CN108270863B - After-sale service authenticity verification method based on Internet of things - Google Patents

After-sale service authenticity verification method based on Internet of things Download PDF

Info

Publication number
CN108270863B
CN108270863B CN201810056678.XA CN201810056678A CN108270863B CN 108270863 B CN108270863 B CN 108270863B CN 201810056678 A CN201810056678 A CN 201810056678A CN 108270863 B CN108270863 B CN 108270863B
Authority
CN
China
Prior art keywords
internet
user
things
application server
sales
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810056678.XA
Other languages
Chinese (zh)
Other versions
CN108270863A (en
Inventor
罗孝琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Hualong Xunda Software Co., Ltd
Original Assignee
Zhuhai Hualong Xunda Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Hualong Xunda Software Co Ltd filed Critical Zhuhai Hualong Xunda Software Co Ltd
Priority to CN201810936619.1A priority Critical patent/CN108833598B/en
Priority to CN201810056678.XA priority patent/CN108270863B/en
Publication of CN108270863A publication Critical patent/CN108270863A/en
Application granted granted Critical
Publication of CN108270863B publication Critical patent/CN108270863B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to an after-sale service authenticity verification method based on the Internet of things.A server registers after-sale personnel, first Internet of things equipment, a user, second Internet of things equipment and public Internet of things equipment respectively; when the after-sales personnel pass through the coverage range of the public Internet of things equipment on the planned path, the application server sends a verification instruction to the after-sales personnel communication equipment so that the after-sales personnel communication equipment can detect the corresponding public Internet of things equipment, and authenticity verification is carried out on the way; after the user location is reached, the first Internet of things device is detected through the user communication device, the second Internet of things device is detected through the after-sales personnel communication device, and the application server conducts security verification and after-sales service activity authorization according to a detection result. The invention not only facilitates the remote monitoring and management of the after-sales personnel, but also greatly improves the safety of the after-sales service, and is particularly suitable for users and use scenes with higher requirements on confidentiality and safety.

Description

After-sale service authenticity verification method based on Internet of things
Technical Field
The invention relates to the field of Internet of things and after-sale services, in particular to an after-sale service authenticity verification method based on the Internet of things.
Background
With the development of society, the sales range of enterprise products is greatly expanded. Certain products and services often require subsequent after-market service. In addition to answering over the telephone or network, certain after-market service personnel often require home service. At present, most enterprises distribute after-sales services in a manual mode, and the state of after-sales service staff in the way is difficult to track, so that corresponding management problems are brought, and the improvement of the working efficiency of the after-sales services is not facilitated. Some after-sales solutions perform location monitoring and confirmation after completion of tasks through mobile communication technology, but since these solutions are only determined based on corresponding smart phones, it is also difficult to verify the authenticity of after-sales service personnel during the service process.
For example, chinese patent publication CN102752712 discloses a real-time status tracking system and method for a mobile after-sale cloud service platform, in which a maintenance order status detection module and a real-time tracking module are arranged on a wireless communication mobile terminal, and a back-end manager manages and schedules maintenance personnel according to the status of the maintenance order and the location information of the maintenance personnel. The scheme can improve the distribution efficiency of the maintenance task to a certain extent, but the scheme does not solve the problem of verifying the authenticity of after-sales service personnel in the service process.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an after-sales service authenticity verification method based on the Internet of things, which comprises the following steps: the application server registers the after-sales personnel, the first Internet of things equipment related to the after-sales personnel, the user, the second Internet of things equipment related to the user and the public Internet of things equipment respectively;
when the after-sales personnel pass through the coverage range of the public Internet of things equipment on the planned path, the application server sends a verification instruction to the after-sales personnel communication equipment so that the after-sales personnel communication equipment can detect the corresponding public Internet of things equipment, and authenticity verification is carried out on the way;
after the after-sales personnel arrive at the user position, the first Internet of things device is detected through the user communication device, the second Internet of things device is detected through the after-sales personnel communication device, and the application server conducts security verification and after-sales service activity authorization according to the detection result.
According to a preferred embodiment, the method comprises the steps of:
s1) the application server registers the after-sales person, the first internet-of-things device related to the after-sales person, the user, the second internet-of-things device related to the user, and the public internet-of-things device, respectively, and the step S1 includes:
s1.1) registering after-sales personnel and first Internet of things equipment by an application server, and storing identification information of the after-sales personnel, communication equipment information of the after-sales personnel and first Internet of things equipment information to a storage server in a classified manner;
s1.2) the application server responds to a registration instruction related to user registration to retrieve the identification information and the communication equipment information of the user and register the user;
s1.3) the application server detects and registers second networking equipment related to the user;
s1.4) the storage server stores the identification information of the user, the user communication equipment information and the second networking equipment information in a classified manner;
s1.5) detecting and registering public Internet of things equipment by an application server;
s2) the application server initializes the service request after receiving the after-sales service request of the user, the step S2 includes:
s2.1) after receiving an after-sale service request sent by a user through user communication equipment, detecting second networking equipment which is related to the user and is positioned in the range of the user communication equipment by an application server;
s2.2) the application server performs task allocation and path planning according to the service request of the user and by combining the identification information, busy and idle states and geographical position information of the after-sales personnel, and then sends the task information to the communication equipment of the after-sales personnel;
s2.3) after the after-sales personnel confirm the after-sales tasks, the application server respectively authorizes the first Internet of things device, the second Internet of things device and the public Internet of things device located on the planned path;
s3) when the after-sales personnel pass through the coverage range of the public Internet of things equipment on the planned path, the application server sends a verification instruction to the after-sales personnel communication equipment so that the after-sales personnel communication equipment can detect the corresponding public Internet of things equipment, and authenticity verification is carried out on the path;
s4) after the after-sales person arrives at the user location, detecting a first internet-of-things device through the user communication device, and detecting a second internet-of-things device through the after-sales person communication device, where the application server performs security verification and after-sales service activity authorization according to a detection result, and the step S4 includes:
s4.1) the user communication equipment responds to an instruction sent by the application server to generate a first verification code, and the after-sales personnel communication equipment responds to the instruction sent by the application server to generate a second verification code;
s4.2) after the after-sales personnel arrive at the user position, the application server sends a second verification password to the user communication equipment and sends a first verification password to the after-sales personnel communication equipment, and the user and the after-sales personnel judge whether the first verification password is matched with the second verification password;
s4.3) the user communication equipment responds to the instruction sent by the application server to detect the first Internet of things equipment and sends the obtained first verification data to the application server; the after-sales personnel communication equipment responds to an instruction sent by the application server to detect second networking equipment and sends the obtained second verification data to the application server;
and S4.4) the application server compares the first detection data and the second detection data with the first Internet of things equipment information and the second Internet of things equipment information stored in the storage server respectively, so that safety verification is performed.
According to a preferred embodiment, step S3 further includes: the public Internet of things equipment carries out short-range communication with first Internet of things equipment located in a communication coverage range of the public Internet of things equipment, and a communication verification result is sent to the application server through the after-sales personnel communication equipment, so that the identity of the after-sales personnel is verified.
According to a preferred embodiment, further comprising: after the application server initializes the after-sales service request, the application server periodically or irregularly sends a temporary verification instruction to the after-sales personnel communication equipment, the after-sales personnel communication equipment transmits verification data to the application server, and the application server evaluates the working state of the after-sales personnel based on standard data pre-stored in the storage server, wherein the verification data comprises photos, audio, position information and pulse information, and the standard data comprises geographic position data, audio data, pulse data and face data of the after-sales personnel.
According to a preferred embodiment, the first and second networked devices comprise an adaptation layer and a link layer, the link layer comprising an NFC mapping unit requesting a link layer node ID by the adaptation layer, the NFC mapping unit returning the link layer node ID to the adaptation layer in response to a request sent by the adaptation layer to maintain continuity of the IP connection.
According to a preferred embodiment, the IP connection is checked by the adaptation layer and the result of the check is sent to the NFC mapping unit;
upon requesting an IP connection, the NFC mapping unit returns the link layer node ID stored in the cache to the adaptation layer.
According to a preferred embodiment, when no link layer node ID exists in the cache, the NFC mapping unit generates and stores a new link layer node ID in the cache, and returns the newly generated link layer node ID to the adaptation layer.
The invention has the following beneficial effects:
the invention can remotely monitor the position information and the working state of the after-sales personnel, and can interact with the after-sales personnel communication equipment and the first networking equipment through the public Internet of things equipment on the way, thereby verifying the authenticity of the after-sales personnel on the way. The management personnel can monitor and manage the after-sales personnel conveniently, and the loophole that the after-sales personnel look for a third party class is avoided. After the after-sales personnel reach the user designated position, cross detection is carried out between the user communication equipment and the first Internet of things equipment and between the after-sales personnel communication equipment and the second Internet of things equipment, and the application server carries out security verification and after-sales service activity authorization according to the detection result, so that the security of the after-sales service activity can be improved, and the after-sales management client, the user and the after-sales personnel can conveniently carry out after-sales service recording and archiving. Therefore, the invention not only facilitates the remote monitoring and management of the after-sales personnel, but also greatly improves the safety of the after-sales service, and is particularly suitable for users and use scenes with higher requirements on confidentiality and safety.
Drawings
FIG. 1 schematically illustrates a method flow diagram of the present invention;
FIG. 2 is a schematic diagram of a system connection for performing the method of the present invention;
fig. 3 is a diagram of a communication protocol stack layer structure of an internet of things device in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 2, the after-sales service system for executing the method of the present invention includes an application server, a storage server, an after-sales person communication device, a user communication device, a first internet-of-things device, a second internet-of-things device, a public internet-of-things device, and an after-sales management client. The application server is mainly used for functions of registration of related personnel and equipment, after-sale task allocation, path planning, authenticity verification, safety verification, judgment and the like. The storage server is used for storing identification information of the after-sales personnel and the user, equipment information of the after-sales personnel communication equipment, the user communication equipment, the first networking equipment and the second networking equipment, and related recording information of the after-sales service. The after-market personal communication device and the user communication device are smart communication devices with operating systems, such as smart phones, tablet computers, smart wearable devices, and the like.
The first Internet of things equipment refers to Internet of things equipment related to after-sales personnel; the second networking equipment refers to the equipment of the Internet of things related to the user. The internet of things equipment comprises a smart phone, smart wearable equipment, clothes containing an IOT device and the like, and in addition, the internet of things equipment further comprises a sensor/detection device capable of detecting a bar code, an RFID tag and the like in the communication equipment. In addition, the second internet-of-things device can also be an office-related internet-of-things device which is at the user position and authorized by the user, such as a smart printer, an entrance guard device, a gateway, a notebook computer and the like.
The public internet of things equipment refers to public internet of things equipment located in public places in the way, such as intelligent street lamps, intelligent gateways and other equipment with communication modules and sensors related to smart cities.
It should be noted that, in practical applications, the post-sale person communication device, the first internet of things device, the user communication device, the second internet of things device and the public internet of things device are usually multiple, and fig. 2 only exemplarily expresses a single case for convenience of representation. In addition, the first internet of things equipment matched with the after-sales personnel communication equipment is not limited to one-to-one relationship, and the after-sales personnel communication equipment can be matched with a plurality of first internet of things equipment. Similarly, the user communication device can also be matched with a plurality of second networked devices, for example, when the user is in the office, the user communication device can simultaneously communicate with a plurality of intelligent devices in the office.
The user communication device and the after-market personnel communication device are each connected to the medical application server via a communication network, including a Local Area Network (LAN), a Wide Area Network (WAN), the internet, a wireless network, and the like. The aforementioned communication devices include, but are not limited to: smart phones, smart tablet computers, smart wearable devices with communication functions, and the like. The user communication equipment and the after-sales personnel communication equipment comprise sensors/detection devices, and the sensors/detection devices specifically comprise a bar code reader, an RFID reader, a temperature sensor, an infrared sensor, a video retrieval device and the like. The public internet of things equipment can respond to the request of the application server to communicate with the application server, and optionally, the public internet of things equipment can also communicate with the after-sales personnel communication equipment and/or the first internet of things equipment within the coverage range of the public internet of things equipment, so that the after-sales personnel can be conveniently authenticated on the way. The public internet of things equipment, the after-sales personnel communication equipment and the first internet of things equipment are usually connected through a wireless network, and the communication modes comprise WiFi, Bluetooth, ZigBee and the like. The after-sale management client is in communication connection with the application server and is used for issuing tasks, monitoring and managing the after-sale personnel, evaluating the working states of the after-sale personnel and the like by the after-sale management personnel.
After-sale personnel identification information is characteristic information of after-sale personnel, and the characteristic information comprises: name, gender, age, skill level, adequacy range, after-sales service range, etc. of the after-sales person.
The user identification information is characteristic information of a user, and comprises the following steps: purchased product or service information, general geographic location, user's name, gender, age, user rating, etc.
Example 1
As shown in fig. 1, the method for verifying the authenticity of after-sales service based on internet of things of the present invention comprises the following steps:
s1: the application server registers the after-sales personnel, the first Internet of things equipment related to the after-sales personnel, the user, the second Internet of things equipment related to the user and the public Internet of things equipment respectively. Specifically, the steps include:
s1.1: the application server registers the after-sales personnel and the first Internet of things equipment, and stores the identification information of the after-sales personnel, the after-sales personnel communication equipment information and the first Internet of things equipment information to the storage server in a classified mode.
S1.2: the application server retrieves identification information and communication device information of the user and registers the user in response to a registration instruction related to user registration.
S1.3: the application server detects and registers a second networked device associated with the user.
S1.4: and the storage server classifies and stores the identification information of the user, the user communication equipment information and the second networking equipment information.
S1.5: the application server detects and registers the public Internet of things equipment. The public internet of things equipment refers to public internet of things equipment located on the way, and includes but is not limited to: intelligent street lamp, intelligent gateway to and other thing networking equipment or the sensor relevant with the wisdom city.
S2: after receiving the after-sales service request of the user, the application server initializes the service request. Specifically, the steps include:
s2.1: after receiving a service request sent by a user through the user communication equipment, the application server detects a second networking equipment which is related to the user and is positioned in the range of the user communication equipment.
S2.2: and the application server performs task allocation and path planning according to the service request of the user and by combining the identification information, the busy and idle states and the geographical position information of the after-sales personnel, and then sends the task information to the communication equipment of the after-sales personnel.
S2.3: after the after-sales personnel confirm the after-sales tasks, the application server respectively authorizes the first internet of things device, the second internet of things device and the public internet of things device located on the planned path.
S3: when the after-sales personnel pass through the coverage range of the public Internet of things equipment on the planned path, the application server sends a verification instruction to the after-sales personnel communication equipment, so that the after-sales personnel communication equipment detects the corresponding public Internet of things equipment, and authenticity verification is performed on the way. Optionally, the public internet of things device can also perform short-range communication with the first internet of things device of the after-sales person, and send the communication verification result to the application server via the after-sales person communication device, so as to verify the identity of the after-sales person.
S4: after the after-sales personnel arrive at the user position, the first Internet of things device is detected through the user communication device, the second Internet of things device is detected through the after-sales personnel communication device, and the application server conducts security verification and after-sales service activity authorization according to the detection result. Specifically, the method comprises the following steps:
s4.1: the user communication equipment responds to an instruction sent by the application server to generate a first verification code, and the after-sales personnel communication equipment responds to the instruction sent by the application server to generate a second verification code.
S4.2: after the after-sales person arrives at the user position, the application server sends a second verification password to the user communication equipment and sends a first verification password to the after-sales person communication equipment, and the user and the after-sales person judge whether the first verification password is matched with the second verification password.
S4.3: the user communication equipment responds to an instruction sent by the application server to detect first Internet of things equipment and sends obtained first verification data to the application server; the after-sales person communication device detects the second networked device in response to an instruction issued by the application server, and transmits the obtained second verification data to the application server.
S4.4: the application server compares the first detection data and the second detection data with the first internet of things equipment information and the second internet of things equipment information stored in the storage server respectively, and therefore safety verification is conducted. After the security verification passes, the application server authorizes the after-sales service activity.
By the method, the authenticity of the identity of the post-sale personnel is verified in the road, and the vulnerability of counterfeiting by simulating the geographical position through software is effectively avoided. After the after-sales personnel reach the user designated position, cross detection is carried out between the user communication equipment and the first Internet of things equipment and between the after-sales personnel communication equipment and the second Internet of things equipment, and the application server carries out security verification and after-sales service activity authorization according to the detection result, so that the security of the after-sales service activity can be improved, and the after-sales management client, the user and the after-sales personnel can conveniently carry out after-sales service recording and archiving.
Example 2
As an improvement or supplement to embodiment 1, when the after-sales person passes through the coverage area of the public internet-of-things device on the planned path, the public internet-of-things device can also perform short-range communication with the first internet-of-things device of the after-sales person, and send the communication verification result to the application server via the after-sales person communication device, so as to verify the identity of the after-sales person. In this example, the first internet of things device is a smart wearable device that contains after-market personnel identity information, such as smart glasses, a smart watch, a workcard containing sensors and a communication module, clothing, and the like.
Through communication between the communication equipment of the after-sales personnel and the public Internet of things equipment, the vulnerability of simulating the corresponding position through the system simulator to perform geographic position counterfeiting can be effectively avoided. On this basis, because first thing networking equipment contains the identity information of personnel after sale, carry out short range communication through public thing networking equipment and corresponding first thing networking equipment, just can verify personnel's after sale authenticity.
Example 3
As an improvement or addition to embodiments 1, 2, this embodiment is particularly suitable for data transmission and authentication services by NFC.
NFC technology is an enhanced technology of mutual communication based on Radio Frequency Identification (RFID) technology. In addition to streaming services for transmitting multimedia or files, NFC technology can be used for payment services, licensing services, and authentication services.
The IPv6 address includes a most significant 64-bit prefix address and an Interface Identifier (IID) corresponding to a 64-bit region. The IID may be a device Identification (ID) for identification in the home network. The IPv6 address can provide an upper 64-bit prefix for network identification and form a globally unique address of 128 bits in total. In the case of communication using the NFC technology, a 6-bit node corresponding to an NFC link layer address is an address obtained by logically and temporarily generating a physical address. Therefore, each time a connection between the same devices is attempted, different IIDs are generated from different node IDs. Therefore, whenever a connection is performed, communication is performed using a different IPv6 address.
The aforementioned operating mode, when used for NFC-based services requiring data transmission or authentication by multiple contacts, suffers from the following problems: when there is no IP connection due to external interference or network abnormality, two communication terminals need to perform data transmission anew from the beginning. This may increase the time to authenticate the service, resulting in a poor user experience. More seriously, if external interference or network abnormality is caused by hacking, the retransmitted data has a security risk of being completely acquired by a third party under the condition that the data transmission rule of the internet of things device is not particularly encrypted.
As shown in fig. 3, the protocol stacks of the first and second networked devices in the present invention include: a physical layer, a link layer, an NFC adaptation layer, a network layer and an application layer. The link layer comprises an NFC mapping unit, the link layer node ID is requested through the adaptation layer, and the NFC mapping unit responds to the request sent by the adaptation layer and returns the link layer node ID to the adaptation layer so as to maintain the continuity of the IP connection.
The NFC mapping unit may bind a logical link layer address of NFC to the adaptation layer. For example, the NFC mapping unit may send a 6-bit node ID address of a logical link layer address used to generate an Interface Identifier (IID) for IPv6 to the adaptation layer. The NFC mapping unit is also capable of performing caching of logical link layer addresses to maintain IP continuity of network connection requests at the network layer.
Specifically, the IP connection is checked by the adaptation layer and the check result is sent to the NFC mapping unit. Upon requesting an IP connection, the NFC mapping unit returns the link layer node ID stored in the cache to the adaptation layer. When the link layer node ID does not exist in the cache, the NFC mapping unit generates and stores a new link layer node ID in the cache, and returns the newly generated link layer node ID to the adaptation layer.
Therefore, when the first and second networked devices perform data transmission and authentication service through NFC, the first and second networked devices can be matched with the authentication method, the user is allowed to perform the authentication service in a multi-contact mode, the continuity of IP connection of the networked devices can be effectively maintained, and the efficiency and the safety of the authentication service are improved.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present invention, and all such changes or substitutions are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (2)

1. An after-sale service authenticity verification method based on the Internet of things is characterized by comprising the following steps:
s1) the application server registers the after-sales person, the first Internet of things device related to the after-sales person, the user, the second Internet of things device related to the user and the public Internet of things device respectively, wherein the first Internet of things device and the second Internet of things device comprise intelligent wearable devices and clothes containing IOT devices; the protocol stacks of the first and second networked devices comprise: the system comprises a physical layer, a link layer, an NFC adaptation layer, a network layer and an application layer, wherein the link layer comprises an NFC mapping unit, the NFC mapping unit can bind a logical link layer address of NFC to the adaptation layer and request a link layer node ID through the adaptation layer, and the NFC mapping unit responds to a request sent by the adaptation layer and returns the link layer node ID to the adaptation layer so as to maintain the continuity of IP connection; when IP connection is requested, the NFC mapping unit returns the link layer node ID stored in the cache to the adaptation layer; when the link layer node ID does not exist in the cache, the NFC mapping unit generates and stores a new link layer node ID in the cache, and returns the newly generated link layer node ID to the adaptation layer; step S1 includes:
s1.1) registering after-sales personnel and first Internet of things equipment by an application server, and storing identification information of the after-sales personnel, communication equipment information of the after-sales personnel and first Internet of things equipment information to a storage server in a classified manner;
s1.2) the application server responds to a registration instruction related to user registration to retrieve the identification information and the communication equipment information of the user and register the user;
s1.3) the application server detects and registers second networking equipment related to the user;
s1.4) the storage server stores the identification information of the user, the user communication equipment information and the second networking equipment information in a classified manner;
s1.5) detecting and registering public Internet of things equipment by an application server;
s2) the application server initializes the service request after receiving the after-sales service request of the user, the step S2 includes:
s2.1) after receiving an after-sale service request sent by a user through user communication equipment, detecting second networking equipment which is related to the user and is positioned in the range of the user communication equipment by an application server;
s2.2) the application server performs task allocation and path planning according to the service request of the user and by combining the identification information, busy and idle states and geographical position information of the after-sales personnel, and then sends the task information to the communication equipment of the after-sales personnel;
s2.3) after the after-sales personnel confirm the after-sales tasks, the application server respectively authorizes the first Internet of things device, the second Internet of things device and the public Internet of things device located on the planned path;
s3) when the after-sales personnel pass through the coverage range of the public Internet of things equipment on the planned path, the application server sends a verification instruction to the after-sales personnel communication equipment so that the after-sales personnel communication equipment can detect the corresponding public Internet of things equipment, and authenticity verification is carried out on the path;
s4) after the after-sales person arrives at the user location, detecting a first internet-of-things device through the user communication device, and detecting a second internet-of-things device through the after-sales person communication device, where the application server performs security verification and after-sales service activity authorization according to a detection result, and the step S4 includes:
s4.1) the user communication equipment responds to an instruction sent by the application server to generate a first verification code, and the after-sales personnel communication equipment responds to the instruction sent by the application server to generate a second verification code;
s4.2) after the after-sales personnel arrive at the user position, the application server sends a second verification password to the user communication equipment and sends a first verification password to the after-sales personnel communication equipment, and the user and the after-sales personnel judge whether the first verification password is matched with the second verification password;
s4.3) the user communication equipment responds to the instruction sent by the application server to detect the first Internet of things equipment and sends the obtained first verification data to the application server; the after-sales personnel communication equipment responds to an instruction sent by the application server to detect second networking equipment and sends the obtained second verification data to the application server;
and S4.4) the application server compares the first verification data and the second verification data with the first Internet of things equipment information and the second Internet of things equipment information stored in the storage server respectively, so that safety verification is performed.
2. The method according to claim 1, wherein step S3 further comprises: the public Internet of things equipment carries out short-range communication with the first Internet of things equipment located in the communication coverage range of the public Internet of things equipment, and a communication verification result is sent to the application server through the after-sales personnel communication equipment, so that the identity of the after-sales personnel is verified.
CN201810056678.XA 2018-01-21 2018-01-21 After-sale service authenticity verification method based on Internet of things Active CN108270863B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810936619.1A CN108833598B (en) 2018-01-21 2018-01-21 After-sale service verification method based on Internet of Things
CN201810056678.XA CN108270863B (en) 2018-01-21 2018-01-21 After-sale service authenticity verification method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810056678.XA CN108270863B (en) 2018-01-21 2018-01-21 After-sale service authenticity verification method based on Internet of things

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201810936619.1A Division CN108833598B (en) 2018-01-21 2018-01-21 After-sale service verification method based on Internet of Things

Publications (2)

Publication Number Publication Date
CN108270863A CN108270863A (en) 2018-07-10
CN108270863B true CN108270863B (en) 2019-12-24

Family

ID=62776183

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810936619.1A Active CN108833598B (en) 2018-01-21 2018-01-21 After-sale service verification method based on Internet of Things
CN201810056678.XA Active CN108270863B (en) 2018-01-21 2018-01-21 After-sale service authenticity verification method based on Internet of things

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810936619.1A Active CN108833598B (en) 2018-01-21 2018-01-21 After-sale service verification method based on Internet of Things

Country Status (1)

Country Link
CN (2) CN108833598B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960870B (en) * 2018-08-21 2022-12-30 刘明德 Area management system and method based on position information

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202425046U (en) * 2011-12-14 2012-09-05 林浩恩 Handheld terminal and after-sales service system using same
CN102752712A (en) * 2012-05-20 2012-10-24 上海巨服信息科技有限公司 System and method for real-time status tracking of mobile after-sale cloud service platform
CN103220624A (en) * 2013-04-23 2013-07-24 广东欧珀移动通信有限公司 Updating method for mobile terminal system and device thereof
CN103544624A (en) * 2013-11-08 2014-01-29 中国科学院自动化研究所 Self-service after-sales service system and method
CN104066053B (en) * 2014-07-04 2017-11-14 饶渐平 A kind of mobile post-sell service method
CN105787659A (en) * 2016-02-24 2016-07-20 上海和鹰机电科技股份有限公司 Intelligent scheduling method

Also Published As

Publication number Publication date
CN108833598A (en) 2018-11-16
CN108270863A (en) 2018-07-10
CN108833598B (en) 2019-10-18

Similar Documents

Publication Publication Date Title
US11463241B2 (en) Transmitting or receiving blockchain information
US11151816B2 (en) Methods and systems for access control and awareness management
US10382946B1 (en) Providing a service with location-based authorization
CN103797858B (en) System and method for registered network bit string
US12032716B2 (en) Accessing information based on privileges
EP3905671B1 (en) Method and device for processing request
US11978053B2 (en) Systems and methods for estimating authenticity of local network of device initiating remote transaction
CN102448061A (en) Method and system for preventing phishing attack on basis of mobile terminal
CN108765905A (en) Electric power cable well lid on-line intelligence prior-warning device based on NB-IoT
CN104125230B (en) A kind of short message certification service system and authentication method
US8990887B2 (en) Secure mechanisms to enable mobile device communication with a security panel
CN108123961A (en) Information processing method, apparatus and system
CN107396362A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN108270863B (en) After-sale service authenticity verification method based on Internet of things
JP6447949B1 (en) Authentication system, authentication server, authentication method, and authentication program
CN107371160A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN107396363A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN107396295A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
KR101359659B1 (en) Management server for managing wireless sensing device, and management method thereof
CN108038705B (en) Post-sell service method based on mobile network and Internet of Things
US12081544B2 (en) Systems and methods for preventing unauthorized network access
US20220255929A1 (en) Systems and methods for preventing unauthorized network access
SE542530C2 (en) Mobile identification using thin client devices
CN116719887A (en) Distributed storage system, related method and device for passenger identification information
CN117527177A (en) Block chain-based data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20191129

Address after: 519000 unit 4, floor 1, building 2, South Software Park production and processing center, No. 1, Software Park Road, Zhuhai City, Guangdong Province

Applicant after: Zhuhai Hualong Xunda Software Co., Ltd

Address before: 628000 Xuefeng Qiaoge Road 338, Lizhou District, Guangyuan City, Sichuan Province

Applicant before: Guangyuan Measurement Technology Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant