CN112581233A - Method, device, equipment and computer-readable storage medium for order offline operation - Google Patents

Method, device, equipment and computer-readable storage medium for order offline operation Download PDF

Info

Publication number
CN112581233A
CN112581233A CN202011554927.1A CN202011554927A CN112581233A CN 112581233 A CN112581233 A CN 112581233A CN 202011554927 A CN202011554927 A CN 202011554927A CN 112581233 A CN112581233 A CN 112581233A
Authority
CN
China
Prior art keywords
order
offline
information
offline operation
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011554927.1A
Other languages
Chinese (zh)
Other versions
CN112581233B (en
Inventor
刁浩然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shunda Technology Co ltd
Original Assignee
Beijing Shunda Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shunda Technology Co ltd filed Critical Beijing Shunda Technology Co ltd
Priority to CN202011554927.1A priority Critical patent/CN112581233B/en
Publication of CN112581233A publication Critical patent/CN112581233A/en
Application granted granted Critical
Publication of CN112581233B publication Critical patent/CN112581233B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an order offline operation method, an order offline operation device, order offline operation equipment and a computer-readable storage medium, which are used for solving the problem that order information of the existing scheme is not timely acquired; the method comprises the steps of obtaining order information corresponding to a target order cache target order; if the operation request response is overtime, reading the cached order information; judging whether the off-line operation on the target order is legal or not according to the order information; if the off-line operation on the target order is legal, recording off-line operation data corresponding to the operation request; after the network is recovered, uploading off-line operation data; after the operation request response is overtime, the authority verification of the off-line operation is provided according to the order information, and the safety of the off-line operation of the target order is improved; the order information is cached, and the target order offline operation is realized by reading the cached order information, so that the problem of timely obtaining the order information is solved; after the network is recovered, offline operation data are synchronously uploaded, and the safety of order offline operation is further improved.

Description

Method, device, equipment and computer-readable storage medium for order offline operation
Technical Field
The invention relates to the field of wireless mobile terminal development, in particular to a method, a device, equipment and a computer readable storage medium for order offline operation.
Background
With the rapid development of internet technology, the internet is applied to order management of the same city service, so as to improve the user experience and the service quality of the same city service.
In the existing city-sharing service, order management is performed through the cooperation of a network end and a delivery client, that is, the network end sends an order to the delivery client, and a delivery person corresponding to the delivery client performs delivery and delivery according to order information in the order, however, in general, the network environment where the delivery client is located is unstable, and the network end cannot timely send the order to the delivery client, so that order sending is overtime; the distribution client-side corresponding to the distribution personnel cannot timely acquire the details of the order and operate the order, so that the distribution overtime corresponding to the order is caused; in order to solve the above technical problems, the platform of the current part of the network side supports offline operation, however, the existing offline operation is only to simply store the offline operation information of the order form by the delivery personnel, and upload the offline operation information when the network condition is stable, so that anyone can perform offline operation on the order form, and the security of the offline operation mode is low.
Disclosure of Invention
The embodiment of the invention provides an order offline operation method, an order offline operation device, order offline operation equipment and a computer-readable storage medium, and solves the technical problem that an existing order offline operation scheme is low in operation safety.
In one aspect, the present application provides an order offline operation method, including:
reading order information corresponding to a target order and caching the order information;
receiving an operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information;
if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information;
if the off-line operation corresponding to the operation request is legal, recording off-line operation data corresponding to the operation request;
and uploading the off-line operation data after the network is recovered.
In some embodiments of the present application, if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal according to the verification information includes:
if the target order supports off-line operation, collecting verification information based on the order identification of the target order, and comparing the verification information with preset conditions corresponding to the target order;
if the verification information is matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is legal;
and if the verification information is not matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is illegal.
In some embodiments of the present application, if the offline operation corresponding to the operation request is legal, the recording the offline operation data corresponding to the operation request includes:
if the offline operation corresponding to the operation request is legal, reading the cached order information, and extracting the order identification of the target order from the order information;
recording operation data generated by the operation request corresponding to offline operation, and updating the order state of the target order according to the operation data;
and binding the operation data, the order state and the order identification in a correlation manner to be used as offline operation data, and caching the offline operation data.
In some embodiments of the present application, the reading order information corresponding to the target order, and the caching the order information includes:
reading order information corresponding to the target order, and encrypting and caching the order information;
the receiving the operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information, including:
receiving an operation request, and if the response of the operation request is overtime, verifying the identity of a user triggering the operation request through a digital signature;
if the identity authentication of the user is not passed, outputting a prompt message to prompt the user to have no order information viewing permission;
and if the user passes the identity authentication, judging whether the target order supports offline operation according to the order type in the order information.
In some embodiments of the present application, the receiving an operation request, and if the operation request response is time-out, verifying, by a digital signature, an identity of a user who triggered the operation request includes:
receiving an operation request, and if the response of the user operation request is overtime, outputting prompt information to prompt a user to input an identity key;
performing digital signature verification according to the identity key input by the user to verify the identity of the user;
if the digital signature is successfully verified, judging that the identity of the user passes verification;
and if the digital signature fails to be verified, judging that the identity verification of the user fails.
In some embodiments of the present application, after recording offline operation data corresponding to the operation request if the offline operation corresponding to the operation request is legal, the method includes:
encrypting the off-line operation data by using a preset symmetric encryption algorithm;
encrypting a first secret key used in the preset symmetric encryption algorithm through a user public key corresponding to the target order;
after the network is recovered, uploading the offline operation data comprises:
and after the network is recovered, uploading the encrypted offline operation data and the encrypted first key so that a network terminal corresponding to the target order can obtain the offline operation data by decrypting the first key.
In some embodiments of the present application, after the network is recovered and the offline operation data is uploaded, the method includes:
receiving a confirmation message fed back by a network side corresponding to the target order, and opening the operation authority of the target order;
and if the confirmation message fed back by the network side corresponding to the target order is not received within the specified time, the offline operation data is uploaded for the second time.
In another aspect, the present application provides an order offline operating apparatus, including:
the order reading module is used for reading order information corresponding to the target order and caching the order information;
the request response module is used for receiving an operation request, and if the operation request response is overtime, whether the target order supports offline operation is judged according to the order information;
the verification module is used for reading the verification information of the target order if the target order supports the off-line operation and determining whether the off-line operation corresponding to the operation request is legal or not according to the verification information;
the offline operation module is used for recording offline operation data corresponding to the operation request if the offline operation corresponding to the operation request is legal;
and the data uploading module is used for uploading the offline operation data after the network is recovered.
In another aspect, the present application provides an order offline operating device, including:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement an order offline operation.
In another aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is loaded by a processor to execute the steps in the order offline operation method.
According to the technical scheme, order information corresponding to a target order is read, and the order information is cached; receiving a user operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information; if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information; if the off-line operation corresponding to the operation request is legal, recording off-line operation data corresponding to the operation request; after the network is recovered, uploading the off-line operation data; after monitoring that the response of the operation request is overtime, judging whether the off-line operation corresponding to the operation request is legal or not according to the order information, providing authority verification of the off-line operation, and increasing the safety of the off-line operation of the target order; after receiving the target order, caching the order information, and when the operation request response is overtime, reading the cached order information to realize the off-line operation of the target order, thereby solving the problem of timely obtaining the order information; in addition, according to the method and the device, offline operation data are uploaded synchronously after the network is recovered, and the safety of order offline operation is further improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic view of a scenario of an order offline operation provided by an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an example of an order offline operation method according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating an embodiment of offline validity checking in the order offline operation method according to the present invention;
FIG. 4 is a flowchart illustrating an embodiment of generating offline operation data in the order offline operation method according to the present invention;
fig. 5 is a flowchart illustrating an embodiment of order information storage in the order offline operation method according to the present invention;
FIG. 6 is a flowchart illustrating an embodiment of encrypting offline operation data in the order offline operation method according to the present invention;
fig. 7 is a flowchart illustrating an example of uploading offline operation data in the order offline operation method according to the present invention;
FIG. 8 is a schematic structural diagram of an order offline operating apparatus according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of an embodiment of an order offline operating device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present application, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be considered as limiting the present application. Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In this application, the word "exemplary" is used to mean "serving as an example, instance, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. The following description is presented to enable any person skilled in the art to make and use the application. In the following description, details are set forth for the purpose of explanation. It will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In other instances, well-known structures and processes are not set forth in detail in order to avoid obscuring the description of the present application with unnecessary detail. Thus, the present application is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
The embodiment of the invention provides an order offline operation method, an order offline operation device, order offline operation equipment and a computer-readable storage medium.
The order offline operation method in the embodiment of the application is applied to an order offline operation device, the order offline operation device is arranged on order offline operation equipment, the order offline operation equipment is provided with a memory and a processor, the memory stores an application program, and the processor is used for running the application program stored in the memory to realize order offline operation; the order offline operating device can be a mobile terminal, such as a mobile phone or a tablet computer.
As shown in fig. 1, fig. 1 is a schematic view of a scenario of order offline operation provided in an embodiment of the present application, where the order offline operation scenario in the embodiment of the present application includes an order offline operation apparatus 100 (an order offline operation device is integrated in the order offline operation apparatus), and the order offline operation apparatus 100 executes a computer-readable storage medium corresponding to the order offline operation to execute a step of the order offline operation.
It should be understood that the order offline operation device 100 in the order offline operation shown in fig. 1, or the apparatuses included in the order offline operation device 100, do not constitute a limitation to the embodiment of the present application, that is, the number of devices and the kind of devices included in the scenario of the order offline operation, or the number of apparatuses and the kind of apparatuses included in each device do not affect the overall implementation of the technical solution in the embodiment of the present application, and the military may be calculated as an equivalent replacement or a derivative of the technical solution claimed in the embodiment of the present invention.
The order offline operating device 100 according to the embodiment of the present application is mainly used for:
reading order information corresponding to a target order and caching the order information;
receiving an operation request, and if the response of the user operation request is overtime, judging whether the target order supports offline operation or not according to the order information;
if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information;
if the off-line operation corresponding to the operation request is legal, recording off-line operation data corresponding to the operation request;
and uploading the off-line operation data after the network is recovered.
In this embodiment of the present application, the order offline operation device 100 may be an individual order offline operation device, or an order offline operation device network or an order offline operation device cluster that is formed by order offline operation devices, for example, the order offline operation device 100 described in this embodiment of the present application includes, but is not limited to, a mobile terminal, a computer, a network host, a single network order offline operation device, a plurality of network order offline operation device sets, or a cloud order offline operation device that is formed by a plurality of order offline operation devices. The cloud order offline operation equipment is composed of a large number of computers or network order offline operation equipment based on cloud computing.
Those skilled in the art can understand that the application scenario shown in fig. 1 is only one application scenario of the present embodiment, and does not constitute a limitation on the application scenario of the present embodiment, and other application scenarios may further include more or fewer order offline operating devices 100 than those shown in fig. 1, or an order offline operating device 100 network connection relationship, for example, only 1 order offline operating device 100 is shown in fig. 1, and it can be understood that the order offline operating scenario may further include one or more order offline operating devices 100, which is not limited herein; the order offline operation device 100 may further include a memory for storing data, such as order information and offline operation data.
In addition, in the scenario of order offline operation, the order offline operation apparatus 100 may be provided with the display device 200, or the display device 200 is not provided in the order offline operation apparatus 100 and is in communication connection with an external display device, and the display device 200 is configured to output a result executed by the order offline operation method in the order offline operation apparatus 100. The order offline operating apparatus 100 may access the background database 300 (the background database 300 may be a local memory of the order offline operating apparatus 100), and information related to the order offline operation is stored in the background database 300, for example, order information, order status, offline operation data, and the like are stored in the background database.
It should be noted that the scene diagram of the order offline operation shown in fig. 1 is only an example, and the scene of the order offline operation described in the embodiment of the present application is for more clearly illustrating the technical solution of the embodiment of the present application, and does not constitute a limitation to the technical solution provided in the embodiment of the present application.
As shown in fig. 2, fig. 2 is a flowchart illustrating an embodiment of an order offline operation method provided in the present application, where the order offline operation method includes:
and 101, reading order information corresponding to the target order and caching the order information.
The order offline operation method in this embodiment is applied to the order offline operation device 100, and the type and the number of devices in the order offline operation device 100 are not limited. The present embodiment takes the client as an example for explanation. The client establishes a communication channel with the network, acquires a target order sent by the network through the communication channel, reads order information corresponding to the target order (wherein the order information includes but is not limited to an order identifier, a delivery address and expected delivery time), and caches the read order information to the local client.
In the embodiment of the application, after the client reads the order information, the order information is encrypted, and the client caches the encrypted order information in the local part of the client to protect the order information from being attacked by malicious applications.
And 102, receiving an operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information.
In the embodiment of the application, the client receives an operation request based on a target order (the operation request based on the target order is also called an operation target order request, and the operation request includes picking, delivering, completing the order, checking the order and the like), and the client sends the operation target order request to the network end through the communication network and waits for the reply of the network end.
When the client receives the reply of the network, the client judges that the network responds to the operation request, the client acquires operation data (wherein the operation data comprises an operation target order request, time information, client position information and the like), the client sends the operation data to the network, updates the order state of the target order (the order state comprises that the order is taken, the order is delivered, the order is completed and the like), and the client caches the operation data and the order state and synchronously uploads the operation data and the order state to the network.
If the client does not receive the reply of the network after the specified time, the client stops waiting for the reply of the network, outputs an operation request response timeout prompt message, reads the cached order information, extracts the order mark of the target order from the order information, and judges whether the target order supports the offline operation according to the order mark (in the embodiment, the order mark allowing the offline operation or not allowing the offline operation is marked on the order according to the type of the order in advance, and the terminal uses the order mark and the order number as the order mark; for example, the order mark requiring the consignee to confirm receipt such as valuables, consignment payment and the like is marked not allowing the offline operation, and the order mark for takeout is marked as allowing the offline operation).
103, if the target order supports the offline operation, reading the verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information.
In the embodiment of the application, if the target order supports offline operation, the client reads collected verification information (the verification information includes position verification information, time verification information and the like), the client compares the verification information with preset conditions of the target order (the preset conditions refer to preset target order offline operation conditions, the preset conditions can be set according to the type and the like of the target order, for example, if the target order is a goods delivery order, the preset conditions are that offline operation can be performed at a goods target place), and the client determines whether the offline operation on the target order is legal or not by judging whether the verification information meets the preset conditions or not; if the verification information does not meet the preset conditions, the client judges that the offline operation of the target order is illegal, and only provides the offline viewing authority of the order information of the target order; and if the verification information meets the preset conditions, the client side judges that the off-line operation on the target order is legal.
In the embodiment of the application, after the target order supports the offline operation, whether the offline operation on the target order is legal or not is determined through the verification information, the authority verification of the offline operation is provided, and the security of the offline operation on the target order is improved.
And 104, if the offline operation corresponding to the operation request is legal, recording the offline operation data corresponding to the operation request.
If the offline operation on the target order is legal, the client records offline operation data (wherein the offline operation data includes but is not limited to information input by a user, acquired operation time information and position information) generated when the operation request is executed, updates the order state of the target order according to the offline operation data, and encrypts and stores the offline operation data and the updated order state locally at the client.
And 105, uploading the offline operation data after the network is recovered.
The method comprises the steps that a client detects network environment information in real time, the client uploads offline operation data to a network end after detecting that a network is recovered, in this embodiment, the client can monitor a network connection state with the network end through a heartbeat packet, specifically, the client sends a detection packet to the network end every time interval, the client starts an overtime timer when sending the detection packet, and if a response packet sent by the network end is received within the time set by the overtime timer, the overtime timer is deleted, and the network is prompted to be normal; if the response packet sent by the network end is still not received after the timeout timer is overtime, the network connection between the client and the network end is interrupted.
In this embodiment, if the offline operation on the target order is legal, the client records the offline operation data generated when the operation request is executed, encrypts and caches the offline operation data in the local of the client, so as to ensure the security of the offline operation data, and simultaneously monitors the network state to ensure that the offline operation data is uploaded in time after the network is restored.
After monitoring that the response of the operation request is overtime, judging whether the off-line operation corresponding to the operation request is legal or not according to the order information, providing authority verification of the off-line operation, and increasing the safety of the off-line operation of the target order; after receiving the target order, caching the order information, and when the operation request response is overtime, reading the cached order information to realize the off-line operation of the target order, thereby solving the problem of timely obtaining the order information; in addition, according to the method and the device, offline operation data are uploaded synchronously after the network is recovered, and the safety of order offline operation is further improved.
As shown in fig. 3, fig. 3 is a flowchart of an embodiment of offline validity check in the order offline operation method according to the present application.
In some embodiments of the present application, the step of checking the offline validity in the order offline operation method is specifically described, including:
201, if the target order supports the off-line operation, collecting verification information based on the order identifier of the target order, and comparing the verification information with a preset condition corresponding to the target order.
And if the target order supports the off-line operation, the client collects the position information, the time information and the like of the client as the verification information according to the order mark of the target order. In this embodiment, the location information of the client may be longitude and latitude of the client; the time information may be a time obtained using an in-client timer; specifically, the client uses GPS (Global Positioning System, Chinese: Global Positioning System) to obtain the longitude and latitude of the position where the client is located as the position parameter; and the client acquires the time information through the timer.
The terminal compares the verification information with preset conditions corresponding to the target order (the preset conditions refer to preset target order offline operation conditions, and the preset conditions can be set according to the type of the target order, for example, if the target order is a goods delivery order, the preset conditions are that offline operation can be performed at a goods target place), so as to determine whether the offline operation corresponding to the operation request is legal or not.
202, if the verification information is matched with the preset condition corresponding to the target order, determining that the offline operation corresponding to the operation request is legal.
If the verification information is matched with the preset condition corresponding to the target order, the client judges that the off-line operation corresponding to the operation request is legal, and if the off-line operation corresponding to the target order is legal, the client records the off-line operation data corresponding to the user operation request.
And 203, if the verification information is not matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is illegal.
And if the verification information is matched with the preset condition corresponding to the target order, the client judges that the off-line operation corresponding to the operation request is illegal, closes the off-line operation permission of the order and only provides the viewing permission of the cached order information.
In the embodiment of the application, after the client side determines that the target order supports the offline operation, the client side collects the inspection parameters to generate the inspection information, matches the inspection information with the preset conditions to determine whether the offline operation of the target order is legal or not, provides the authority verification of the offline operation, and increases the security of the offline operation of the target order.
In this embodiment, before checking parameter collection, the client may perform operation environment security detection, specifically, if the target order supports offline operation, the client performs operation environment security detection by querying whether to open a root right (where the root right is a root right and is the highest right of the entire system, and may be conveniently deleted or modified for a component of the system) and an auxiliary location function, and if the root right is opened or the auxiliary location function is opened, it indicates that the operation environment is unsafe, and outputs a prompt message that the order offline operation is not allowed; and if the root authority and the auxiliary positioning function are not started, the safety of the operating environment is indicated, and the inspection parameters are collected.
In this embodiment of the present application, after reading the collected verification information, the client reads the preset condition corresponding to the target order from the cached order information, and then compares the verification information with the preset condition to verify the validity of the offline operation, which specifically includes:
the client compares the position information in the verification information with the position condition in the preset condition, and if the difference value between the position information and the position condition in the preset condition is smaller than a fixed value, the position information accords with the preset position condition; if the difference value between the position information and the position condition in the preset condition is larger than a fixed value, the position information is not in accordance with the preset position condition;
the client compares the operation time in the check information with the time condition in the preset condition, if the network connection between the client and the network is overtime all the time after the client is cold started, the time information in the client is judged to be invalid, and the operation time does not accord with the preset time condition; and if the client corrects the time information by connecting with the network side after the client is cold started, judging that the time information in the client is valid, and the operation time accords with the preset time condition.
If the client position information and the operation time both accord with preset conditions, the verification information meets the preset conditions corresponding to the order; and if the client position information does not accord with the preset position condition and/or the operation time does not accord with the preset time condition, indicating that the verification information does not meet the preset condition corresponding to the order.
In this embodiment, in the verification of the location information, the fixed value may be set to 300 meters, that is, if the difference between the location information and the location condition in the preset condition is less than 300 meters, it indicates that the location information conforms to the preset location condition; and if the difference value of the position information and the position condition in the preset condition is more than 300 meters, the position information is not in accordance with the preset position condition.
In the embodiment of the application, before collecting the real-time position information and the operation time information, the client side inquires whether to start the root authority and the auxiliary positioning function, so that the safety detection of the operation environment is carried out, the safety and the accuracy guarantee are provided for the collection of the verification information, and the safety of the order offline operation is guaranteed; and the legitimacy of the offline operation is verified through preset conditions, the authority verification of the offline operation is provided, and the security of the offline operation of the target order is improved.
As shown in fig. 4, fig. 4 is a flowchart illustrating an embodiment of generating offline operation data in an order offline operation method according to the present application.
In some embodiments of the present application, a method for generating offline operation data in an order offline operation method is specifically described, where the method includes:
301, if the offline operation corresponding to the operation request is legal, reading the cached order information, and extracting the order identifier of the target order from the order information.
In the embodiment of the application, if the offline operation corresponding to the operation request is legal, the client reads the order identifier and the order state of the target order from the cached order information, judges whether the order state of the target order is a finished order, and prompts that the target order is finished if the order state is the finished order; and if the order state is not the completed order, executing the operation of responding to the operation request of the user.
302, recording operation data generated by the offline operation corresponding to the operation request, and updating the order state of the target order according to the operation data.
And in response to the operation request, the client records operation data (wherein the operation data comprises operation time information, position information and the like) generated when the operation request is executed according to the operation request, updates the order state of the target order according to the operation data and the operation request, and records the updated record of the target order, such as picking at the A time A1, delivering at the B time B1, delivering at the C time and the like.
303, binding the operation data, the order state and the order identifier in association as offline operation data, and caching the offline operation data.
And binding the recorded operation data and the updated order state in combination with the order mark corresponding to the target order as offline operation data, encrypting the offline operation data, and caching the encrypted offline operation data to the local part of the client.
In the embodiment of the application, after the client determines that the validity check of the offline operation is passed, the client generates the operation data according to the operation request, updates the order state, associates and binds the updated order state and the operation data with the order identifier as the offline operation data, and caches the offline operation data in the local client, so that the problem of order offline operation in a non-network environment is solved, and the problem of untimely delivery caused by a network is solved.
As shown in fig. 5, fig. 5 is a schematic flowchart of an embodiment of order information storage in an order offline operation method according to the embodiment of the present application.
In some embodiments of the present application, a method for storing order information in an order offline operation method is specifically described, where the method includes:
401, reading order information corresponding to the target order, and encrypting and caching the order information.
In the embodiment of the application, before reading the order information corresponding to the target order, the client acquires the target order, creates an order file, associates the order file with the order identifier corresponding to the target order, reads the order information corresponding to the target order, and encrypts and caches the read order information into the order file.
For example, in the embodiment, a target order corresponds to an order file, and the file name of the order file may be generated by using an MD5 (full name: message-digest algorithm 5, chinese: information digest algorithm) encryption algorithm, and specifically, the method includes:
step a1, setting the data of the order mark of the target order as a set M, sorting the parameters of the non-empty parameter values in the set M from small to large according to parameter name ASCII (American Standard Code for Information exchange, Chinese: American Standard Code) codes (dictionary order), and generating a character string by using the URL (Uniform Resource Location, Chinese: Uniform Resource locator) key-value pair format;
step a2, splicing a key at the end of the character string to obtain a temporary character string, and performing MD5 operation on the temporary character string to obtain the character string;
step a3, all characters in the obtained character string are converted into capitals, and the file name is obtained.
In the embodiment of the application, the temporary character string may be formed by splicing a random character string, an order number and a sequenced request, and the order file and the order identifier are associated with each other through the order number.
In the embodiment of the application, after the order information is read, the order information is encrypted and then serialized and then stored in the order file, so that the encrypted cache of the order information is realized, and the order information is prevented from being tampered.
402, receiving an operation request, and if the operation request response is overtime, verifying the identity of a user triggering the operation request through a digital signature.
In this embodiment of the present application, receiving an operation request, and if the operation request response is overtime, before reading order information, verifying, by a client, an identity of a user through a digital signature, specifically, the method includes:
and b1, receiving the operation request, and outputting prompt information to prompt the user to input the identity key if the user operation request response is overtime.
And b2, performing digital signature verification according to the identity key input by the user to verify the identity of the user.
If the user operation request response is overtime, the client prompts the user to input an identity key to carry out digital signature verification (wherein the identity key comprises a file key and an order key), the client matches the file name of the order file according to the file key input by the user, and if the file key input by the user is the same as the file name, the file key and the file name are successfully matched; and if the file key input by the user is not identical to the file name, indicating that the file key and the file name are not matched.
If the file key and the file name are successfully matched, reading encrypted order information stored in an order file, and performing digital signature verification according to an order key input by a user to verify the identity of the user, specifically, after the client obtains a digital signature of the user, encrypting a plaintext input by the user (the plaintext input by the user can be an operation request) by using the order key input by the user to obtain a ciphertext, comparing the ciphertext with the digital signature, and determining whether the digital signature verification is successful by judging whether the ciphertext is the same as the digital signature; if the ciphertext is the same as the digital signature, the verification of the digital signature is successful; if the ciphertext is not identical to the digital signature, the verification of the digital signature fails.
Step b3, if the digital signature is successfully verified, the identity of the user is judged to be passed;
step b4, if the digital signature fails to verify, determining that the user identity verification fails.
In the embodiment of the application, the identity of the user is determined through two rounds of verification of the file key and the order key, the reference permission of the cached order information is provided only for the user passing the two rounds of verification, the permission supervision for reading the cached order information is provided, and the safety of the order information is guaranteed.
And 403, if the identity of the user passes the authentication, judging whether the target order supports offline operation according to the order type in the order information.
And if the user identity verification is passed, reading order information in an order file corresponding to the target order, and judging whether the target order supports offline operation according to the order type in the order information.
404, if the user's identity authentication is not passed, outputting a prompt message to prompt that the user does not have the order information viewing permission.
In the embodiment of the application, after the order information is read, the order information is encrypted and cached, and after the response of the operation request is overtime, the client side verifies the identity of the user through the file key input by the user and the order key, and the security of the offline operation of the order is ensured through verifying the identity of the user.
As shown in fig. 6, fig. 6 is a flowchart illustrating an embodiment of encrypting offline operation data in an order offline operation method according to the present application.
In some embodiments of the present application, a method for encrypting offline operation data in an order offline operation method is specifically described, including:
601, encrypting the off-line operation data by using a preset symmetric encryption algorithm.
In the embodiment of the application, if the offline operation corresponding to the operation request is legal, the client generates offline operation data according to the user operation request, encrypts the offline operation data by using a preset symmetric encryption method, stores the encrypted offline data into an order file, and specifically, the client generates a first key by using a preset symmetric encryption algorithm; after the offline operation data are generated, plaintext (namely the offline operation data) are grouped in a grouping mode, and then each group of plaintext is encrypted by using a first key to obtain a ciphertext, so that the offline operation data are encrypted.
In the embodiment of the present application, the symmetric Encryption method may be AES (Advanced Encryption Standard, chinese: Advanced data Encryption Standard), and the client groups the offline operation data by the AES Encryption method, where each group is 128 bits long, and then encrypts the offline operation data one by one until all the offline operation data are encrypted. The length of the first key may be 128, 192 or 256 bits in embodiments of the present application.
In the embodiment, the off-line operation data is encrypted by using an AES method, so that a safe and efficient encryption method is provided, and the off-line operation data is encrypted and stored to ensure the safety of the data.
And 602, encrypting the first key used in the preset symmetric encryption algorithm by using the user public key corresponding to the target order.
After the off-line operation data encryption storage is completed, encrypting a first key used in a preset symmetric encryption algorithm by using an asymmetric encryption algorithm (wherein the asymmetric encryption algorithm needs a public key and a private key for encryption and decryption), specifically, the method includes:
step c1, when the client acquires the target order sent by the network side corresponding to the target order, the client receives the user public key sent by the network side corresponding to the target order;
and c2, after the off-line operation data is encrypted by the AES, encrypting the first key by using the user public key by using an asymmetric encryption algorithm to obtain a key ciphertext.
In this embodiment of the application, the asymmetric encryption algorithm may be RSA (Rivest Shamir Adleman, chinese: an encryption algorithm), and after the client detects that the network is recovered, the encrypted offline operation data and the key ciphertext are uploaded to the network, so that the network decrypts the key ciphertext by using the private key to obtain the first key, and then decrypts the encrypted offline operation data by using the first key to obtain the offline operation data.
In the embodiment of the application, the off-line operation data is encrypted by using the symmetric encryption algorithm, then the key of the symmetric encryption algorithm is encrypted by using the asymmetric encryption algorithm, and through two rounds of mixed encryption, the safety of data storage and data transmission is improved, tampering is avoided, and the safety of the off-line operation of the order is improved.
As shown in fig. 7, fig. 7 is a flowchart illustrating an embodiment of uploading offline operation data in an order offline operation method according to the present application.
In some embodiments of the present application, a method for uploading offline operation data in an order offline operation method is specifically described, where the method includes:
701, receiving a confirmation message fed back by a network side corresponding to the target order, and opening the operation authority of the target order.
In the embodiment of the application, after the client detects that the network is recovered, the off-line operation data is uploaded to the network, and whether the off-line operation data is successfully uploaded is determined by judging whether the confirmation information fed back by the network is received within the specified time. If the client receives the confirmation information fed back by the network terminal within the specified time, the offline operation data is successfully uploaded, the operation authority of the target order is opened (wherein the operation authority comprises the authority of taking, delivering and modifying the order state of the target order and the like), the user operation request is responded, the operation data is recorded according to the user operation request, and the order state is updated.
And 702, if the confirmation message fed back by the network side corresponding to the target order is not received within the specified time, performing secondary uploading on the offline operation data.
If the client does not receive the confirmation information fed back by the network terminal within the specified time, the offline operation data uploading is failed, and the client closes the operation authority of the target order and uploads for the second time.
In the embodiment of the application, after the client performs offline operation, the client can prompt a user to upload offline operation data to a network terminal within a scheduled time, specifically, after the offline operation is performed, the client prompts the user to select the time for uploading the offline operation data, scheduled time is generated according to the selection of the user, the network state is monitored, after the network is recovered, the client automatically uploads the offline operation data to the network terminal, the client determines whether a default exists in a user corresponding to the client by judging that the user finishes uploading the offline operation data within a scheduled time intranet, if the client does not upload the offline operation data within the scheduled time, the client determines that the user corresponding to the client violates a contract, and caches the default record to the local client. The appointed time in the embodiment of the application can be 5 minutes.
In the embodiment of the application, the client side ensures the safety of the offline operation data by judging whether the offline operation data is uploaded to the network side within the specified time, so that real and effective order offline operation data is provided.
As shown in fig. 8, fig. 8 is a schematic structural diagram of an embodiment of an order offline operating apparatus according to an embodiment of the present application.
In order to better implement the order offline operation method in the embodiment of the present application, in addition to the order offline operation method, an order offline operation apparatus is further provided in the embodiment of the present application, where the order offline operation apparatus includes:
an order reading module 801, configured to read order information corresponding to a target order, and cache the order information;
a request response module 802, configured to receive an operation request, and if the operation request response is overtime, determine whether the target order supports offline operation according to the order information;
a checking module 803, configured to read checking information of the target order if the target order supports offline operation, and determine whether offline operation corresponding to the operation request is legal according to the checking information;
an offline operation module 804, configured to record offline operation data corresponding to the operation request if the offline operation corresponding to the operation request is legal;
a data uploading module 805, configured to upload the offline operation data after the network is recovered.
In some embodiments of the present application, the verification module 803 further includes:
if the target order supports off-line operation, collecting verification information based on the order identification of the target order, and comparing the verification information with preset conditions corresponding to the target order;
if the verification information is matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is legal;
and if the verification information is not matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is illegal.
In some embodiments of the present application, the offline operation module 804 further includes:
if the offline operation corresponding to the operation request is legal, reading the cached order information, and extracting the order identification of the target order from the order information;
recording operation data generated by the operation request corresponding to offline operation, and updating the order state of the target order according to the operation data;
and binding the operation data, the order state and the order identification in a correlation manner to be used as offline operation data, and caching the offline operation data.
In some embodiments of the present application, the order reading module 801 further includes:
reading order information corresponding to the target order, and encrypting and caching the order information;
the request response module 802 further includes:
receiving an operation request, and if the response of the operation request is overtime, verifying the identity of a user triggering the operation request through a digital signature;
if the identity authentication of the user is not passed, outputting a prompt message to prompt the user to have no order information viewing permission;
and if the user passes the identity authentication, judging whether the target order supports offline operation according to the order type in the order information.
In some embodiments of the present application, the request response module 802 further includes:
receiving an operation request, and if the response of the user operation request is overtime, outputting prompt information to prompt a user to input an identity key;
performing digital signature verification according to the identity key input by the user to verify the identity of the user;
if the digital signature is successfully verified, judging that the identity of the user passes verification;
and if the digital signature fails to be verified, judging that the identity verification of the user fails.
In some embodiments of the present application, the offline operation module 804 further includes:
encrypting the off-line operation data by using a preset symmetric encryption algorithm;
and encrypting the first key used in the preset symmetric encryption algorithm through the user public key corresponding to the target order.
In some embodiments of the present application, the data uploading module 805 further includes:
and after the network is recovered, uploading the encrypted offline operation data and the encrypted first key so that a network terminal corresponding to the target order can obtain the offline operation data by decrypting the first key.
In some embodiments of the present application, the data uploading module 805 further includes:
receiving a confirmation message fed back by a network side corresponding to the target order, and opening the operation authority of the target order;
and if the confirmation message fed back by the network side corresponding to the target order is not received within the specified time, the offline operation data is uploaded for the second time.
After monitoring that the response of the operation request is overtime, the order offline operation device in the embodiment of the application judges whether the offline operation of the target order is legal or not according to the order information, provides the authority verification of the offline operation and increases the security of the offline operation of the target order; after receiving the target order, caching the order information, and when the operation request response is overtime, reading the cached order information to realize the off-line operation of the target order, thereby solving the problem of timely obtaining the order information; in addition, according to the method and the device, offline operation data are uploaded synchronously after the network is recovered, and the safety of order offline operation is further improved.
An order offline operating device is further provided in the embodiment of the present application, as shown in fig. 9, fig. 9 is a schematic structural diagram of an embodiment of the order offline operating device provided in the embodiment of the present application.
The order offline operating device integrates any one of the order offline operating devices provided in the embodiments of the present application, and includes:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to perform the steps of the order offline operation method in any of the above described order offline operation method embodiments.
Specifically, the method comprises the following steps: the order offline operating apparatus includes components such as a processor 1001 of one or more processing cores, a memory 1002 of one or more computer-readable storage media, a power source 1003, and an input unit 1004. Those skilled in the art will appreciate that the order offline operation apparatus configuration illustrated in FIG. 9 does not constitute a limitation of order offline operation apparatus and may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. Wherein:
the processor 1001 is a control center of the order offline operating device, connects various parts of the whole order offline operating device by using various interfaces and lines, and executes various functions and processing data of the order offline operating device by running or executing software programs and/or modules in the memory 1002 and calling data stored in the memory 1002, thereby performing overall monitoring of the order offline operating device. Optionally, processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 1001.
The memory 1002 may be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by operating the software programs and modules stored in the memory 1002. The memory 1002 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, an application program required by at least one function (such as a target order obtaining function, an order information caching function, an offline operation data storage function, and the like), and the like; the storage data area may store data created according to the use of the order offline-operation apparatus, and the like. Further, the memory 1002 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 1002 may also include a memory controller to provide the processor 1001 access to the memory 1002.
The order offline operating device further includes a power source 1003 for supplying power to each component, and preferably, the power source 1003 may be logically connected to the processor 1001 through a power management system, so that functions of managing charging, discharging, power consumption management and the like are implemented through the power management system. The power supply 1002 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The order offline operating apparatus may further include an input unit 1004, and the input unit 1004 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the order offline operating apparatus may further include a display unit and the like, which are not described in detail herein. Specifically, in this embodiment, the processor 1001 in the order offline operation device loads the executable file corresponding to the process of one or more application programs into the memory 1002 according to the following instructions, and the processor 1001 runs the application programs stored in the memory 1002, so as to implement various functions as follows:
reading order information corresponding to a target order and caching the order information;
receiving an operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information;
if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information;
if the off-line operation corresponding to the operation request is legal, recording off-line operation data corresponding to the operation request;
and uploading the off-line operation data after the network is recovered.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present invention provides a computer-readable storage medium, which may include: Read-Only Memory (ROM, Chinese: ROM), Random Access Memory (RAM, Chinese: RAM), magnetic or optical disk, etc. The computer program is loaded by a processor to execute the steps of any order offline operation method provided by the embodiment of the invention. For example, the computer program may be loaded by a processor to perform the steps of:
reading order information corresponding to a target order and caching the order information;
receiving an operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information;
if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information;
if the off-line operation corresponding to the operation request is legal, recording off-line operation data corresponding to the operation request;
and uploading the off-line operation data after the network is recovered.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed descriptions of other embodiments, and are not described herein again.
In a specific implementation, each unit or structure may be implemented as an independent entity, or may be combined arbitrarily to be implemented as one or several entities, and the specific implementation of each unit or structure may refer to the foregoing method embodiment, which is not described herein again.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
The order offline operation method, apparatus, device and computer-readable storage medium provided by the embodiments of the present invention are described in detail above, and a specific example is applied in the present disclosure to explain the principle and the implementation of the present invention, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for offline operation of an order, the method comprising:
reading order information corresponding to a target order and caching the order information;
receiving an operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information;
if the target order supports offline operation, reading verification information of the target order, and determining whether the offline operation corresponding to the operation request is legal or not according to the verification information;
if the off-line operation corresponding to the operation request is legal, recording off-line operation data corresponding to the operation request;
and uploading the off-line operation data after the network is recovered.
2. The order offline operation method of claim 1, wherein reading verification information of the target order if the target order supports offline operation, and determining whether the offline operation corresponding to the operation request is legal according to the verification information comprises:
if the target order supports off-line operation, collecting verification information based on the order identification of the target order, and comparing the verification information with preset conditions corresponding to the target order;
if the verification information is matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is legal;
and if the verification information is not matched with the preset condition corresponding to the target order, judging that the off-line operation corresponding to the operation request is illegal.
3. The order offline operation method of claim 1, wherein, if the offline operation corresponding to the operation request is legal, the recording of the offline operation data corresponding to the operation request comprises:
if the offline operation corresponding to the operation request is legal, reading the cached order information, and extracting the order identification of the target order from the order information;
recording operation data generated by the operation request corresponding to offline operation, and updating the order state of the target order according to the operation data;
and binding the operation data, the order state and the order identification in a correlation manner to be used as offline operation data, and caching the offline operation data.
4. The order offline operation method of claim 1, wherein said reading order information corresponding to the target order and said caching said order information comprises:
reading order information corresponding to a target order, and encrypting and caching the order information;
the receiving the operation request, and if the operation request response is overtime, judging whether the target order supports offline operation according to the order information, including:
receiving an operation request, and if the response of the operation request is overtime, verifying the identity of a user triggering the operation request through a digital signature;
if the identity authentication of the user is not passed, outputting a prompt message to prompt the user to have no order information viewing permission;
and if the user passes the identity authentication, judging whether the target order supports offline operation according to the order type in the order information.
5. The order offline operation method of claim 4, wherein said receiving an operation request, and if said operation request response times out, verifying the identity of a user triggering said operation request by a digital signature comprises:
receiving an operation request, and if the response of the user operation request is overtime, outputting prompt information to prompt a user to input an identity key;
performing digital signature verification according to the identity key input by the user to verify the identity of the user;
if the digital signature is successfully verified, judging that the identity of the user passes verification;
and if the digital signature fails to be verified, judging that the identity verification of the user fails.
6. The order offline operation method of claim 1, wherein after recording offline operation data corresponding to the operation request if the offline operation corresponding to the operation request is legal, the method comprises:
encrypting the off-line operation data by using a preset symmetric encryption algorithm;
encrypting a first secret key used in the preset symmetric encryption algorithm through a user public key corresponding to the target order;
after the network is recovered, uploading the offline operation data comprises:
and after the network is recovered, uploading the encrypted offline operation data and the encrypted first key so that a network terminal corresponding to the target order can obtain the offline operation data by decrypting the first key.
7. The order offline operation method of any one of claims 1 to 6, wherein after said offline operation data is uploaded after network recovery, said method comprises:
receiving a confirmation message fed back by a network side corresponding to the target order, and opening the operation authority of the target order;
and if the confirmation message fed back by the network side corresponding to the target order is not received within the specified time, the offline operation data is uploaded for the second time.
8. An order offline operating apparatus, comprising:
the order reading module is used for reading order information corresponding to the target order and caching the order information;
the request response module is used for receiving an operation request, and if the operation request response is overtime, whether the target order supports offline operation is judged according to the order information;
the verification module is used for reading the verification information of the target order if the target order supports the off-line operation and determining whether the off-line operation corresponding to the operation request is legal or not according to the verification information;
the offline operation module is used for recording offline operation data corresponding to the operation request if the offline operation corresponding to the operation request is legal;
and the data uploading module is used for uploading the offline operation data after the network is recovered.
9. An order offline operating apparatus, comprising:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement the order offline method of operation of any of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a computer program which is loaded by a processor to perform the steps of the order offline method of operation of any of claims 1 to 7.
CN202011554927.1A 2020-12-24 2020-12-24 Method, apparatus, device and computer readable storage medium for order offline operation Active CN112581233B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011554927.1A CN112581233B (en) 2020-12-24 2020-12-24 Method, apparatus, device and computer readable storage medium for order offline operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011554927.1A CN112581233B (en) 2020-12-24 2020-12-24 Method, apparatus, device and computer readable storage medium for order offline operation

Publications (2)

Publication Number Publication Date
CN112581233A true CN112581233A (en) 2021-03-30
CN112581233B CN112581233B (en) 2024-01-26

Family

ID=75139620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011554927.1A Active CN112581233B (en) 2020-12-24 2020-12-24 Method, apparatus, device and computer readable storage medium for order offline operation

Country Status (1)

Country Link
CN (1) CN112581233B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298620A (en) * 2021-05-31 2021-08-24 中国民航信息网络股份有限公司 Frequent traveler information management method and related device
CN113627931A (en) * 2021-07-14 2021-11-09 荣耀终端有限公司 Payment limiting method and electronic equipment
CN114257637A (en) * 2021-12-14 2022-03-29 优默网络科技(深圳)有限公司 Task execution method and device, terminal equipment and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711152B1 (en) * 1999-04-30 2010-05-04 Davida George I System and method for authenticated and privacy preserving biometric identification systems
CN106327186A (en) * 2016-08-31 2017-01-11 中城智慧科技有限公司 Offline payment method based on NFC
CN106971297A (en) * 2016-01-13 2017-07-21 阿里巴巴集团控股有限公司 A kind of offline electronic payment method, apparatus and system
CN107248096A (en) * 2017-04-20 2017-10-13 多点生活(中国)网络科技有限公司 Order processing method and system
CN108053205A (en) * 2018-01-25 2018-05-18 苏宁云商集团股份有限公司 A kind of quick paying method and equipment
CN108230511A (en) * 2018-01-17 2018-06-29 北京锐拓时代科技有限公司 Realize that the method and system for management of checking out are moved in unattended hotel's intelligence offline
CN109658084A (en) * 2017-10-11 2019-04-19 北京京东尚科信息技术有限公司 The method and system of offline electronic payment
CN111461703A (en) * 2020-03-31 2020-07-28 支付宝(杭州)信息技术有限公司 Payment order checking method, payment order checking equipment, activation method thereof and transaction server
CN111815326A (en) * 2019-04-11 2020-10-23 财付通支付科技有限公司 Payment method in flight state, device, equipment and storage medium thereof
CN111833047A (en) * 2020-08-19 2020-10-27 深圳市富之富信息科技有限公司 Payment code generation method and device based on mobile payment and computer equipment
CN112036866A (en) * 2020-05-06 2020-12-04 深圳市龙岳科技有限公司 Transaction confirmation method and system capable of being under offline

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711152B1 (en) * 1999-04-30 2010-05-04 Davida George I System and method for authenticated and privacy preserving biometric identification systems
CN106971297A (en) * 2016-01-13 2017-07-21 阿里巴巴集团控股有限公司 A kind of offline electronic payment method, apparatus and system
CN106327186A (en) * 2016-08-31 2017-01-11 中城智慧科技有限公司 Offline payment method based on NFC
CN107248096A (en) * 2017-04-20 2017-10-13 多点生活(中国)网络科技有限公司 Order processing method and system
CN109658084A (en) * 2017-10-11 2019-04-19 北京京东尚科信息技术有限公司 The method and system of offline electronic payment
CN108230511A (en) * 2018-01-17 2018-06-29 北京锐拓时代科技有限公司 Realize that the method and system for management of checking out are moved in unattended hotel's intelligence offline
CN108053205A (en) * 2018-01-25 2018-05-18 苏宁云商集团股份有限公司 A kind of quick paying method and equipment
CN111815326A (en) * 2019-04-11 2020-10-23 财付通支付科技有限公司 Payment method in flight state, device, equipment and storage medium thereof
CN111461703A (en) * 2020-03-31 2020-07-28 支付宝(杭州)信息技术有限公司 Payment order checking method, payment order checking equipment, activation method thereof and transaction server
CN112036866A (en) * 2020-05-06 2020-12-04 深圳市龙岳科技有限公司 Transaction confirmation method and system capable of being under offline
CN111833047A (en) * 2020-08-19 2020-10-27 深圳市富之富信息科技有限公司 Payment code generation method and device based on mobile payment and computer equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张锐: ""高速铁路网上订餐服务配送方案优化研究"", 《中国优秀硕士学位论文全文数据库工程科技Ⅱ辑》, pages 033 - 14 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298620A (en) * 2021-05-31 2021-08-24 中国民航信息网络股份有限公司 Frequent traveler information management method and related device
WO2022252853A1 (en) * 2021-05-31 2022-12-08 中国民航信息网络股份有限公司 Method for managing frequent flyer information, and related apparatus
CN113627931A (en) * 2021-07-14 2021-11-09 荣耀终端有限公司 Payment limiting method and electronic equipment
CN113627931B (en) * 2021-07-14 2022-12-30 荣耀终端有限公司 Payment limiting method and electronic equipment
CN114257637A (en) * 2021-12-14 2022-03-29 优默网络科技(深圳)有限公司 Task execution method and device, terminal equipment and readable storage medium
CN114257637B (en) * 2021-12-14 2023-12-08 优默网络科技(深圳)有限公司 Task execution method, device, terminal equipment and readable storage medium

Also Published As

Publication number Publication date
CN112581233B (en) 2024-01-26

Similar Documents

Publication Publication Date Title
CN112581233B (en) Method, apparatus, device and computer readable storage medium for order offline operation
CN108111473B (en) Unified management method, device and system for hybrid cloud
CN106060796B (en) The backup destroying method and device of terminal
CN108521333B (en) Login method and system for off-line authentication based on dynamic password
CN105656859B (en) Tax control equipment software safety online upgrading method and system
US7620213B2 (en) Authentication device using anatomical information and method thereof
CN110493258A (en) Proof of identity method and relevant device based on TOKEN token
CN108696356B (en) Block chain-based digital certificate deleting method, device and system
CN101258505A (en) Secure software updates
CN103023862A (en) Method, server and system used for integrity protection and authentication
CN111435913A (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN112836202A (en) Information processing method and device and server
CN108156175A (en) To the access method of shared storage information under cloud computing platform
CN111770087A (en) Service node verification method and related equipment
JP2020024376A (en) Data protection method, authentication server, data protection system, and data structure
CN112667621A (en) Block chain supervision method, equipment and computer readable storage medium
CN112751800A (en) Authentication method and device
EP4220518A1 (en) Blockchain network-based device management method, related device, and storage medium
CN110912676A (en) Key management method and system
CN110086796A (en) A kind of transmission method based on public private key encryption technology collection monitoring data
CN114266080A (en) Data integrity protection method and system based on state cryptographic algorithm
CN108600149A (en) Cloud computing high availability cluster method for managing resource
CN107492157A (en) Base station iron tower inspection platform
CN110602121B (en) Network key obtaining method and device and computer readable storage medium
CN114745115A (en) Information transmission method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant