in the form of a series of memories and processors, in which executable instructions are stored, which when executed by the processors, perform an electronic lock control method applied to the electronic lock. As an example that the unlocking control method applied to the electronic lock provided by the embodiment of the present invention is implemented by combining software and hardware, the unlocking control method applied to the electronic lock provided by the embodiment of the present invention may be directly embodied as the above-mentioned different forms of software modules executed by the fourth processor 4401, the software modules may be located in a storage medium, the storage medium is located in the fourth memory 4404, and the fourth processor 4401 reads executable instructions included in the software modules in the fourth memory 4404 and completes the functions of the electronic lock 600 by combining necessary hardware (for example, including a processor and other components connected to a bus system). As an example of software implementation of the unlocking control method applied to the electronic lock 600, for example, the software modules may be implemented to include: the unlocking module 4405 is configured to receive an unlocking instruction forwarded by the block chain network, and control the current state to be unlocked after verifying that both the block chain network signature and the authorization end signature are valid according to the unlocking instruction; and the locking module 4406 is configured to generate a locking state message according to the electronic lock identifier and the state information when detecting that the current state is changed from unlocking to locking, and send the locking state message to the block chain network after signing the locking state message.
Referring to fig. 8, an alternative flowchart of an unlocking control method for a blockchain network according to an embodiment of the present invention is shown, which can be applied to the blockchain network 100 shown in fig. 3, and will be described with reference to the following steps.
Step 101, receiving an unlocking request message of a request end, wherein the unlocking request message carries a request end identifier and an electronic lock identifier;
the unlocking request message refers to a message requesting to unlock a specified electronic lock. The request terminal is a user terminal corresponding to a requester who applies for opening the specified electronic lock.
103, calling an authorization terminal identity query contract to query an authorization terminal corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization terminal, wherein the authorization terminal identity query contract is an intelligent contract deployed in a block chain network;
the authorization end is a user terminal which has ownership right for the designated electronic lock and can control the owner of the corresponding electronic lock to open according to the opening request of the request end to the electronic lock. The user terminal refers to a smart device for installing a corresponding client program, and includes but is not limited to a mobile phone, a tablet computer, a personal computer, and the like. In the embodiment of the invention, the client program comprises a first client program applied to the request terminal so as to realize the electronic lock control method applied to the request terminal provided by the embodiment of the invention; and a second client program applied to the authorization end, so as to implement the electronic lock control method applied to the authorization end provided by the embodiment of the invention. And the authorization terminal identity query contract is deployed in the block chain network and is used for querying the state data of the corresponding relationship between the pre-stored electronic lock identifier and the authorization terminal identifier so as to determine the corresponding authorization terminal identifier according to the electronic lock identifier contained in the unlocking request message, namely to determine the owner. Taking an express receiving and sending scene as an example, the authorization terminal identity inquiry contract refers to a unique code of an electronic lock used for searching the serial number of a vehicle owner according to the electronic lock of the vehicle trunk. The electronic lock identification refers to information capable of uniquely characterizing the identity of the electronic lock, and includes, but is not limited to, a name, a number, an id (identification), and the like for characterizing the identity of the electronic lock. The authorization terminal identifier refers to information capable of uniquely characterizing the identity of an owner, and includes, but is not limited to, a user identity identification card number (SIM card number) of a user terminal corresponding to the authorization terminal, a user account number, a user name, and the like.
Taking an express receiving and sending scene as an example, the courier can send unlocking request information to the receiver to request the receiver to unlock an electronic lock on a designated device belonging to the receiver, so that the article can be placed into the designated device to complete the process of delivering the article to the receiver. In the express receiving and dispatching scene, the request end refers to a user terminal corresponding to the courier, and the authorization end refers to a user terminal corresponding to the receiver.
Step 105, receiving an authentication request message sent by the authorization side after confirming the authorization confirmation message, wherein the authentication request message is used for authenticating the identity of the request side;
and the authorization confirmation message is used for sending a verification request message for verifying the identity of the request terminal after the authorization terminal confirms. The block chain network receives an unlocking request message of a request end, calls an identity inquiry contract of the authorization end to determine the authorization end, and sends an authorization confirmation message to the authorization end based on the unlocking request message, so that the authorization end can judge whether an event corresponding to the unlocking request message sent by the request end is true based on the authorization confirmation message, if the event is true, the authorization end sends a verification request message to the block chain network after confirmation, and if the verification request message can be a confirmation instruction sent by aiming at the authorization confirmation message, the block chain network further verifies the identity of the request end according to the verification request message; if not, no confirmation is performed or a confirmation no instruction is sent to the blockchain network, and the process is ended.
Step 107, invoking a request end identity authentication contract to authenticate the identity of the request end according to a request end identifier in the authentication request message, wherein the request end identity authentication contract is an intelligent contract deployed in a block chain network;
the system comprises a request end identity authentication contract, a block chain network and a block chain network, wherein the request end identity authentication contract is deployed in the block chain network and is used for inquiring the state data of a pre-stored request end identification list so as to determine that the identity of a request end is a legal identity, namely that a requester is a legal user having an unlocking request message. Taking an express receiving and dispatching scene as an example, the request terminal identity verification contract is used for verifying whether a courier holds consignee goods or a delivery order.
Step 109, when the verification is passed, sending a verification success message to the authorization terminal so as to receive an unlocking instruction sent by the authorization terminal after receiving the verification success message;
and the block chain network receives the verification request message sent by the authorization terminal, and returns a verification success message to the authorization terminal after the identity of the request terminal is verified. After receiving the verification success message sent by the blockchain network, the authorization end can determine that the identity of the requester sending the unlocking request message is a legal user, so that an unlocking instruction can be sent to the blockchain network.
Step 111, transmitting the unlocking instruction signature to the electronic lock;
and the block chain network transmits the unlocking instruction signature to the electronic lock so as to control the electronic lock to be unlocked. The block chain network signs the unlocking instruction, so that the unlocking instruction sent to the electronic lock further carries the block chain network signature, and the safety of the electronic lock receiving the unlocking instruction is ensured.
In the method for controlling an electronic lock of a blockchain network provided by the embodiment of the invention, after receiving an unlocking request message from a request end, the blockchain network invokes an authorization end identity query contract to determine an authorization end, and sends an authorization confirmation message to the authorization end based on the unlocking request message, so that the authorization end judges whether an event corresponding to the unlocking request message sent by the request end is authentic or not based on the authorization confirmation message; the authorization end confirms the authorization confirmation message and then sends a verification request message to the blockchain network, the blockchain network further calls the identity verification contract of the request end according to the verification request message, the identity of the request end sending the unlocking request message is determined to be a legal user, then a verification success message is sent to the authorization end for the authorization end to send an unlocking instruction, at the moment, the authorization end confirms whether the event corresponding to the unlocking request message sent by the request end is true or not and the block chain network confirms whether the identity of the request end is legal or not, therefore, safety guarantee is provided for the problem of lack of trust between the request terminal and the authorization terminal, the remote control of the authorization terminal is supported to open the electronic lock under the condition of ensuring the identity safety of the request terminal, the authorization terminal can authorize the request terminal to open through the electronic lock, and the circulation of articles between the authorization terminal and the request terminal is completed.
In some embodiments, the receiving an unlocking instruction sent by the authorization terminal after receiving the verification success message, and forwarding the unlocking instruction to the electronic lock after signing the unlocking instruction includes:
receiving an unlocking instruction which is sent by the authorization end and carries an authorization end signature;
and calling an unlocking contract when the signature of the authorization end is verified to be valid, and forwarding the signature of the unlocking instruction to the electronic lock according to the electronic lock identifier corresponding to the signature of the authorization end in the unlocking instruction, wherein the unlocking contract is an intelligent contract deployed in a block chain network.
And the unlocking contract is deployed in the block chain network and is used for inquiring the state data of the corresponding relation between the pre-stored authorization end identification and the electronic lock identification so as to determine the corresponding electronic lock identification according to the authorization end identification in the unlocking instruction. Taking an express receiving and dispatching scene as an example, the unlocking contract is used for verifying whether the receiver has the unlocking right. The method comprises the steps that an authorization end sends an unlocking instruction with an authorization end signature to a block chain network, the block chain network verifies whether the authorization end signature is valid after receiving the unlocking instruction, and when the authorization end signature is valid, an unlocking contract is called to determine a corresponding electronic lock so that the unlocking instruction is sent to the corresponding electronic lock to be unlocked. The authorization end sends an unlocking instruction in an authorization end signature mode, the blockchain network verifies the validity of the authorization end signature, and the blockchain network can definitely know that the unlocking instruction is sent by the authorization end, so that the information safety can be further ensured.
In some embodiments, before receiving the unlocking request message from the requesting end, the method further includes:
receiving a position request message which is sent by the request end and carries a request end signature, wherein the position request message comprises a request end identifier, related information of a transmitted article and an authorization end identifier;
and when the signature of the request end is verified to be valid, calling an electronic lock position acquisition contract, and sending a notification message to a corresponding authorization end according to the position request message, wherein the notification message is used for the authorization end to confirm and then sending the related information of the electronic lock position to the request end, and the electronic lock position acquisition contract is an intelligent contract deployed in a block chain network.
The position request message is a request message used by the request end to request the authorization end to send the position of the electronic lock. The identifier of the requester is information for uniquely characterizing the identity of the requester, and includes, but is not limited to, a user identity identification card number (SIM card number), a user account number, a user name, and the like for characterizing a user terminal corresponding to the requester. And the electronic lock position acquisition contract is deployed in the block chain network and is used for inquiring the prestored state data of the corresponding relation between the authorization end identifier and the electronic lock identifier so as to determine the corresponding authorization end according to the authorization end identifier in the position request message. Taking an express receiving and dispatching scene as an example, the electronic lock position acquisition contract means that the electronic lock position acquisition contract is used for notifying a receiver of sending automobile position information to a courier by using an event notification function of a block chain network. And the block chain network acquires a position request message of the position of the electronic lock according to the request sent by the request end and sends a notification message to the corresponding authorization end. The notification message may include a request end identifier carried in the location request message, the related information of the delivered article, and an authorization end identifier, so that the authorization end determines whether the event requesting the location of the electronic lock is true based on the notification message, so as to determine whether to send the related information of the location of the electronic lock to the request end. The request end sends the position request message in a request end signature mode, the blockchain network verifies the validity of the request end signature, and the blockchain network can definitely know that the request end sends an unlocking instruction, so that the information safety can be further ensured.
Still taking an express receiving and dispatching scene as an example, a courier can send a position request message to a receiver to request the receiver to inform the courier of the position of the device to which the electronic lock belongs, so that the courier can request to open the electronic lock after reaching the position of the device to which the electronic lock belongs, specifically, the courier generates the position request message according to logistics information of the receiver, and the logistics information includes a courier identity, a receiver identity and a product name or an invoice number representing related information of a transmitted product. And after receiving the position request message sent by the courier, the block chain network sends a notification message to a corresponding receiver, so that the receiver can judge whether the event requesting the electronic lock position is real or not according to the notification message to determine whether to send the position related information of the electronic lock, such as the position of the vehicle provided with the electronic lock on the trunk to the corresponding courier. In the express receiving and dispatching scene, the request end refers to a user terminal corresponding to a courier, and the authorization end refers to a user terminal corresponding to a receiver.
In the above embodiment of the present invention, the request end may send a location request message for obtaining a location of the electronic lock to the authorization end, and the blockchain network sends a notification message to the corresponding authorization end according to the location request message, so that the authorization end can send location-related information of the electronic lock to the request end after confirmation, so that the electronic lock may be disposed on a device with a changeable location, and the authorization end can receive an article transported by the request end through the device with a changeable location and provided with the electronic lock.
In some embodiments, the delivery item related information includes waybill information corresponding to the delivery item, estimated delivery time; the sending of the notification message to the corresponding authorization terminal according to the location request message includes:
and sending a notification message containing the request end identification, the waybill information and the estimated delivery time to a corresponding authorization end according to the position request message.
The block chain network sends a notification message containing a request end identifier, waybill information and predicted delivery time to a corresponding authorization end according to a position request message sent by the request end, so that the authorization end can determine whether to send electronic lock position related information to the request end based on the position request message sent by the request end or not through the waybill information, and send the corresponding electronic lock position related information to the request end by combining the predicted delivery time.
Still taking an express receiving and dispatching scene as an example, when a courier needs to deliver an article to a receiver based on certain waybill information, a location request message may be sent to the blockchain network, and the blockchain network sends a notification message to the receiver based on the location request message, so that when the receiver determines that the article is actually express information of the receiver according to the waybill information in the notification message, the receiver sends electronic lock location related information corresponding to the expected delivery time to the courier.
In some embodiments, the unlocking request message carries a request end signature, and the invoking an authorized end identity query contract includes: when the signature of the request end is verified to be valid, an identity query contract of an authorization end is called; and/or
The verification request message carries an authorization end signature, and the invoking of the request end identity verification contract comprises: calling a request end identity verification contract when the authorization end signature is verified to be valid; and/or
The unlocking instruction carries an authorized terminal signature, and the unlocking instruction is forwarded to the electronic lock after the unlocking instruction signature, and the method comprises the following steps: and when the signature of the authorization end is verified to be valid, the unlocking instruction is subjected to block chain network signature and then forwarded to the electronic lock.
Here, the request terminal sends the unlocking request message in a request terminal signature mode, and the blockchain network verifies the validity of the request terminal signature, so that the blockchain network can definitely know that the unlocking request message is sent by the request terminal after receiving the unlocking request message. The authorization terminal sends a verification request message in a signature mode of the authorization terminal, and the blockchain network verifies the validity of the signature of the authorization terminal, so that the blockchain network can definitely know that the verification request message is sent by the authorization terminal after receiving the verification request message. The authorization end sends an unlocking instruction in an authorization end signature mode, the blockchain network verifies the validity of the authorization end signature, and the blockchain network can definitely know that the unlocking instruction is sent by the authorization end. Therefore, the request end and the authorization end respectively adopt a digital signature mode of a public key to send corresponding messages, the block chain network verifies the validity of the digital signature by using the private key of the block chain network, the sent messages are firstly ensured to be sent by the corresponding request end or the authorization end, and then the messages are processed, so that the safety of the messages can be further ensured.
In some embodiments, the step 111, after forwarding the signature of the unlocking instruction to the electronic lock, further includes:
receiving a locking state message which is sent by the electronic lock and carries an electronic lock signature;
and when the signature of the electronic lock is verified to be valid, updating the state of the corresponding electronic lock according to the electronic lock identifier in the locking state message and informing the authorization end.
After the electronic lock is opened, the request end can put the object to be transported to the authorization end into the equipment provided with the electronic lock, and then the equipment is locked again. The electronic lock monitors the change of the self state from opening to locking and actively submits a locking state message to the block chain network. The message content may be the key, the key being the electronic lock number, and the value being the electronic lock status and the electronic lock signature. The electronic lock sends the locking state message in an electronic lock signature mode, and the blockchain network verifies the validity of the electronic lock signature, so that the electronic lock can definitely know the locking state message sent by the electronic lock after the blockchain network receives the locking state message. And the block chain network updates the corresponding state of the electronic lock according to the electronic lock identifier in the locking state message and informs the authorized terminal of the change of the locking state of the electronic lock.
In some embodiments, the step 111, after forwarding the signature of the unlocking instruction to the electronic lock, further includes:
receiving multimedia information which is sent by image equipment and carries an image equipment signature;
and when the signature of the image equipment is verified to be valid, the multimedia information and the image equipment identification are stored in an associated manner.
The electronic lock belonging equipment also comprises imaging equipment arranged near the electronic lock. After the electronic lock is opened, the image equipment is automatically started, image information in a corresponding shooting range is recorded, and the image information of an unlocking person can be recorded and compressed to form multimedia information which is sent to the block chain network. The image device sends multimedia information in an image device signature mode, and the blockchain network verifies the validity of the image device signature so that the blockchain network can definitely know that the multimedia information is sent by the image device after receiving the multimedia information. And the block chain network stores the multimedia information and the image equipment identification in an associated manner according to the image equipment identification in the multimedia information. The storage content can be a keyword key to influence the device identifier and the starting time, and the value is a compressed image, an image compression algorithm, an image compression parameter and an influence device signature.
Referring to fig. 9, in another aspect of the present invention, an electronic lock control method is provided, which is applicable to the request end shown in fig. 5, and the method includes:
step 201, generating a position request message according to a request terminal identifier, related information of a transmitted article and an authorization terminal identifier, and sending the position request message to a block chain network; the position request message is used for sending the position related information of the electronic lock to the request end after the block chain network notification authorization end confirms the position request message;
the request end identifier refers to information for uniquely characterizing the identity of a requester, and includes, but is not limited to, a user identity identification card number (SIM card number), a user account number, a user name, and the like, for characterizing a user terminal corresponding to the requester who sends the unlocking request. The information related to the delivered article refers to information which can be used for determining the article which is delivered to the authorized end by the requesting end, such as the name of the article, the number of the shipping order and the like. The authorization end identifier refers to information capable of uniquely representing the identity of an owner, and includes, but is not limited to, a user identity identification card number (SIM card number), a user account number, a user name, and the like of a user terminal corresponding to the owner of the electronic lock.
The request end sends a position request message to the block chain network, the block chain network calls an electronic lock position acquisition contract, the state data of the corresponding relation between the pre-stored authorization end identification and the electronic lock identification is inquired, and the corresponding authorization end is determined according to the authorization end identification in the position request message. And the block chain network sends a notification message to the corresponding authorization terminal according to the position request message sent by the request terminal. The notification message may include a request end identifier carried in the location request message, the related information of the delivered article, and an authorization end identifier, so that the authorization end determines whether the event requesting the location of the electronic lock is true based on the notification message, so as to determine whether to send the related information of the location of the electronic lock to the request end.
Step 203, receiving the position related information of the electronic lock sent by the authorization terminal;
and the authorization terminal judges whether the event based on the position request message sent by the request terminal is true according to the notification message sent by the block chain network, and then confirms to send the position related information of the electronic lock to the request terminal. The request by the requester for the authorization to unlock the electronic lock is typically initiated based on an event, such as the requester needing to ship something to the owner of the electronic lock. The event is also an event based on which the location request message is based. The electronic lock position related information refers to information for representing the position of the electronic lock, such as an electronic lock identifier and an address of the electronic lock, an equipment identifier of the electronic lock and an address of the equipment of the electronic lock.
Step 205, when it is determined that the electronic lock is the target electronic lock according to the position-related information of the electronic lock, sending an unlocking request message to the blockchain network, where the unlocking request message is used for the blockchain network to call an authorization terminal identity query contract to send an authorization confirmation message to the authorization terminal, and the authorization terminal identity query contract is an intelligent contract deployed in the blockchain network;
the request end receives the position related information of the electronic lock sent by the authorization end, so that the address of the equipment to which the electronic lock belongs can be reached according to the position related information of the electronic lock. And the request terminal sends an unlocking request message to the block chain network when determining that the electronic lock is the target electronic lock according to the address of the equipment to which the electronic lock belongs. The unlocking request message is a message for requesting to unlock the appointed electronic lock, and the unlocking request message comprises a request end identifier and an electronic lock identifier. And the authorization terminal identity query contract is deployed in the block chain network and is used for querying the prestored state data of the corresponding relation between the electronic lock identifier and the authorization terminal identifier so as to determine the corresponding authorization terminal identifier according to the electronic lock identifier contained in the unlocking request message, namely determine the owner corresponding to the electronic lock.
In some embodiments, the information related to the position of the electronic lock is used to indicate that the request end reaches the position of the electronic lock; determining that the electronic lock is the target electronic lock according to the position related information of the electronic lock, comprising:
and acquiring the graphic code information corresponding to the electronic lock, and determining that the electronic lock is the target electronic lock when the equipment information to which the electronic lock belongs in the graphic code information is matched with the equipment information to which the electronic lock belongs in the position related information of the electronic lock.
After the request terminal reaches the address of the electronic lock according to the position related information of the electronic lock, the request terminal can obtain the information of the equipment to which the electronic lock belongs by scanning the graphic code corresponding to the electronic lock. The graphic code corresponding to the electronic lock can be set near the electronic lock by the owner of the electronic lock. The setting mode of the graphic code of the electronic lock mainly comprises two modes, namely, a first mode and a dynamic graphic code, the electronic lock belongs to equipment and can comprise a display device, the owner of the electronic lock can display the graphic code corresponding to the electronic lock through the display device, the display device is adopted to display the graphic code corresponding to the electronic lock, the owner of the electronic lock can conveniently replace the graphic code according to the set rule, the electronic lock can conveniently carry required information under different scenes through the graphic code, and the situation that other people can send an unlocking request message to a block chain network after repeatedly scanning the graphic code is avoided. And in the second mode, the static graphic code can be displayed on the electronic lock or the equipment to which the electronic lock belongs. The request terminal obtains the equipment information belonging to the graphic code information corresponding to the electronic lock by scanning the graphic code corresponding to the electronic lock, and when the equipment information belonging to the electronic lock in the position related information of the electronic lock is matched, the electronic lock is determined to be the target electronic lock.
Referring to fig. 10, in another aspect of the present invention, an electronic lock control method is provided, which can be applied to the authorization terminal shown in fig. 6, and the method includes:
step 301, receiving an authorization confirmation message sent by a blockchain network;
the authorization confirmation message is used for sending a verification request message for verifying the identity of the request terminal after the authorization terminal confirms. The block chain network receives an unlocking request message of a request end, calls an identity inquiry contract of an authorization end to determine the authorization end, and sends an authorization confirmation message to the authorization end based on the unlocking request message.
Step 303, after receiving the command for confirming the authorization confirmation message, generating a verification request message according to the request terminal identifier and the authorization terminal identifier, and sending the verification request message to the block chain network; the verification request message is used for the blockchain network to call a request end identity verification contract to verify the identity of the request end, and the request end identity verification contract is an intelligent contract deployed in the blockchain network;
the authorization end receives an authorization confirmation message sent by the blockchain network, judges whether an event corresponding to an unlocking request message sent by the request end is true, if so, sends a verification request message to the blockchain network after confirmation, and if the verification request message can be sent according to a confirmation instruction sent by the authorization confirmation message, the blockchain network further verifies the identity of the request end according to the verification request message; if not, no confirmation is performed or a confirmation no instruction is sent to the blockchain network, and the process is ended. The system comprises a request end identity authentication contract, a block chain network and a block chain network, wherein the request end identity authentication contract is deployed in the block chain network and is used for inquiring the state data of a pre-stored request end identification list so as to determine that the identity of a request end is a legal identity, namely that a requester is a legal user having an unlocking request message.
Step 305, receiving a verification success message returned by the blockchain network, and sending an unlocking instruction to the blockchain network;
and the authorization terminal sends a verification request message for verifying the identity of the request terminal to the blockchain network, and sends an unlocking instruction to the blockchain network when receiving a verification success message returned by the blockchain network. Before the authorization end sends the unlocking instruction to the blockchain network, the method may include: and detecting unlocking operation acting on the setting of the authorization terminal, such as a touch instruction of an unlocking key.
In some embodiments, before receiving the grant confirmation message sent by the blockchain network, the method includes:
receiving a notification message sent by a block chain network, wherein the notification message comprises a request end identifier, waybill information and predicted delivery time;
and when the confirmation operation carried out according to the notification message is detected, sending the position related information of the electronic lock to a corresponding request end.
Before the authorization end receives the authorization confirmation message sent by the blockchain network, the notification message forwarded after the blockchain network receives the unlocking request message of the request end is received, and when the confirmation operation of the notification message is detected, the position related information of the electronic lock is sent to the corresponding request end. The notification message comprises waybill information, so that the authorization terminal can determine whether the unlocking request message of the request terminal belongs to the event according to the waybill information so as to confirm whether the position related information of the electronic lock is sent to the request terminal. The notification message comprises the predicted delivery time, so that the authorization end can conveniently send the electronic lock position related information corresponding to the predicted delivery time to the request end according to the predicted delivery time.
In the above embodiment of the present invention, when the authorization end receives the verification success message returned by the blockchain network and aiming at verifying the identity of the request end, the authorization end has already confirmed whether the event to which the unlocking request message sent by the request end belongs is true or not, and the blockchain network has already confirmed whether the identity of the request end is legal or not, thereby providing security guarantee for the lack of trust between the request end and the authorization end, ensuring that the identity of the request end is safe, supporting the authorization end to remotely control to open the electronic lock, and facilitating the authorization end to open the request end through the electronic lock, and completing the circulation of articles between the authorization end and the request end.
Referring to fig. 11, in another aspect of the present invention, an electronic lock control method is provided, which can be applied to the electronic lock shown in fig. 7, and the method includes:
step 401, receiving an unlocking instruction forwarded by a block chain network, verifying that both a block chain network signature and an authorization terminal signature are valid according to the unlocking instruction, and controlling the current state to be open.
After receiving the unlocking instruction sent by the authorization terminal, the block chain network signs the unlocking instruction and forwards the unlocking instruction to the electronic lock. The electronic lock carries an unlocking instruction of the block chain network signature and the authorization end signature, and controls the current state to be open after verifying that the block chain network signature and the authorization end signature are both valid according to the unlocking instruction. The electronic lock verifies that the network signature of the block chain and the signature of the authorization end are both valid according to the unlocking instruction, and the method comprises the following steps: after the electronic lock receives the unlocking instruction, the current state is controlled to be open after the block chain network signature is verified to be valid and then the signature of the authorization terminal is verified to be valid. The electronic lock executes the unlocking instruction after passing the verification twice, so that the unlocking safety can be further ensured.
In some embodiments, the method further comprises:
and 403, when the current state is detected to be changed from open to locked, generating a locked state message according to the electronic lock identifier and the state information, signing the locked state message, and sending the signed locked state message to the block chain network.
After the electronic lock is opened, the request end can put the object to be transported to the authorization end into the equipment provided with the electronic lock, and then the equipment is locked again. The electronic lock monitors the change of the self state from opening to locking and actively submits a locking state message to the block chain network. The message content may be the key, the key being the electronic lock number, and the value being the electronic lock status and the electronic lock signature. The electronic lock sends the locking state message in an electronic lock signature mode, and the blockchain network verifies the validity of the electronic lock signature, so that the electronic lock can definitely know the locking state message sent by the electronic lock after the blockchain network receives the locking state message.
In order to further understand the implementation principle of the electronic lock control method provided by the embodiment of the present invention, the following describes a flow of the electronic lock control method by taking an express receiving and dispatching scene as an example, where a request end is a user terminal corresponding to a courier and an authorization end is a user terminal corresponding to an express recipient, please refer to fig. 12, where an electronic lock is disposed in a vehicle trunk of the recipient to open or lock the vehicle trunk, and a device to which the electronic lock belongs is a vehicle of the recipient, and the electronic lock control method includes the following steps:
s11, the request end obtains the automobile position from the block chain network; the requesting end receives a requesting end identifier, related information of a delivered article and a recipient identifier input by a courier, assembles a position request message requesting to acquire the position of a recipient vehicle, signs and then sends the position request message to the block chain network. Wherein the request end identification can be a courier number; the recipient identification may be a recipient number; the information related to the delivered article can comprise an express bill number and a predicted delivery time.
S12, the block chain network informs the authorization end of the owner position request; and the block chain network calls a position acquisition contract, and after receiving a position request message sent by the request end, the block chain network sends a notification message to the authorization end by using an event notification function.
S13, the authorization end confirms the notice and sends the automobile position to the request end; the block chain network sends a notification message to the authorization terminal according to the received position request message of the request terminal, wherein the notification message can comprise a request terminal identifier, related information of a transmitted article and a receiver identifier carried in the position request message sent by the request terminal, so that the authorization terminal can receive the notification message conveniently, determine whether an event to which the position request belongs is real according to the notification message, and send the vehicle position to the request terminal after confirmation. The vehicle position comprises information such as the address of the vehicle, the license plate number and the vehicle type.
S14, the request terminal scans the electronic lock and obtains the information of the vehicle;
s15, the authorization end returns the vehicle information to the request end; the request end reaches the address of the corresponding vehicle according to the position of the vehicle, and the courier scans the two-dimensional code on the display device of the vehicle to acquire the vehicle information carried in the two-dimensional code. The vehicle information may include a license plate number, a vehicle type, an electronic lock unique code. And the request terminal compares the vehicle information carried in the two-dimensional code with the vehicle information contained in the previously received vehicle position to determine the vehicle as the target vehicle.
S16, the request end sends unlocking request information to the block chain network; after the courier scans the electronic lock to obtain the vehicle information and determines the vehicle information as a target vehicle, the courier can click the unlocking request button and send an unlocking request message to the block chain system. The unlocking request information comprises a courier number and an electronic lock number. And the request terminal signs the unlocking instruction and then sends the unlocking instruction to the block chain network.
S17, the block chain network requests the authorization end for the owner authorization; after receiving an unlocking request message of a request end, the block chain network verifies the validity of the signature of the unlocking request message, invokes an identity query contract of an authorization end, determines a corresponding authorization end number according to an electronic lock code of an unlocking request message terminal, and sends an authorization confirmation message to the authorization end. The authorization confirmation message comprises a courier number and an electronic lock number carried in the unlocking request information.
S18, the authorization terminal requests the block chain network to verify whether the courier holds the owner' S goods; after receiving the authorization confirmation message, the authorization end sends a verification request message for requesting to verify the identity of the courier to the blockchain network. The message content of the verification request message comprises a courier number and a receiver number, the authorization terminal signs the verification request message and then sends the verification request message to the block chain network, and whether the courier holds the receiver to obtain the verification request message is verified through the block chain network.
S19, the block chain network returns the verification result to the authorization terminal;
s20, the authorization end sends an unlocking confirmation instruction to the block chain network; when the authorization terminal judges that the verification result is successful, at this time, the authorization terminal confirms whether the event corresponding to the unlocking request message sent by the request terminal is true or not, and the block chain network confirms whether the identity of the request terminal is legal or not, so that safety guarantee is provided for the problem of lack of trust between the request terminal and the authorization terminal.
S21, after receiving the unlocking instruction of the authorization end and signing, the block chain network forwards the unlocking instruction to the corresponding electronic lock; the block chain network signs the unlocking instruction of the authorization end and then sends the signing result to the electronic lock, and the block chain network can further ensure the safety of the unlocking instruction received by the electronic lock through the signing result. The unlocking instruction received by the electronic lock comprises an authorization end identifier, an electronic lock identifier, an unlocking control instruction, an authorization end signature and a block chain network signature.
S22, the electronic lock executes an unlocking instruction; after the electronic lock receives an unlocking instruction sent by the block chain network, the electronic lock executes the unlocking instruction after verifying that both the block chain network signature and the authorization end signature in the unlocking instruction are valid.
S23, the image device uploads image information to the block chain network; after the electronic lock is unlocked, a courier can open the vehicle trunk to store/pick up articles; meanwhile, after the trunk is opened, the image equipment arranged in the trunk is started, the image information of the trunk opener is recorded, and the image information is compressed and signed and then sent to the block chain network.
S24, the electronic lock sends the information of changing the state of the electronic lock to the block chain network; after the courier stores/extracts the articles, the trunk is closed, the electronic lock is locked again, and the updating state information of the electronic lock is automatically submitted to the block chain system. The message content is key which is the number of the electronic lock, and the value is the state of the electronic lock and the signature of the electronic lock.
S25, the block chain network informs the authorization end of lock closing; after receiving the electronic lock state message of the electronic lock, the block chain network updates the state of the electronic lock and sends a notification message to the authorization terminal.
In the electronic lock control method provided in the foregoing embodiment, after receiving an unlocking request message from a request end, a block chain network invokes an authorization end identity query contract to determine an authorization end, and sends an authorization confirmation message to the authorization end based on the unlocking request message, so that the authorization end determines whether an event corresponding to the unlocking request message sent by the request end is authentic based on the authorization confirmation message; the authorization end confirms the authorization confirmation message and then sends a verification request message to the blockchain network, the blockchain network further calls the identity verification contract of the request end according to the verification request message, the identity of the request end sending the unlocking request message is determined to be a legal user, then a verification success message is sent to the authorization end for the authorization end to send an unlocking instruction, at the moment, the authorization end confirms whether the event corresponding to the unlocking request message sent by the request end is true or not and the block chain network confirms whether the identity of the request end is legal or not, therefore, effective safety guarantee is provided for the problem of lack of trust between the request terminal and the authorization terminal, the authorization terminal is supported to remotely control and open the electronic lock under the condition of ensuring the identity safety of the request terminal, and the authorization terminal can authorize the request terminal to open through the electronic lock, so that the circulation of articles between the authorization terminal and the request terminal is completed.
In summary, the embodiments of the present invention have the following beneficial effects:
1) the problem of lack of trust between the requesting end and the authorizing end is solved, the article circulation is prevented from being completed by two opposite sides, and therefore adverse factors such as privacy disclosure, security threats and the like can be avoided;
2) the request end and the authorization end can be used as message senders to sign messages by using private keys of the request end and the authorization end, the blockchain network and the electronic lock can be used as message receivers to verify messages by using the private keys of the senders, and the request end and the authorization end can be internally provided with a holder private key to sign sent messages, so that forgery prevention and falsification prevention of the messages can be guaranteed, and the information safety is further guaranteed;
3) after the electronic lock is unlocked, the image equipment automatically records all information in the unlocking process and sends the information to the block chain network for storage;
4) the block chain network receives an unlocking request message of the request end, and controls the electronic lock to be remotely opened after receiving an unlocking instruction of the authorization end based on the intelligent contract processing logic, so that the authorization end can authorize the request end to complete circulation of articles between the authorization end and the request end through the electronic lock opening, and a safer and more convenient control flow for remotely opening the electronic lock is realized.
The above description is only an example of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present invention are included in the protection scope of the present invention.

Claims (28)

1. An electronic lock control method of a block chain network, the method comprising:
receiving an unlocking request message of a request terminal, wherein the unlocking request message carries a request terminal identifier and an electronic lock identifier;
calling an authorization terminal identity query contract to query an authorization terminal corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization terminal, wherein the authorization terminal identity query contract is an intelligent contract deployed in a block chain network;
receiving an authentication request message sent by the authorization terminal after the authorization confirmation message is confirmed, wherein the authentication request message is used for authenticating the identity of the request terminal;
calling a request end identity authentication contract to authenticate the identity of the request end according to the request end identification in the authentication request message, wherein the request end identity authentication contract is an intelligent contract deployed in a block chain network;
when the verification is passed, sending a verification success message to the authorization terminal so as to receive an unlocking instruction sent by the authorization terminal after receiving the verification success message;
and transmitting the unlocking instruction signature to the electronic lock.
2. The method as claimed in claim 1, wherein said receiving the unlocking instruction sent by said authorization terminal after receiving said verification success message, and forwarding said unlocking instruction to the electronic lock after signing, comprises:
receiving an unlocking instruction which is sent by the authorization end and carries an authorization end signature;
and calling an unlocking contract when the signature of the authorization end is verified to be valid, and forwarding the signature of the unlocking instruction to the electronic lock according to the electronic lock identifier corresponding to the signature of the authorization end in the unlocking instruction, wherein the unlocking contract is an intelligent contract deployed in a block chain network.
3. The method of claim 1, wherein before receiving the unlocking request message from the requesting end, the method further comprises:
receiving a position request message which is sent by the request end and carries a request end signature, wherein the position request message comprises a request end identifier, related information of a transmitted article and an authorization end identifier;
and when the signature of the request end is verified to be valid, calling an electronic lock position acquisition contract, and sending a notification message to a corresponding authorization end according to the position request message, wherein the notification message is used for the authorization end to confirm and then sending the related information of the electronic lock position to the request end, and the electronic lock position acquisition contract is an intelligent contract deployed in a block chain network.
4. The method of claim 3,
the related information of the transmitted article comprises waybill information and estimated delivery time corresponding to the transmitted article;
the sending of the notification message to the corresponding authorization terminal according to the location request message includes:
and sending a notification message containing the request end identification, the waybill information and the estimated delivery time to a corresponding authorization end according to the position request message.
5. The method of claim 1, wherein the unlocking request message carries a request-side signature, and the invoking an authority-side identity query contract comprises: when the signature of the request end is verified to be valid, an identity query contract of an authorization end is called; and/or
The verification request message carries an authorization end signature, and the invoking of the request end identity verification contract comprises: calling a request end identity verification contract when the authorization end signature is verified to be valid; and/or
The unlocking instruction carries an authorized terminal signature, and the unlocking instruction is forwarded to the electronic lock after the unlocking instruction signature, and the method comprises the following steps: and when the signature of the authorization end is verified to be valid, the unlocking instruction is subjected to block chain network signature and then forwarded to the electronic lock.
6. The method according to any one of claims 1 to 5, wherein after the signing of the unlocking instruction and forwarding to the electronic lock, further comprising:
receiving a locking state message which is sent by the electronic lock and carries an electronic lock signature;
and when the signature of the electronic lock is verified to be valid, updating the state of the corresponding electronic lock according to the electronic lock identifier in the locking state message and informing the authorization end.
7. The method according to any one of claims 1 to 5, wherein after the signing of the unlocking instruction and forwarding to the electronic lock, further comprising:
receiving multimedia information which is sent by image equipment and carries an image equipment signature;
and when the signature of the image equipment is verified to be valid, the multimedia information and the image equipment identification are stored in an associated manner.
8. An electronic lock control method, characterized in that the method comprises:
generating a position request message according to the request end identification, the related information of the transmitted article and the authorization end identification, and sending the position request message to the block chain network; the position request message is used for sending the position related information of the electronic lock to the request end after the block chain network notification authorization end confirms the position request message;
receiving electronic lock position related information sent by an authorization end;
and when the electronic lock is determined to be the target electronic lock according to the electronic lock position related information, sending an unlocking request message to the block chain network, wherein the unlocking request message is used for the block chain network to call an authorization terminal identity query contract and send an authorization confirmation message to the authorization terminal, and the authorization terminal identity query contract is an intelligent contract deployed in the block chain network.
9. The electronic lock control method according to claim 8, wherein the information relating to the position of the electronic lock is used to indicate that the requesting end reaches the position of the electronic lock; determining that the electronic lock is the target electronic lock according to the position related information of the electronic lock, comprising:
and acquiring the graphic code information corresponding to the electronic lock, and determining that the electronic lock is the target electronic lock when the equipment information to which the electronic lock belongs in the graphic code information is matched with the equipment information to which the electronic lock belongs in the position related information of the electronic lock.
10. An electronic lock control method, characterized in that the method comprises:
receiving an authorization confirmation message sent by a block chain network;
after receiving an instruction for confirming the authorization confirmation message, generating a verification request message according to the request end identifier and the authorization end identifier, and sending the verification request message to a block chain network; the verification request message is used for the blockchain network to call a request end identity verification contract to verify the identity of the request end, and the request end identity verification contract is an intelligent contract in a deployed blockchain network;
and receiving a verification success message returned by the blockchain network, and sending an unlocking instruction to the blockchain network.
11. The method of claim 10, wherein the receiving the grant confirmation message sent by the blockchain network comprises, prior to:
receiving a notification message sent by a block chain network, wherein the notification message comprises a request end identifier, waybill information and predicted delivery time;
and when the confirmation operation carried out according to the notification message is detected, sending the position related information of the electronic lock to a corresponding request end.
12. An electronic lock control method, characterized in that the method comprises:
and receiving an unlocking instruction forwarded by the block chain network, and controlling the current state to be open after verifying that the block chain network signature and the authorization terminal signature are both valid according to the unlocking instruction.
13. The method of claim 12, further comprising:
and when the current state is detected to be changed from open to locked, generating a locking state message according to the electronic lock identifier and the state information, signing and then sending the locking state message to the block chain network.
14. A blockchain network, the blockchain network comprising:
the authorization confirmation module is used for receiving an unlocking request message of a request end, wherein the unlocking request message carries a request end identifier and an electronic lock identifier; calling an authorization terminal identity query contract to query an authorization terminal corresponding to the electronic lock identifier in the unlocking request message, and sending an authorization confirmation message to the authorization terminal, wherein the authorization terminal identity query contract is an intelligent contract deployed in a block chain network;
the identity authentication module is used for receiving an authentication request message sent by the authorization terminal after the authorization confirmation message is confirmed, wherein the authentication request message is used for authenticating the identity of the request terminal; calling a request end identity authentication contract to authenticate the identity of the request end according to a request end identifier in the authentication request message, wherein the request end identity authentication contract is an intelligent contract deployed in a block chain network;
the unlocking module is used for sending a verification success message to the authorization terminal when the verification is passed so as to receive an unlocking instruction sent by the authorization terminal after receiving the verification success message; and transmitting the unlocking instruction signature to the electronic lock.
15. The blockchain network of claim 14, wherein the unlocking module is specifically configured to receive an unlocking instruction carrying an authorization side signature sent by the authorization side; and calling an unlocking contract when the signature of the authorization end is verified to be valid, and forwarding the signature of the unlocking instruction to the electronic lock according to the electronic lock identifier corresponding to the signature of the authorization end in the unlocking instruction, wherein the unlocking contract is an intelligent contract deployed in a block chain network.
16. The blockchain network of claim 14, wherein the blockchain network further includes a notification module, configured to receive a location request message carrying a request end signature sent by a request end before receiving an unlocking request message of the request end, where the location request message includes a request end identifier, information related to a transferred article, and an authorization end identifier;
and when the signature of the request end is verified to be valid, calling an electronic lock position acquisition contract, and sending a notification message to a corresponding authorization end according to the position request message, wherein the notification message is used for the authorization end to confirm and then sending the related information of the electronic lock position to the request end, and the electronic lock position acquisition contract is an intelligent contract in a deployment block chain network.
17. The blockchain network according to claim 16, wherein the information related to the delivered item includes waybill information and estimated delivery time corresponding to the delivered item, and the notification module sends a notification message to a corresponding authorization terminal according to the location request packet, specifically including:
and sending a notification message containing the request end identification, the waybill information and the estimated delivery time to a corresponding authorization end according to the position request message.
18. A blockchain network as claimed in any one of claims 14 to 17 wherein the blockchain network further comprises a status update module for receiving a lock status message carrying an electronic lock signature sent by the electronic lock; and when the signature of the electronic lock is verified to be valid, updating the state of the corresponding electronic lock according to the electronic lock identifier in the locking state message and informing the authorization end.
19. The blockchain network of any one of claims 14 to 17, wherein the blockchain network further comprises a video processing module for receiving multimedia information carrying a video device signature sent by a video device; and when the signature of the image equipment is verified to be valid, the multimedia information and the image equipment identification are stored in an associated manner.
20. A request side, characterized in that the request side comprises:
the position request module is used for generating a position request message according to the request end identifier, the related information of the transmitted article and the authorization end identifier and sending the position request message to the block chain network; the position request message is used for sending the position related information of the electronic lock to the request end after the block chain network notification authorization end confirms the position request message;
the position receiving module is used for receiving the position related information of the electronic lock sent by the authorization end;
and the unlocking request module is used for sending an unlocking request message to the block chain network when the electronic lock is determined to be the target electronic lock according to the position related information of the electronic lock, the unlocking request message is used for calling an authorization terminal identity query contract by the block chain network to send an authorization confirmation message to the authorization terminal, and the authorization terminal identity query contract is an intelligent contract deployed in the block chain network.
21. The requesting end of claim 20, comprising:
the position related information of the electronic lock is used for indicating the request terminal to reach the position of the electronic lock;
the unlocking request module determines that the electronic lock is a target electronic lock according to the electronic lock position related information, and specifically comprises the following steps:
and acquiring the graphic code information corresponding to the electronic lock, and determining that the electronic lock is the target electronic lock when the equipment information to which the electronic lock belongs in the graphic code information is matched with the equipment information to which the electronic lock belongs in the position related information of the electronic lock.
22. An authorization peer, characterized in that the authorization peer comprises:
the authorization confirmation module is used for receiving an authorization confirmation message sent by the block chain network; after receiving an instruction for confirming the authorization confirmation message, generating a verification request message according to the request end identifier and the authorization end identifier, and sending the verification request message to a block chain network; the verification request message is used for the blockchain network to call a request end identity verification contract to verify the identity of the request end, and the request end identity verification contract is an intelligent contract deployed in the blockchain network;
and the unlocking control module is used for receiving the verification success message returned by the block chain network and sending an unlocking instruction to the block chain network.
23. The authorization terminal according to claim 22, characterized in that the authorization terminal further comprises:
the system comprises a position sending module, a position receiving module and a position sending module, wherein the position sending module is used for receiving a notification message sent by a block chain network, and the notification message comprises a request end identifier, waybill information and expected delivery time; and when the confirmation operation carried out according to the notification message is detected, sending the position related information of the electronic lock to a corresponding request end.
24. An electronic lock, characterized in that the electronic lock comprises:
and the opening module is used for receiving an unlocking instruction forwarded by the block chain network, and controlling the current state to be open after verifying that the block chain network signature and the authorization terminal signature are both valid according to the unlocking instruction.
25. The electronic lock of claim 24, wherein the electronic lock further comprises a locking module configured to generate a locking status message based on the electronic lock identifier and the status information and send the locking status message to the blockchain network after signing the locking status message when detecting that the current status is changed from unlocked to locked.
26. A blockchain network, the blockchain network comprising:
a first memory for storing executable instructions;
a first processor for executing executable instructions stored in said memory to implement the electronic lock control method according to any one of claims 1 to 7.
27. A terminal device, wherein the terminal device is a request end, and the request end includes: a second memory for storing executable instructions; a second processor for executing executable instructions stored in said second memory to implement the electronic lock control method according to claim 8 or 9;
or, the terminal device is an authorization end, and the authorization end includes: a third memory for storing executable instructions; a third processor for executing executable instructions stored in said third memory to implement the electronic lock control method according to claim 10 or 11;
or, the terminal equipment is the electronic lock, the electronic lock includes: a fourth memory for storing executable instructions; a fourth processor for executing the executable instructions stored in said fourth memory to implement the electronic lock control method according to claim 12 or 13.
28. A storage medium having stored thereon executable instructions for causing a processor to perform the electronic lock control method according to any one of claims 1 to 13 when the executable instructions are executed.
CN201811232561.9A 2018-10-22 2018-10-22 Block chain network, electronic lock control method thereof, terminal device and storage medium Active CN111163034B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811232561.9A CN111163034B (en) 2018-10-22 2018-10-22 Block chain network, electronic lock control method thereof, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811232561.9A CN111163034B (en) 2018-10-22 2018-10-22 Block chain network, electronic lock control method thereof, terminal device and storage medium

Publications (2)

Publication Number Publication Date
CN111163034A CN111163034A (en) 2020-05-15
CN111163034B true CN111163034B (en) 2021-12-07

Family

ID=70555028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811232561.9A Active CN111163034B (en) 2018-10-22 2018-10-22 Block chain network, electronic lock control method thereof, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN111163034B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787020B (en) * 2020-07-02 2023-04-14 深圳市亲邻科技有限公司 Communication method and device based on block chain
CN111832083B (en) * 2020-09-15 2021-01-08 江苏开博科技有限公司 System resource tamper-proofing method based on block chain and national secret digital fingerprint technology
CN112967423A (en) * 2021-02-01 2021-06-15 德施曼机电(中国)有限公司 Method, system, equipment and storage medium for unlocking coded lock
CN113569226B (en) * 2021-09-22 2022-02-15 深圳市金蚁云数字科技有限公司 Parking space management system and method based on block chain
CN115035637A (en) * 2022-05-26 2022-09-09 北京溪塔科技有限公司 Lock control method and system based on block chain and electronic lock

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106797389A (en) * 2016-11-18 2017-05-31 深圳前海达闼云端智能科技有限公司 Block chain network, article trading method, device and node device
CN106875518A (en) * 2016-06-21 2017-06-20 阿里巴巴集团控股有限公司 The control method of smart lock, device and smart lock
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN108446917A (en) * 2018-05-08 2018-08-24 炬众钛合(天津)科技发展有限公司 A kind of packing material system and method based on block chain
CN108492071A (en) * 2018-03-27 2018-09-04 深圳市元征科技股份有限公司 A kind of express delivery information processing method and device based on block chain
CN108547239A (en) * 2018-06-01 2018-09-18 安徽灵图壹智能科技有限公司 A kind of Car sharing parking stall intelligent space lock
CN108564692A (en) * 2018-04-10 2018-09-21 周伟 A kind of unlock verification method and system for unlocking based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286951A1 (en) * 2016-04-04 2017-10-05 Moving Media GmbH Dynamic Delivery Authorization for Cryptographic Payments

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875518A (en) * 2016-06-21 2017-06-20 阿里巴巴集团控股有限公司 The control method of smart lock, device and smart lock
CN106797389A (en) * 2016-11-18 2017-05-31 深圳前海达闼云端智能科技有限公司 Block chain network, article trading method, device and node device
CN108492071A (en) * 2018-03-27 2018-09-04 深圳市元征科技股份有限公司 A kind of express delivery information processing method and device based on block chain
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain
CN108564692A (en) * 2018-04-10 2018-09-21 周伟 A kind of unlock verification method and system for unlocking based on block chain
CN108446917A (en) * 2018-05-08 2018-08-24 炬众钛合(天津)科技发展有限公司 A kind of packing material system and method based on block chain
CN108547239A (en) * 2018-06-01 2018-09-18 安徽灵图壹智能科技有限公司 A kind of Car sharing parking stall intelligent space lock

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"A security framework for IOT devices against wireless threats;Garima Varshney 等;《2017 2nd International Conference on Telecommunication and Networks (TEL-NET)》;20180423;全文 *
"Formation of industrial and logistic parks in Kazakhstan";Gulmira Bodaubayeva;《2015 4th International Conference on Advanced Logistics and Transport (ICALT)》;20150629;全文 *
"区块链技术在物流快递行业中的应用浅析";宁卓 等;《中国市场》;20180331;全文 *
"电商平台下物联网智能快递箱现状及改进";魏旭等;《包装工程》;20181210(第23期);全文 *

Also Published As

Publication number Publication date
CN111163034A (en) 2020-05-15

Similar Documents

Publication Publication Date Title
CN111163034B (en) Block chain network, electronic lock control method thereof, terminal device and storage medium
KR102472230B1 (en) Methods and systems implemented in blockchain
US11463241B2 (en) Transmitting or receiving blockchain information
US11138608B2 (en) Authorizing multiparty blockchain transactions via one-time passwords
CN108197913B (en) Payment method, system and computer readable storage medium based on block chain
US20230161898A1 (en) Accessing information based on privileges
CN110598434B (en) House information processing method and device based on blockchain network, electronic equipment and storage medium
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
US20020152376A1 (en) Method for deployment of a workable public key infrastructure
US20190097806A1 (en) System and Methods for Resolving Data Discrepancies in a Distributed System with Blockchain Controls
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CN111222935A (en) Transportation means sharing method based on block chain network, terminal and storage medium
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
US20210012447A1 (en) Method and System for Processing Firearm-Related Data
CN113141404B (en) Intelligent gateway and data sharing system
CN112287311A (en) Service implementation method and device based on block chain
JP2006119769A (en) Content providing system
CN115708119A (en) Cross-chain transaction system, method, device and storage medium
JP6175490B2 (en) Method and computer communication system for authenticating a client system
CN111241188B (en) Consensus method, node and storage medium in block chain network
Piramuthu RFID-based non-repudiation protocols for supply chains
CN117714062A (en) Asset information processing method, device, equipment and medium based on block chain
CN117395005A (en) Identity authentication system, method and computer equipment based on block chain
CN115170016A (en) Abnormal service processing method and device based on block chain
CN117081839A (en) Key management method, device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant