CN114650174B - Inheritance method, device and equipment for personal property information - Google Patents

Inheritance method, device and equipment for personal property information Download PDF

Info

Publication number
CN114650174B
CN114650174B CN202210262219.3A CN202210262219A CN114650174B CN 114650174 B CN114650174 B CN 114650174B CN 202210262219 A CN202210262219 A CN 202210262219A CN 114650174 B CN114650174 B CN 114650174B
Authority
CN
China
Prior art keywords
property information
electronic key
terminal
owner
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210262219.3A
Other languages
Chinese (zh)
Other versions
CN114650174A (en
Inventor
周军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qiyun Technology Co ltd
Original Assignee
Beijing Qiyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qiyun Technology Co ltd filed Critical Beijing Qiyun Technology Co ltd
Priority to CN202210262219.3A priority Critical patent/CN114650174B/en
Publication of CN114650174A publication Critical patent/CN114650174A/en
Application granted granted Critical
Publication of CN114650174B publication Critical patent/CN114650174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/255Maintenance or indexing of mapping tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a method, a device and equipment for inheriting personal property information, wherein the method comprises the following steps: reading a unique code of the electronic key terminal, and binding equipment; after the terminal equipment is bound, the property information owner delivers the electronic key terminal to the property information inheriter; the personal property information is encrypted by using the unique user key, the encrypted personal property information is stored based on the cloud block chain network, and the unique user key is stored in the electronic key terminal; when the unique code of the electronic key terminal is read, judging whether the property information owner has login behavior in a preset time period, and if not, granting the property information inheriter permission to check the personal property information. The invention can lead the user to take personal property information by taking the parent as the appointed property information owner to hold the authorized electronic key terminal when the accident happens or even the life cycle is terminated, thereby providing data support for the subsequent personal property information management or inheritance.

Description

Inheritance method, device and equipment for personal property information
Technical Field
The invention belongs to the technical field of property information acquisition, and particularly relates to a method, a device and equipment for inheriting personal property information.
Background
In real life, asset storage, transfer and recording are often performed in terms of physical asset credentials. With the development of the internet, more and more property information owners manage and record own property information through internet technology and intelligent terminals. However, when the property information owners fail to manage the personal property continuously due to accidents, even when the life cycle is terminated, some digital property is easily lost with the accident of the property information owners due to the failure to deliver the personal property information to relatives and friends in time. For example: after the life cycle of the property information owner is finished, the property is unknown to the person, so that the inheriter cannot inherit or retrieve the property certificate in a legal way, and the property is permanently lost.
In the prior art, a method for timely delivering property information to authorized relatives and friends when the property information owner has an unexpected situation that personal property information cannot be managed, so that property loss is avoided.
Disclosure of Invention
The invention aims to provide a method, a device and equipment for inheriting personal property information, which are used for solving at least one technical problem existing in the prior art.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
in a first aspect, the present invention provides a method for inheriting personal property information, including:
after detecting that the property information owner completes the account registration operation, reading a unique code of the electronic key terminal, and associating the unique code with account information of the property information owner to realize the binding of terminal equipment; the property information owner delivers the corresponding electronic key terminal to the property information inheriter after the terminal equipment is bound;
receiving personal property information editing operation of the property information owner, carrying out encryption operation on the personal property information by using a user unique key, storing the encrypted personal property information based on a cloud block chain network, and synchronously storing the user unique key into the electronic key terminal;
when the unique code of the electronic key terminal is read again, judging whether the property information owner has login behavior in a preset time period, if not, granting the property information inheriter permission to view or inherit the personal property information, so that the property information inheriter views or inherits the personal property information based on the unique key of the user.
In one possible design, the account registration operation is done based on the following:
the property information owner reads the NFC module of the electronic key terminal based on the NFC card reader to enter an account registration port so as to finish account registration; or alternatively
And the property information owner scans the two-dimensional code information on the electronic key terminal to enter an account registration port, and completes account registration.
In one possible design, when the property information owner reads the NFC module based on the NFC reader into the account registration port, reading the unique code of the electronic key terminal includes:
and automatically reading the unique code of the electronic key terminal.
In one possible design, when the property information owner scans the two-dimensional code information into the account registration port, reading the unique code of the electronic key terminal includes:
and receiving an electronic key terminal binding request sent by the property information owner, searching Bluetooth information of the electronic key terminal, and reading a unique code of the electronic key terminal after pairing connection.
In one possible design, the user unique key is set by:
carrying out SHA encryption operation on the identity information of the property information owner to generate the unique user key; or alternatively
Receiving the key information set by the property information owner by the user, and taking the key information as the unique key of the user;
wherein, when the property information owner sets the key by himself, the server does not save or record the key information.
In one possible design, the method further comprises, before reading the unique code of the electronic key terminal again:
and transmitting the read hardware code information of any electronic key terminal to a server for comparison so as to judge whether the terminal corresponding to the hardware code information is the electronic key terminal with the bound account, and if so, considering that the unique code of the electronic key terminal is read.
In one possible design, the account information of the property information owner may be bound to a plurality of electronic key terminals based on different unique codes.
In one possible design, each electronic key terminal may be bound with account information for multiple property information owners based on a unique code.
In a second aspect, the present invention provides an inheritance device for personal property information, comprising:
the account number and terminal binding module is used for reading the unique code of the electronic key terminal after detecting that the property information owner completes the account number registration operation, and associating the unique code with the account number information of the property information owner so as to realize the binding of the terminal equipment; the property information owner delivers the corresponding electronic key terminal to the property information inheriter after the terminal equipment is bound;
the property information encryption storage module is used for receiving the personal property information editing operation of the property information owner, carrying out encryption operation on the personal property information by utilizing a unique user key, storing the encrypted personal property information based on a cloud block chain network, and synchronously storing the unique user key into the electronic key terminal;
and the property information inheritance authorization module is used for judging whether the property information owner has login behavior in a preset time period when the unique code of the electronic key terminal is read again, and if not, granting the property information inheriter permission to view or inherit the personal property information so that the property information inheriter views or inherits the personal property information based on the unique key of the user.
In one possible design, the account registration operation is done based on the following:
the property information owner reads the NFC module of the electronic key terminal based on the NFC card reader to enter an account registration port so as to finish account registration; or alternatively
And the property information owner scans the two-dimensional code information on the electronic key terminal to enter an account registration port, and completes account registration.
In one possible design, when the property information owner reads the NFC module based on the NFC reader to enter the account registration port, the account and terminal binding module is specifically configured to:
and automatically reading the unique code of the electronic key terminal.
In one possible design, when the property information owner scans the two-dimensional code information into the account registration port, reading the unique code of the electronic key terminal includes:
and receiving an electronic key terminal binding request sent by the property information owner, searching Bluetooth information of the electronic key terminal, and reading a unique code of the electronic key terminal after pairing connection.
In one possible design, the user unique key is set by:
carrying out SHA encryption operation on the identity information of the property information owner to generate the unique user key; or alternatively
Receiving the key information set by the property information owner by the user, and taking the key information as the unique key of the user;
wherein, when the property information owner sets the key by himself, the server does not save or record the key information.
In one possible design, the property information inheritance authorization module is further configured to, prior to reading the unique code of the electronic key terminal again:
and transmitting the read hardware code information of any electronic key terminal to a server for comparison so as to judge whether the terminal corresponding to the hardware code information is the electronic key terminal with the bound account, and if so, considering that the unique code of the electronic key terminal is read.
In one possible design, the account information of the property information owner may be bound to a plurality of electronic key terminals based on different unique codes.
In one possible design, each electronic key terminal may be bound with account information for multiple property information owners based on a unique code.
In a third aspect, the present invention provides a computer device comprising a memory, a processor and a transceiver in communication with each other in sequence, wherein the memory is adapted to store a computer program and the transceiver is adapted to receive and send messages, and the processor is adapted to read the computer program and to perform the method of inheriting personal property information as described in any one of the possible designs of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium having instructions stored thereon which, when executed on a computer, perform a method of inheriting personal property information as described in any one of the possible designs of the first aspect.
In a fifth aspect, the invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of inheriting personal property information as described in any one of the possible designs of the first aspect.
The beneficial effects are that:
after detecting that an account registration operation is finished by a property information owner, the invention reads the unique code of the electronic key terminal and associates the unique code with the account information of the property information owner so as to realize the binding of terminal equipment; after the terminal equipment is bound, the property information owner delivers the corresponding electronic key terminal to the property information inheriter; then, personal property information editing operation of a property information owner is received, encryption operation is carried out on the personal property information by using a user unique key, the encrypted personal property information is stored on the basis of a cloud block chain network, and the user unique key is synchronously stored in an electronic key terminal; and finally, when the unique code of the electronic key terminal is read again, judging whether the property information owner has login behavior in the preset time period, and if not, granting the property information inheriter permission to check or inherit the personal property information. The invention can enable the common user to independently manage and record the personal property information, and when the user himself or herself has accidents or even the life cycle is terminated, the friends of the user can be used as appointed property information owners to hold authorized electronic key terminals to acquire the personal property information, thereby providing data support for subsequent personal property information management or property inheritance.
Drawings
Fig. 1 is a flowchart of a method for inheriting personal property information in the present embodiment.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present specification more clear, the technical solutions of the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is apparent that the described embodiments are some embodiments of the present specification, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present invention based on the embodiments herein.
Examples
In order to solve the technical problem that in the prior art, when an unexpected situation that personal property information cannot be managed does not exist in a property information owner, property information can be timely delivered to authorized relatives and friends, so that property loss is avoided, the embodiment of the application provides a method for inheriting the personal property information, which can enable a common user to independently manage and record the personal property information, and when the user is unexpected or even the life cycle is terminated, the relatives and friends can serve as appointed electronic key terminals for the appointed property information owner to acquire the personal property information, so that data support is provided for subsequent personal property information management or property inheritance.
In real life, individuals can start to open various accounts, such as banks, securities, financial, funds, trust, insurance, etc., after independent autonomous life, and meanwhile, various physical assets can be purchased, etc., and these important information are often stored and kept in a scattered manner, and these property information usually has privacy, even only the user himself knows.
However, when a user is in an unexpected or even life cycle end or the like, some property information, particularly digital property information, is difficult for the user to know because personal property information is not disclosed and informed in advance. For example, a user purchases an accident risk, when the user is unaware of the accident, the general insurance company cannot actively contact the relatives of the applicant to make claims after the accident occurs; or, banks, securities companies and other institutions will not actively contact customers to return user assets; or, various assets such as funds which are borrowed before the user happens unexpectedly, investment equity and the like are difficult to manage after the user happens unexpectedly. Therefore, in order to enable relatives and friends to know various important property information when a user is unexpected or even the life cycle is terminated, the embodiment provides a method for inheriting personal property information, which specifically comprises the following steps:
as shown in fig. 1, in a first aspect, the present invention provides a method for inheriting personal property information, including, but not limited to, implementation of steps S101 to S103:
s101, after detecting that an account registration operation is completed by a property information owner, reading a unique code of an electronic key terminal, and associating the unique code with account information of the property information owner to realize binding of terminal equipment; the property information owner delivers the corresponding electronic key terminal to the property information inheriter after the terminal equipment is bound;
it should be noted that, the method in this embodiment may be implemented by a client or a micro-letter applet disposed on a user terminal, where the user terminal includes, but is not limited to, a smart phone, a tablet computer, a notebook computer, and the like; such clients include, but are not limited to, PC (personal computer) client and cell phone client, as not limited herein.
In a specific embodiment, the account registration operation is performed based on the following manner: the property information owner reads the NFC module of the electronic key terminal based on the NFC card reader to enter an account registration port so as to finish account registration; or the property information owner scans the two-dimensional code information on the electronic key terminal to enter an account registration port, and the account registration is completed.
It should be noted that, in this embodiment, the electronic key terminal is a hardware device with an NFC (Near Field Communication ) module, and a user may read the NFC module through a terminal provided with an NFC card reader, for example, a mobile phone, so as to implement communication with the electronic key terminal, so that a micro-letter applet may be directly accessed; in addition, the two-dimensional code of the WeChat applet or the two-dimensional code of the APP software can be arranged on the electronic key terminal, so that property owners can enter the WeChat applet or download the APP software by scanning the two-dimensional code. Both of the above approaches can be used to complete user account registration.
In a specific embodiment, when the property information owner reads the NFC module based on the NFC reader into the account registration port, reading the unique code of the electronic key terminal includes:
automatically reading the unique code of the electronic key terminal; specifically, the user utilizes the intelligent terminal to sense the chip sensing area of the electronic key terminal, namely the NFC module, the intelligent terminal can automatically start APP software, the APP software can automatically read the unique code of the electronic key terminal, and the unique code is associated with the user account number, so that the binding of the terminal equipment is completed.
In one specific embodiment, when the property information owner scans the two-dimensional code information into the account registration port, reading the unique code of the electronic key terminal comprises:
and receiving an electronic key terminal binding request sent by the property information owner, searching Bluetooth information of the electronic key terminal, and reading a unique code of the electronic key terminal after pairing connection.
Specifically, a user (property information owner) scans a two-dimensional code or manually opens APP software, and simultaneously manually opens a power switch of the electronic key terminal, so that the Bluetooth communication function of the electronic key terminal is automatically opened at the same time, the user can automatically search Bluetooth information of the electronic terminal device by clicking a terminal device binding function button and enter a device binding boundary surface, connection is performed after pairing is successful, a unique code of the electronic key terminal is read after the connection is successful, and the unique code is associated with a user account number, so that terminal device binding is completed.
The method comprises the steps that after binding of terminal equipment is completed, the property information owners deliver corresponding electronic key terminals to property information inheritors, wherein the property information inheritors can be one or more relatives and friends designated by the property information owners, and in one possible design, account information of the property information owners can be bound with a plurality of electronic key terminals based on different unique codes; similarly, each property information inheritor can also view or inherit property information of a plurality of property information owners, and therefore, in one possible design, each electronic key terminal can be bound with account information of a plurality of property information owners based on a unique code.
After the binding of the terminal equipment is completed, the property information owner transfers and delivers the electronic key terminal of the hardware, so that the property information inheritor can hold the bound electronic key terminal to check the property information of the user when the user cannot handle the property information in unexpected situations in different places in the future.
S102, receiving personal property information editing operation of the property information owner, carrying out encryption operation on the personal property information by using a user unique key, storing the encrypted personal property information based on a cloud block chain network, and synchronously storing the user unique key into the electronic key terminal;
the server receives the data submitted and saved by the user and saves the data.
In a specific embodiment of step S102, the user unique key is set by:
the identity information of the property information owner is subjected to SHA (Secure Hash Algorithm ) encryption operation to generate the user unique key; or alternatively
Receiving the key information set by the property information owner by the user, and taking the key information as the unique key of the user;
specifically, the user can set a key with higher security by clicking a function button for setting the key to enter the setting interface, such as a password of numbers, signs and characters, and clicking and storing.
When the property information owner sets the key by himself, the server does not store or record the key information, so that the user inputs the key information to decrypt the stored personal property information after logging in the software each time.
And S103, judging whether the property information owner has login behavior in a preset time period when the unique code of the electronic key terminal is read again, and if not, granting the property information inheriter permission to view or inherit the personal property information so that the property information inheriter views or inherits the personal property information based on the unique key of the user.
In a specific embodiment of step S103, before reading the unique code of the electronic key terminal again, the method further includes:
and transmitting the read hardware code information of any electronic key terminal to a server for comparison so as to judge whether the terminal corresponding to the hardware code information is the electronic key terminal with the bound account, and if so, considering that the unique code of the electronic key terminal is read.
Preferably, the preset duration may be a default duration of the system, for example, 7 days, or may be set by the user, for example, 10 days, 15 days, or 30 days, which is not limited herein, and when the property owner does not perform software login or information update within the preset duration, the property inheritor may view the personal property information of the user through the unique code of the electronic key terminal and the internally stored unique key of the user.
Based on the above disclosure, in this embodiment, after detecting that the property information owner completes the account registration operation, the unique code of the electronic key terminal is read, and the unique code is associated with the account information of the property information owner, so as to implement binding of the terminal device; after the terminal equipment is bound, the property information owner delivers the corresponding electronic key terminal to the property information inheriter; then, personal property information editing operation of a property information owner is received, encryption operation is carried out on the personal property information by using a user unique key, the encrypted personal property information is stored on the basis of a cloud block chain network, and the user unique key is synchronously stored in an electronic key terminal; and finally, when the unique code of the electronic key terminal is read again, judging whether the property information owner has login behavior in the preset time period, and if not, granting the property information inheriter permission to check or inherit the personal property information. The invention can enable the common user to independently manage and record the personal property information, and when the user himself or herself has accidents or even the life cycle is terminated, the friends of the user can be used as appointed property information owners to hold authorized electronic key terminals to acquire the personal property information, thereby providing data support for subsequent personal property information management or property inheritance.
In a second aspect, the present invention provides an inheritance device for personal property information, comprising:
the account number and terminal binding module is used for reading the unique code of the electronic key terminal after detecting that the property information owner completes the account number registration operation, and associating the unique code with the account number information of the property information owner so as to realize the binding of the terminal equipment; the property information owner delivers the corresponding electronic key terminal to the property information inheriter after the terminal equipment is bound;
the property information encryption storage module is used for receiving the personal property information editing operation of the property information owner, carrying out encryption operation on the personal property information by utilizing a unique user key, storing the encrypted personal property information based on a cloud block chain network, and synchronously storing the unique user key into the electronic key terminal;
and the property information inheritance authorization module is used for judging whether the property information owner has login behavior in a preset time period when the unique code of the electronic key terminal is read again, and if not, granting the property information inheriter permission to view or inherit the personal property information so that the property information inheriter views or inherits the personal property information based on the unique key of the user.
In one possible design, the account registration operation is done based on the following:
the property information owner reads the NFC module of the electronic key terminal based on the NFC card reader to enter an account registration port so as to finish account registration; or alternatively
And the property information owner scans the two-dimensional code information on the electronic key terminal to enter an account registration port, and completes account registration.
In one possible design, when the property information owner reads the NFC module based on the NFC reader to enter the account registration port, the account and terminal binding module is specifically configured to:
and automatically reading the unique code of the electronic key terminal.
In one possible design, when the property information owner scans the two-dimensional code information into the account registration port, reading the unique code of the electronic key terminal includes:
and receiving an electronic key terminal binding request sent by the property information owner, searching Bluetooth information of the electronic key terminal, and reading a unique code of the electronic key terminal after pairing connection.
In one possible design, the user unique key is set by:
carrying out SHA encryption operation on the identity information of the property information owner to generate the unique user key; or alternatively
Receiving the key information set by the property information owner by the user, and taking the key information as the unique key of the user;
wherein, when the property information owner sets the key by himself, the server does not save or record the key information.
In one possible design, the property information inheritance authorization module is further configured to, prior to reading the unique code of the electronic key terminal again:
and transmitting the read hardware code information of any electronic key terminal to a server for comparison so as to judge whether the terminal corresponding to the hardware code information is the electronic key terminal with the bound account, and if so, considering that the unique code of the electronic key terminal is read.
In one possible design, the account information of the property information owner may be bound to a plurality of electronic key terminals based on different unique codes.
In one possible design, each electronic key terminal may be bound with account information for multiple property information owners based on a unique code.
In a third aspect, the present invention provides a computer device comprising a memory, a processor and a transceiver in communication with each other in sequence, wherein the memory is adapted to store a computer program and the transceiver is adapted to receive and send messages, and the processor is adapted to read the computer program and to perform the method of inheriting personal property information as described in any one of the possible designs of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium having instructions stored thereon which, when executed on a computer, perform a method of inheriting personal property information as described in any one of the possible designs of the first aspect.
In a fifth aspect, the invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of inheriting personal property information as described in any one of the possible designs of the first aspect.
Finally, it should be noted that: the foregoing description is only of the preferred embodiments of the invention and is not intended to limit the scope of the invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of inheriting personal property information, comprising:
after detecting that the property information owner completes the account registration operation, reading a unique code of the electronic key terminal, and associating the unique code with account information of the property information owner to realize the binding of terminal equipment; the property information owner delivers the corresponding electronic key terminal to the property information inheriter after the terminal equipment is bound;
receiving personal property information editing operation of the property information owner, carrying out encryption operation on the personal property information by using a user unique key, storing the encrypted personal property information based on a cloud block chain network, and synchronously storing the user unique key into the electronic key terminal;
when the unique code of the electronic key terminal is read again, judging whether the property information owner has login behavior in a preset time period, if not, granting the property information inheriter permission to view or inherit the personal property information, so that the property information inheriter views or inherits the personal property information based on the unique user key and the unique code of the electronic key terminal.
2. The method of inheriting personal property information according to claim 1, wherein the account registration operation is performed based on:
the property information owner reads the NFC module of the electronic key terminal based on the NFC card reader to enter an account registration port so as to finish account registration; or alternatively
And the property information owner scans the two-dimensional code information on the electronic key terminal to enter an account registration port, and completes account registration.
3. The inheritance method of personal property information according to claim 2, wherein when the property information owner reads the NFC module based on the NFC reader to enter the account registration port, reading the unique code of the electronic key terminal comprises:
and automatically reading the unique code of the electronic key terminal.
4. The inheritance method of personal property information according to claim 2, wherein when the property information owner scans the two-dimensional code information into the account registration port, reading the unique code of the electronic key terminal comprises:
and receiving an electronic key terminal binding request sent by the property information owner, searching Bluetooth information of the electronic key terminal, and reading a unique code of the electronic key terminal after pairing connection.
5. The inheritance method of personal property information according to claim 1, wherein the user unique key is set by:
carrying out SHA encryption operation on the identity information of the property information owner to generate the unique user key; or alternatively
Receiving the key information set by the property information owner by the user, and taking the key information as the unique key of the user;
wherein, when the property information owner sets the key by himself, the server does not save or record the key information.
6. The inheritance method of personal property information according to claim 1, characterized in that before reading the unique code of the electronic key terminal again, the method further comprises:
and transmitting the read hardware code information of any electronic key terminal to a server for comparison so as to judge whether the terminal corresponding to the hardware code information is the electronic key terminal with the bound account, and if so, considering that the unique code of the electronic key terminal is read.
7. The inheritance method of personal property information according to claim 1, wherein account information of the property information owner can be bound with a plurality of electronic key terminals based on different unique codes.
8. The inheritance method of personal property information according to claim 1, wherein each electronic key terminal is capable of binding account information of a plurality of property information owners based on a unique code.
9. An apparatus for inheriting personal property information, comprising:
the account number and terminal binding module is used for reading the unique code of the electronic key terminal after detecting that the property information owner completes the account number registration operation, and associating the unique code with the account number information of the property information owner so as to realize the binding of the terminal equipment; the property information owner delivers the corresponding electronic key terminal to the property information inheriter after the terminal equipment is bound;
the property information encryption storage module is used for receiving the personal property information editing operation of the property information owner, carrying out encryption operation on the personal property information by utilizing a unique user key, storing the encrypted personal property information based on a cloud block chain network, and synchronously storing the unique user key into the electronic key terminal;
and the property information inheritance authorization module is used for judging whether the property information owner has login behavior in a preset time period when the unique code of the electronic key terminal is read again, and if not, granting the property information inheriter permission to view or inherit the personal property information so that the property information inheriter views or inherits the personal property information based on the unique user key and the unique code of the electronic key terminal.
10. A computer device comprising a memory, a processor and a transceiver in communication with each other in sequence, wherein the memory is adapted to store a computer program and the transceiver is adapted to send and receive messages, and wherein the processor is adapted to read the computer program and to perform the inheritance method of personal property information according to any of claims 1-8.
CN202210262219.3A 2022-03-16 2022-03-16 Inheritance method, device and equipment for personal property information Active CN114650174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210262219.3A CN114650174B (en) 2022-03-16 2022-03-16 Inheritance method, device and equipment for personal property information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210262219.3A CN114650174B (en) 2022-03-16 2022-03-16 Inheritance method, device and equipment for personal property information

Publications (2)

Publication Number Publication Date
CN114650174A CN114650174A (en) 2022-06-21
CN114650174B true CN114650174B (en) 2024-01-05

Family

ID=81993634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210262219.3A Active CN114650174B (en) 2022-03-16 2022-03-16 Inheritance method, device and equipment for personal property information

Country Status (1)

Country Link
CN (1) CN114650174B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070059026A (en) * 2007-04-27 2007-06-11 (주)인터센스 System and method for inheriting cyber assets
US8171528B1 (en) * 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
CN105809338A (en) * 2016-03-04 2016-07-27 厦门大易孝德文化产业有限公司 Network heritage trusting system used for intelligent cemetery
CN109874125A (en) * 2019-01-29 2019-06-11 上海博泰悦臻网络技术服务有限公司 The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server
CN111563734A (en) * 2020-05-06 2020-08-21 广东工业大学 Digital asset transfer method and device, electronic equipment and storage medium
CN112105000A (en) * 2019-06-17 2020-12-18 上海博泰悦臻网络技术服务有限公司 Method, apparatus and computer storage medium for authorizing a vehicle based on bluetooth
CN112734989A (en) * 2020-12-24 2021-04-30 广州保仕盾智能科技有限公司 Bluetooth key distribution method of intelligent door lock
CN113722699A (en) * 2021-07-14 2021-11-30 江铃汽车股份有限公司 Identity authentication method and device, readable storage medium and vehicle

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9560019B2 (en) * 2013-04-10 2017-01-31 International Business Machines Corporation Method and system for managing security in a computing environment
US20150326548A1 (en) * 2014-05-12 2015-11-12 Omne Tempus Llc Management of digital assets
US20170041324A1 (en) * 2015-08-04 2017-02-09 Pawn Detail, LLC Systems and methods for personal property information management
US11238134B2 (en) * 2018-06-18 2022-02-01 International Business Machines Corporation Adaptable access to digital assets

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070059026A (en) * 2007-04-27 2007-06-11 (주)인터센스 System and method for inheriting cyber assets
US8171528B1 (en) * 2007-12-06 2012-05-01 Proxense, Llc Hybrid device having a personal digital key and receiver-decoder circuit and methods of use
CN105809338A (en) * 2016-03-04 2016-07-27 厦门大易孝德文化产业有限公司 Network heritage trusting system used for intelligent cemetery
CN109874125A (en) * 2019-01-29 2019-06-11 上海博泰悦臻网络技术服务有限公司 The car owner's authorization method and system of bluetooth key, storage medium and vehicle Cloud Server
CN112105000A (en) * 2019-06-17 2020-12-18 上海博泰悦臻网络技术服务有限公司 Method, apparatus and computer storage medium for authorizing a vehicle based on bluetooth
CN111563734A (en) * 2020-05-06 2020-08-21 广东工业大学 Digital asset transfer method and device, electronic equipment and storage medium
CN112734989A (en) * 2020-12-24 2021-04-30 广州保仕盾智能科技有限公司 Bluetooth key distribution method of intelligent door lock
CN113722699A (en) * 2021-07-14 2021-11-30 江铃汽车股份有限公司 Identity authentication method and device, readable storage medium and vehicle

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
个人"数字遗产"的处理方法探究;王静;方兴;李英;;设计艺术研究(第02期);全文 *
手机数字钥匙远程控制车辆系统的设计;信瑛南;刘静;李琦;张瀛;董嵩松;丁靖;;汽车工程师(第10期);全文 *

Also Published As

Publication number Publication date
CN114650174A (en) 2022-06-21

Similar Documents

Publication Publication Date Title
US11405781B2 (en) System and method for mobile identity protection for online user authentication
US9600674B2 (en) Transaction system for business and social networking
US9728028B2 (en) Security device, method and system for financial transactions, based on the identification of an individual using a biometric profile and a smart card
TW202021307A (en) Cross-block chain interaction method and system, computer device, and storage medium
US20080120698A1 (en) Systems and methods for authenticating a device
CN106096935A (en) The biological characteristic validation of preposition self-service terminal transaction
US8831220B2 (en) Processing module operating methods, processing modules, and communications systems
US11501004B2 (en) Exchanging user information with other physically proximate users
CN108140152A (en) Computer implemented tracking mechanism and data management
KR20170041799A (en) Secure mobile contact system (smcs)
KR20210158271A (en) System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies
CN101479752A (en) Portable device and methods for performing secure transactions
CN101807318B (en) Mobile communication terminal, automatic transaction device, automatic transaction system and automatic transaction method
CA3028753A1 (en) Wireless based methods and systems for federated key management, asset management, and financial transactions
US20230050280A1 (en) Computer-implemented user identity verification method
CN105959277A (en) Method of locking/unlocking computer screen based on NFC terminal
US11764962B2 (en) Systems and methods for data access control of secure memory using a short-range transceiver
US20100024025A1 (en) Authentication system and authentication server device
KR20200055178A (en) Management server and method of digital signature for electronic document
CN100470574C (en) Network information protection method and storage medium
CN109815669A (en) Authentication method and server based on recognition of face
KR20100121139A (en) Personal privacy protection method in service based on electronic tag
CN114650174B (en) Inheritance method, device and equipment for personal property information
EP1749415B1 (en) Methods of securing devices such as mobile terminals, and secured assemblies comprising such devices
CN100335986C (en) Portable hard disk device and method for logging on remote real time transmission servo system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant