CN108009878A - A kind of information processing method and its device - Google Patents

A kind of information processing method and its device Download PDF

Info

Publication number
CN108009878A
CN108009878A CN201711200203.5A CN201711200203A CN108009878A CN 108009878 A CN108009878 A CN 108009878A CN 201711200203 A CN201711200203 A CN 201711200203A CN 108009878 A CN108009878 A CN 108009878A
Authority
CN
China
Prior art keywords
target device
user
information
user terminal
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711200203.5A
Other languages
Chinese (zh)
Inventor
刘均
刘新
兰飞
周军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Car Wheel Linked Data Technology Co Ltd
Original Assignee
Shenzhen City Car Wheel Linked Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Car Wheel Linked Data Technology Co Ltd filed Critical Shenzhen City Car Wheel Linked Data Technology Co Ltd
Priority to CN201711200203.5A priority Critical patent/CN108009878A/en
Publication of CN108009878A publication Critical patent/CN108009878A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The embodiment of the present invention discloses a kind of information processing method and its device, and wherein method includes the following steps:Receive enable request of the user terminal to the target device that is in the lock state, the device identification for enabling the user identifier and the target device of asking to include the user terminal;The corresponding intelligent contract of the device identification is obtained from block chain, and obtains the corresponding user information of the user identifier, the intelligence contract includes the conditions for use of the target device;If the user information meets the conditions for use of the target device, control releases the lock-out state of the target device.Implement the embodiment of the present invention, it is possible to achieve point-to-point property rights transfer, can improve flexibility and the reliability of property rights transfer.

Description

A kind of information processing method and its device
Technical field
The present invention relates to block chain technical field, more particularly to a kind of information processing method and its device.
Background technology
With the development of science and technology the mankind create substantial amounts of production and living instrument to lift happy level.It is but excessively fast The development of speed, has had resulted in serious waste, has caused environmental pollution.Shared economic one kind as social development is inevitable, right The mode of production and life of the mankind generates far-reaching influence.By taking automobile as an example:As a kind of indispensable vehicles, it is counted automobile Amount has exceeded the tolerance range in city, and the cumulative year after year of automobile quantity causes the pollution of serious traffic congestion and air. By Car sharing mode, while travel requirement is met, moreover it is possible to automobile quantity is controlled, effectively mitigates environmental pollution, can be with As the effective way for solving automobile congestion and pollution problem.
Property rights transfer in shared economy is a key issue, at present can using the electronic password lock for possessing network savvy To control the property rights in shared economy to shift.But system of this property rights transfer dependent on centralization, relation between supply and demand are opaque Or controlled by third side, it is impossible to realize point-to-point property rights transfer.
The content of the invention
An embodiment of the present invention provides a kind of information processing method and its device, it is possible to achieve point-to-point property rights transfer, Flexibility and the reliability of property rights transfer can be improved.
First aspect of the embodiment of the present invention provides a kind of information processing method, including:
Enable request of the user terminal to the target device that is in the lock state is received, described enable asks to include the use The device identification of the user identifier of family terminal and the target device;
The corresponding intelligent contract of the device identification is obtained from block chain, and obtains the corresponding user of the user identifier Information, the intelligence contract include the conditions for use of the target device;
If the user information meets the conditions for use of the target device, control releases the locking of the target device State.
, please to the enabling for target device being in the lock state receiving user terminal in a kind of mode in the cards Before asking, further include:Receive management terminal and be directed to the registration request that the target device is sent, the registration request includes described The lease condition of target device;The corresponding intelligent contract of the target device is generated according to the lease condition of the target device; The corresponding intelligent contract of the target device is registered to the block chain.
, please to the enabling for target device being in the lock state receiving user terminal in a kind of mode in the cards Before asking, further include:Receive the contract that the user terminal is sent and check request, the contract checks that request carries the target The device identification of equipment;The corresponding intelligent contract of the device identification is obtained from the block chain;Sent out to the user terminal Send the device identification corresponding intelligent contract;The user terminal is received for the corresponding intelligent contract hair of the device identification The corresponding user information of the user identifier sent;The corresponding user information of the user identifier is registered to block chain.
In a kind of mode in the cards, before the corresponding user information of the user identifier is obtained, further include:To The user terminal pushes the corresponding intelligent contract of the device identification;Receive the user terminal and be directed to the device identification pair The corresponding user information of the user identifier that the intelligent contract answered is sent;By the corresponding user information registration of the user identifier To block chain.
In a kind of mode in the cards, the conditions for use included by the intelligence contract includes trading rules, described User information includes the Transaction Information for trading rules feedback;If meet enabling for the target device in the user information Condition, then before control releases the lock-out state of the target device, further include:The Transaction Information is detected to advise with the transaction Then whether match;If the Transaction Information is matched with the trading rules, it is determined that the user information meets that the target is set Standby conditions for use.
In a kind of mode in the cards, the mesh is released to control by sending unlock instruction to the target device The lock-out state of marking device, the unlock instruction are used for the lock-out state for indicating that the target device releases the target device.
In a kind of mode in the cards, the user information includes checking information, and control releases the lock of target device Determine state, including:Checking information is sent to the target device, the checking information is used to indicate that the target device is receiving To the user terminal send checking request when, to the user terminal carry out authentication, and authentication by when, Release the lock-out state of the target device.
Second aspect of the embodiment of the present invention provides a kind of information processor, including:
Receiving unit, it is described to enable for receiving enable request of the user terminal to the target device that is in the lock state Request includes the user identifier of the user terminal and the device identification of the target device;
Acquiring unit, for obtaining the corresponding intelligent contract of the device identification from block chain, and obtains the user Corresponding user information is identified, the intelligence contract includes the conditions for use of the target device;
Unlocking unit, if meeting the conditions for use of the target device for the user information, described in control releasing The lock-out state of target device.
In a kind of mode in the cards, the receiving unit is additionally operable to reception management terminal and is directed to the target device The registration request of transmission, the registration request include the lease condition of the target device;Described information processing unit further includes:
Generation unit, is closed for generating the corresponding intelligence of the target device according to the lease condition of the target device About;
Registration unit, for registering the corresponding intelligent contract of the target device to the block chain.
In a kind of mode in the cards, the contract that the receiving unit is additionally operable to receive the user terminal transmission is looked into See request, the contract checks that request carries the device identification of the target device;Described information processing unit further includes:
Transmitting element, for sending the corresponding intelligent contract of the device identification obtained from the block chain to institute State user terminal;The receiving unit is additionally operable to receive the user terminal for the corresponding intelligent contract hair of the device identification The corresponding user information of the user identifier sent;The registration unit is additionally operable to the corresponding user information of the user identifier Register to block chain.
In a kind of mode in the cards, the transmitting element is additionally operable to push the equipment mark to the user terminal Know corresponding intelligent contract;The receiving unit, which is additionally operable to receive the user terminal, is directed to the corresponding intelligence of the device identification The corresponding user information of the user identifier that contract is sent;The registration unit is additionally operable to the corresponding use of the user identifier Family information is registered to block chain.
In a kind of mode in the cards, the conditions for use included by the intelligence contract includes trading rules, described User information includes the Transaction Information for trading rules feedback;If meet institute for the user information in the unlocking unit The conditions for use of target device is stated, then before control releases the lock-out state of the target device, described information processing unit is also Including:
Detection unit, for detecting whether the Transaction Information matches with the trading rules;
Determination unit, if being matched for the Transaction Information with the trading rules, it is determined that the user information meets The conditions for use of the target device.
In a kind of mode in the cards, the unlocking unit is specifically used for unlocking by sending to the target device Instruction releases the lock-out state of the target device to control, and the unlock instruction is used to indicate described in the target device releasing The lock-out state of target device.
In a kind of mode in the cards, the user information includes checking information, and the unlocking unit is specifically used for Checking information is sent to the target device, the checking information is used to indicate that the target device is receiving user's end Hold send checking request when, to the user terminal carry out authentication, and authentication by when, release the target The lock-out state of equipment.
The third aspect of the embodiment of the present invention provides a kind of information processor, including processor, memory, communication interface and Bus, processor, memory and communication interface are connected with each other by bus, wherein, memory is used to store computer program, counts Calculation machine program includes programmed instruction, and processor is arranged to caller instruction, performs first aspect of the embodiment of the present invention and carries The method of confession.
The third aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, computer-readable recording medium storage There is computer program, computer program includes programmed instruction, and programmed instruction makes processor perform this hair when being executed by a processor The method that bright embodiment first aspect provides.
In embodiments of the present invention, by receiving conditions for use of the user terminal to the target device being in the lock state, The conditions for use includes the user identifier of user terminal and the device identification of target device, and obtaining device identification from block chain corresponds to Intelligent contract, and obtain the corresponding user information of user identifier, which includes the conditions for use of target device, if User information meets the conditions for use of the target device included by intelligent contract, then control releases the lock-out state of target device, Shifted so as to fulfill point-to-point property rights, flexibility and the reliability of property rights transfer can be improved.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the exemplary system figure using the embodiment of the present invention;
Fig. 2 is a kind of flow diagram of information processing method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another information processing method provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another information processing method provided in an embodiment of the present invention;
Fig. 5 is a kind of structure diagram of information processor provided in an embodiment of the present invention;
Fig. 6 is the structure diagram of another information processor provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment, belongs to the scope of protection of the invention.
With the continuous development of internet, traditional economic model quietly occurs to change, and shared economy starts to come into people The visual field.Shared economy refer to the focal pointe for possessing idle asset amortize with compensation the assets right to use to other people, transmitter Return is obtained, transmitter creates value using the idle asset of oneself is shared.Assets are obtained so as to fulfill a kind of user, are amortized The win-win situation of person (or participator) value -capture, such as:Shared bicycle and shared automobile etc. typically share economic case.
Property rights transfer in shared economic is a key issue, at present, be by the way of mainly by coded lock come Control the transfer of property rights.But at present, no matter any type of mechanical lock, electronic lock, have network function coded lock or Control lock with service centre, dependent on the system of centralization, relation between supply and demand is opaque or is controlled by third side, all cannot Realize point-to-point property rights transfer.
To solve the above-mentioned problems, an embodiment of the present invention provides a kind of information processing method and its device, it is possible to achieve Point-to-point property rights transfer, can improve flexibility and the reliability of property rights transfer.The embodiment of the present invention can be applied to control In the scene that shared assets with coded lock are unlocked.
In order to more fully understand the embodiment of the present invention, will be situated between below to the system of the application embodiment of the present invention Continue.
Fig. 1 is referred to, is the exemplary system figure using the embodiment of the present invention, including share automobile, coded lock, user terminal With block chain.
Wherein, a kind of citing that automobile is shared assets is shared, shared assets refer to available for shared idle asset, this is common Enjoy assets and can include but is not limited to shared bicycle, shared automobile, shared umbrella or shared KTV etc..
Wherein, coded lock can be used for the use for controlling corresponding shared assets, which can be built in shared assets, I.e. the coded lock is a part for the shared assets.The coded lock can also be placed outside shared assets, i.e., the coded lock is not this A part for shared assets, but the coded lock can obtain the shared assets assets information (such as Asset Type, assets purposes, Scope, asset status information, assets transmitter etc.), and the use of the shared assets can be controlled.The embodiment of the present invention is with close Code lock is built in exemplified by corresponding shared assets.It should be noted that the coded lock can be tangible mechanical lock or The virtual responsive realized by logic control mode, such as:Engine is opened by igniter, is controlled by authentication mode System power etc..
Wherein, user terminal can initiate the request using shared assets.The user's terminal can refer to the accession to terminal, user Equipment (user equipment, UE), mobile terminal, terminal, wireless telecom equipment, user agent or user apparatus.Access is eventually End can be cell phone, wireless phone, Session initiation Protocol (sessioninitiation protocol, SIP) phone, nothing Line local loop (wireless local loop, WLL) is stood, personal digital assistant (personal digital Assistant, PDA), have the handheld device of wireless communication function, computing device or be connected to radio modem its In terminal device, virtual reality device, future 5G networks in its processing equipment, mobile unit, wearable device, Internet of Things End in terminal device or the public land mobile network (public land mobile network, PLMN) of following evolution End equipment etc..
Wherein, the corresponding server of block chain can respond the request that assets are shared in the use that user terminal is initiated.Block Chain technology is to be verified and stored data using block linked data structure, generated and updated using distributed node common recognition algorithm Data, the safety for ensureing using the mode of cryptography data transfer and access, utilize the intelligence being made of automatized script code Contract programs a kind of brand-new distributed basis framework and calculation paradigm with operation data.Wherein, decentralization is block The subversiveness feature of chain technology, block chain technology do not have centralized architecture, are acted on behalf of without centralization, allow all clauses to write For program, these clauses can on block chain automated execution, cost can not only be substantially reduced, can also improve efficiency.Block chain On each node have identical account book, it can be ensured that account book recording process is open and clear.Block chain technology can be real A kind of point-to-point, open and clear direct interaction is showed so that high efficiency, extensive, non-stop layerization agency information exchange Mode becomes reality.Information processing method provided in an embodiment of the present invention is based on block chain technology, is realized a little without third side The property rights of point are shifted.
Being shared in Fig. 1 can be by having between automobile and coded lock, coded lock and user terminal, user terminal and block chain Line or radio connection carry out data transmission.
It should be noted that the equipment form and quantity shown in Fig. 1 do not form the restriction to the embodiment of the present invention.
It should be noted that the embodiment of the present invention is introduced by taking shared automobile as an example, it should be appreciated that other shared assets bases The protection domain of the embodiment of the present application ought to be fallen into the releasing process of coded lock.
Information processor in the embodiment of the present invention can be the part or all of of the corresponding server of block chain, mainly It is responsible for the management of block chain, such as generation block, registration block etc., is additionally operable to the request of response apparatus, phase is performed according to request Operation answered etc..
Target device in the embodiment of the present invention is to need to be unlocked the shared assets to enable, built in the shared assets Or external coded lock.In other words, target device is made of coded lock and shared assets, such as automobile and coded lock are shared in Fig. 1 The equipment of composition can be target device.Coded lock in the embodiment of the present invention be it is a kind of have network function, data storage and The terminal device of computing capability, can be as a node in block chain, and the corresponding server of oriented block chain initiates request Ability.
Describe in detail below in conjunction with attached drawing 2- attached drawings 4 to information processing method provided in an embodiment of the present invention.
Fig. 2 is referred to, is a kind of flow diagram of information processing method provided in an embodiment of the present invention, this method can be with Including but not limited to following steps:
Step S201, receives enable request of the user terminal to the target device that is in the lock state, described to enable request The device identification of user identifier and the target device including the user terminal.
Information processor receives user terminal and enables request to the target device that is in the lock state, this enables request The device identification of user identifier and target device including user terminal.
The user of user terminal, i.e. user, it is desirable to when being unlocked to the target device being in the lock state, can pass through By the way of application-specific on user terminal is scanned enabling for target device is sent to information processor Request, enabling request includes the user identifier of user terminal and the device identification of target device.Correspondingly, information processor connects Receipts enable request.
Wherein, the user identifier of the user identifier of user terminal, i.e. user, can include but is not limited to telephone number, ID card No., E-mail address, social account etc..The device identification of target device, i.e., the device identification of shared assets, such as compile Number, license plate number etc..
Wherein, target device can be formed by sharing transmitter's purchase of assets and installing coded lock in shared assets, Target device can also be the shared assets of built-in combination lock.Target device thinks shared assets to be used for user.
Coded lock on target device can generate unsymmetrical key pair by cryptography arithmetic in advance.Wherein, it is asymmetric close Key is to including public key and private key, public key is used to encrypt, and is disclosed;Private key is used to decrypt, and is protected by the coded lock on target device Deposit, it is impossible to leak.Rivest, shamir, adelman realizes that the basic process that confidential information exchanges is:Party A generate a pair of secret keys and by its In public key disclosed to other sides;Obtain the public key Party B confidential information is encrypted using the public key after be then forwarded to first Side;Information after the private key pair encryption that Party A is preserved with oneself again is decrypted.Private key is additionally operable to digital signature, and public key is additionally operable to Verify digital signature, digital signature is exactly others the hop count word string that can not forge that the sender of only information could produce, This hop count word string is also that a valid certificates of information authenticity are sent to the sender of information at the same time.
Coded lock on the target device generates unsymmetrical key to afterwards, the coded lock on target device can be by generation Public key, coded lock numbering, the assets information of shared assets are sent to information processor.Correspondingly, information processor receives These information that coded lock on target device is sent, and these information are registered to block chain, to establish coded lock with sharing Binding relationship between assets, i.e. a coded lock are corresponding with the assets information of a shared assets.
Wherein, Asset Type, assets purposes, assets scope, assets transmitter can be included by sharing the assets information of assets Etc. information.The type of the as shared assets of Asset Type, such as bicycle, automobile, umbrella etc..Assets purposes is shared assets Purposes.Assets transmitter can be personal or mechanism.
The assets transmitter of target device can be sent the lease condition of target device to information processing by management terminal Device, so that information processor generates the corresponding intelligent contract of target device according to the lease condition of target device, and by mesh The corresponding intelligent contract of marking device is registered to block chain.Wherein, the end that management terminal operates for the assets transmitter of target device End, can be the terminals such as UE, mobile terminal, PDA, personal computer.
It is understood that the corresponding intelligent contract of target device defines a series of clauses, these clauses can include But it is not limited to conditions for use, parks condition, authentication condition, charging regulation, reservation using rule etc..Wherein, bar is enabled Part can include trading rules (such as the amount of money that need to transfer accounts of the cash pledge that need to pay of user, user etc.).
User terminal can obtain the corresponding intelligent contract of target device, the user of user terminal to information processor in advance The corresponding intelligent contract of target device can be directed to be operated accordingly, such as pay cash pledge, transfer accounts.User terminal can basis These corresponding user informations of operation generation user identifier, and the corresponding user information of user identifier is sent to information processing apparatus Put, information processor registers the corresponding user information of user identifier to block chain.
Step S202, the corresponding intelligent contract of the device identification is obtained from block chain, and obtains the user identifier Corresponding user information, the intelligence contract include the conditions for use of the target device.
Information processor is corresponding from the corresponding intelligent contract of block chain acquisition device identification, and acquisition user identifier User information, the intelligence contract include the conditions for use of target device.
Specifically, information processor is in the case where receiving and enabling request, according to the user identifier of user terminal from Block chain obtains the corresponding user information of user identifier, and obtains equipment mark from block chain according to the device identification of target device Know corresponding intelligent contract.Wherein, the corresponding user information of user identifier can be directed to the corresponding intelligence of target device including user Can the contract cash pledge paid, the amount of money transferred accounts and what is inputted default be used to open unlocking information of coded lock etc..Mesh The conditions for use of marking device can be enabled clause or enable rule, be set for judging whether user information can enable target It is standby, such as can specify that and pay cash pledge number, regulation transfer amounts etc..
Although the corresponding user information of user identifier is for the corresponding intelligent contract generation of target device, user It may not operated when the intelligent contract for target device is operated according to the corresponding intelligent contract of target device, For example, transfer amounts as defined in the corresponding intelligent contract of target device are 50 bit coin, and the transfer amounts in user information are 30 bit coin.Therefore, information processor is getting the corresponding user information of user identifier and the corresponding intelligence of device identification In the case of contract, whether the corresponding user information of detection user identifier meets the corresponding intelligent contract of device identification, and full In the case of foot, the corresponding intelligent contract of performance objective equipment;In the case of ungratified, refusal performance objective equipment is corresponding Intelligent contract.
Step S203, if the user information meets the conditions for use of the target device, control releases the target The lock-out state of equipment.
If user information meets the conditions for use of the target device included by intelligent contract, information processor control solution Except the lock-out state of target device.
In a kind of mode in the cards, information processor can meet the target device included by intelligent contract During conditions for use, unlock instruction directly is sent to target device, unlock instruction is used for target device and releases target device Lock-out state.Specifically, information processor sends unlock instruction to the coded lock on target device, coded lock is receiving solution During lock instruction, the locking to coded lock is released, that is, opens coded lock, the user of user terminal can use target device.Can be with Understand, this kind of mode is a kind of mode unlocked in real time.
Coded lock can carry out authentication, and pass through body in user terminal when receiving unlock instruction to user terminal During part verification, the locking to coded lock is released, opens coded lock.The default unlocking information for being used to open coded lock of user terminal Coded lock can be issued to by information processor, coded lock can be to it when the corresponding intelligent contract of target device is finished Registered.Wherein, unlocking information can be public key information, character string or the biological information of user terminal generation, biological Characteristic information can include but is not limited to finger print information, voiceprint, iris information, face information etc..Coded lock is receiving During the checking request that user terminal is sent, public key information, character string or biological information that detection checking request carries with it is pre- If unlocking information whether match, if matching, user terminal passes through authentication.
Alternatively, the character string or biological information that checking request carries can use the public key of coded lock generation to be added Close, coded lock is decrypted, then matched when receiving checking request using the corresponding private key of the public key.
In a kind of mode in the cards, information processor can meet the target device included by intelligent contract During conditions for use, the corresponding checking information of user identifier is sent to target device, target device is receiving user terminal transmission Checking request when, according to checking information to user terminal carry out authentication, and authentication by when, release target set Standby lock-out state.Specifically, information processor sends checking information to the coded lock on target device, and coded lock is receiving During the checking request sent to user terminal, authentication is carried out to user terminal according to checking information, and is led in authentication It is out-of-date, the locking to coded lock is released, opens coded lock, the user of user terminal can use target device.It is appreciated that It is that this kind of mode is a kind of mode for the unlock that is delayed.
The public key of user terminal, checking information can be when the corresponding intelligent contract of target device be finished, by information Reason device is issued to coded lock, and coded lock registers it.
Wherein, checking information can be the digital signature of the digital signature of the user of user terminal, i.e. user, the numeral Signature is signed using the private key of user terminal generation, and the public key of user terminal generation can be used for solving the digital signature.Password The digital signature that receive information processing unit is sent is locked, and is receiving the carrying user terminal generation of user terminal transmission During the checking request of public key, authentication is carried out, if the public key can solve the digital signature, then user terminal passes through verification.
Checking information can also be default character string or default biological information.Coded lock receive information processing dress Put the default character string of transmission or default biological information, and receive the carrying character string of user terminal transmission or During the checking request of biological information, authentication is carried out, if matching, then user terminal passes through certification.Alternatively, test The character string or biological information that card request carries can use the public key of coded lock generation to be encrypted, and coded lock is receiving During checking request, it is decrypted using the corresponding private key of the public key, then matched.
It should be noted that target device can first receive checking information, then checking request is received, between the two The time interval embodiment of the present invention in do not limit.
Above two mode does not form the restriction to the embodiment of the present invention, and information processor can also use its other party Formula control releases the lock-out state of target device.
In the embodiment shown in Figure 2, by receive enable request when, from block chain obtain user identifier correspond to User information and target device correspond to conditions for use included by intelligent contract, and meet conditions for use in user information In the case of, control releases the lock-out state of target device, with the assets of the user so as to fulfill user terminal to target device Point-to-point property rights transfer between transmitter, the property rights transfer realized by block chain have higher flexibility and reliability.
Fig. 3 is referred to, is the flow diagram of another information processing method provided in an embodiment of the present invention, this method can To include but not limited to following steps:
Step S301, receives management terminal and is directed to the registration request that target device is sent, the registration request includes target The lease condition of equipment.
Information processor receives management terminal and is directed to the registration request that target device is sent, which includes target The lease condition of equipment.
Assets transmitter buys coded lock and is installed in shared assets, can will be mounted with the shared money of coded lock Production is used as target device, can also will be pre-configured with the shared assets of coded lock as target device.It should be noted that mesh Marking device is any one of the shared assets with coded lock.
Management terminal is the terminal of assets transmitter operation, and assets transmitter can be closed by the management terminal using intelligence User is edited mesh by the about lease condition of format editing target device, such as required cash pledge, charging mode etc., the management terminal The lease condition of marking device is sent to information processor by registration request.It should be noted that concrete intelligence contract form And the content included by it does not limit in embodiments of the present invention, is determined on a case-by-case basis.Alternatively, registration request is also wrapped Include the device identification of target device.
Step S302, the corresponding intelligent contract of the target device is generated according to the lease condition of the target device.
Information processor generates the corresponding intelligent contract of target device according to the lease condition of target device.
Specifically, information processor is corresponded to when receiving the registration request of management terminal transmission according to target device The corresponding intelligent contract of lease condition generation target device.It is understood that the corresponding intelligent contract regulation of target device A series of clauses, these clauses can include but is not limited to conditions for use, park condition, authentication condition, charging regulation Etc..
Step S303, the corresponding intelligent contract of the target device is registered to block chain.
Information processor registers the corresponding intelligent contract of target device to block chain, the target device pair that will be generated The intelligent contract answered is registered into block chain, establishes the binding relationship between the corresponding intelligent contract of target device.
Step S304, receives enable request of the user terminal to the target device that is in the lock state, described to enable Request includes the user identifier of user terminal and the device identification of target device.
Information processor receives user terminal and enables request to the target device that is in the lock state, this enables request The device identification of user identifier and target device including user terminal.
Wherein, target device is in the lock state, i.e., the coded lock on target device is by shared assets lock up so that target Equipment is in the lock state.User terminal receives user's input and enables instruction, is sent to information processor and enables request, this is opened Include the user identifier of user terminal and the device identification of target device with request.
Step S305, the corresponding intelligent contract of the device identification is obtained from the block chain, and obtains the user Corresponding user information is identified, the intelligence contract includes the conditions for use of the target device.
Information processor is corresponding from the corresponding intelligent contract of block chain acquisition device identification, and acquisition user identifier User information, the intelligence contract include the conditions for use of target device.
The user of user terminal obtains the corresponding intelligent contract of target device, the user of user terminal to information processor It can accordingly be operated, i.e., be advised according to the corresponding intelligent contract of target device according to the corresponding intelligent contract of target device Fixed clause is operated accordingly, such as pays cash pledge etc..User terminal can be corresponded to according to these operation generation user identifiers User information, and the corresponding user information of user identifier is sent to information processor, information processor and marks user Know corresponding user information to register to block chain.
Although the corresponding user information of user identifier is for the corresponding intelligent contract generation of target device, user It may not operated when the intelligent contract for target device is operated according to the corresponding intelligent contract of target device, For example, transfer amounts as defined in the corresponding intelligent contract of target device are 50 bit coin, and the transfer amounts in user information are 30 bit coin.Therefore, information processor is getting the corresponding user information of user identifier and the corresponding intelligence of device identification In the case of contract, whether the corresponding user information of detection user identifier meets the corresponding intelligent contract of device identification, and full In the case of foot, the corresponding intelligent contract of performance objective equipment;In the case of ungratified, refusal performance objective equipment is corresponding Intelligent contract.
In a kind of mode in the cards, target device included by the corresponding intelligent contract of target device enables bar Part includes trading rules, and trading rules can be used for the amount of money, the user institute to transfer accounts needed for regulation user to assets transmitter Cash pledge that need to be paid etc., the corresponding user information of user identifier include the Transaction Information for trading rules feedback.If transaction letter Breath is matched with trading rules, it is determined that user information meets the conditions for use of target device, the corresponding intelligence of performance objective equipment Contract.
For example, the amount of money that trading rules provide to transfer accounts needed for user to assets transmitter is 100 bit coin, and is handed over Easy information includes the record of transferring accounts that the corresponding user of user identifier has turned 80 bit coin to the assets transmitter of target device, then Transaction Information is mismatched with trading rules, and user information is unsatisfactory for the conditions for use of target device.If Transaction Information includes user Identify the record of transferring accounts that corresponding user has turned 120 bit coin to the assets transmitter of target device, then Transaction Information is with handing over Easy rule match, user information meet the conditions for use of target device.
It should be noted that the bit coin in the embodiment of the present invention is a kind of ideal money, Transaction Information and trading rules The units of transfer amounts be not limited to bit coin.
Step S306, if the user information meets the conditions for use of the target device, control releases the target The lock-out state of equipment.
The specific implementation process of step S306 can be found in shown in Fig. 2 in step S203 specific descriptions, it is no longer superfluous herein State.
In the embodiment shown in fig. 3, the registration request sent according to management terminal, the corresponding intelligence of generation target device Contract, and registered to block chain, when enabling request of user terminal transmission is being received, user's mark is obtained from block chain Know corresponding user information and target device and correspond to conditions for use included by intelligent contract, and meet to enable in user information In the case of condition, control releases the lock-out state of target device, with the user so as to fulfill user terminal to target device Assets transmitter between the transfer of point-to-point property rights, the property rights transfer realized by block chain has higher flexibility and can By property.
Refer to Fig. 4, be the flow diagram of another information processing method provided in an embodiment of the present invention, with Fig. 2 or Step identical Fig. 3 can be found in the specific descriptions of Fig. 2 or Fig. 3, and the method shown in Fig. 4 can include but is not limited to following steps:
Step S401, receives the contract that user terminal is sent and checks request, the contract checks that request carries target device Device identification.
Information processor receives the contract that user terminal is sent and checks request, which checks that request carries target device Device identification.
The user of user terminal, i.e. user can send contract to information processor and look into before using target device See request, which checks that request carries the device identification of target device.
User terminal can check request by being scanned for target device to information processor transmission contract, also by pin Target device is determined to the selection instruction of multiple equipment, then sending contract to information processor checks request.
Step S402, obtains the corresponding intelligent contract of the device identification from block chain.
Information processor obtains the corresponding intelligent contract of device identification from block chain, that is, it is corresponding to obtain target device Intelligent contract.
Specifically, information processor obtains target device when receiving the contract and checking request from block chain The corresponding intelligent contract of device identification.The corresponding intelligent contract of device identification of target device is by information processor according to management Terminal send registration request generation, reference can be made in embodiment illustrated in fig. 3 step S301- steps S303 specific descriptions.
Step S403, the corresponding intelligent contract of the device identification is sent to the user terminal.
Information processor sends the corresponding intelligent contract of device identification of target device to user terminal.
Step S404, receives the user identifier that user terminal is sent for the corresponding intelligent contract of the device identification and corresponds to User information.
Information processor receives the user identifier that user terminal is sent for the corresponding intelligent contract of the device identification Corresponding user information.Wherein, the corresponding user information of user identifier can be directed to the corresponding intelligence of target device including user Cash pledge that contract is paid, the amount of money transferred accounts and what is inputted default be used to open unlocking information of coded lock etc..
Step S405, the corresponding user information of the user identifier is registered to block chain.
Information processor registers the corresponding user information of user identifier to block chain.
Step S406, receives enable request of the user terminal to the target device that is in the lock state, described Enabling request includes the user identifier of the user terminal and the device identification of target device.
Step S407, the corresponding intelligent contract of the device identification is obtained from the block chain, and obtains the user Corresponding user information is identified, the intelligence contract includes the conditions for use of the target device.
Step S408, if the user information meets the conditions for use of the target device, control releases the target The lock-out state of equipment.
The specific implementation process of step S406- steps S408 can be found in shown in Fig. 2 in step S201- steps S203 tool Body describes, and details are not described herein.
In the embodiment shown in fig. 4, the corresponding user information of user identifier that user terminal is sent is registered to block Chain, is receiving when enabling request of user terminal transmission, obtained from block chain the corresponding user information of user identifier and Target device corresponds to the conditions for use included by intelligent contract, and in the case where user information meets conditions for use, control solution Except the lock-out state of target device, with the point between the assets transmitter of the user so as to fulfill user terminal to target device To a property rights transfer, the property rights transfer realized by block chain has higher flexibility and reliability.
As a kind of optional embodiment, information processor receives user terminal to the target device that is in the lock state Enable request, this enable request include user terminal user identifier and target device device identification;Information processor Obtain the corresponding intelligent contract of device identification from block chain, to the corresponding intelligent contract of user terminal pushing equipment mark, i.e., to The corresponding intelligent contract of user terminal push target device, the intelligence contract include the conditions for use of target device;User terminal User operated accordingly for the corresponding intelligent contract of device identification, user terminal is according to these operation generation user's marks Know corresponding user information, and send it to information processor;Information processor receives user terminal and is directed to equipment mark Know the corresponding user information of user identifier that corresponding intelligent contract is sent, the corresponding user information of user identifier is registered to area Block chain;Then information processor obtains the corresponding user information of user identifier from block chain, and in the corresponding use of user identifier In the case that family information meets the corresponding conditions for use of target device, control releases the lock-out state of target device.
The embodiment is that embodiment illustrated in fig. 4 user terminal is enabled in transmission please with embodiment illustrated in fig. 4 difference Obtain the corresponding intelligent contract of target device before asking, the embodiment information processor receive enable request when, to user The corresponding intelligent contract of terminal push target device.
Fig. 5 is referred to, is a kind of structure diagram of information processor provided in an embodiment of the present invention, the information processing Device may include:
Receiving unit 501, it is described to open for receiving enable request of the user terminal to the target device that is in the lock state Include the user identifier of the user terminal and the device identification of the target device with request;
Acquiring unit 502, for obtaining the corresponding intelligent contract of the device identification from block chain, and obtains the use Family identifies corresponding user information, and the intelligence contract includes the conditions for use of the target device;
Unlocking unit 503, if meeting the conditions for use of the target device for the user information, control releases institute State the lock-out state of target device.
Embodiment according to embodiments of the present invention, the step S201- steps that the information processing method shown in Fig. 2 is related to Rapid S203 can be the unit in information processor as shown in Figure 5 to perform.For example, the step S201- in Fig. 2 S203 can be respectively by the receiving unit 501 shown in Fig. 5, acquiring unit 502, and unlocking unit 503 performs respectively.
In a kind of possible implementation, receiving unit 501 is additionally operable to receiving user terminal to being in the lock state Target device enable request before, receive management terminal be directed to the target device send registration request, the registration please Asking includes the lease condition of the target device.
Information processor shown in Fig. 5 may also include:
Generation unit, is closed for generating the corresponding intelligence of the target device according to the lease condition of the target device About;
Registration unit, for registering the corresponding intelligent contract of the target device to the block chain.
In a kind of possible implementation, the receiving unit 501 is additionally operable to receiving user terminal in locking shape The target device of state enable request before, receive the contract that the user terminal is sent and check request, the contract, which is checked, asks Ask the device identification for carrying the target device.
Information processor shown in Fig. 5 may also include:
Transmitting element, for sending the corresponding intelligent contract of the device identification obtained from block chain to the use Family terminal.
The receiving unit 501 is additionally operable to receive the user terminal for the corresponding intelligent contract hair of the device identification The corresponding user information of the user identifier sent.
The registration unit is additionally operable to register the corresponding user information of the user identifier to block chain.
In a kind of possible implementation, the acquiring unit 502 is obtaining the corresponding user's letter of the user identifier Before breath, the transmitting element is additionally operable to push the corresponding intelligent contract of the device identification to the user terminal.
The receiving unit 501 is additionally operable to receive the user terminal for the corresponding intelligent contract hair of the device identification The corresponding user information of the user identifier sent.
The registration unit is additionally operable to register the corresponding user information of the user identifier to block chain.
In a kind of possible implementation, the conditions for use included by the intelligence contract includes trading rules, described User information includes the Transaction Information for trading rules feedback;If being used for the user information in the unlocking unit 503 expires The conditions for use of the foot target device, then before control releases the lock-out state of the target device, at the information shown in Fig. 5 Reason device may also include:
Detection unit, for detecting whether the Transaction Information matches with the trading rules;
Determination unit, if being matched for the Transaction Information with the trading rules, it is determined that the user information meets The conditions for use of the target device.
In a kind of possible implementation, the unlocking unit 503, which is specifically used for sending to the target device, to be unlocked Instruction, the unlock instruction are used for the lock-out state for indicating that the target device releases the target device.
In a kind of possible implementation, the user information includes checking information, and the unlocking unit 503 is specifically used In sending checking information to the target device, the checking information indicates that the target device is receiving user's end Hold send checking request when, to the user terminal carry out authentication, and authentication by when, release the target The lock-out state of equipment.
Fig. 6 is referred to, is the structure diagram of another information processor provided in an embodiment of the present invention.At the information Reason device can include:One or more processors 601;One or more input equipments 602, one or more output equipments 603 and memory 604.Above-mentioned processor 601, input equipment 602, output equipment 603 and memory 604 are connected by bus 605 Connect.Memory 604 is used to store computer program, and the computer program includes programmed instruction, and processor 601 is deposited for execution The programmed instruction that reservoir 604 stores.Wherein, processor 601 is arranged to call described program instruction to perform:
It should be appreciated that in embodiments of the present invention, alleged processor 601 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 602 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 603 can include display (LCD etc.), loudspeaker etc..
The memory 604 can include read-only storage and random access memory, and to processor 601 provide instruction and Data.The a part of of memory 604 can also include nonvolatile RAM.For example, memory 604 can also be deposited Store up the information of device type.
In embodiments of the present invention, loaded by processor 601 and perform stored in computer-readable storage medium one or one Bar above instructions, to realize the corresponding steps of method flow shown in above-mentioned Fig. 2, Fig. 3 or Fig. 4;In the specific implementation, computer stores One in medium or one or more instruction are loaded by processor 601 and perform following steps:
Enable request of the user terminal to the target device that is in the lock state is received, described enable asks to include the use The device identification of the user identifier of family terminal and the target device;
The corresponding intelligent contract of the device identification is obtained from block chain, and obtains the corresponding user of the user identifier Information, the intelligence contract include the conditions for use of the target device;
If the user information meets the conditions for use of the target device, control releases the locking of the target device State.
In a kind of possible implementation, processor 601, which performs, receives user terminal to the target that is in the lock state Equipment enable request before, also perform:
Receive management terminal and be directed to the registration request that the target device is sent, the registration request is set including the target Standby lease condition;
The corresponding intelligent contract of the target device is generated according to the lease condition of the target device;
The corresponding intelligent contract of the target device is registered to the block chain.
In a kind of possible implementation, processor 601, which performs, receives user terminal to the target that is in the lock state Equipment enable request before, also perform:
Receive the contract that the user terminal is sent and check request, the contract checks that request carries the target device Device identification;
The corresponding intelligent contract of the device identification is obtained from the block chain;
The corresponding intelligent contract of the device identification is sent to the user terminal;
The user identifier that the user terminal is sent for the corresponding intelligent contract of the device identification is received to correspond to User information;
The corresponding user information of the user identifier is registered to block chain.
In a kind of possible implementation, processor 601 perform obtain the corresponding user information of the user identifier it Before, also perform:
The corresponding intelligent contract of the device identification is pushed to the user terminal;
The user identifier that the user terminal is sent for the corresponding intelligent contract of the device identification is received to correspond to User information;
The corresponding user information of the user identifier is registered to block chain.
In a kind of possible implementation, the conditions for use included by the intelligence contract includes trading rules, described User information includes the Transaction Information for trading rules feedback;If processor 601, which performs the user information, meets the mesh The conditions for use of marking device, then before control releases the lock-out state of the target device, also perform:
Detect whether the Transaction Information matches with the trading rules;
If the Transaction Information is matched with the trading rules, it is determined that the user information meets the target device Conditions for use.
In a kind of possible implementation, when processor 601 performs the lock-out state of the control releasing target device, Specific perform to the target device sends unlock instruction, and the unlock instruction is used to indicate that the target device releases the mesh The lock-out state of marking device.
In a kind of possible implementation, the user information includes checking information, and processor 601 performs control and releases During the lock-out state of the target device, checking information is sent to the target device, the checking information is used to indicate described Target device is when receiving the checking request that the user terminal is sent, to user terminal progress authentication, and Authentication by when, release the lock-out state of the target device.
It should be noted that some embodiments not being described in detail can be found in other corresponding implementations in the embodiment of the present invention The specific descriptions of example.For example, device embodiment can be found in the specific descriptions of corresponding method embodiment.
It should be noted that for foregoing each embodiment of the method, in order to be briefly described, therefore it is all expressed as to a system The combination of actions of row, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because For according to the present invention, certain some step can use other orders or be carried out at the same time.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily this hair Necessary to bright.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Unit in device of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above disclosed right for being only the section Example of the present invention, the present invention cannot being limited with this certainly Scope, one of ordinary skill in the art will appreciate that realize all or part of flow of above-described embodiment, and according to right of the present invention It is required that the equivalent variations made, still fall within and invent covered scope.

Claims (10)

  1. A kind of 1. information processing method, it is characterised in that including:
    Receive enable request of the user terminal to the target device that is in the lock state, it is described to enable request and include user's end The device identification of the user identifier at end and the target device;
    The corresponding intelligent contract of the device identification is obtained from block chain, and obtains the corresponding user's letter of the user identifier Breath, the intelligence contract include the conditions for use of the target device;
    If the user information meets the conditions for use of the target device, control releases the locking shape of the target device State.
  2. 2. the method according to claim 1, it is characterised in that the user terminal that receives is to the target device that is in the lock state Enable request before, further include:
    Receive management terminal and be directed to the registration request that the target device is sent, the registration request includes the target device Lease condition;
    The corresponding intelligent contract of the target device is generated according to the lease condition of the target device;
    The corresponding intelligent contract of the target device is registered to the block chain.
  3. 3. the method according to claim 1, it is characterised in that the user terminal that receives is to the target device that is in the lock state Enable request before, further include:
    Receive the contract that the user terminal is sent and check request, the contract checks the equipment that request carries the target device Mark;
    The corresponding intelligent contract of the device identification is obtained from the block chain;
    The corresponding intelligent contract of the device identification is sent to the user terminal;
    Receive the corresponding use of the user identifier that the user terminal is sent for the corresponding intelligent contract of the device identification Family information;
    The corresponding user information of the user identifier is registered to block chain.
  4. 4. the method according to claim 1, it is characterised in that it is described obtain the corresponding user information of the user identifier before, Further include:
    The corresponding intelligent contract of the device identification is pushed to the user terminal;
    Receive the corresponding use of the user identifier that the user terminal is sent for the corresponding intelligent contract of the device identification Family information;
    The corresponding user information of the user identifier is registered to block chain.
  5. 5. according to the method for claim 3 or 4, it is characterised in that the conditions for use included by the intelligence contract includes transaction Rule, the user information include the Transaction Information for trading rules feedback;
    If the user information meets the conditions for use of the target device, control releases the locking of the target device Before state, further include:
    Detect whether the Transaction Information matches with the trading rules;
    If the Transaction Information is matched with the trading rules, it is determined that the user information meets enabling for the target device Condition.
  6. 6. according to the method for any one of claim 1-4, it is characterised in that the control releases the locking shape of the target device State, including:
    Unlock instruction is sent to the target device, the unlock instruction is used to indicate that the target device releases the target and sets Standby lock-out state.
  7. 7. according to the method for any one of claim 1-4, it is characterised in that the user information includes checking information;
    The control releases the lock-out state of the target device, including:
    Checking information is sent to the target device, the checking information is used to indicate that the target device is receiving the use During the checking request that family terminal is sent, carry out authentication to the user terminal, and authentication by when, described in releasing The lock-out state of target device.
  8. 8. a kind of information processor, it is characterised in that including for performing such as the side of any one of claim 1-7 claim The unit of method.
  9. 9. a kind of information processor, it is characterised in that including processor, memory, communication interface and bus, processor, deposit Reservoir and communication interface are connected with each other by bus, wherein, memory is used to store computer program, and computer program includes journey Sequence instructs, and processor is arranged to caller instruction, performs such as the method for any one of claim 1-7.
  10. A kind of 10. computer-readable recording medium, it is characterised in that computer-readable recording medium storage has computer program, Computer program includes programmed instruction, and programmed instruction makes processor perform as claim 1-7 is any when being executed by a processor The method of item.
CN201711200203.5A 2017-11-24 2017-11-24 A kind of information processing method and its device Pending CN108009878A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711200203.5A CN108009878A (en) 2017-11-24 2017-11-24 A kind of information processing method and its device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711200203.5A CN108009878A (en) 2017-11-24 2017-11-24 A kind of information processing method and its device

Publications (1)

Publication Number Publication Date
CN108009878A true CN108009878A (en) 2018-05-08

Family

ID=62053944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711200203.5A Pending CN108009878A (en) 2017-11-24 2017-11-24 A kind of information processing method and its device

Country Status (1)

Country Link
CN (1) CN108009878A (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108701324A (en) * 2018-05-31 2018-10-23 深圳市元征科技股份有限公司 A kind of management method and server of shared vehicle
CN108765082A (en) * 2018-05-29 2018-11-06 深圳市元征科技股份有限公司 A kind of book borrowing and reading method, system, equipment and computer readable storage medium
CN108830983A (en) * 2018-05-29 2018-11-16 广州蛙管家科技有限公司 A kind of access control system and its working method based on block chain
CN108961643A (en) * 2018-06-12 2018-12-07 深圳市中电数通智慧安全科技股份有限公司 A kind of parameter management method based on block chain, device and terminal device
CN109035510A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of controlling the access of express delivery smart lock by block chain
CN109035509A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of intelligent door lock is opened and closed by block chain
CN109118620A (en) * 2018-07-18 2019-01-01 广州智乐物联网技术有限公司 A kind of fingerprint real-name authentication system based on block chain
CN109146618A (en) * 2018-07-30 2019-01-04 杭州复杂美科技有限公司 A kind of collaborative share method and system, computer equipment and storage medium
CN109243032A (en) * 2018-09-17 2019-01-18 李婵珊 A kind of face recognition door control system based on block chain technology
CN109255671A (en) * 2018-07-18 2019-01-22 北京京东尚科信息技术有限公司 Processing method, device and the computer readable storage medium of order request
CN109285256A (en) * 2018-10-31 2019-01-29 国网黑龙江省电力有限公司信息通信公司 Computer room based on block chain authentication enter permission give method
CN109302415A (en) * 2018-11-09 2019-02-01 四川虹微技术有限公司 A kind of authentication method, block chain node and storage medium
CN109308605A (en) * 2018-09-12 2019-02-05 莆田市烛火信息技术有限公司 A kind of electronic time capsule management method and system based on block chain
CN109308612A (en) * 2018-09-29 2019-02-05 西安蜂语信息科技有限公司 Router charging method and device
CN109447645A (en) * 2018-11-09 2019-03-08 四川虹微技术有限公司 A kind of equipment linkage method, block chain network and storage medium
CN109472675A (en) * 2018-11-29 2019-03-15 阿里巴巴集团控股有限公司 Processing method, device, system and the equipment of charter business
CN109639434A (en) * 2018-12-07 2019-04-16 中链科技有限公司 A kind of method for unlocking based on block chain, device, system and calculate equipment
CN109671193A (en) * 2018-12-13 2019-04-23 深圳市云歌人工智能技术有限公司 It authorizes the electronic lock right to use and obtains the method and device of the electronic lock right to use
CN109685950A (en) * 2018-12-20 2019-04-26 深圳市华智创科智能科技有限公司 A kind of gate inhibition's unlocking method and its device based on shake mobile terminal
CN109767534A (en) * 2019-01-17 2019-05-17 平安科技(深圳)有限公司 Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN110009388A (en) * 2019-02-02 2019-07-12 阿里巴巴集团控股有限公司 Equipment leasing method, apparatus, equipment and storage medium
CN110162474A (en) * 2019-05-10 2019-08-23 北京理工大学 A kind of intelligent contract reentry leak detection method based on abstract syntax tree
CN110176082A (en) * 2019-04-03 2019-08-27 博生(广州)信息科技有限公司 Private savings parking stall lease total management system and its implementation based on block chain
CN110337102A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Terminal locking method and device based on block chain
CN110599653A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
WO2020011028A1 (en) * 2018-07-13 2020-01-16 Telefonaktiebolaget Lm Ericsson (Publ) System and method for information generation and delivery
CN110706045A (en) * 2018-07-10 2020-01-17 北京京东尚科信息技术有限公司 Transaction data storage method, system, service platform and storage medium
CN110866743A (en) * 2018-08-28 2020-03-06 精工爱普生株式会社 Providing apparatus, processing system, and communication method
CN111049800A (en) * 2019-11-14 2020-04-21 深圳市朗仁科技有限公司 Vehicle service management method and device, block chain link point equipment and storage medium thereof
CN111245883A (en) * 2018-11-28 2020-06-05 财团法人资讯工业策进会 Control method and control system of Internet of things device
CN111353783A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Block chain based signing method and equipment
CN111369710A (en) * 2018-12-06 2020-07-03 开利公司 Intelligent lock system supported by block chain
CN111553767A (en) * 2020-04-29 2020-08-18 天网互联科技(深圳)有限公司 Shared house leasing system, method and storage medium based on block chain
SE1951056A1 (en) * 2019-09-18 2021-03-19 Gunnebo Ab Method, locking system for controlling access to a resource and a locking device
CN113034740A (en) * 2021-02-26 2021-06-25 山东浪潮质量链科技有限公司 Unlocking method and equipment for shared bicycle and storage medium
CN113763621A (en) * 2020-07-20 2021-12-07 北京沃东天骏信息技术有限公司 Access control authorization method, management client and system based on block chain
CN114783089A (en) * 2022-04-27 2022-07-22 江苏无限感知科技有限公司 Intelligent lock management system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809062A (en) * 2016-03-01 2016-07-27 布比(北京)网络技术有限公司 Contract construction and execution methods and apparatuses
CN106327700A (en) * 2016-08-22 2017-01-11 深圳易马达科技有限公司 Scooter borrowing system and method based on Internet of things
CN107154116A (en) * 2017-05-19 2017-09-12 杭州排山信息科技有限公司 Bicycle leasing system and its control method and device
CN107194778A (en) * 2017-05-25 2017-09-22 金立彦 Equipment leasing method and system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809062A (en) * 2016-03-01 2016-07-27 布比(北京)网络技术有限公司 Contract construction and execution methods and apparatuses
CN106327700A (en) * 2016-08-22 2017-01-11 深圳易马达科技有限公司 Scooter borrowing system and method based on Internet of things
CN107154116A (en) * 2017-05-19 2017-09-12 杭州排山信息科技有限公司 Bicycle leasing system and its control method and device
CN107194778A (en) * 2017-05-25 2017-09-22 金立彦 Equipment leasing method and system based on block chain

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830983B (en) * 2018-05-29 2021-03-02 广州足迹体育文化发展有限公司 Access control system based on block chain and working method thereof
CN108765082A (en) * 2018-05-29 2018-11-06 深圳市元征科技股份有限公司 A kind of book borrowing and reading method, system, equipment and computer readable storage medium
CN108830983A (en) * 2018-05-29 2018-11-16 广州蛙管家科技有限公司 A kind of access control system and its working method based on block chain
WO2019227451A1 (en) * 2018-05-31 2019-12-05 深圳市元征科技股份有限公司 Shared vehicle management method and server
CN108701324A (en) * 2018-05-31 2018-10-23 深圳市元征科技股份有限公司 A kind of management method and server of shared vehicle
CN108961643A (en) * 2018-06-12 2018-12-07 深圳市中电数通智慧安全科技股份有限公司 A kind of parameter management method based on block chain, device and terminal device
CN110706045A (en) * 2018-07-10 2020-01-17 北京京东尚科信息技术有限公司 Transaction data storage method, system, service platform and storage medium
CN109035510A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of controlling the access of express delivery smart lock by block chain
CN109035509A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of intelligent door lock is opened and closed by block chain
WO2020011028A1 (en) * 2018-07-13 2020-01-16 Telefonaktiebolaget Lm Ericsson (Publ) System and method for information generation and delivery
CN109118620A (en) * 2018-07-18 2019-01-01 广州智乐物联网技术有限公司 A kind of fingerprint real-name authentication system based on block chain
CN109255671A (en) * 2018-07-18 2019-01-22 北京京东尚科信息技术有限公司 Processing method, device and the computer readable storage medium of order request
CN109146618A (en) * 2018-07-30 2019-01-04 杭州复杂美科技有限公司 A kind of collaborative share method and system, computer equipment and storage medium
CN110866743A (en) * 2018-08-28 2020-03-06 精工爱普生株式会社 Providing apparatus, processing system, and communication method
CN109308605A (en) * 2018-09-12 2019-02-05 莆田市烛火信息技术有限公司 A kind of electronic time capsule management method and system based on block chain
CN109308605B (en) * 2018-09-12 2021-04-23 莆田市烛火信息技术有限公司 Electronic time capsule management method and system based on block chain
CN109243032A (en) * 2018-09-17 2019-01-18 李婵珊 A kind of face recognition door control system based on block chain technology
CN109308612A (en) * 2018-09-29 2019-02-05 西安蜂语信息科技有限公司 Router charging method and device
CN109285256A (en) * 2018-10-31 2019-01-29 国网黑龙江省电力有限公司信息通信公司 Computer room based on block chain authentication enter permission give method
CN109447645A (en) * 2018-11-09 2019-03-08 四川虹微技术有限公司 A kind of equipment linkage method, block chain network and storage medium
CN109302415A (en) * 2018-11-09 2019-02-01 四川虹微技术有限公司 A kind of authentication method, block chain node and storage medium
CN111245883A (en) * 2018-11-28 2020-06-05 财团法人资讯工业策进会 Control method and control system of Internet of things device
WO2020108134A1 (en) * 2018-11-29 2020-06-04 阿里巴巴集团控股有限公司 Rental service processing method, apparatus, system and device
CN109472675A (en) * 2018-11-29 2019-03-15 阿里巴巴集团控股有限公司 Processing method, device, system and the equipment of charter business
CN111369710A (en) * 2018-12-06 2020-07-03 开利公司 Intelligent lock system supported by block chain
CN109639434A (en) * 2018-12-07 2019-04-16 中链科技有限公司 A kind of method for unlocking based on block chain, device, system and calculate equipment
CN109671193A (en) * 2018-12-13 2019-04-23 深圳市云歌人工智能技术有限公司 It authorizes the electronic lock right to use and obtains the method and device of the electronic lock right to use
CN109685950A (en) * 2018-12-20 2019-04-26 深圳市华智创科智能科技有限公司 A kind of gate inhibition's unlocking method and its device based on shake mobile terminal
CN111353783A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Block chain based signing method and equipment
CN109767534B (en) * 2019-01-17 2022-03-04 平安科技(深圳)有限公司 Access control access method, system, management terminal and access control terminal based on block chain
CN109767534A (en) * 2019-01-17 2019-05-17 平安科技(深圳)有限公司 Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN110009388A (en) * 2019-02-02 2019-07-12 阿里巴巴集团控股有限公司 Equipment leasing method, apparatus, equipment and storage medium
CN110176082A (en) * 2019-04-03 2019-08-27 博生(广州)信息科技有限公司 Private savings parking stall lease total management system and its implementation based on block chain
CN110162474B (en) * 2019-05-10 2020-09-15 北京理工大学 Intelligent contract reentry vulnerability detection method based on abstract syntax tree
CN110162474A (en) * 2019-05-10 2019-08-23 北京理工大学 A kind of intelligent contract reentry leak detection method based on abstract syntax tree
CN110337102A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Terminal locking method and device based on block chain
CN110599653A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN110599653B (en) * 2019-09-11 2022-02-11 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
SE1951056A1 (en) * 2019-09-18 2021-03-19 Gunnebo Ab Method, locking system for controlling access to a resource and a locking device
CN111049800A (en) * 2019-11-14 2020-04-21 深圳市朗仁科技有限公司 Vehicle service management method and device, block chain link point equipment and storage medium thereof
CN111553767A (en) * 2020-04-29 2020-08-18 天网互联科技(深圳)有限公司 Shared house leasing system, method and storage medium based on block chain
CN111553767B (en) * 2020-04-29 2023-04-18 天网互联科技(深圳)有限公司 Shared house leasing system, method and storage medium based on block chain
CN113763621A (en) * 2020-07-20 2021-12-07 北京沃东天骏信息技术有限公司 Access control authorization method, management client and system based on block chain
CN113034740A (en) * 2021-02-26 2021-06-25 山东浪潮质量链科技有限公司 Unlocking method and equipment for shared bicycle and storage medium
CN114783089A (en) * 2022-04-27 2022-07-22 江苏无限感知科技有限公司 Intelligent lock management system

Similar Documents

Publication Publication Date Title
CN108009878A (en) A kind of information processing method and its device
TWI814706B (en) Blockchain-implemented method and system
CN108306887B (en) Block chain-based Internet of things security and data privacy protection system
JP6971019B2 (en) Data management system, information processing device, program, and data management method
US10682981B2 (en) Systems and methods for networked device security
CN109361688B (en) Evidence storing method and system based on 5G architecture and block chain
US6718470B1 (en) System and method for granting security privilege in a communication system
KR100315991B1 (en) Digitally signing agreements from remotely located nodes
CN108012268A (en) A kind of mobile phone terminal SIM card and the method for safe handling App, medium
JP4209840B2 (en) IC card, terminal device and data communication method
CN101300808A (en) Method and arrangement for secure autentication
CN109155731A (en) The management of password transaction
CN110266648A (en) Data capture method, server and computer storage medium based on alliance's chain
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
CN114266681A (en) Electronic contract signing method, system, storage medium and computing equipment
CN111369338A (en) Data processing method and device based on block chain
CN110494878A (en) It is remitted money by telecom operators via the digital properties of telephone number
Kwame et al. V-chain: A blockchain-based car lease platform
CN109741070B (en) Account management method and device based on network certificate
Tang et al. Using agents to improve security and convenience in mobile e-commerce
CN108055240A (en) A kind of user authentication method of shared automobile
US7660770B2 (en) System and method for providing a secure contact management system
KR101033114B1 (en) Bicycle rental system
KR20100006811A (en) Contraction authenticating system using certification of contractor in mobile configuration and contractor authenticating method thereof
JP2007310562A (en) Settlement method using electronic money

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518000 Guangdong Shenzhen Longgang District Bantian Street five and Avenue North Yuan Zheng science and Technology Factory 1 Factory 4 floor.

Applicant after: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

Address before: 518000 4th Floor, No. 1 Workshop, Beiyuan Zheng Science and Technology Factory Area, 5th Avenue, Bantian Street, Shenzhen City, Guangdong Province

Applicant before: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
CB02 Change of applicant information

Address after: Bantian street, Longgang District of Shenzhen City, Guangdong province 518000 yuan and five Avenue sign technology plant No. 1 building 4 floor

Applicant after: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

Address before: Bantian street, Longgang District of Shenzhen City, Guangdong province 518000 yuan and five Avenue sign technology plant No. 1 building 4 floor

Applicant before: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180508

RJ01 Rejection of invention patent application after publication