CN112581011A - Lease management method, lease management device, terminal equipment and storage medium - Google Patents

Lease management method, lease management device, terminal equipment and storage medium Download PDF

Info

Publication number
CN112581011A
CN112581011A CN202011567947.2A CN202011567947A CN112581011A CN 112581011 A CN112581011 A CN 112581011A CN 202011567947 A CN202011567947 A CN 202011567947A CN 112581011 A CN112581011 A CN 112581011A
Authority
CN
China
Prior art keywords
enterprise
user
information
leasing
lease
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011567947.2A
Other languages
Chinese (zh)
Other versions
CN112581011B (en
Inventor
刘新
张辉雄
兰飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN202011567947.2A priority Critical patent/CN112581011B/en
Publication of CN112581011A publication Critical patent/CN112581011A/en
Application granted granted Critical
Publication of CN112581011B publication Critical patent/CN112581011B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • Software Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application is applicable to the technical field of computers, and provides a lease management method, a lease management device, terminal equipment and a storage medium, wherein the lease management method comprises the following steps: receiving a leasing request of a user, wherein the leasing request comprises identity information of the user; sending a query request to a blockchain according to the lease request, wherein the query request comprises the identity information of the user; acquiring risk prompt information returned by the blockchain, wherein the risk prompt information is prompt information returned after calculating the matching degree of the first leasing enterprise and the second leasing enterprise for the blockchain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the blockchain; and returning lease response information to the user according to the risk prompt information. The embodiment of the application can realize a flexible and effective lease management mode.

Description

Lease management method, lease management device, terminal equipment and storage medium
Technical Field
The present application belongs to the field of computer technologies, and in particular, to a lease management method, apparatus, terminal device, and storage medium.
Background
As the sharing economy develops, more and more items can be shared for use through renting. Currently, more and more leasing enterprises realize the sharing of self-operated goods through self platforms. For example, with the development of vehicle sharing, a vehicle sharing platform respectively maintained by each rental enterprise appears, and each rental enterprise realizes vehicle sharing through its own vehicle sharing platform. Generally, each platform of each rental enterprise maintains information recorded by the platform through a server of the platform, and performs rental management on a rental request received by the platform according to the information recorded by the platform. In the lease management mode, each lease enterprise can only carry out lease management according to the information recorded by the server, and the management mode is single and has certain limitation.
Disclosure of Invention
In view of this, embodiments of the present application provide a lease management method, an apparatus, a terminal device, and a storage medium, so as to solve the problem in the prior art how to implement a flexible and effective lease management manner.
A first aspect of an embodiment of the present application provides a first rental management method, where the method is applied to a first electronic device, and the first electronic device is an electronic device corresponding to a first rental enterprise, and the method includes:
receiving a lease request of a user, wherein the lease request comprises identity information of the user;
sending a query request to a blockchain according to the lease request, wherein the query request comprises the identity information of the user;
acquiring risk prompt information returned by the block chain, wherein the risk prompt information is prompt information returned after calculating the matching degree of the first leasing enterprise and the second leasing enterprise for the block chain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the block chain;
and returning lease response information to the user according to the risk prompt information.
Optionally, the lease management method further includes:
recording the article use behaviors of the user;
if the user is judged to violate a preset rule set by the first leasing enterprise according to the article using behavior, generating blacklist record information of the first leasing enterprise, wherein the blacklist record information of the first leasing enterprise comprises the identity information of the user so as to represent that the user is listed in a blacklist of the first leasing enterprise;
and sending the blacklist record information of the first leasing enterprise to the block chain for storage.
Optionally, the returning rental response information to the user according to the risk prompt information includes:
and if the risk prompt information is detected to be that the risk audit is not passed, returning lease response information rejecting the lease request to the user.
A second aspect of the embodiments of the present application provides a second lease management method applied to a block link point device in a block chain, the method including:
acquiring a query request sent by first electronic equipment, wherein the query request comprises user identity information contained in a leasing request received by the first electronic equipment; the first electronic equipment is corresponding to a first leasing enterprise;
calculating the matching degree of the first leasing enterprise and the second leasing enterprise according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the block chain;
and returning risk prompt information to the first electronic equipment according to the matching degree.
Optionally, the method further comprises:
and acquiring blacklist record information sent by electronic equipment, and storing the blacklist record information, wherein the electronic equipment comprises the first electronic equipment and/or second electronic equipment, and the second electronic equipment is corresponding to the second leasing enterprise.
Optionally, the calculating the matching degree between the first rental business and the second rental business according to the identity information of the user and blacklist record information of the second rental business stored in the blockchain includes:
if the user is determined to be the blacklist of the second leasing enterprise according to the identity information of the user and the blacklist record information of the second leasing enterprise stored in the block chain, calculating according to any one or more of the operation range, the number of operation articles and the risk control capability of the first leasing enterprise and the second leasing enterprise, and determining the matching degree of the first leasing enterprise and the second leasing enterprise.
Optionally, the returning risk prompt information to the first electronic device according to the matching degree includes:
if the matching degree meets a preset condition, returning risk prompt information indicating that the risk examination is passed to the first electronic equipment; and otherwise, returning risk prompt information indicating that the risk audit is not passed to the first electronic equipment.
A third aspect of the embodiments of the present application provides a rental management apparatus, where the rental management apparatus is applied to a first electronic device, and the first electronic device is an electronic device corresponding to a first rental enterprise, and the rental management apparatus includes:
a lease request receiving unit, configured to receive a lease request of a user, where the lease request includes identity information of the user;
the query request sending unit is used for sending a query request to the block chain according to the lease request, wherein the query request contains the identity information of the user;
a risk prompt information obtaining unit, configured to obtain risk prompt information returned by the blockchain, where the risk prompt information is prompt information returned after calculating a matching degree of the first rental enterprise and a second rental enterprise for the blockchain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second rental enterprise stored in the blockchain;
and the lease response information feedback unit is used for returning lease response information to the user according to the risk prompt information.
Optionally, the lease management apparatus further includes:
the recording unit is used for recording the article use behavior of the user;
a blacklist determining unit, configured to generate blacklist record information of the first leasing enterprise if it is determined that the user violates a preset rule set by the first leasing enterprise according to the article usage behavior, where the blacklist record information of the first leasing enterprise includes identity information of the user, so as to indicate that the user is listed in a blacklist of the first leasing enterprise;
and the blacklist record information sending unit is used for sending the blacklist record information of the first leasing enterprise to the block chain for storage.
Optionally, the lease response information feedback unit is specifically configured to return lease response information rejecting the lease request to the user if it is detected that the risk prompt information is that the risk audit is not passed.
A fourth aspect of the embodiments of the present application provides a second lease management apparatus, where the lease management apparatus is applied to a block chain link point device in a block chain, and includes:
the device comprises a query request acquisition unit, a lease request sending unit and a lease request sending unit, wherein the query request acquisition unit is used for acquiring a query request sent by first electronic equipment, and the query request comprises identity information of a user contained in the lease request received by the first electronic equipment; the first electronic equipment is corresponding to a first leasing enterprise;
the matching degree calculation unit is used for calculating the matching degree of the first rental enterprise and the second rental enterprise according to the identity information of the user and blacklist record information of the second rental enterprise stored in the block chain;
and the risk prompt information sending unit is used for returning risk prompt information to the first electronic equipment according to the matching degree.
Optionally, the lease management apparatus further includes:
and the blacklist record information acquisition unit is used for acquiring blacklist record information sent by electronic equipment and storing the blacklist record information, wherein the electronic equipment comprises the first electronic equipment and/or second electronic equipment, and the second electronic equipment is electronic equipment corresponding to the second leasing enterprise.
Optionally, the matching degree calculating unit is specifically configured to calculate, if it is determined that the user is a user of a blacklist of a second rental enterprise according to the identity information of the user and blacklist record information of the second rental enterprise stored in the block chain, according to any one or more of an operation range, an operation item number, and a risk control capability of the first rental enterprise and the second rental enterprise, and determine the matching degree of the first rental enterprise and the second rental enterprise.
Optionally, the risk prompt information sending unit is specifically configured to return risk prompt information indicating that risk review is passed to the first electronic device if the matching degree meets a preset condition; and otherwise, returning risk prompt information indicating that the risk audit is not passed to the first electronic equipment.
A fifth aspect of embodiments of the present application provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the computer program, when executed by the processor, causes the terminal device to implement the steps of the rental management method according to the first aspect or the second aspect.
A sixth aspect of embodiments of the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, causes a terminal device to implement the steps of the rental management method according to the first or second aspect.
A seventh aspect of embodiments of the present application is a computer program product, which, when run on a terminal device, causes the terminal device to perform the steps of the rental management method according to the first or second aspect.
Compared with the prior art, the embodiment of the application has the advantages that: in the embodiment of the application, after acquiring the leasing request of the user, the first electronic device sends the query request containing the identity information of the user to the blockchain, so that the blockchain can calculate the matching degree of the first leasing enterprise and the second leasing enterprise and then return corresponding risk prompt information according to the identity information of the user and the blacklist record information of the second leasing enterprise stored in the blockchain, thereby realizing blacklist sharing among different leasing enterprises through the blockchain, and directly and effectively acquiring the risk prompt information corresponding to the current leasing request by combining the matching degrees of the different leasing enterprises so as to return corresponding leasing response information to the user. Because the risk prompt information of the lease request can be determined by combining information (information such as blacklists and matching degrees) among different lease enterprises based on the block chain, the lease management based on a multi-lease enterprise platform can be flexibly and effectively realized. Moreover, the block chain can ensure the safety and the accuracy of the information, so that the safety of leasing management can be ensured, and a flexible, convenient and high-safety leasing management mode is realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic system structure diagram of a lease management system provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of an implementation of a first lease management method provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of an implementation of a second lease management method provided in the embodiment of the present application;
fig. 4 is a schematic diagram of a first rental management apparatus provided in an embodiment of the present application;
fig. 5 is a schematic diagram of a second rental management apparatus provided in an embodiment of the present application;
fig. 6 is a schematic diagram of a terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
With the development of sharing economy, more and more leasing enterprises realize the sharing of goods by operating own platforms. Currently, when each leasing enterprise receives a leasing request, whether the leasing request is accepted can be judged only according to a blacklist maintained by a platform of the leasing enterprise, so that leasing management is realized. However, the rental management mode is limited to the platform of the rental enterprise, and the management form is single and has certain limitation. In order to solve the technical problem, the application provides a leasing management method, a device, a terminal device and a storage medium, wherein after a first electronic device corresponding to a first leasing enterprise receives a leasing request of a user, an inquiry request containing identity information of the user is sent to a block chain, so that the block chain can return corresponding risk prompt information after calculating matching degrees of the first leasing enterprise and a second leasing enterprise according to the identity information of the user and blacklist record information of the second leasing enterprise stored by the block chain, thereby realizing blacklist sharing among different leasing enterprises through the block chain, directly and effectively acquiring risk prompt information corresponding to the current leasing request by combining the matching degrees of the different leasing enterprises, and further returning corresponding leasing response information to the user. Because the risk prompt information of the leasing request can be determined by combining information (information such as blacklists, matching degrees and the like) among different leasing enterprises based on the block chain, the leasing management is not limited in a platform of a single leasing enterprise, and the leasing management based on a multi-leasing enterprise platform can be flexibly and effectively realized. Moreover, the block chain can ensure the safety and the accuracy of the information, so that the safety of leasing management can be ensured, and a flexible, convenient and high-safety leasing management mode is realized.
Illustratively, the embodiment of the present application provides a schematic diagram of a rental management system, as shown in fig. 1, including a first electronic device 11, a second electronic device 12, and a blockchain 13. The first electronic device is an electronic device corresponding to a first rental enterprise, and the first rental enterprise operates a platform of the first rental enterprise through the first electronic device (for distinction, referred to as a first rental enterprise platform); the second electronic device is an electronic device corresponding to a second rental business, and the second rental business operates a platform of the second rental business through the second electronic device (for distinction, referred to as a second rental business platform). Specifically, the electronic device of the embodiment of the present application may be a server.
When the user W uses the second rental enterprise platform 12 for rental of the item, if there is an undesirable behavior, such as not returning the item on time, damage to the item in use, or the like, the second electronic device 12 records and analyzes the undesirable behavior. If the analysis determines that the bad behavior violates the rule set by the second rental enterprise platform, the user W is listed in the blacklist of the second rental enterprise, and specifically, the identity information of the user W may be stored in the blacklist of the second electronic device. Meanwhile, the second electronic device generates the current blacklist record information of the second leasing enterprise, and sends the blacklist record information of the second leasing enterprise to the block chain 13 for storage. The current blacklist record information of the second rental business is used for indicating that the user W is listed in the blacklist of the second rental business. Specifically, the blacklist record information of the second rental business at least includes the identity information of the user W, and may also include specific bad behaviors of the user W.
Then, when the user W wants to rent the item through the first rental business platform, a rental request is sent to the first electronic device 11 corresponding to the first rental business (for example, the rental request may be sent through a user terminal held by the user W), where the rental request includes the identity information of the user W.
After receiving the lease request, the first electronic device 11 sends an inquiry request to the blockchain 13 according to the lease request, where the inquiry request includes the identity information of the user W.
After receiving the query request, the blockchain 13 queries that the user W is a user in the blacklist of the second rental enterprise according to the identity information of the user W and the blacklist record information of the second rental enterprise stored in the blockchain, and at this time, the blockchain can calculate the matching degree of the first rental enterprise and the second rental enterprise according to the information (such as information of the operating range, the number of the operated articles, the wind control management capability, and the like) of the first rental enterprise and the second rental enterprise, which are pre-stored by the blockchain. And then returns risk prompt information to the first electronic device 11 according to the calculated matching degree. Specifically, when the risk bearing capacity of the first leasing enterprise is judged to be larger than that of the second leasing enterprise according to the matching degree, the risk prompt information is prompt information which passes risk verification; otherwise, the risk prompt message is a prompt message that the risk audit is not passed.
After receiving the risk prompt information returned by the block chain 13, the first electronic device 11 returns lease response information to the user W according to the risk prompt information (specifically, lease response information may be returned to a user terminal held by the user W). Specifically, when the risk prompt information is prompt information that the risk check is passed, the lease response information is information that the lease request of the user W is accepted and the user W is instructed to use the article. And when the risk prompt information is prompt information that the risk audit is not passed, the lease response information is response information for rejecting the lease request of the user W.
It should be understood that, the first rental enterprise, the first electronic device, the second rental enterprise, and the second electronic device are only described for distinguishing, in a specific application, one electronic device corresponds to one rental enterprise, and the same electronic device can implement the functions performed by the first electronic device described above and can also implement the functions performed by the second electronic device described above. In addition, the above description is only given by taking two leasing enterprises (the first leasing enterprise and the second leasing enterprise) as an example, in an actual application scenario, there may be more than two leasing enterprises, and there may be more than two electronic devices in the leasing management system, and each electronic device may optionally execute the function executed by the first electronic device and/or the function executed by the second electronic device.
Example two:
fig. 2 is a flowchart illustrating a first rental management method provided in an embodiment of the present application, where the first rental management method is applied to an electronic device, and for the purpose of description differentiation, the first rental management method is specifically referred to as a first electronic device, that is, an electronic device corresponding to a first rental enterprise. The lease management method is detailed as follows:
in S201, a lease request of a user is received, where the lease request includes identity information of the user.
In the embodiment of the application, the lease request of the user may be specifically sent by a user terminal held by the user, and the first electronic device specifically receives the lease request sent by the user terminal to implement receiving of the lease request of the user. The lease request includes identity information of the user, such as information of the user's mobile phone number, name, identification number, etc.
In S202, a query request is sent to the blockchain according to the lease request, where the query request includes the identity information of the user.
And after receiving the lease request, sending an inquiry request to the blockchain, wherein the inquiry request comprises the identity information of the user carried by the lease request. Specifically, the block chain is composed of a plurality of block chain node devices, and the first electronic device may send the query request to any one of the block chain node devices, or send the query request to a designated block chain node device in the block chain, which has established a correspondence relationship with the first electronic device in advance, so as to implement the step of sending the query request to the block chain. Optionally, the query request may include unique identification information of the first electronic device or the first rental business, so that the blockchain identifies the query request currently sent for which rental business.
In S203, acquiring risk prompt information returned by the blockchain, where the risk prompt information is prompt information returned after calculating a matching degree of the first rental enterprise and the second rental enterprise for the blockchain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second rental enterprise stored in the blockchain.
In the embodiment of the application, the risk prompt information is the prompt information returned after the blockchain receives the query request and the matching degree of the first leasing enterprise and the second leasing enterprise is calculated according to the identity information of the user contained in the query request and the blacklist record information of the second leasing enterprise stored in the blockchain. The blacklist recording information of the second leasing enterprise records information of the users blacklisted by the second leasing enterprise.
Specifically, the returned risk prompt information may be acquired from any one block link point device or a certain designated block link point device in the block chain in the embodiment of the present application.
And in S204, according to the risk prompt information, renting response information is returned to the user.
In the embodiment of the application, the risk prompt information may be prompt information that the risk audit is passed or prompt information that the risk audit is not passed. And after receiving the risk prompt message, the first electronic equipment returns corresponding lease response information to the user according to the risk prompt message. Specifically, the lease response information may be returned by text, voice, or the like.
Optionally, the step S204 includes:
and if the risk prompt information is detected to be that the risk audit is not passed, returning lease response information rejecting the lease request to the user.
And when the risk prompt information indicates that the risk audit is passed, the user is the user in the blacklist of the second leasing enterprise at present, the risk bearing capacity of the first leasing enterprise is determined to be smaller than that of the second leasing enterprise according to the matching degree, and at the moment, leasing response information rejecting the leasing request is returned to the user. Optionally, the lease response message may prompt the user in a voice or text manner that the current lease request is denied.
In the embodiment of the application, when the risk prompt information acquired from the block chain is that the risk check is not passed, the lease response information rejecting the lease request can be returned to the user, so that the user cannot lease the article on the platform of the first lease enterprise, and therefore the safety of the lease management method can be improved.
Optionally, the step S204 includes:
and if the risk prompt information is detected to be that the risk examination is passed, returning lease response information for receiving the lease request to the user, and opening the article use permission to the user.
And when the risk prompt information is that the risk is checked, returning lease response information for accepting the lease request to the user, and opening the use permission of the article requested to be used by the user to the user. Optionally, the lease request of the user includes unique identification information of an item currently requested to be used by the user, the first electronic device may query, according to the unique identification information, unlocking information corresponding to the item, and open the usage right of the item by returning the unlocking information to the user.
In the embodiment of the application, when the risk prompt information acquired from the block chain is that the risk audit is passed, the lease response information for accepting the lease request can be returned to the user, and the article use permission is opened to the user, so that an intelligent, safe and effective lease management mode can be realized.
Optionally, the lease management method in the embodiment of the present application further includes:
a1: recording the article use behaviors of the user;
a2: if the user is judged to violate a preset rule set by the first leasing enterprise according to the article using behavior, generating blacklist record information of the first leasing enterprise, wherein the blacklist record information of the first leasing enterprise comprises the identity information of the user so as to represent that the user is listed in a blacklist of the first leasing enterprise;
a3: and sending the blacklist record information of the first leasing enterprise to the block chain for storage.
In the embodiment of the application, the rental request of the user is determined to be accepted according to the risk prompt information, and the user can use the article managed by the first rental enterprise after the article use authority is opened to the user.
In step a1, a monitoring device may be present on the article used by the user for monitoring the user's article usage behavior. The first electronic device may obtain the user's usage behavior of the item monitored by the monitoring device.
In step a2, when it is determined that the user violates a preset rule set by the first leasing enterprise according to the recorded article usage behavior, for example, the article usage range exceeds the preset usage range, the article usage time exceeds the leasing time, and the state after the article usage is a damaged state, the user is listed in a blacklist of the first leasing enterprise, and meanwhile, blacklist record information of the first leasing enterprise is generated. The blacklist record information of the first leasing enterprise at least comprises identity information of the user to indicate that the user is listed in a blacklist of the first leasing enterprise. Optionally, the blacklist record information of the first rental enterprise includes the identity information of the user and the unique identification information of the first rental enterprise, so that the subsequent blockchain can recognize that the blacklist record information is information sent by the first rental enterprise. Optionally, the blacklist information of the first rental business may further include information of a current illegal usage behavior of the user (i.e., an article usage behavior violating a preset rule).
In step a3, the generated blacklist record information of the first rental enterprise is sent to the blockchain for storage, so that after receiving an inquiry request sent by the electronic device of another rental enterprise, the blockchain can perform matching degree calculation according to the stored blacklist information of the first rental enterprise to obtain corresponding risk prompt information. Specifically, a plurality of blockchain link point devices exist in the blockchain, and after the first electronic device sends the blacklist record information of the first rental enterprise to one of the blockchain node devices, the blockchain link point device stores the blacklist record information of the first rental enterprise, and broadcasts the blacklist record information of the first rental enterprise to other blockchain link point devices for storage.
In the embodiment of the application, the first electronic device can record the article using behavior of the user and judge whether the user violates the preset rule set by the first leasing enterprise, so that the blacklist of the first leasing enterprise platform can be maintained. Meanwhile, after the fact that the user violates the preset rule set by the first leasing enterprise per se is judged, the generated blacklist record information of the first leasing enterprise can be sent to the block chain to be stored, so that other subsequent leasing enterprises can share the blacklist record information of the first leasing enterprise through the block chain, and the electronic equipment of other leasing enterprises can obtain accurate risk prompt information.
An application scenario used for vehicle rental is taken as an example for explanation, that is, currently, an article rented by each rental platform is specifically a vehicle:
when a user needs to use a vehicle managed by the first rental enterprise, a license plate number of the vehicle or a two-dimensional code attached to the vehicle is input at a user terminal, own mobile phone number information is input as identity information, and then a rental request is sent to first electronic equipment through the user terminal, wherein the rental request comprises the mobile phone number information of the user. And after receiving the lease request, the first electronic equipment sends a query request to the blockchain, wherein the query request comprises the mobile phone number information of the user. And then, acquiring risk prompt information returned by the blockchain, if the risk prompt information is that the risk audit is not passed, indicating that the user is listed in a blacklist of a second rental enterprise platform, and the risk carrying capacity of the first rental enterprise is smaller than that of the second rental enterprise, and at this moment, directly sending rental response information which refuses the user to use the vehicle to the user terminal.
On the contrary, if the risk prompt message is that the risk audit is passed, the rental response message for accepting the vehicle use by the user is sent to the user terminal, and the vehicle unlocking password is sent to the user terminal, so that the user can unlock the vehicle and rent the vehicle for use. In the process of using the vehicle by the user, the monitoring device on the vehicle monitors the vehicle using behavior of the user and sends monitoring data to the first electronic device. And if the first electronic equipment judges that the vehicle using behaviors of the user exist behaviors such as safe driving violation, delayed fine payment and the like according to the monitoring data, storing the mobile phone number of the user into a blacklist of the first rental enterprise maintained by the first electronic equipment. Meanwhile, generating blacklist record information of the first leasing enterprise, specifically binding the mobile phone number of the user and the current unique identification information of the first leasing enterprise as a piece of blacklist record information, and sending the blacklist record information to the block chain for storage.
In the embodiment of the application, after acquiring the leasing request of the user, the first electronic device sends the query request containing the identity information of the user to the blockchain, so that the blockchain can calculate the matching degree of the first leasing enterprise and the second leasing enterprise and then return corresponding risk prompt information according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the blockchain, thereby realizing blacklist sharing among different leasing enterprises through the blockchain, and directly and effectively acquiring the risk prompt information corresponding to the current leasing request by combining the matching degrees of the different leasing enterprises so as to return corresponding leasing response information to the user. Because the risk prompt information of the lease request can be determined by combining information (information such as blacklists and matching degrees) among different lease enterprises based on the block chain, the lease management based on a multi-lease enterprise platform can be flexibly and effectively realized. Moreover, the block chain can ensure the safety and the accuracy of the information, so that the safety of leasing management can be ensured, and a flexible, convenient and high-safety leasing management mode is realized.
Example three:
fig. 3 is a schematic flowchart illustrating a second lease management method provided in an embodiment of the present application, where the lease management method is applied to a blockchain link point device in a blockchain. The lease management method is detailed as follows:
in the embodiment of the present application, consistent with the above description, the first electronic device is an electronic device corresponding to a first rental enterprise, and the second electronic device is an electronic device corresponding to a second rental enterprise.
In the embodiment of the application, the block chain is composed of a plurality of block chain node devices, and the data stored in the block chain node devices are all data which are authenticated by each block chain node device and cannot be tampered. Specifically, each block chain node device stores information of each rental enterprise, at least includes blacklist record information, and may further include other information related to the risk bearing capacity of the rental enterprise. The block link point device as the execution subject in the embodiment of the application may be a block link point device fixedly bound to the first electronic device, or may be a block chain node device randomly designated from a block chain when the first electronic device needs to send a query request each time.
In S301, an inquiry request sent by a first electronic device is obtained, where the inquiry request includes identity information of a user included in a lease request received by the first electronic device; the first electronic equipment is corresponding to the first leasing enterprise.
The block chain node device receives a query request sent by the first electronic device, where the query request specifically includes identity information of a user, and the identity information of the user is specifically information obtained by the first electronic device from a lease request received by the first electronic device. Optionally, the identity information of the user may include information such as a mobile phone number, an identification number, and a name of the user.
In S302, according to the identity information of the user and the blacklist record information of the second rental enterprise stored in the block chain, a matching degree between the first rental enterprise and the second rental enterprise is calculated.
In the embodiment of the application, the block chain node equipment stores the blacklist record information of each leasing enterprise. And inquiring all blacklist record information stored in the block chain node equipment according to the identity information of the user, if the blacklist record information of the identity information of the user is found, determining the leasing enterprise corresponding to the blacklist record information as a second leasing enterprise, and calculating the matching degree of the first leasing enterprise and the second leasing enterprise. Specifically, the block link point device may determine the matching degree between the first rental enterprise and the second rental enterprise by respectively obtaining the information related to the risk bearing capacity of the first rental enterprise and obtaining the information related to the risk bearing capacity of the second rental enterprise, and then performing matching calculation according to the two information. The matching degree can reflect the magnitude relation of the risk bearing capacity of the first leasing enterprise and the second leasing enterprise.
Optionally, in the block link point device, an individual storage unit is set for each rental enterprise, and is specially used for storing blacklist record information of the rental enterprise, and the storage unit carries unique identification information of the rental enterprise. When the blacklist record information matched with the identity information of the user is found in a certain storage unit according to the identity information of the user, the unique identification information carried by the storage unit is obtained, and the second leasing enterprise is determined according to the unique identification information.
Optionally, a piece of blacklist recording information stored by the block chain node device specifically includes unique identification information of the rental enterprise and identity information of a user listed in the rental enterprise, and when a piece of blacklist recording information matched with the identity information of the user is found in the block chain node device according to the identity information of the user, the unique identification information included in the blacklist recording information is acquired, and the second rental enterprise is determined according to the unique identification information.
Optionally, when the information matching with the identity information of the current user is not found from all the blacklist record information stored in the block link point device, it may be considered that the user is not blacklisted by any rental enterprise, at this time, the value of the matching degree is directly set to 100%, or the information of "the user is not blacklisted" is directly returned as the information of the matching degree.
And in S303, returning risk prompt information to the first electronic equipment according to the matching degree.
And determining whether the current first electronic equipment can bear the risk of the lease request of the current user according to the matching degree. If yes, returning prompt information indicating that the risk audit is passed to the first electronic equipment; and if not, returning prompt information indicating that the risk audit is not passed to the second electronic equipment.
Optionally, the lease management method further includes:
and acquiring blacklist record information sent by electronic equipment, and storing the blacklist record information, wherein the electronic equipment comprises the first electronic equipment and/or second electronic equipment, and the second electronic equipment is corresponding to the second leasing enterprise.
In the embodiment of the application, the block chain node device can also acquire blacklist recording information sent by the electronic device and store the blacklist recording information. The electronic device may be a first electronic device corresponding to a first rental enterprise, may also be an electronic device corresponding to a second rental enterprise, and may also be an electronic device corresponding to another rental enterprise except the first electronic device and the second electronic device.
Specifically, the blacklist record information at least includes identity information of the blacklisted user, and may also include illegal behavior information of the blacklisted user. In one embodiment, the blacklist record information further includes unique identification information of the rental platform to identify the blacklist record information corresponding to which rental platform the blacklist record information corresponds to. In another embodiment, the blacklist record information does not include unique identification information of the rental platform, and the block link point device stores a corresponding relationship between the unique identification information of the electronic device and the unique identification information of the rental platform. When the block chain node equipment receives the blacklist record information sent by the electronic equipment, the unique identification information of the corresponding leasing platform is determined according to the unique identification information of the electronic equipment, such as the equipment number or the IP address of the electronic equipment, and then the unique identification information of the leasing platform is bound with the blacklist record information for storage, so that the blacklist record information is distinguished as the corresponding blacklist record information of which leasing platform.
Optionally, in this embodiment of the application, after storing the blacklist recording information in its own storage unit, the block link node device further broadcasts the blacklist recording information to other block link node devices of the block chain, so that each block link node device of the block chain stores the blacklist recording information.
In the embodiment of the application, since the block chain node equipment can acquire and store the blacklist record information from the electronic equipment, the stored blacklist record information can be combined to accurately inquire and match calculation when the inquiry request sent by the electronic equipment of other leasing enterprises is acquired subsequently, and accurate risk prompt information is returned.
Optionally, the step S302 includes:
if the user is determined to be the blacklist of the second leasing enterprise according to the identity information of the user and the blacklist record information of the second leasing enterprise stored in the block chain, calculating according to any one or more of the operation range, the number of operation articles and the risk control capability of the first leasing enterprise and the second leasing enterprise, and determining the matching degree of the first leasing enterprise and the second leasing enterprise.
In the embodiment of the application, the matching degree of the first rental enterprise and the second rental enterprise is calculated according to any one or more of the operation range, the number of the operated items and the risk control capability respectively corresponding to the first rental enterprise and the second rental enterprise. The operation range may specifically refer to a geographic area range that the rental enterprise allows the item to be used, or may refer to a category of the item operated by the rental enterprise. The number of the operated goods is the number of the goods which are input by the leasing enterprise and can be used by the user. The risk management and control capability can be represented according to a unified wind control algorithm or risk index information of the rental enterprise calculated by a unified wind control management platform. Specifically, each block chain node device in the block chain stores information such as the operation range, the number of operated articles, and the risk control capability of each rental enterprise, and the block chain node device can calculate the matching degree of the first rental enterprise and the second rental enterprise according to the information stored by the block chain node device.
Optionally, the determining the matching degree of the first rental enterprise and the second rental enterprise according to the calculation performed according to any one or more of the operation range, the number of the operated items, and the risk control capability of the first rental enterprise and the second rental enterprise specifically includes:
comparing the operating ranges of the first leasing enterprise and the second leasing enterprise, and determining a first matching value by combining the first weight;
comparing the number of the operation articles of the first leasing enterprise and the second leasing enterprise, and determining a second matching value by combining the second weight;
comparing the risk control capacity of the first leasing enterprise and the second leasing enterprise, and determining a third matching value by combining the third weight;
and determining the matching degree of the first rental enterprise and the second rental enterprise according to the first matching value, the second matching value and the third matching value.
In the embodiment of the application, three corresponding weights (namely, a first weight, a second weight and a third weight) are respectively set for three indexes, namely, an operation range, an operation article quantity and a risk control capability, and three corresponding matching values are determined according to comparison results of the three indexes and the three weights, so that the matching degree of a first rental enterprise and a second rental enterprise is finally determined. Wherein the result of adding the three weights equals 100%.
Specifically, when the experience range of the first leasing enterprise is larger than the operation range of the second leasing enterprise, the first matching value is equal to the first weight value, otherwise, the first matching value is equal to 0. And when the number of the operation items of the first leasing enterprise is larger than that of the second leasing enterprise, the second matching value is equal to the second weight, otherwise, the second matching value is equal to 0. And when the risk control capability of the first leasing enterprise is greater than that of the second leasing enterprise, the third matching value is equal to the third weight, otherwise, the third matching value is equal to 0. And then, taking the value obtained by adding the first matching value, the second matching value and the third matching value as the matching degree of the first rental business and the second rental business.
An application scenario used for vehicle rental is taken as an example for explanation, that is, currently, an article rented by each rental platform is specifically a vehicle:
the operation range specifically refers to a vehicle release range, and the operation item quantity refers to the quantity of vehicles operated by the rental enterprise. Let the current first weight be 40%, the second weight be 30%, and the third weight be 30%. And when the vehicle release range of the first leasing enterprise is determined to be larger than that of the second leasing enterprise, determining that the first matching value is 40% according to the first weight. And when the number of the vehicles of the first leasing enterprise is determined to be larger than that of the vehicles of the second leasing enterprise, determining that the second matching value is 30% according to the second weight value. And when the wind control management capacity of the first leasing enterprise is determined to be smaller than that of the second leasing enterprise, determining the third matching value to be 0. And then adding the first matching value, the second matching value and the third matching value to obtain: if the ratio of 40% + 30% +0 is 70%, 70% is used as the matching degree between the first rental business and the second rental business.
In the embodiment of the application, the matching degree of the first rental enterprise and the second rental enterprise can be determined by combining any one or more of the operation range, the number of the operation articles and the risk control capacity, so that the matching degree can accurately reflect the risk bearing capacity of the first rental enterprise and the second rental enterprise, and corresponding risk prompt information can be accurately obtained subsequently according to the matching degree.
Optionally, the step S303 includes:
if the matching degree meets a preset condition, returning risk prompt information indicating that the risk examination is passed to the first electronic equipment; and otherwise, returning risk prompt information indicating that the risk audit is not passed to the first electronic equipment.
The preset condition in the embodiment of the present application may specifically be that the matching degree is greater than a preset threshold, and the result of the query for the matching degree is "the user is not listed in a blacklist". And when the matching degree meets the preset condition, returning risk prompt information indicating that the risk audit is passed to the first electronic equipment, otherwise, returning risk prompt information indicating that the risk audit is not passed to the first electronic equipment. For example, the preset condition is that the matching degree needs to be greater than the preset threshold value by 50%, in the above example, the matching degree calculated in step S302 is 70%, and since 70% is greater than 50%, it may be determined that the current matching degree meets the preset condition, and a risk prompt message indicating that the risk audit is passed is returned to the first electronic device.
Optionally, before the acquiring the query request sent by the first electronic device, the method further includes:
and acquiring setting information of a preset condition, and storing the preset condition into the block chain node equipment according to the setting information. Through the steps, the preset conditions can be flexibly set, so that the corresponding risk prompt information can be flexibly generated, and the flexibility of the lease management method is improved.
In the embodiment of the application, the corresponding risk prompt information can be accurately returned to the first electronic device according to the matching degree and the preset condition, so that the safety of the lease management method can be improved.
In the embodiment of the application, after the blockchain node device acquires the query request sent by the first electronic device, the matching degree between the first leasing enterprise and the second leasing enterprise can be automatically calculated according to the identity information of the user included in the query request and the blacklist record information of the second leasing enterprise stored in the blockchain, and the corresponding risk prompt information is returned to the first electronic device according to the matching degree, so that blacklist sharing between different leasing enterprises can be realized through the blockchain, and the risk prompt information corresponding to the current leasing request can be directly and effectively acquired by combining the matching degrees of the different leasing enterprises, so that the corresponding leasing response information can be returned to the user. Because the risk prompt information of the lease request can be determined by combining information (information such as blacklists and matching degrees) among different lease enterprises based on the block chain, the lease management based on a multi-lease enterprise platform can be flexibly and effectively realized. Moreover, the block chain can ensure the safety and the accuracy of the information, so that the safety of leasing management can be ensured, and a flexible, convenient and high-safety leasing management mode is realized.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Example three:
fig. 4 is a schematic structural diagram of a first rental management apparatus provided in an embodiment of the present application, where the first rental management apparatus is applied to a first electronic device, and the first electronic device is an electronic device corresponding to a first rental enterprise. For convenience of explanation, only the portions related to the embodiments of the present application are shown:
the rental management apparatus includes: lease request receiving section 41, inquiry request transmitting section 42, risk prompt information acquiring section 43, and lease response information feedback section 44. Wherein:
a lease request receiving unit 41, configured to receive a lease request of a user, where the lease request includes identity information of the user.
A query request sending unit 42, configured to send a query request to the blockchain according to the lease request, where the query request includes the identity information of the user.
A risk prompt information obtaining unit 43, configured to obtain risk prompt information returned by the blockchain, where the risk prompt information is prompt information returned after calculating, for the blockchain, a matching degree of the first rental enterprise and the second rental enterprise, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second rental enterprise stored in the blockchain.
And the lease response information feedback unit 44 is configured to return lease response information to the user according to the risk prompt information.
Optionally, the lease management apparatus further includes:
the recording unit is used for recording the article use behavior of the user;
a blacklist determining unit, configured to generate blacklist record information of the first leasing enterprise if it is determined that the user violates a preset rule set by the first leasing enterprise according to the article usage behavior, where the blacklist record information of the first leasing enterprise includes identity information of the user, so as to indicate that the user is listed in a blacklist of the first leasing enterprise;
and the blacklist record information sending unit is used for sending the blacklist record information of the first leasing enterprise to the block chain for storage.
Optionally, the lease response information feedback unit 44 is specifically configured to return lease response information rejecting the lease request to the user if it is detected that the risk prompt information is that the risk audit is not passed.
Fig. 5 is a schematic structural diagram of a second rental management apparatus provided in an embodiment of the present application, where the second rental management apparatus is applied to a block chain link point device in a block chain. For convenience of explanation, only the portions related to the embodiments of the present application are shown:
the rental management apparatus includes: an inquiry request acquisition unit 51, a matching degree calculation unit 52, and a risk prompt information transmission unit 53. Wherein:
an inquiry request obtaining unit 51, configured to obtain an inquiry request sent by a first electronic device, where the inquiry request includes identity information of a user included in a lease request received by the first electronic device; the first electronic equipment is corresponding to a first leasing enterprise;
the matching degree calculation unit 52 is configured to calculate a matching degree between the first rental enterprise and the second rental enterprise according to the identity information of the user and blacklist record information of the second rental enterprise stored in the block chain;
and a risk prompt information sending unit 53, configured to return risk prompt information to the first electronic device according to the matching degree.
Optionally, the lease management apparatus further includes:
and the blacklist record information acquisition unit is used for acquiring blacklist record information sent by electronic equipment and storing the blacklist record information, wherein the electronic equipment comprises the first electronic equipment and/or second electronic equipment, and the second electronic equipment is electronic equipment corresponding to the second leasing enterprise.
Optionally, the matching degree calculating unit 52 is specifically configured to, if it is determined that the user is a user of a blacklist of a second rental enterprise according to the identity information of the user and blacklist record information of the second rental enterprise stored in the block chain, calculate according to any one or more of an operation range, an operation article number, and a risk control capability of the first rental enterprise and the second rental enterprise, and determine the matching degree of the first rental enterprise and the second rental enterprise.
Optionally, the risk prompt information sending unit 53 is specifically configured to, if the matching degree meets a preset condition, return risk prompt information indicating that risk review is passed to the first electronic device; and otherwise, returning risk prompt information indicating that the risk audit is not passed to the first electronic equipment.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Example four:
fig. 6 is a schematic diagram of a terminal device according to an embodiment of the present application. As shown in fig. 6, the terminal device 6 of this embodiment includes: a processor 60, a memory 61, and a computer program 62, such as a rental management program, stored in the memory 61 and operable on the processor 60. The processor 60 executes the computer program 62 to implement the steps in the above-described embodiments of the rental management method, such as steps S201 to S204 shown in fig. 2, or such as steps S301 to S303 shown in fig. 3. Alternatively, the processor 60, when executing the computer program 62, implements the functions of the modules/units in the above-described device embodiments, such as the functions of the units 41 to 44 shown in fig. 4, or such as the functions of the units 51 to 53 shown in fig. 5.
Illustratively, the computer program 62 may be partitioned into one or more modules/units that are stored in the memory 61 and executed by the processor 60 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 62 in the terminal device 6. For example, the computer program 62 may be divided into a lease request receiving unit, an inquiry request sending unit, a risk prompt information obtaining unit, and a lease response information feedback unit, where the specific functions of each unit are as follows:
the system comprises a lease request receiving unit used for receiving a lease request of a user, wherein the lease request comprises the identity information of the user.
And the query request sending unit is used for sending a query request to the block chain according to the lease request, wherein the query request comprises the identity information of the user.
And the risk prompt information acquisition unit is used for acquiring risk prompt information returned by the block chain, the risk prompt information is prompt information returned after calculating the matching degree of the first leasing enterprise and the second leasing enterprise for the block chain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the block chain.
And the lease response information feedback unit is used for returning lease response information to the user according to the risk prompt information.
Alternatively, the computer program 62 may be divided into an inquiry request obtaining unit, a matching degree calculating unit, and a risk prompt information sending unit, and the specific functions of each unit are as follows:
the device comprises a query request acquisition unit, a lease request sending unit and a lease request sending unit, wherein the query request acquisition unit is used for acquiring a query request sent by first electronic equipment, and the query request comprises identity information of a user contained in the lease request received by the first electronic equipment; the first electronic equipment is corresponding to the first leasing enterprise.
And the matching degree calculation unit is used for calculating the matching degree of the first leasing enterprise and the second leasing enterprise according to the identity information of the user and the blacklist record information of the second leasing enterprise stored in the block chain.
And the risk prompt information sending unit is used for returning risk prompt information to the first electronic equipment according to the matching degree.
The terminal device 6 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 6 is merely an example of a terminal device 6 and does not constitute a limitation of terminal device 6 and may include more or less components than those shown, or some components in combination, or different components, for example, the terminal device may also include input output devices, network access devices, buses, etc.
The Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6. The memory 61 may also be an external storage device of the terminal device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 6. Further, the memory 61 may also include both an internal storage unit and an external storage device of the terminal device 6. The memory 61 is used for storing the computer program and other programs and data required by the terminal device. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (11)

1. A lease management method is applied to first electronic equipment, wherein the first electronic equipment is corresponding to a first lease enterprise, and the method comprises the following steps:
receiving a lease request of a user, wherein the lease request comprises identity information of the user;
sending a query request to a blockchain according to the lease request, wherein the query request comprises the identity information of the user;
acquiring risk prompt information returned by the block chain, wherein the risk prompt information is prompt information returned after calculating the matching degree of the first leasing enterprise and the second leasing enterprise for the block chain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the block chain;
and returning lease response information to the user according to the risk prompt information.
2. The rental management method of claim 1, further comprising:
recording the article use behaviors of the user;
if the user is judged to violate a preset rule set by the first leasing enterprise according to the article using behavior, generating blacklist record information of the first leasing enterprise, wherein the blacklist record information of the first leasing enterprise comprises the identity information of the user so as to represent that the user is listed in a blacklist of the first leasing enterprise;
and sending the blacklist record information of the first leasing enterprise to the block chain for storage.
3. The rental management method of claim 1, wherein returning rental response information to the user based on the risk prompt information comprises:
and if the risk prompt information is detected to be that the risk audit is not passed, returning lease response information rejecting the lease request to the user.
4. A lease management method, applied to a block link point device in a block chain, includes:
acquiring a query request sent by first electronic equipment, wherein the query request comprises user identity information contained in a leasing request received by the first electronic equipment; the first electronic equipment is corresponding to a first leasing enterprise;
calculating the matching degree of the first leasing enterprise and the second leasing enterprise according to the identity information of the user and blacklist record information of the second leasing enterprise stored in the block chain;
and returning risk prompt information to the first electronic equipment according to the matching degree.
5. The rental management method of claim 4, further comprising:
and acquiring blacklist record information sent by electronic equipment, and storing the blacklist record information, wherein the electronic equipment comprises the first electronic equipment and/or second electronic equipment, and the second electronic equipment is corresponding to the second leasing enterprise.
6. The rental management method of claim 4, wherein the calculating the matching degree of the first rental business and the second rental business according to the identity information of the user and blacklist record information of the second rental business stored in the blockchain comprises:
if the user is determined to be the blacklist of the second leasing enterprise according to the identity information of the user and the blacklist record information of the second leasing enterprise stored in the block chain, calculating according to any one or more of the operation range, the number of operation articles and the risk control capability of the first leasing enterprise and the second leasing enterprise, and determining the matching degree of the first leasing enterprise and the second leasing enterprise.
7. The rental management method of claim 4, wherein returning risk prompting information to the first electronic device based on the matching degree comprises:
if the matching degree meets a preset condition, returning risk prompt information indicating that the risk examination is passed to the first electronic equipment; and otherwise, returning risk prompt information indicating that the risk audit is not passed to the first electronic equipment.
8. The utility model provides a lease management device, its characterized in that, lease management device is applied to first electronic equipment, first electronic equipment is the electronic equipment that first lease enterprise corresponds, lease management device includes:
a lease request receiving unit, configured to receive a lease request of a user, where the lease request includes identity information of the user;
the query request sending unit is used for sending a query request to the block chain according to the lease request, wherein the query request contains the identity information of the user;
a risk prompt information obtaining unit, configured to obtain risk prompt information returned by the blockchain, where the risk prompt information is prompt information returned after calculating a matching degree of the first rental enterprise and a second rental enterprise for the blockchain, and the matching degree is calculated according to the identity information of the user and blacklist record information of the second rental enterprise stored in the blockchain;
and the lease response information feedback unit is used for returning lease response information to the user according to the risk prompt information.
9. A leasing management device is applied to block chain link point equipment in a block chain, and comprises the following components:
the device comprises a query request acquisition unit, a lease request sending unit and a lease request sending unit, wherein the query request acquisition unit is used for acquiring a query request sent by first electronic equipment, and the query request comprises identity information of a user contained in the lease request received by the first electronic equipment; the first electronic equipment is corresponding to a first leasing enterprise;
the matching degree calculation unit is used for calculating the matching degree of the first rental enterprise and the second rental enterprise according to the identity information of the user and blacklist record information of the second rental enterprise stored in the block chain;
and the risk prompt information sending unit is used for returning risk prompt information to the first electronic equipment according to the matching degree.
10. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the computer program, when executed by the processor, causes the terminal device to carry out the steps of the method according to any one of claims 1 to 7.
11. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, causes a terminal device to carry out the steps of the method according to any one of claims 1 to 7.
CN202011567947.2A 2020-12-25 2020-12-25 Lease management method, lease management device, terminal equipment and storage medium Active CN112581011B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011567947.2A CN112581011B (en) 2020-12-25 2020-12-25 Lease management method, lease management device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011567947.2A CN112581011B (en) 2020-12-25 2020-12-25 Lease management method, lease management device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112581011A true CN112581011A (en) 2021-03-30
CN112581011B CN112581011B (en) 2024-04-02

Family

ID=75139828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011567947.2A Active CN112581011B (en) 2020-12-25 2020-12-25 Lease management method, lease management device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112581011B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060212717A1 (en) * 2005-03-18 2006-09-21 Fujitsu Limited Rental authentication system
CN107464178A (en) * 2017-08-24 2017-12-12 东峡大通(北京)管理咨询有限公司 A kind of shared bicycle statement of account method, server and statement of account system
US20190103958A1 (en) * 2017-09-29 2019-04-04 Alibaba Group Holding Limited Data storage method, data query method and apparatuses
CN109710687A (en) * 2018-11-23 2019-05-03 泰康保险集团股份有限公司 Processing method of insuring, device and electronic equipment based on block chain
CN109711973A (en) * 2018-11-09 2019-05-03 深圳壹账通智能科技有限公司 Methods of risk assessment and device, storage medium, computer equipment
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
WO2020233043A1 (en) * 2019-05-20 2020-11-26 深圳壹账通智能科技有限公司 Blockchain-based list type query method and node

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060212717A1 (en) * 2005-03-18 2006-09-21 Fujitsu Limited Rental authentication system
CN107464178A (en) * 2017-08-24 2017-12-12 东峡大通(北京)管理咨询有限公司 A kind of shared bicycle statement of account method, server and statement of account system
US20190103958A1 (en) * 2017-09-29 2019-04-04 Alibaba Group Holding Limited Data storage method, data query method and apparatuses
CN109711973A (en) * 2018-11-09 2019-05-03 深圳壹账通智能科技有限公司 Methods of risk assessment and device, storage medium, computer equipment
CN109710687A (en) * 2018-11-23 2019-05-03 泰康保险集团股份有限公司 Processing method of insuring, device and electronic equipment based on block chain
WO2020233043A1 (en) * 2019-05-20 2020-11-26 深圳壹账通智能科技有限公司 Blockchain-based list type query method and node
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112581011B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
CN109815657B (en) Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
US20200286162A1 (en) Method and server for managing shared vehicles
CN107609848B (en) Intellectual property licensing method and system based on Internet of things
US8719911B2 (en) Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
CN109889517B (en) Data processing method, permission data set creating device and electronic equipment
CN102144193B (en) Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
CN111556059A (en) Abnormity detection method, abnormity detection device and terminal equipment
CN105591743A (en) Method and device for carrying out identity authentication through equipment operation features of user terminal
CN110489994B (en) File authority management method and device for nuclear power station and terminal equipment
CN113111359A (en) Big data resource sharing method and resource sharing system based on information security
CN105991596A (en) Access control method and system
TW202036418A (en) Block chain-based method and device for taxi operation
CN111490966A (en) Processing method and device of access control policy and computer readable storage medium
CN104967594A (en) Stolen account identification method and apparatus
CN111460496A (en) Permission configuration method based on user role, electronic device and storage medium
CN108228744B (en) Vehicle diagnosis data management method and device
CN113672974A (en) Authority management method, device, equipment and storage medium
CN112581011B (en) Lease management method, lease management device, terminal equipment and storage medium
CN108540335A (en) The management method and managing device of device analysis report
JP7274198B2 (en) Asset information registration method
CN114722412B (en) Data secure storage method and device, electronic equipment and storage medium
CN111597577B (en) Function menu loading method, function menu loading device and terminal equipment
CN105635048A (en) Service request processing method and service request processing device
CN114266015A (en) Method and device for opening function permission, electronic equipment and storage medium
WO2020228564A1 (en) Application service method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant