CN111508161B - Locker application method, equipment and storage medium - Google Patents

Locker application method, equipment and storage medium Download PDF

Info

Publication number
CN111508161B
CN111508161B CN202010277680.7A CN202010277680A CN111508161B CN 111508161 B CN111508161 B CN 111508161B CN 202010277680 A CN202010277680 A CN 202010277680A CN 111508161 B CN111508161 B CN 111508161B
Authority
CN
China
Prior art keywords
locker
request
block chain
cabinet
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010277680.7A
Other languages
Chinese (zh)
Other versions
CN111508161A (en
Inventor
张振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Left Chain Technology Co ltd
Original Assignee
Hangzhou Left Chain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Left Chain Technology Co ltd filed Critical Hangzhou Left Chain Technology Co ltd
Priority to CN202010277680.7A priority Critical patent/CN111508161B/en
Publication of CN111508161A publication Critical patent/CN111508161A/en
Application granted granted Critical
Publication of CN111508161B publication Critical patent/CN111508161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/10Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property
    • G07F17/12Coin-freed apparatus for hiring articles; Coin-freed facilities or services for means for safe-keeping of property, left temporarily, e.g. by fastening the property comprising lockable containers, e.g. for accepting clothes to be cleaned
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Multimedia (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a locker application method, equipment and a storage medium, wherein the method comprises the following steps: monitoring whether an unprocessed storage request of a storage cabinet managed by a current storage cabinet management node is recorded in a storage cabinet management contract; in response to monitoring the first storage request, locally inquiring the state of a corresponding locker to generate a locker distribution result, generating a distribution result, submitting a transaction and broadcasting the distribution result in a block chain network; when the distribution result is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction; monitoring whether an unprocessed first fetching request of a locker managed by a current node is recorded in a locker management contract or not; generating and outputting a second cabinet opening instruction in response to monitoring the first fetching request; monitoring whether the second cabinet door is opened successfully: if so, a status update transaction is generated and broadcast in the blockchain network. The invention ensures that the user can still use the storage cabinet safely and conveniently without keeping the paper bar code.

Description

Locker application method, equipment and storage medium
Technical Field
The application relates to the technical field of internet, in particular to a locker application method, equipment and a storage medium.
Background
Currently, the most common locker scheme adopts a centralized random code verification mode, for example, a user clicks a storage button on a supermarket locker, the locker distributes and prints random barcodes for the user, and opens a corresponding cabinet door, and when the user needs to take a thing and finishes using the locker, the locker needs to scan the previously printed random barcodes and verify the locker.
In the scheme, the user must properly maintain and manage the random bar code printed by the storage cabinet, once the user loses or destroys the bar code, the user can only seek the help of the management personnel of the storage cabinet, and at the moment, if the user cannot know which cabinet lattice exists, the problem of difficult positioning often exists.
In addition, the centralized locker has the problems that when a dispute between a user and a locker manager occurs, evidence can be provided only by relying on the monitoring video, and when the monitoring video is lost, the evidence which is enough to define a real responsible party in the dispute is lacked.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a locker application method, device and storage medium that a user can safely and conveniently use a locker without keeping a paper barcode, and further to provide a reliable evidence-of-deposit tracing basis for dispute responsibility definition.
In a first aspect, the present invention provides a locker application method applicable to a locker management node, where the locker management node is a node simultaneously operating a block chain node and a locker control system, and a locker management contract is configured on a block chain, and the method includes:
monitoring whether an unprocessed storage request of a storage cabinet managed by a current storage cabinet management node is recorded in a storage cabinet management contract; the storage request transaction is generated and sent to a block chain network after the storage request transaction is acquired by a user side;
responding to the monitored unprocessed first storage request, locally inquiring the state of a corresponding locker to generate a locker distribution result of the first storage request, generating a distribution result, submitting a transaction and broadcasting the distribution result in a block chain network for execution through a locker management contract, and recording the distribution result of the first storage request on a block chain;
when the distribution result of the storage cabinet is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction to control to open a corresponding first cabinet door;
monitoring whether an unprocessed first fetching request of a locker managed by a current locker management node is recorded in a locker management contract or not; the method comprises the steps that an unprocessed first fetching request is recorded on a block chain after a first fetching request transaction is successfully executed by a locker management contract, and the first fetching request transaction is generated by a user terminal responding to a user request and stopping using the locker and is sent to a block chain network;
responding to the first article taking request which is not processed, generating a second cabinet opening instruction and outputting the second cabinet opening instruction to control to open a corresponding second cabinet door;
monitoring whether the second cabinet door is opened successfully: if so, generating a state updating transaction and broadcasting the state updating transaction in the block chain network for execution through the locker management contract, and updating the use state of the cabinet lattice corresponding to the second cabinet door on the block chain.
In a second aspect, the present invention provides a locker application method for a user side, including:
obtaining locker information of a first locker to generate a locker request transaction and sending the locker request transaction to a block chain network, so that block chain nodes can execute through locker management contracts, and recording an unprocessed first locker request to the block chain so as to manage a first locker management node of the first locker:
after monitoring the first storage request, locally inquiring the state of a corresponding locker to generate a locker distribution result of the first storage request, generating a distribution result, submitting a transaction and broadcasting the distribution result in a block chain network so that block chain nodes can execute the distribution result through a locker management contract, and recording the distribution result of the first storage request on a block chain; and the number of the first and second groups,
when the distribution result of the storage cabinet is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction to control to open a corresponding first cabinet door;
responding to a current user request to open a first cabinet door to terminate the use of the locker, generating a first fetching request transaction and sending the transaction to a block chain network for the block chain nodes to execute through a locker management contract, and recording an unprocessed first fetching request to the block chain for the first locker management node:
after the first fetching request is monitored, generating a second cabinet opening instruction and outputting the second cabinet opening instruction to control opening of a corresponding second cabinet door; and the number of the first and second groups,
monitoring whether the second cabinet door is opened successfully: if so, generating a state updating transaction and broadcasting the state updating transaction in the block chain network for execution through the locker management contract, and updating the use state of the cabinet lattice corresponding to the second cabinet door on the block chain.
The locker management node is a node which runs a block chain node and a locker control system at the same time.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a locker application method provided according to embodiments of the invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program, the computer program causing a computer to execute the locker application method according to the embodiments of the present invention.
According to the locker application method, the equipment and the storage medium provided by the embodiments of the invention, the locker management contract is configured on the block chain, the integrated block chain node and the locker management node of the locker control system are configured for the locker, so that the locker opening authority of a user is recorded on the block chain, and the locker opening authority is verified by the contract on the block chain, so that the user can safely and conveniently use the locker without keeping a paper barcode;
the locker application method, equipment and storage medium provided by some embodiments of the invention further enrich the application mode of the locker and optimize the user experience by allowing the user to open the locker and continue to use the locker in the using process;
the locker application method, the equipment and the storage medium provided by some embodiments of the invention further provide reliable evidence-saving tracing basis for disputes between users and locker managers by managing contracts of the lockers and verifying the locker opening authority of locker managers;
the locker application method, equipment and storage medium provided by some embodiments of the invention further enrich the application mode of the locker and optimize the user experience by allowing the user to partially or completely transfer the use right of the locker in the process of using the locker.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a locker application method according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a preferred embodiment of the method shown in FIG. 1.
FIG. 3 is a flow diagram of another preferred embodiment of the method shown in FIG. 1.
FIG. 4 is a flowchart of another locker application method according to an embodiment of the present invention.
FIG. 5 is a flow chart of a preferred embodiment of the method shown in FIG. 4.
Fig. 6 is a flow chart of another preferred embodiment of the method shown in fig. 4.
FIG. 7 is a flow chart of yet another preferred embodiment of the method shown in FIG. 4.
Fig. 8 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a locker application method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides a locker application method suitable for a locker management node, where the locker management node is a node running a block chain node and a locker control system at the same time, and a locker management contract is configured on the block chain, and the method includes:
s11: monitoring whether an unprocessed storage request of a storage cabinet managed by a current storage cabinet management node is recorded in a storage cabinet management contract; the storage request transaction is generated and sent to a block chain network after the storage request transaction is acquired by a user side;
s12: responding to the monitored unprocessed first storage request, locally inquiring the state of a corresponding locker to generate a locker distribution result of the first storage request, generating a distribution result, submitting a transaction and broadcasting the distribution result in a block chain network for execution through a locker management contract, and recording the distribution result of the first storage request on a block chain;
s13: and when the distribution result of the storage cabinet is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction to control the opening of the corresponding first cabinet door.
S14: monitoring whether an unprocessed first fetching request of a locker managed by a current locker management node is recorded in a locker management contract or not; the method comprises the steps that an unprocessed first fetching request is recorded on a block chain after a first fetching request transaction is successfully executed by a locker management contract, and the first fetching request transaction is generated by a user terminal responding to a user request and stopping using the locker and is sent to a block chain network;
s15: responding to the first article taking request which is not processed, generating a second cabinet opening instruction and outputting the second cabinet opening instruction to control to open a corresponding second cabinet door;
s161: monitoring whether the second cabinet door is opened successfully:
if yes, go to step S162: and generating a state updating transaction and broadcasting the state updating transaction in the block chain network so as to be executed through the locker management contract, and updating the use state of the cabinet lattice corresponding to the second cabinet door on the block chain.
The method is exemplified by the case that the tourist nail uses the locker at the A entrance of a certain scenic spot.
Before entering the A port of the scenic spot, the tourist needs to use the storageThe storage cabinet stores some articles, and the user terminal can scan the two-dimensional code on the storage cabinet x to acquire the equipment information m of the storage cabinet xx(different ways commonly used in the field, such as inputting the device code displayed on the locker x into the user end by the user A, can also be adopted), the user end of the user A generates the code including mxThe stock requisition transaction tx1, tx1 is sent to the blockchain network.
The blockchain node receives, broadcasts, packages and executes tx1 through the locker management contract, records the guest A request to use locker x's locker request (status is unprocessed) on the blockchain.
Preferably, the locker management contract, when executing tx1, needs to determine whether locker x is free for supply: if the locker x needs to be used for payment, the deposit of the guest A is frozen in the contract when the tx1 is executed, if the deposit is not frozen, the tx1 is failed to execute, and the storage request is not recorded.
In step S11, the locker management node X managing the locker X monitors whether an unprocessed locker request of the locker managed by the current node is recorded in the locker management contract according to the local blockchain database. The locker management node X can only manage the locker X, and can also manage a plurality of lockers simultaneously through means commonly used in the field, such as the Internet of things.
In step S12, after monitoring the storage request of the guest a requesting to use the locker X, the locker management node X queries the use status of each cell of the locker X in the local block chain database to determine whether there are any cells that can be allocated to the guest a (only the locker X may be queried, or query other lockers located at the same position as the locker X at the same time):
if not, generating a locker distribution result with failed distribution, generating a distribution result comprising the distribution result, submitting the distribution result to a transaction tx2, broadcasting tx2 in the blockchain network, and recording the distribution result with failed distribution of the storage request of the tourist A to the blockchain;
if yes, generating a locker distribution result which is successfully distributed and comprises the specifically distributed grid information, generating a distribution result comprising the distribution result, submitting the distribution result to a transaction tx3, broadcasting tx3 in the blockchain network, and recording the distribution result of the storage request of the tourist A to the blockchain (at the moment, the currently distributed grid cannot be distributed to other users when the state of the blockchain is in use); and the number of the first and second groups,
and step S13 is executed, the locker management node X generates a locker opening instruction and outputs the locker opening instruction to control the locker X to open the corresponding cabinet door for the guest A to store.
When the tourist A finishes the tour and returns to the port A to take out the stored objects, the fetching request information is input into the user side, the user side generates a first fetching request transaction tx4 through the private key signature of the tourist A, and tx4 is sent to the block chain network;
the block chain node receives, broadcasts, packages and executes tx4 through a locker management contract, verifies the signature of tx4 through the public key of the first visitor, and verifies whether the fetching request of the first visitor is legal according to the data recorded in the contract (for example, the request of opening the grids of other lockers or the request of opening different grids of the same locker belong to illegal requests):
if not, tx4 fails;
if yes, tx4 is executed successfully, and the fetching request (type is end use, status is unprocessed) of the guest nail is recorded on the blockchain;
in step S14, the locker management node X monitors whether an unprocessed fetching request of the locker managed by the current node is recorded in the locker management contract according to the local blockchain database.
In step S15, after monitoring the fetching request of the first visitor, the locker management node X generates a locker opening instruction and outputs the instruction to control the locker X to open the corresponding cabinet door for the first visitor to fetch;
in step S161, the locker management node X monitors whether the door is opened successfully by waiting for receiving the notification information returned by the locker X:
if not, generating a cabinet opening instruction again and outputting the cabinet opening instruction (if repeated cabinet opening fails, generating alarm information to inform relevant workers);
if yes, step S162 is executed to generate a status update transaction tx5, broadcast tx5 in the blockchain network, and update the use status of the grid that the guest finishes using to be free (if the locker needs to pay for use, the contract also deducts the fee from the frozen deposit and unfreezes the rest deposit when tx5 is executed).
In the above example, the tourist coach uses the scenic spot storage cabinet as an example, the method is exemplarily described, and in more embodiments, the method can be applied to any places with storage requirements, such as supermarkets, districts, schools, and the like, and can achieve the same technical effect.
FIG. 2 is a flow diagram of a preferred embodiment of the method shown in FIG. 1. As shown in fig. 2, in a preferred embodiment, the method further comprises:
s171: monitoring whether an unprocessed second fetching request of the storage cabinet managed by the current storage cabinet management node is recorded in the storage cabinet management contract or not; the unprocessed second fetching request is recorded on the block chain after the execution of the second fetching request transaction is successful by the management contract of the locker, and the second fetching request transaction is generated by the user side responding to the user request in the process of using and is sent to the block chain network;
s172: and generating a third cabinet opening instruction in response to the second unprocessed fetching request, and outputting to control the opening of a corresponding third cabinet door.
Similarly, for the example that the tourist A uses the scenic spot locker, when the tourist A needs to temporarily take out a part of articles in the locker and continuously store another part of articles due to a sudden reason during the visiting process, the user side of the tourist A generates a second article taking request transaction tx6 through the private key signature of the tourist A, and tx6 is sent to the blockchain network;
the blockchain node receives, broadcasts, packages and executes tx6 through a locker management contract, verifies the signature of tx6 through the public key of the first tourist, and verifies whether the fetching request of the first tourist is legal according to the data recorded in the contract:
if not, tx6 fails;
if yes, tx6 is executed successfully, and the fetching request (type is continuously used and status is unprocessed) of the guest nail is recorded on the blockchain;
in step S171, the locker management node X monitors whether an unprocessed fetching request of the locker managed by the current node is recorded in the locker management contract according to the local block chain database;
in step S172, after monitoring the fetching request of tx6, the locker management node X generates a locker opening instruction and outputs the instruction to control the locker X to open the corresponding cabinet door for the guest to fetch.
FIG. 3 is a flow diagram of another preferred embodiment of the method shown in FIG. 1. In another preferred embodiment, as shown in fig. 3, the method further comprises:
s181: monitoring whether an unprocessed manager cabinet opening request of the storage cabinet managed by the current storage cabinet management node is recorded in the storage cabinet management contract; the unprocessed manager cabinet opening request is recorded on a block chain after the manager cabinet opening transaction is successfully executed by a locker management contract, and the manager cabinet opening transaction is generated by a management terminal responding to the manager request cabinet opening and is sent to a block chain network;
s182: and responding to the monitored unprocessed manager cabinet opening request, generating a fourth cabinet opening instruction and outputting the fourth cabinet opening instruction to control the opening of the corresponding fourth cabinet door.
Specifically, in the conventional locker scheme, a manager may open the locker without any trace or delete the locker opening record in the centralized server, and the problem of guarding against self-theft can be prevented only by the monitoring video, and if the monitoring video is lost due to various reasons when disputes occur, the manager cannot be proved to have illegal operation.
In the embodiment, the management authority of the administrator and the opening operation record are linked, so that the operation of the administrator can be traced through the block chain, and a reliable proof can be provided for determining whether the administrator has illegal operation or not under the condition that the monitoring video is absent.
In a preferred embodiment, the locker management contract is further used for executing locker use authorization transaction, and recording the use authority of the newly added authorized user on the block chain when the execution is successful.
Specifically, also taking the example that the tourist A uses the scenic spot locker, when the tourist A is deep into the scenic spot and is far away from the A port, and the friend B of the tourist A needs to take the tourist A and store the tourist A into a certain object in the locker, the user side of the tourist A can generate a locker use authorization transaction tx7 through the private key signature of the tourist A and send tx7 to the blockchain network.
The blockchain node receives, broadcasts, packages and executes tx7 through a locker management contract, verifies whether the authorization of the transaction is legal:
if not, tx7 fails;
if yes, tx7 is executed successfully, and the usage right of B is recorded on the blockchain (the usage right of A is reserved).
At this time, the user side of the second object taking device can open the cabinet for the second object taking device to take the object by generating and sending the second object taking request transaction, and after the first object returns to the port a, the first object can take out the rest of the objects by the method shown in fig. 1.
In a preferred embodiment, the locker management contract is further used for executing locker usage right transfer transaction, and replacing the usage right of the transferor recorded on the blockchain with the usage right of the transferee when the execution is successful.
Also taking the tourist A as an example of using the scenic spot storage cabinet, when the tourist A temporarily leaves the scenic spot from the scenic spot B, the tourist A can transfer the use authority of the storage cabinet to a friend C near the A, and the tourist A can be used for taking out objects in the storage cabinet.
Specifically, the user side of the first can generate a locker right transfer transaction tx8 through the private key signature of the first, and transmit tx8 to the blockchain network.
The blockchain node receives, broadcasts, packages and executes tx8 through a locker management contract, verifies whether the right to use transfer of the transaction is legal:
if not, tx8 fails;
if yes, tx8 is executed successfully, the usage right of third is recorded on the blockchain, and the usage right of first is deleted.
At this time, the third user side can open the cabinet by generating and sending the first fetching request transaction method so as to fetch the third object.
FIG. 4 is a flowchart of another locker application method according to an embodiment of the present invention. The method illustrated in fig. 4 may be performed in conjunction with the method illustrated in fig. 1.
As shown in fig. 4, in this embodiment, the present invention further provides a locker application method suitable for a user side, including:
s22: obtaining locker information of a first locker to generate a locker request transaction and sending the locker request transaction to a block chain network, so that block chain nodes can execute through locker management contracts, and recording an unprocessed first locker request to the block chain so as to manage a first locker management node of the first locker:
after monitoring the first storage request, locally inquiring the state of a corresponding locker to generate a locker distribution result of the first storage request, generating a distribution result, submitting a transaction and broadcasting the distribution result in a block chain network so that block chain nodes can execute the distribution result through a locker management contract, and recording the distribution result of the first storage request on a block chain; and the number of the first and second groups,
when the distribution result of the storage cabinet is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction to control to open a corresponding first cabinet door;
s26: responding to a current user request to open a first cabinet door to terminate the use of the locker, generating a first fetching request transaction and sending the transaction to a block chain network for the block chain nodes to execute through a locker management contract, and recording an unprocessed first fetching request to the block chain for the first locker management node:
after the first fetching request is monitored, generating a second cabinet opening instruction and outputting the second cabinet opening instruction to control opening of a corresponding second cabinet door; and the number of the first and second groups,
monitoring whether the second cabinet door is opened successfully: if so, generating a state updating transaction and broadcasting the state updating transaction in the block chain network for execution through the locker management contract, and updating the use state of the cabinet lattice corresponding to the second cabinet door on the block chain.
The locker management node is a node which runs a block chain node and a locker control system at the same time.
The application principle of the method shown in fig. 4 can refer to the method shown in fig. 1, and is not described herein again.
FIG. 5 is a flow chart of a preferred embodiment of the method shown in FIG. 4. The method illustrated in fig. 5 may be performed in conjunction with the method illustrated in fig. 2.
As shown in fig. 5, in a preferred embodiment, the method further includes:
s23: responding to a current user request for opening the cabinet in the using process, generating a second fetching request transaction and sending the second fetching request transaction to the block chain network so that the block chain nodes can execute through the locker management contract, recording the unprocessed second fetching request to the block chain, and generating a third cabinet opening instruction and outputting the third cabinet opening instruction to control opening of a corresponding third cabinet door after the first locker management node monitors the second fetching request.
The application principle of the method shown in fig. 5 can refer to the method shown in fig. 2, and is not described herein again.
In a preferred embodiment, the locker management contract is further configured to execute an administrator opening transaction, and record an unprocessed administrator opening request to the block chain, so that the corresponding locker management node generates a fourth cabinet instruction after monitoring the administrator opening request and outputs the fourth cabinet instruction to control opening of the corresponding fourth cabinet door.
The manager opening transaction is generated by the management terminal responding to the manager request opening and is sent to the block chain network.
The above-mentioned preferred embodiment can be executed in conjunction with the method shown in fig. 3, and the application principle thereof can refer to the method shown in fig. 3, which is not described herein again.
Fig. 6 is a flow chart of another preferred embodiment of the method shown in fig. 4. The method illustrated in fig. 6 may be performed in conjunction with the preferred embodiment of the method illustrated in fig. 1-3 described above.
As shown in fig. 6, in a preferred embodiment, the method further includes:
s24: and responding to the current user to authorize the first user to commonly use the locker, generating locker use authorization transaction and sending the locker use authorization transaction to the block chain network, so that the block chain nodes can execute the transaction through the locker management contract, and recording the use permission of the newly added first user on the block chain.
It is obvious that, in this embodiment, when the newly added authorized user terminates the use of the locker, the user end of the current user does not need to (or cannot) perform step S26.
The principle of application of the method shown in fig. 6 can be referred to the preferred embodiments of the methods shown in fig. 1-3, and will not be described herein again.
FIG. 7 is a flow chart of yet another preferred embodiment of the method shown in FIG. 4. The method illustrated in fig. 7 may be performed in conjunction with the preferred embodiment of the method illustrated in fig. 1-3 described above.
As shown in fig. 7, in a preferred embodiment, the method further includes:
s25: and responding to the current user to transfer the use right of the locker to a second user, generating locker use right transfer transaction and sending the locker use right transfer transaction to the blockchain network, so that the blockchain node can execute the transaction through a locker management contract, and replacing the use right of the current user recorded on the blockchain with the use right of the second user.
It is obvious that, in the present embodiment, after the step S25 is successfully executed, the user end of the current user cannot execute the step S26 any more.
The principle of application of the method shown in fig. 7 can be referred to the preferred embodiments of the methods shown in fig. 1-3, and will not be described herein again.
Fig. 8 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 8, as another aspect, the present application also provides an apparatus 800 including one or more Central Processing Units (CPUs) 801 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. In the RAM803, various programs and data necessary for the operation of the apparatus 800 are also stored. The CPU801, ROM802, and RAM803 are connected to each other via a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
The following components are connected to the I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as necessary. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (12)

1. A locker application method is applied to a locker management node, the locker management node is a node which runs a block chain node and a locker control system simultaneously, and a locker management contract is configured on a block chain, and the method comprises the following steps:
monitoring whether unprocessed storage requests of the storage cabinets managed by the current storage cabinet management nodes are recorded in the storage cabinet management contract or not; the unprocessed storage request is recorded on a block chain by the locker management contract after the successful execution of the storage request transaction, and the storage request transaction is generated and sent to a block chain network after the locker information is acquired by a user side;
in response to monitoring an unprocessed first storage request, locally inquiring the state of a corresponding locker to generate a locker distribution result of the first storage request, generating a distribution result, submitting a transaction and broadcasting the distribution result in a block chain network for execution through a locker management contract, and recording the distribution result of the first storage request on a block chain;
when the distribution result of the storage cabinet is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction to control to open a corresponding first cabinet door;
monitoring whether an unprocessed first fetching request of a locker managed by a current locker management node is recorded in the locker management contract or not; the unprocessed first fetching request is recorded on the block chain by the locker management after the first fetching request transaction is successfully executed, and the first fetching request transaction is generated by the user terminal responding to the user request and stopping using the locker and is sent to the block chain network;
responding to the first article taking request which is not processed, generating a second cabinet opening instruction and outputting the second cabinet opening instruction to control to open a corresponding second cabinet door;
monitoring whether the second cabinet door is opened successfully: if so, generating a state updating transaction and broadcasting the state updating transaction in the block chain network for execution through the locker management contract, and updating the use state of the cabinet lattice corresponding to the second cabinet door on the block chain.
2. The method of claim 1, further comprising:
monitoring whether an unprocessed second fetching request of the locker managed by the current locker management node is recorded in the locker management contract or not; the unprocessed second fetching request is recorded on the block chain after the locker management contract successfully executes the second fetching request transaction, and the second fetching request transaction is generated by the user side in response to the user request in the process of using and is sent to the block chain network;
and generating a third cabinet opening instruction in response to the second unprocessed fetching request, and outputting to control the opening of a corresponding third cabinet door.
3. The method of claim 1, further comprising:
monitoring whether an unprocessed manager cabinet opening request of the storage cabinet managed by the current storage cabinet management node is recorded in the storage cabinet management contract; the unprocessed manager cabinet opening request is recorded on a block chain after the manager cabinet opening transaction is successfully executed by the locker management contract, and the manager cabinet opening transaction is generated by a management terminal responding to the manager request cabinet opening and is sent to a block chain network;
and responding to the monitored unprocessed manager cabinet opening request, generating a fourth cabinet opening instruction and outputting the fourth cabinet opening instruction to control the opening of the corresponding fourth cabinet door.
4. The method of any one of claims 1 to 3, wherein the locker management contract is further configured to execute a locker usage authorization transaction and record usage rights of the newly added authorized user on the blockchain when the execution is successful.
5. The method of any one of claims 1-3, wherein the locker management contract is further configured to execute a locker usage right transfer transaction and replace usage rights of the transferor recorded on the blockchain with usage rights of the transferee when the execution is successful.
6. A locker application method is applied to a user side, and the method comprises the following steps:
obtaining locker information of a first locker to generate a locker request transaction and sending the locker request transaction to a block chain network, so that a block chain node executes through a locker management contract, and recording an unprocessed first locker request to the block chain so as to manage a first locker management node of the first locker:
after the first storage request is monitored, the state of a corresponding locker is inquired locally to generate a locker distribution result of the first storage request, the distribution result is generated and submitted to a transaction and is broadcasted in a block chain network, so that block chain nodes can execute through a locker management contract, and the distribution result of the first storage request is recorded on a block chain; and the number of the first and second groups,
when the distribution result of the storage cabinet is successful, generating a first cabinet opening instruction and outputting the first cabinet opening instruction to control to open a corresponding first cabinet door;
responding to a current user request to open the first cabinet door to terminate the use of the locker, generating a first fetching request transaction and sending the first fetching request transaction to a block chain network, so that block chain nodes can execute through the locker management contract, and recording an unprocessed first fetching request to the block chain for the first locker management node to:
after the first fetching request is monitored, generating a second cabinet opening instruction and outputting the second cabinet opening instruction to control opening of a corresponding second cabinet door; and the number of the first and second groups,
monitoring whether the second cabinet door is opened successfully: if yes, generating a state updating transaction and broadcasting the state updating transaction in a block chain network for being executed through the locker management contract, and updating the use state of the cabinet lattice corresponding to the second cabinet door on the block chain;
the locker management node is a node which runs a block chain node and a locker control system at the same time.
7. The method of claim 6, further comprising:
responding to a current user request for opening the cabinet in the using process, generating a second fetching request transaction and sending the second fetching request transaction to a block chain network so that block chain nodes can execute through the locker management contract, recording an unprocessed second fetching request to a block chain, and generating a third opening instruction and outputting the third opening instruction to control opening of a corresponding third cabinet door after the first locker management node monitors the second fetching request.
8. The method of claim 6, wherein the locker management contract is further configured to execute an administrator opening transaction, record an unprocessed administrator opening request to a blockchain, and enable the corresponding locker management node to generate and output a fourth locker instruction after monitoring the administrator opening request to control opening of a corresponding fourth door;
the manager opening transaction is generated by the management terminal responding to the manager request opening and is sent to the block chain network.
9. The method according to any one of claims 6-8, further comprising:
and responding to the condition that the current user authorizes the first user to commonly use the locker, generating locker use authorization transaction and sending the locker use authorization transaction to a block chain network, so that block chain nodes can execute through the locker management contract, and recording the newly added use authority of the first user to the block chain.
10. The method according to any one of claims 6-8, further comprising:
and responding to the current user to transfer the locker usage right to a second user, generating locker usage right transfer transaction and sending the locker usage right transfer transaction to the blockchain network, so that the blockchain node can execute the transaction through the locker management contract, and replacing the usage right of the current user recorded on the blockchain with the usage right of the second user.
11. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-10.
12. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-10.
CN202010277680.7A 2020-04-08 2020-04-08 Locker application method, equipment and storage medium Active CN111508161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010277680.7A CN111508161B (en) 2020-04-08 2020-04-08 Locker application method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010277680.7A CN111508161B (en) 2020-04-08 2020-04-08 Locker application method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111508161A CN111508161A (en) 2020-08-07
CN111508161B true CN111508161B (en) 2021-09-10

Family

ID=71874816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010277680.7A Active CN111508161B (en) 2020-04-08 2020-04-08 Locker application method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111508161B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104616402A (en) * 2015-02-13 2015-05-13 广州硕鑫网络科技有限公司 System for mobile client terminal to rent and control storage cabinet
CN105118186A (en) * 2015-09-23 2015-12-02 成都生长线科技有限公司 Control system and method for intelligent storage cabinet
CN106204948A (en) * 2016-07-11 2016-12-07 商汤集团有限公司 Locker management method and locker managing device
CN206179123U (en) * 2016-11-15 2017-05-17 北京天瑞恒安科技有限公司 A networking locker for water paradise
CN207052028U (en) * 2017-08-17 2018-02-27 湖南创合未来科技股份有限公司 A kind of locker
CN107993359A (en) * 2017-11-23 2018-05-04 浙江大学 A kind of end-to-end bicycle shared system and method based on block chain
CN108597128A (en) * 2018-05-04 2018-09-28 济南浪潮高新科技投资发展有限公司 Urban network joins Car sharing system and method
CN109508977A (en) * 2018-12-29 2019-03-22 杭州趣链科技有限公司 A kind of end-to-end Car sharing system and method based on block chain
CN109523427A (en) * 2018-10-31 2019-03-26 广州乐快信息科技有限公司 A kind of operation system of intelligence gymnasium service management
CN208673428U (en) * 2018-08-14 2019-03-29 北京铂阳顶荣光伏科技有限公司 A kind of outdoor multifunctional service equipment
CN109636979A (en) * 2018-12-14 2019-04-16 深圳壹账通智能科技有限公司 Article access method, locker, backstage face identification system and electronic equipment
WO2019083933A1 (en) * 2017-10-23 2019-05-02 Diebold Nixdorf, Incorporated Transactions for transferring goods employing lockers
CN109711196A (en) * 2018-12-28 2019-05-03 湖北汇盾传媒有限公司 Improve the information processing method of user's pickup safety
CN110288445A (en) * 2019-06-28 2019-09-27 杭州复杂美科技有限公司 Decentralization storage method, equipment and storage medium
EP3591892A1 (en) * 2018-07-04 2020-01-08 Panasonic Intellectual Property Corporation of America Management system, server, management method, and program for management of access rights to a delivery locker using blockchain
WO2020025098A1 (en) * 2018-07-30 2020-02-06 Margento R&D D.O.O. Smart unattended home delivery box

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019010288A1 (en) * 2017-07-05 2019-01-10 United Parcel Service Of America, Inc. Verifiable parcel distributed ledger shipping and tracking system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104616402A (en) * 2015-02-13 2015-05-13 广州硕鑫网络科技有限公司 System for mobile client terminal to rent and control storage cabinet
CN105118186A (en) * 2015-09-23 2015-12-02 成都生长线科技有限公司 Control system and method for intelligent storage cabinet
CN106204948A (en) * 2016-07-11 2016-12-07 商汤集团有限公司 Locker management method and locker managing device
CN206179123U (en) * 2016-11-15 2017-05-17 北京天瑞恒安科技有限公司 A networking locker for water paradise
CN207052028U (en) * 2017-08-17 2018-02-27 湖南创合未来科技股份有限公司 A kind of locker
WO2019083933A1 (en) * 2017-10-23 2019-05-02 Diebold Nixdorf, Incorporated Transactions for transferring goods employing lockers
CN107993359A (en) * 2017-11-23 2018-05-04 浙江大学 A kind of end-to-end bicycle shared system and method based on block chain
CN108597128A (en) * 2018-05-04 2018-09-28 济南浪潮高新科技投资发展有限公司 Urban network joins Car sharing system and method
EP3591892A1 (en) * 2018-07-04 2020-01-08 Panasonic Intellectual Property Corporation of America Management system, server, management method, and program for management of access rights to a delivery locker using blockchain
WO2020025098A1 (en) * 2018-07-30 2020-02-06 Margento R&D D.O.O. Smart unattended home delivery box
CN208673428U (en) * 2018-08-14 2019-03-29 北京铂阳顶荣光伏科技有限公司 A kind of outdoor multifunctional service equipment
CN109523427A (en) * 2018-10-31 2019-03-26 广州乐快信息科技有限公司 A kind of operation system of intelligence gymnasium service management
CN109636979A (en) * 2018-12-14 2019-04-16 深圳壹账通智能科技有限公司 Article access method, locker, backstage face identification system and electronic equipment
CN109711196A (en) * 2018-12-28 2019-05-03 湖北汇盾传媒有限公司 Improve the information processing method of user's pickup safety
CN109508977A (en) * 2018-12-29 2019-03-22 杭州趣链科技有限公司 A kind of end-to-end Car sharing system and method based on block chain
CN110288445A (en) * 2019-06-28 2019-09-27 杭州复杂美科技有限公司 Decentralization storage method, equipment and storage medium

Also Published As

Publication number Publication date
CN111508161A (en) 2020-08-07

Similar Documents

Publication Publication Date Title
CN102246180B (en) Method and system for impersonating a user
CN103957248B (en) A kind of public real time data releasing cloud service platform based on Internet of Things
CN102012981B (en) Distributing and matching method and system of general permission grade
CN106127368B (en) Data storage method for enterprise resource management system
CN109614806A (en) Log Administration System based on block chain
US9350726B2 (en) Recovery from rolling security token loss
US11516203B2 (en) System and method for identity management of cloud based computing services in identity management artificial intelligence systems
CN103634144B (en) The configuration file management method of many IDC clusters, system and equipment
CN108351771A (en) Maintain the control for the restricted data during being deployed to cloud computing environment
US9497028B1 (en) System and method for remote storage auditing
CN102684903A (en) Management platform, system and method for realizing access of multiple cloud storage resource nodes
CN102034036A (en) Permission management method and equipment
CN106330813A (en) Method, device and system for processing authorization
CN107483495A (en) A kind of big data cluster Host Administration method, management system and service end
CN108650289A (en) A kind of method and apparatus of the management data based on block chain
US20080091701A1 (en) Enterprise Rack Management Method, Apparatus and Media
WO2022206439A1 (en) Method and apparatus for providing cross-chain message
CN106372874A (en) Internet of things mobile finance payment system based on cloud platform
US20220300586A1 (en) Systems and methods for network security using identity management data
CN112001191A (en) Door card and door lock unlocking method and device and door card and door lock system
US8042158B2 (en) Management of user authorizations
CN114117387A (en) Substation tool monitoring method and device, computer equipment and storage medium
CN111508161B (en) Locker application method, equipment and storage medium
CN112446988A (en) Access control application method, device and storage medium
CN115640457A (en) Information management method, apparatus, device, medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant