Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment, belongs to the scope of protection of the invention.
With the continuous development of internet, traditional economic model quietly occurs to change, and shared economy starts to come into people
The visual field.Shared economy refer to the focal pointe for possessing idle asset amortize with compensation the assets right to use to other people, transmitter
Return is obtained, transmitter creates value using the idle asset of oneself is shared.Assets are obtained so as to fulfill a kind of user, are amortized
The win-win situation of person (or participator) value -capture, such as:Shared bicycle and shared automobile etc. typically share economic case.
Property rights transfer in shared economic is a key issue, at present, be by the way of mainly by coded lock come
Control the transfer of property rights.But at present, no matter any type of mechanical lock, electronic lock, have network function coded lock or
Control lock with service centre, dependent on the system of centralization, relation between supply and demand is opaque or is controlled by third side, all cannot
Realize point-to-point property rights transfer.
To solve the above-mentioned problems, an embodiment of the present invention provides a kind of information processing method and its device, it is possible to achieve
Point-to-point property rights transfer, can improve flexibility and the reliability of property rights transfer.The embodiment of the present invention can be applied to control
In the scene that shared assets with coded lock are unlocked.
In order to more fully understand the embodiment of the present invention, will be situated between below to the system of the application embodiment of the present invention
Continue.
Fig. 1 is referred to, is the exemplary system figure using the embodiment of the present invention, including share automobile, coded lock, user terminal
With block chain.
Wherein, a kind of citing that automobile is shared assets is shared, shared assets refer to available for shared idle asset, this is common
Enjoy assets and can include but is not limited to shared bicycle, shared automobile, shared umbrella or shared KTV etc..
Wherein, coded lock can be used for the use for controlling corresponding shared assets, which can be built in shared assets,
I.e. the coded lock is a part for the shared assets.The coded lock can also be placed outside shared assets, i.e., the coded lock is not this
A part for shared assets, but the coded lock can obtain the shared assets assets information (such as Asset Type, assets purposes,
Scope, asset status information, assets transmitter etc.), and the use of the shared assets can be controlled.The embodiment of the present invention is with close
Code lock is built in exemplified by corresponding shared assets.It should be noted that the coded lock can be tangible mechanical lock or
The virtual responsive realized by logic control mode, such as:Engine is opened by igniter, is controlled by authentication mode
System power etc..
Wherein, user terminal can initiate the request using shared assets.The user's terminal can refer to the accession to terminal, user
Equipment (user equipment, UE), mobile terminal, terminal, wireless telecom equipment, user agent or user apparatus.Access is eventually
End can be cell phone, wireless phone, Session initiation Protocol (sessioninitiation protocol, SIP) phone, nothing
Line local loop (wireless local loop, WLL) is stood, personal digital assistant (personal digital
Assistant, PDA), have the handheld device of wireless communication function, computing device or be connected to radio modem its
In terminal device, virtual reality device, future 5G networks in its processing equipment, mobile unit, wearable device, Internet of Things
End in terminal device or the public land mobile network (public land mobile network, PLMN) of following evolution
End equipment etc..
Wherein, the corresponding server of block chain can respond the request that assets are shared in the use that user terminal is initiated.Block
Chain technology is to be verified and stored data using block linked data structure, generated and updated using distributed node common recognition algorithm
Data, the safety for ensureing using the mode of cryptography data transfer and access, utilize the intelligence being made of automatized script code
Contract programs a kind of brand-new distributed basis framework and calculation paradigm with operation data.Wherein, decentralization is block
The subversiveness feature of chain technology, block chain technology do not have centralized architecture, are acted on behalf of without centralization, allow all clauses to write
For program, these clauses can on block chain automated execution, cost can not only be substantially reduced, can also improve efficiency.Block chain
On each node have identical account book, it can be ensured that account book recording process is open and clear.Block chain technology can be real
A kind of point-to-point, open and clear direct interaction is showed so that high efficiency, extensive, non-stop layerization agency information exchange
Mode becomes reality.Information processing method provided in an embodiment of the present invention is based on block chain technology, is realized a little without third side
The property rights of point are shifted.
Being shared in Fig. 1 can be by having between automobile and coded lock, coded lock and user terminal, user terminal and block chain
Line or radio connection carry out data transmission.
It should be noted that the equipment form and quantity shown in Fig. 1 do not form the restriction to the embodiment of the present invention.
It should be noted that the embodiment of the present invention is introduced by taking shared automobile as an example, it should be appreciated that other shared assets bases
The protection domain of the embodiment of the present application ought to be fallen into the releasing process of coded lock.
Information processor in the embodiment of the present invention can be the part or all of of the corresponding server of block chain, mainly
It is responsible for the management of block chain, such as generation block, registration block etc., is additionally operable to the request of response apparatus, phase is performed according to request
Operation answered etc..
Target device in the embodiment of the present invention is to need to be unlocked the shared assets to enable, built in the shared assets
Or external coded lock.In other words, target device is made of coded lock and shared assets, such as automobile and coded lock are shared in Fig. 1
The equipment of composition can be target device.Coded lock in the embodiment of the present invention be it is a kind of have network function, data storage and
The terminal device of computing capability, can be as a node in block chain, and the corresponding server of oriented block chain initiates request
Ability.
Describe in detail below in conjunction with attached drawing 2- attached drawings 4 to information processing method provided in an embodiment of the present invention.
Fig. 2 is referred to, is a kind of flow diagram of information processing method provided in an embodiment of the present invention, this method can be with
Including but not limited to following steps:
Step S201, receives enable request of the user terminal to the target device that is in the lock state, described to enable request
The device identification of user identifier and the target device including the user terminal.
Information processor receives user terminal and enables request to the target device that is in the lock state, this enables request
The device identification of user identifier and target device including user terminal.
The user of user terminal, i.e. user, it is desirable to when being unlocked to the target device being in the lock state, can pass through
By the way of application-specific on user terminal is scanned enabling for target device is sent to information processor
Request, enabling request includes the user identifier of user terminal and the device identification of target device.Correspondingly, information processor connects
Receipts enable request.
Wherein, the user identifier of the user identifier of user terminal, i.e. user, can include but is not limited to telephone number,
ID card No., E-mail address, social account etc..The device identification of target device, i.e., the device identification of shared assets, such as compile
Number, license plate number etc..
Wherein, target device can be formed by sharing transmitter's purchase of assets and installing coded lock in shared assets,
Target device can also be the shared assets of built-in combination lock.Target device thinks shared assets to be used for user.
Coded lock on target device can generate unsymmetrical key pair by cryptography arithmetic in advance.Wherein, it is asymmetric close
Key is to including public key and private key, public key is used to encrypt, and is disclosed;Private key is used to decrypt, and is protected by the coded lock on target device
Deposit, it is impossible to leak.Rivest, shamir, adelman realizes that the basic process that confidential information exchanges is:Party A generate a pair of secret keys and by its
In public key disclosed to other sides;Obtain the public key Party B confidential information is encrypted using the public key after be then forwarded to first
Side;Information after the private key pair encryption that Party A is preserved with oneself again is decrypted.Private key is additionally operable to digital signature, and public key is additionally operable to
Verify digital signature, digital signature is exactly others the hop count word string that can not forge that the sender of only information could produce,
This hop count word string is also that a valid certificates of information authenticity are sent to the sender of information at the same time.
Coded lock on the target device generates unsymmetrical key to afterwards, the coded lock on target device can be by generation
Public key, coded lock numbering, the assets information of shared assets are sent to information processor.Correspondingly, information processor receives
These information that coded lock on target device is sent, and these information are registered to block chain, to establish coded lock with sharing
Binding relationship between assets, i.e. a coded lock are corresponding with the assets information of a shared assets.
Wherein, Asset Type, assets purposes, assets scope, assets transmitter can be included by sharing the assets information of assets
Etc. information.The type of the as shared assets of Asset Type, such as bicycle, automobile, umbrella etc..Assets purposes is shared assets
Purposes.Assets transmitter can be personal or mechanism.
The assets transmitter of target device can be sent the lease condition of target device to information processing by management terminal
Device, so that information processor generates the corresponding intelligent contract of target device according to the lease condition of target device, and by mesh
The corresponding intelligent contract of marking device is registered to block chain.Wherein, the end that management terminal operates for the assets transmitter of target device
End, can be the terminals such as UE, mobile terminal, PDA, personal computer.
It is understood that the corresponding intelligent contract of target device defines a series of clauses, these clauses can include
But it is not limited to conditions for use, parks condition, authentication condition, charging regulation, reservation using rule etc..Wherein, bar is enabled
Part can include trading rules (such as the amount of money that need to transfer accounts of the cash pledge that need to pay of user, user etc.).
User terminal can obtain the corresponding intelligent contract of target device, the user of user terminal to information processor in advance
The corresponding intelligent contract of target device can be directed to be operated accordingly, such as pay cash pledge, transfer accounts.User terminal can basis
These corresponding user informations of operation generation user identifier, and the corresponding user information of user identifier is sent to information processing apparatus
Put, information processor registers the corresponding user information of user identifier to block chain.
Step S202, the corresponding intelligent contract of the device identification is obtained from block chain, and obtains the user identifier
Corresponding user information, the intelligence contract include the conditions for use of the target device.
Information processor is corresponding from the corresponding intelligent contract of block chain acquisition device identification, and acquisition user identifier
User information, the intelligence contract include the conditions for use of target device.
Specifically, information processor is in the case where receiving and enabling request, according to the user identifier of user terminal from
Block chain obtains the corresponding user information of user identifier, and obtains equipment mark from block chain according to the device identification of target device
Know corresponding intelligent contract.Wherein, the corresponding user information of user identifier can be directed to the corresponding intelligence of target device including user
Can the contract cash pledge paid, the amount of money transferred accounts and what is inputted default be used to open unlocking information of coded lock etc..Mesh
The conditions for use of marking device can be enabled clause or enable rule, be set for judging whether user information can enable target
It is standby, such as can specify that and pay cash pledge number, regulation transfer amounts etc..
Although the corresponding user information of user identifier is for the corresponding intelligent contract generation of target device, user
It may not operated when the intelligent contract for target device is operated according to the corresponding intelligent contract of target device,
For example, transfer amounts as defined in the corresponding intelligent contract of target device are 50 bit coin, and the transfer amounts in user information are
30 bit coin.Therefore, information processor is getting the corresponding user information of user identifier and the corresponding intelligence of device identification
In the case of contract, whether the corresponding user information of detection user identifier meets the corresponding intelligent contract of device identification, and full
In the case of foot, the corresponding intelligent contract of performance objective equipment;In the case of ungratified, refusal performance objective equipment is corresponding
Intelligent contract.
Step S203, if the user information meets the conditions for use of the target device, control releases the target
The lock-out state of equipment.
If user information meets the conditions for use of the target device included by intelligent contract, information processor control solution
Except the lock-out state of target device.
In a kind of mode in the cards, information processor can meet the target device included by intelligent contract
During conditions for use, unlock instruction directly is sent to target device, unlock instruction is used for target device and releases target device
Lock-out state.Specifically, information processor sends unlock instruction to the coded lock on target device, coded lock is receiving solution
During lock instruction, the locking to coded lock is released, that is, opens coded lock, the user of user terminal can use target device.Can be with
Understand, this kind of mode is a kind of mode unlocked in real time.
Coded lock can carry out authentication, and pass through body in user terminal when receiving unlock instruction to user terminal
During part verification, the locking to coded lock is released, opens coded lock.The default unlocking information for being used to open coded lock of user terminal
Coded lock can be issued to by information processor, coded lock can be to it when the corresponding intelligent contract of target device is finished
Registered.Wherein, unlocking information can be public key information, character string or the biological information of user terminal generation, biological
Characteristic information can include but is not limited to finger print information, voiceprint, iris information, face information etc..Coded lock is receiving
During the checking request that user terminal is sent, public key information, character string or biological information that detection checking request carries with it is pre-
If unlocking information whether match, if matching, user terminal passes through authentication.
Alternatively, the character string or biological information that checking request carries can use the public key of coded lock generation to be added
Close, coded lock is decrypted, then matched when receiving checking request using the corresponding private key of the public key.
In a kind of mode in the cards, information processor can meet the target device included by intelligent contract
During conditions for use, the corresponding checking information of user identifier is sent to target device, target device is receiving user terminal transmission
Checking request when, according to checking information to user terminal carry out authentication, and authentication by when, release target set
Standby lock-out state.Specifically, information processor sends checking information to the coded lock on target device, and coded lock is receiving
During the checking request sent to user terminal, authentication is carried out to user terminal according to checking information, and is led in authentication
It is out-of-date, the locking to coded lock is released, opens coded lock, the user of user terminal can use target device.It is appreciated that
It is that this kind of mode is a kind of mode for the unlock that is delayed.
The public key of user terminal, checking information can be when the corresponding intelligent contract of target device be finished, by information
Reason device is issued to coded lock, and coded lock registers it.
Wherein, checking information can be the digital signature of the digital signature of the user of user terminal, i.e. user, the numeral
Signature is signed using the private key of user terminal generation, and the public key of user terminal generation can be used for solving the digital signature.Password
The digital signature that receive information processing unit is sent is locked, and is receiving the carrying user terminal generation of user terminal transmission
During the checking request of public key, authentication is carried out, if the public key can solve the digital signature, then user terminal passes through verification.
Checking information can also be default character string or default biological information.Coded lock receive information processing dress
Put the default character string of transmission or default biological information, and receive the carrying character string of user terminal transmission or
During the checking request of biological information, authentication is carried out, if matching, then user terminal passes through certification.Alternatively, test
The character string or biological information that card request carries can use the public key of coded lock generation to be encrypted, and coded lock is receiving
During checking request, it is decrypted using the corresponding private key of the public key, then matched.
It should be noted that target device can first receive checking information, then checking request is received, between the two
The time interval embodiment of the present invention in do not limit.
Above two mode does not form the restriction to the embodiment of the present invention, and information processor can also use its other party
Formula control releases the lock-out state of target device.
In the embodiment shown in Figure 2, by receive enable request when, from block chain obtain user identifier correspond to
User information and target device correspond to conditions for use included by intelligent contract, and meet conditions for use in user information
In the case of, control releases the lock-out state of target device, with the assets of the user so as to fulfill user terminal to target device
Point-to-point property rights transfer between transmitter, the property rights transfer realized by block chain have higher flexibility and reliability.
Fig. 3 is referred to, is the flow diagram of another information processing method provided in an embodiment of the present invention, this method can
To include but not limited to following steps:
Step S301, receives management terminal and is directed to the registration request that target device is sent, the registration request includes target
The lease condition of equipment.
Information processor receives management terminal and is directed to the registration request that target device is sent, which includes target
The lease condition of equipment.
Assets transmitter buys coded lock and is installed in shared assets, can will be mounted with the shared money of coded lock
Production is used as target device, can also will be pre-configured with the shared assets of coded lock as target device.It should be noted that mesh
Marking device is any one of the shared assets with coded lock.
Management terminal is the terminal of assets transmitter operation, and assets transmitter can be closed by the management terminal using intelligence
User is edited mesh by the about lease condition of format editing target device, such as required cash pledge, charging mode etc., the management terminal
The lease condition of marking device is sent to information processor by registration request.It should be noted that concrete intelligence contract form
And the content included by it does not limit in embodiments of the present invention, is determined on a case-by-case basis.Alternatively, registration request is also wrapped
Include the device identification of target device.
Step S302, the corresponding intelligent contract of the target device is generated according to the lease condition of the target device.
Information processor generates the corresponding intelligent contract of target device according to the lease condition of target device.
Specifically, information processor is corresponded to when receiving the registration request of management terminal transmission according to target device
The corresponding intelligent contract of lease condition generation target device.It is understood that the corresponding intelligent contract regulation of target device
A series of clauses, these clauses can include but is not limited to conditions for use, park condition, authentication condition, charging regulation
Etc..
Step S303, the corresponding intelligent contract of the target device is registered to block chain.
Information processor registers the corresponding intelligent contract of target device to block chain, the target device pair that will be generated
The intelligent contract answered is registered into block chain, establishes the binding relationship between the corresponding intelligent contract of target device.
Step S304, receives enable request of the user terminal to the target device that is in the lock state, described to enable
Request includes the user identifier of user terminal and the device identification of target device.
Information processor receives user terminal and enables request to the target device that is in the lock state, this enables request
The device identification of user identifier and target device including user terminal.
Wherein, target device is in the lock state, i.e., the coded lock on target device is by shared assets lock up so that target
Equipment is in the lock state.User terminal receives user's input and enables instruction, is sent to information processor and enables request, this is opened
Include the user identifier of user terminal and the device identification of target device with request.
Step S305, the corresponding intelligent contract of the device identification is obtained from the block chain, and obtains the user
Corresponding user information is identified, the intelligence contract includes the conditions for use of the target device.
Information processor is corresponding from the corresponding intelligent contract of block chain acquisition device identification, and acquisition user identifier
User information, the intelligence contract include the conditions for use of target device.
The user of user terminal obtains the corresponding intelligent contract of target device, the user of user terminal to information processor
It can accordingly be operated, i.e., be advised according to the corresponding intelligent contract of target device according to the corresponding intelligent contract of target device
Fixed clause is operated accordingly, such as pays cash pledge etc..User terminal can be corresponded to according to these operation generation user identifiers
User information, and the corresponding user information of user identifier is sent to information processor, information processor and marks user
Know corresponding user information to register to block chain.
Although the corresponding user information of user identifier is for the corresponding intelligent contract generation of target device, user
It may not operated when the intelligent contract for target device is operated according to the corresponding intelligent contract of target device,
For example, transfer amounts as defined in the corresponding intelligent contract of target device are 50 bit coin, and the transfer amounts in user information are
30 bit coin.Therefore, information processor is getting the corresponding user information of user identifier and the corresponding intelligence of device identification
In the case of contract, whether the corresponding user information of detection user identifier meets the corresponding intelligent contract of device identification, and full
In the case of foot, the corresponding intelligent contract of performance objective equipment;In the case of ungratified, refusal performance objective equipment is corresponding
Intelligent contract.
In a kind of mode in the cards, target device included by the corresponding intelligent contract of target device enables bar
Part includes trading rules, and trading rules can be used for the amount of money, the user institute to transfer accounts needed for regulation user to assets transmitter
Cash pledge that need to be paid etc., the corresponding user information of user identifier include the Transaction Information for trading rules feedback.If transaction letter
Breath is matched with trading rules, it is determined that user information meets the conditions for use of target device, the corresponding intelligence of performance objective equipment
Contract.
For example, the amount of money that trading rules provide to transfer accounts needed for user to assets transmitter is 100 bit coin, and is handed over
Easy information includes the record of transferring accounts that the corresponding user of user identifier has turned 80 bit coin to the assets transmitter of target device, then
Transaction Information is mismatched with trading rules, and user information is unsatisfactory for the conditions for use of target device.If Transaction Information includes user
Identify the record of transferring accounts that corresponding user has turned 120 bit coin to the assets transmitter of target device, then Transaction Information is with handing over
Easy rule match, user information meet the conditions for use of target device.
It should be noted that the bit coin in the embodiment of the present invention is a kind of ideal money, Transaction Information and trading rules
The units of transfer amounts be not limited to bit coin.
Step S306, if the user information meets the conditions for use of the target device, control releases the target
The lock-out state of equipment.
The specific implementation process of step S306 can be found in shown in Fig. 2 in step S203 specific descriptions, it is no longer superfluous herein
State.
In the embodiment shown in fig. 3, the registration request sent according to management terminal, the corresponding intelligence of generation target device
Contract, and registered to block chain, when enabling request of user terminal transmission is being received, user's mark is obtained from block chain
Know corresponding user information and target device and correspond to conditions for use included by intelligent contract, and meet to enable in user information
In the case of condition, control releases the lock-out state of target device, with the user so as to fulfill user terminal to target device
Assets transmitter between the transfer of point-to-point property rights, the property rights transfer realized by block chain has higher flexibility and can
By property.
Refer to Fig. 4, be the flow diagram of another information processing method provided in an embodiment of the present invention, with Fig. 2 or
Step identical Fig. 3 can be found in the specific descriptions of Fig. 2 or Fig. 3, and the method shown in Fig. 4 can include but is not limited to following steps:
Step S401, receives the contract that user terminal is sent and checks request, the contract checks that request carries target device
Device identification.
Information processor receives the contract that user terminal is sent and checks request, which checks that request carries target device
Device identification.
The user of user terminal, i.e. user can send contract to information processor and look into before using target device
See request, which checks that request carries the device identification of target device.
User terminal can check request by being scanned for target device to information processor transmission contract, also by pin
Target device is determined to the selection instruction of multiple equipment, then sending contract to information processor checks request.
Step S402, obtains the corresponding intelligent contract of the device identification from block chain.
Information processor obtains the corresponding intelligent contract of device identification from block chain, that is, it is corresponding to obtain target device
Intelligent contract.
Specifically, information processor obtains target device when receiving the contract and checking request from block chain
The corresponding intelligent contract of device identification.The corresponding intelligent contract of device identification of target device is by information processor according to management
Terminal send registration request generation, reference can be made in embodiment illustrated in fig. 3 step S301- steps S303 specific descriptions.
Step S403, the corresponding intelligent contract of the device identification is sent to the user terminal.
Information processor sends the corresponding intelligent contract of device identification of target device to user terminal.
Step S404, receives the user identifier that user terminal is sent for the corresponding intelligent contract of the device identification and corresponds to
User information.
Information processor receives the user identifier that user terminal is sent for the corresponding intelligent contract of the device identification
Corresponding user information.Wherein, the corresponding user information of user identifier can be directed to the corresponding intelligence of target device including user
Cash pledge that contract is paid, the amount of money transferred accounts and what is inputted default be used to open unlocking information of coded lock etc..
Step S405, the corresponding user information of the user identifier is registered to block chain.
Information processor registers the corresponding user information of user identifier to block chain.
Step S406, receives enable request of the user terminal to the target device that is in the lock state, described
Enabling request includes the user identifier of the user terminal and the device identification of target device.
Step S407, the corresponding intelligent contract of the device identification is obtained from the block chain, and obtains the user
Corresponding user information is identified, the intelligence contract includes the conditions for use of the target device.
Step S408, if the user information meets the conditions for use of the target device, control releases the target
The lock-out state of equipment.
The specific implementation process of step S406- steps S408 can be found in shown in Fig. 2 in step S201- steps S203 tool
Body describes, and details are not described herein.
In the embodiment shown in fig. 4, the corresponding user information of user identifier that user terminal is sent is registered to block
Chain, is receiving when enabling request of user terminal transmission, obtained from block chain the corresponding user information of user identifier and
Target device corresponds to the conditions for use included by intelligent contract, and in the case where user information meets conditions for use, control solution
Except the lock-out state of target device, with the point between the assets transmitter of the user so as to fulfill user terminal to target device
To a property rights transfer, the property rights transfer realized by block chain has higher flexibility and reliability.
As a kind of optional embodiment, information processor receives user terminal to the target device that is in the lock state
Enable request, this enable request include user terminal user identifier and target device device identification;Information processor
Obtain the corresponding intelligent contract of device identification from block chain, to the corresponding intelligent contract of user terminal pushing equipment mark, i.e., to
The corresponding intelligent contract of user terminal push target device, the intelligence contract include the conditions for use of target device;User terminal
User operated accordingly for the corresponding intelligent contract of device identification, user terminal is according to these operation generation user's marks
Know corresponding user information, and send it to information processor;Information processor receives user terminal and is directed to equipment mark
Know the corresponding user information of user identifier that corresponding intelligent contract is sent, the corresponding user information of user identifier is registered to area
Block chain;Then information processor obtains the corresponding user information of user identifier from block chain, and in the corresponding use of user identifier
In the case that family information meets the corresponding conditions for use of target device, control releases the lock-out state of target device.
The embodiment is that embodiment illustrated in fig. 4 user terminal is enabled in transmission please with embodiment illustrated in fig. 4 difference
Obtain the corresponding intelligent contract of target device before asking, the embodiment information processor receive enable request when, to user
The corresponding intelligent contract of terminal push target device.
Fig. 5 is referred to, is a kind of structure diagram of information processor provided in an embodiment of the present invention, the information processing
Device may include:
Receiving unit 501, it is described to open for receiving enable request of the user terminal to the target device that is in the lock state
Include the user identifier of the user terminal and the device identification of the target device with request;
Acquiring unit 502, for obtaining the corresponding intelligent contract of the device identification from block chain, and obtains the use
Family identifies corresponding user information, and the intelligence contract includes the conditions for use of the target device;
Unlocking unit 503, if meeting the conditions for use of the target device for the user information, control releases institute
State the lock-out state of target device.
Embodiment according to embodiments of the present invention, the step S201- steps that the information processing method shown in Fig. 2 is related to
Rapid S203 can be the unit in information processor as shown in Figure 5 to perform.For example, the step S201- in Fig. 2
S203 can be respectively by the receiving unit 501 shown in Fig. 5, acquiring unit 502, and unlocking unit 503 performs respectively.
In a kind of possible implementation, receiving unit 501 is additionally operable to receiving user terminal to being in the lock state
Target device enable request before, receive management terminal be directed to the target device send registration request, the registration please
Asking includes the lease condition of the target device.
Information processor shown in Fig. 5 may also include:
Generation unit, is closed for generating the corresponding intelligence of the target device according to the lease condition of the target device
About;
Registration unit, for registering the corresponding intelligent contract of the target device to the block chain.
In a kind of possible implementation, the receiving unit 501 is additionally operable to receiving user terminal in locking shape
The target device of state enable request before, receive the contract that the user terminal is sent and check request, the contract, which is checked, asks
Ask the device identification for carrying the target device.
Information processor shown in Fig. 5 may also include:
Transmitting element, for sending the corresponding intelligent contract of the device identification obtained from block chain to the use
Family terminal.
The receiving unit 501 is additionally operable to receive the user terminal for the corresponding intelligent contract hair of the device identification
The corresponding user information of the user identifier sent.
The registration unit is additionally operable to register the corresponding user information of the user identifier to block chain.
In a kind of possible implementation, the acquiring unit 502 is obtaining the corresponding user's letter of the user identifier
Before breath, the transmitting element is additionally operable to push the corresponding intelligent contract of the device identification to the user terminal.
The receiving unit 501 is additionally operable to receive the user terminal for the corresponding intelligent contract hair of the device identification
The corresponding user information of the user identifier sent.
The registration unit is additionally operable to register the corresponding user information of the user identifier to block chain.
In a kind of possible implementation, the conditions for use included by the intelligence contract includes trading rules, described
User information includes the Transaction Information for trading rules feedback;If being used for the user information in the unlocking unit 503 expires
The conditions for use of the foot target device, then before control releases the lock-out state of the target device, at the information shown in Fig. 5
Reason device may also include:
Detection unit, for detecting whether the Transaction Information matches with the trading rules;
Determination unit, if being matched for the Transaction Information with the trading rules, it is determined that the user information meets
The conditions for use of the target device.
In a kind of possible implementation, the unlocking unit 503, which is specifically used for sending to the target device, to be unlocked
Instruction, the unlock instruction are used for the lock-out state for indicating that the target device releases the target device.
In a kind of possible implementation, the user information includes checking information, and the unlocking unit 503 is specifically used
In sending checking information to the target device, the checking information indicates that the target device is receiving user's end
Hold send checking request when, to the user terminal carry out authentication, and authentication by when, release the target
The lock-out state of equipment.
Fig. 6 is referred to, is the structure diagram of another information processor provided in an embodiment of the present invention.At the information
Reason device can include:One or more processors 601;One or more input equipments 602, one or more output equipments
603 and memory 604.Above-mentioned processor 601, input equipment 602, output equipment 603 and memory 604 are connected by bus 605
Connect.Memory 604 is used to store computer program, and the computer program includes programmed instruction, and processor 601 is deposited for execution
The programmed instruction that reservoir 604 stores.Wherein, processor 601 is arranged to call described program instruction to perform:
It should be appreciated that in embodiments of the present invention, alleged processor 601 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 602 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc., output equipment 603 can include display (LCD etc.), loudspeaker etc..
The memory 604 can include read-only storage and random access memory, and to processor 601 provide instruction and
Data.The a part of of memory 604 can also include nonvolatile RAM.For example, memory 604 can also be deposited
Store up the information of device type.
In embodiments of the present invention, loaded by processor 601 and perform stored in computer-readable storage medium one or one
Bar above instructions, to realize the corresponding steps of method flow shown in above-mentioned Fig. 2, Fig. 3 or Fig. 4;In the specific implementation, computer stores
One in medium or one or more instruction are loaded by processor 601 and perform following steps:
Enable request of the user terminal to the target device that is in the lock state is received, described enable asks to include the use
The device identification of the user identifier of family terminal and the target device;
The corresponding intelligent contract of the device identification is obtained from block chain, and obtains the corresponding user of the user identifier
Information, the intelligence contract include the conditions for use of the target device;
If the user information meets the conditions for use of the target device, control releases the locking of the target device
State.
In a kind of possible implementation, processor 601, which performs, receives user terminal to the target that is in the lock state
Equipment enable request before, also perform:
Receive management terminal and be directed to the registration request that the target device is sent, the registration request is set including the target
Standby lease condition;
The corresponding intelligent contract of the target device is generated according to the lease condition of the target device;
The corresponding intelligent contract of the target device is registered to the block chain.
In a kind of possible implementation, processor 601, which performs, receives user terminal to the target that is in the lock state
Equipment enable request before, also perform:
Receive the contract that the user terminal is sent and check request, the contract checks that request carries the target device
Device identification;
The corresponding intelligent contract of the device identification is obtained from the block chain;
The corresponding intelligent contract of the device identification is sent to the user terminal;
The user identifier that the user terminal is sent for the corresponding intelligent contract of the device identification is received to correspond to
User information;
The corresponding user information of the user identifier is registered to block chain.
In a kind of possible implementation, processor 601 perform obtain the corresponding user information of the user identifier it
Before, also perform:
The corresponding intelligent contract of the device identification is pushed to the user terminal;
The user identifier that the user terminal is sent for the corresponding intelligent contract of the device identification is received to correspond to
User information;
The corresponding user information of the user identifier is registered to block chain.
In a kind of possible implementation, the conditions for use included by the intelligence contract includes trading rules, described
User information includes the Transaction Information for trading rules feedback;If processor 601, which performs the user information, meets the mesh
The conditions for use of marking device, then before control releases the lock-out state of the target device, also perform:
Detect whether the Transaction Information matches with the trading rules;
If the Transaction Information is matched with the trading rules, it is determined that the user information meets the target device
Conditions for use.
In a kind of possible implementation, when processor 601 performs the lock-out state of the control releasing target device,
Specific perform to the target device sends unlock instruction, and the unlock instruction is used to indicate that the target device releases the mesh
The lock-out state of marking device.
In a kind of possible implementation, the user information includes checking information, and processor 601 performs control and releases
During the lock-out state of the target device, checking information is sent to the target device, the checking information is used to indicate described
Target device is when receiving the checking request that the user terminal is sent, to user terminal progress authentication, and
Authentication by when, release the lock-out state of the target device.
It should be noted that some embodiments not being described in detail can be found in other corresponding implementations in the embodiment of the present invention
The specific descriptions of example.For example, device embodiment can be found in the specific descriptions of corresponding method embodiment.
It should be noted that for foregoing each embodiment of the method, in order to be briefly described, therefore it is all expressed as to a system
The combination of actions of row, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because
For according to the present invention, certain some step can use other orders or be carried out at the same time.Secondly, those skilled in the art also should
Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily this hair
Necessary to bright.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Unit in device of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The above disclosed right for being only the section Example of the present invention, the present invention cannot being limited with this certainly
Scope, one of ordinary skill in the art will appreciate that realize all or part of flow of above-described embodiment, and according to right of the present invention
It is required that the equivalent variations made, still fall within and invent covered scope.