CN110598469A - Information processing method and device and computer storage medium - Google Patents

Information processing method and device and computer storage medium Download PDF

Info

Publication number
CN110598469A
CN110598469A CN201910860693.4A CN201910860693A CN110598469A CN 110598469 A CN110598469 A CN 110598469A CN 201910860693 A CN201910860693 A CN 201910860693A CN 110598469 A CN110598469 A CN 110598469A
Authority
CN
China
Prior art keywords
check
user
request
terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910860693.4A
Other languages
Chinese (zh)
Other versions
CN110598469B (en
Inventor
何畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910860693.4A priority Critical patent/CN110598469B/en
Publication of CN110598469A publication Critical patent/CN110598469A/en
Application granted granted Critical
Publication of CN110598469B publication Critical patent/CN110598469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/12Hotels or restaurants
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses an information processing method, an information processing device and a computer storage medium, wherein the method comprises the following steps: the management equipment acquires a check-in request carrying the reserved check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request; acquiring a user public key and user check-in reservation information in the target block; checking the terminal signature carried in the check-in request according to the user public key; and if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information. By adopting the method and the device, lawless persons can be prevented from providing false information to live in the room, and the success rate and the safety of information booking are improved.

Description

Information processing method and device and computer storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to an information processing method and apparatus, and a computer storage medium.
Background
At present, when people go out and choose a hotel to check in, hotel information is mostly inquired on related application software, and the hotel is booked on line. When people arrive at a reserved hotel, hotel reservation information and an identity card need to be provided to a hotel reception desk, and the hotel reception desk checks and then handles check-in procedures.
The mode of booking the hotel has the following practical problems: with the rapid development of network technology, personal information of people is easy to be stolen, and hotel reservation information is easy to be tampered by lawbreakers, so that when people go to a hotel and check in, the situation that the reservation is unsuccessful or the order is cancelled occurs temporarily.
Disclosure of Invention
The embodiment of the application provides an information processing method, an information processing device and a computer storage medium, which can improve the success rate and the safety of information booking.
An embodiment of the present application provides an information processing method, including:
the management equipment acquires a check-in request carrying the reserved check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request;
acquiring a user public key and user check-in reservation information in the target block;
checking the terminal signature carried in the check-in request according to the user public key;
and if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information.
Wherein, the verifying the terminal signature carried in the check-in request according to the user public key comprises:
acquiring a first hash value corresponding to the user check-in reservation information in the target block;
decrypting the terminal signature by adopting the user public key to obtain a second hash value;
comparing the first hash value with the second hash value;
if the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
and if the first hash value is different from the second hash value, determining that the terminal signature is an illegal signature.
Wherein, still include:
if the terminal signature is verified to be an illegal signature, the management equipment returns failure prompt information to the request terminal;
and sending a request receiving timestamp corresponding to the check-in request, the failure prompt message, the terminal signature carried in the check-in request and the target house number to a block chain node so as to enable the block chain node to carry out uplink processing.
Wherein, the determining the check-in authority of the request terminal for the target house number according to the user check-in reservation information includes:
acquiring the check-in time and the check-out time in the user check-in reservation information in the target block;
determining the user check-in time range according to the check-in time and the check-out time;
acquiring the request receiving time stamp corresponding to the check-in request;
and if the request receiving timestamp is in the user check-in time range, determining that the request terminal has the check-in authority, and unlocking the door lock according to the check-in authority.
Wherein, still include:
when the request terminal is determined to be in a successful check-in state according to the check-in permission, actual check-in time, user information and the target house number are sent to a block chain node so that the block chain node can carry out uplink processing;
and when the request terminal successfully returns the house, controlling a door lock to be closed, and sending the actual house returning time, the user information and the target house number to the block chain node so as to enable the block chain node to carry out chain winding processing.
An embodiment of the present application provides an information processing method, including:
the method comprises the steps that a block chain node point obtains user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user;
generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time;
when an inquiry request sent by management equipment is received, acquiring the target block in the block chain according to the reserved check-in time and the target house number carried by the inquiry request;
and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
An embodiment of the present application provides an information processing apparatus, including:
the first acquisition module is used for acquiring a check-in request which is sent by a request terminal and carries a reserved check-in time by a management device, and acquiring a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request;
the second acquisition module is used for acquiring the user public key and the user check-in reservation information in the target block;
the signature verification module is used for verifying the signature of the terminal carried in the check-in request according to the user public key;
and the determining module is used for determining the check-in permission of the request terminal aiming at the target house number according to the user check-in reservation information if the terminal signature is verified to be a legal signature.
Wherein, the stick verification module includes:
an obtaining unit, configured to obtain a first hash value corresponding to the user check-in reservation information in the target block;
the decryption unit is used for decrypting the terminal signature by adopting the user public key to obtain a second hash value;
the comparison unit is used for comparing the first hash value with the second hash value;
a first determining unit, configured to determine that the terminal signature is a valid signature if the first hash value is the same as the second hash value; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
the first determining unit is further configured to determine that the terminal signature is an illegal signature if the first hash value is different from the second hash value.
Wherein, the label checking module further comprises:
the return unit is used for returning failure prompt information to the request terminal if the terminal signature is verified to be an illegal signature;
and the sending unit is used for sending the request receiving timestamp corresponding to the check-in request, the failure prompt message, the terminal signature carried in the check-in request and the target house number to a block chain node so as to enable the block chain node to carry out uplink processing.
Wherein the determining module comprises:
a first obtaining unit, configured to obtain check-in time and check-out time in the user check-in reservation information in the target block;
the second determining unit is used for determining the user check-in time range according to the check-in time and the check-out time;
a second obtaining unit, configured to obtain the request receiving timestamp corresponding to the check-in request;
the second determining unit is further configured to determine that the request terminal has the check-in authority if the request receiving timestamp is within the check-in time range of the user, and unlock the door lock according to the check-in authority.
Wherein, still include:
a first sending module, configured to send actual check-in time, user information, and the target house number to a block chain node when it is determined that the request terminal is in a check-in successful state according to the check-in permission, so that the block chain node performs uplink processing;
and the second sending module is used for controlling the door lock to be closed when the request terminal successfully returns the house, and sending the actual house returning time, the user information and the target house number to the block chain node so as to enable the block chain node to carry out chain winding processing.
An embodiment of the present application provides an information processing apparatus, including:
the first acquisition module is used for acquiring user check-in reservation information and a user public key which are sent by the service server and are associated with a reservation user;
the generating and adding module is used for generating a target block according to the user check-in reservation information and the user public key and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time;
a second obtaining module, configured to, when receiving an inquiry request sent by a management device, obtain the target block in the block chain according to the reserved check-in time and the target house number carried in the inquiry request;
and the sending module is used for sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
An aspect of an embodiment of the present application provides a computer device, including: a processor and a memory; the processor is connected with the memory, wherein the memory is used for storing a computer program, and the processor is used for calling the computer program to execute the method in the embodiment of the application.
An aspect of the embodiments of the present application provides a computer storage medium storing a computer program comprising program instructions that, when executed by a processor, perform a method as in the embodiments of the present application.
According to the embodiment of the application, a check-in request carrying the reserved check-in time sent by a request terminal is obtained through management equipment, and a target block is obtained from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request; acquiring a user public key and user check-in reservation information in the target block; checking the terminal signature carried in the check-in request according to the user public key; and if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information. Therefore, the request terminal can acquire the user public key and the user check-in reservation information in the block chain, but the user check-in reservation information and the user public key on the block chain cannot be changed or illegally tampered once being determined, and the terminal signature of the request terminal is generated by encrypting the private key of the request terminal, so that the management device can confirm whether the request terminal is consistent with the user terminal by matching the related information provided by the request terminal and the user check-in reservation information on the block chain, thereby preventing lawless persons from providing false information to check in rooms, and improving the success rate and the safety of information reservation.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a system architecture diagram of an information processing system according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an information processing method provided in an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram of another information processing method provided in the embodiments of the present application;
FIG. 4 is a schematic flow chart diagram of another information processing method provided in the embodiments of the present application;
FIG. 5 is a timing diagram illustrating an information processing method according to an embodiment of the present disclosure;
fig. 6a is a schematic diagram of a data uplink scenario according to an embodiment of the present application;
fig. 6b is a schematic diagram of another uplink data scenario provided in the present embodiment;
FIG. 7 is a schematic flowchart of another information processing method provided in the embodiments of the present application;
fig. 8 is a schematic structural diagram of a management device apparatus according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a block link point device according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 11 is a schematic structural diagram of another electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic diagram of a system architecture for information processing according to an embodiment of the present disclosure. The booking user checks hotel information on a booking application by using the booking terminal, after the booking user books a hotel room, the service server feeds back a booking result to the booking terminal, if the booking is successful, the service server stores the room booking information and the user information of the booking user, and sends the room booking information and the user information to a block link point in a block link point system, and the block link point links the room booking information and the user information. When a request user arrives at the hotel and requests to check in on the management equipment by using the request terminal, the management equipment sends a query request to the block chain, after the room reservation information and the user information fed back by the block chain are obtained, the management equipment judges whether the reservation user and the request user are the same user, then judges whether the request user can check in the hotel room based on the room reservation information, if so, a door lock of the corresponding room is opened, and if not, prompt information that the request user cannot check in is returned to the request terminal.
The reservation terminal, the request terminal, and the block link point may include a mobile phone, a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), and the like. The service server is a background server of a subscription Application (APP) and provides hotel information for the user, and stores and transmits room subscription information and user information of the user. The block chain comprises a series of information of hotel rooms and user information, and provides query for the management equipment. The management device may include an on-door authentication device for a reserved room, an authentication device for a hotel front desk, or an authentication device in a hotel lobby.
Fig. 2 is a schematic flow chart of an information processing method according to an embodiment of the present application. As shown in fig. 2, the method may include:
step S101, a management device acquires a check-in request which is sent by a request terminal and carries a reserved check-in time, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request.
Specifically, when the requesting user requests to check in after arriving at the hotel, the requesting user may use the requesting terminal to send a check-in request to the management device, for example, the requesting terminal displays a two-dimensional code to the management device, the management device may obtain room reservation information and user information of the requesting user by scanning the two-dimensional code, the room reservation information may include reservation check-in time, target room number, reservation check-out time, and the like, and the user information may include a terminal signature of the requesting terminal, an identity certificate of the requesting user, or detailed information of other certificates, and the like. The management equipment records a request receiving timestamp (namely the time of receiving the check-in request), a target house number and a terminal signature, and sends an inquiry request carrying the reserved check-in time and the target house number to the block link point according to the information carried by the check-in request; the block link point obtains a target block according to the reserved check-in time and the target house number. The mode of generating the check-in request is not limited, and can be that a request user uses a request terminal to scan a two-dimensional code on the management equipment, a request terminal page is converted into a page for filling in a hotel target room number and reserving check-in time, the request user writes the page and submits the page to the management equipment, and the management equipment sends a query request to the block link point according to information contained in the page; the mode of generating the check-in request may also be a string of serial numbers or face recognition, and the specific process is not described in detail here.
Step S102, obtaining the user public key and the user check-in reservation information in the target block.
Specifically, the user public key and the user check-in reservation information are generated by the subscriber and the subscriber terminal in fig. 1, the user check-in reservation information includes the room reservation information and the user information in fig. 1, the room reservation information may include a reservation check-in time, a target house number, a reservation check-out time, and the like, the user information may include a terminal signature of the subscriber terminal, an identity certificate or other certificate details of the subscriber, and a subscriber public key (i.e., a user public key), and the like, and is transmitted to the block link node by the service server in fig. 1, the block link node calculates the user check-in reservation information into a first hash value according to a preset hash algorithm, and generates a target block from the first hash value, the user check-in reservation information, and the user public key so as to be linked.
And step S103, checking the terminal signature carried in the check-in request according to the user public key.
Specifically, please refer to fig. 3, which is a flowchart illustrating another information processing method according to an embodiment of the present application. On one hand, the management equipment acquires a first hash value in the target block; on the other hand, the management device decrypts the terminal signature by using the user public key in the target block to obtain a second hash value, wherein the terminal signature is obtained by signing a second hash value (for distinguishing whether the terminal signature is legal) of the request terminal by using the private key of the request user, and the second hash value is calculated and generated based on the subscription information of the request terminal; comparing the first hash value with the second hash value, if the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature, and also indicating that the subscription information of the request terminal is consistent with the subscription information of the subscription terminal for the user to check in, thereby determining that the request user is the subscription user, namely that the terminal signature belonging to the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key; if the first hash value is different from the second hash value, the terminal signature can be determined to be an illegal signature, and then the requesting user and the subscribing user can be determined not to be the same person, because the subscribing information of the requesting user and the subscribing user is different, the generated signatures are different. Of course, when the terminal signature cannot be decrypted by using the user public key in the target block, it may be determined that the requesting user and the subscribing user are not the same person, because the private keys of the requesting user and the subscribing user are different, so that the terminal signature cannot be decrypted.
Under the condition that the terminal signature is an illegal signature, on one hand, the management equipment refuses the check-in request of the user and returns failure prompt information to the request terminal; on the other hand, the request receiving timestamp, the failure prompt message, the terminal signature carried in the check-in request and the target house number corresponding to the check-in request are sent to a block chain node, so that the block chain node performs uplink processing, and a later service server or management equipment is convenient to inquire.
In the case where the terminal signature is a valid signature, the subsequent processing refers to step S104.
And step S104, if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information.
As shown in step S103, the requesting user is a subscribing user, in which case the management device needs to verify the check-in authority of the requesting user, so as to prevent the subscribing user from mistaking the subscription check-in time and checking in the target room of the current day subscribed by other subscribing users.
Specifically, please refer to fig. 4, which is a flowchart illustrating another information processing method according to an embodiment of the present application. After obtaining the user check-in reservation information in the target block, the management equipment confirms the check-in time and the check-out time of the requesting user, and determines the check-in time range of the requesting user according to the check-in time and the check-out time; if the requesting user requests to check in within the user check-in time range, namely the request receiving timestamp is within the user check-in time range, the requesting user is determined to have the check-in authority, the management device opens the target room door lock for the requesting user, and otherwise, the request of checking in of the requesting user is refused and the requesting user is prompted to be short of the check-in time.
Please refer to fig. 5, which is a timing diagram of an information processing method according to an embodiment of the present application. As shown in fig. 5, the method may include:
s201, receiving user check-in reservation information and a user public key.
Specifically, any block chain node receives user check-in reservation information and a user public key sent by a service server, the user check-in reservation information is generated by reservation user information and hotel room information reserved by the user, the user public key is generated by a user private key, the block chain node is open, all persons and a server can obtain the user public key, the user private key is generated by a user terminal and is a personal private of the user, other persons cannot steal the user private key, and the user public key cannot deduce the user private key.
S202, generating a target block.
Specifically, after receiving the user check-in reservation information and the user public key, the block link node checks the user check-in reservation information and the user public key, stores the user check-in reservation information and the user public key after the check, calculates the user check-in reservation information into a first hash value according to a preset hash algorithm, and generates a target block by using the first hash value, the user check-in reservation information and the user public key.
S203, adding the data into the block chain.
Specifically, the block link point sends the target block to other nodes on the block chain, the other nodes check the target block, and the target block is added to the block chain after the check is completed.
The above steps S201 to S203 can refer to fig. 6a together, which is a schematic diagram of a data uplink scenario provided in the embodiment of the present application. In fig. 6a, a subscriber uses a reservation terminal to view hotel information on a reservation application, and after the reservation of a hotel room by the subscriber is successful, a service server (which is a background server of the reservation application) stores the room reservation information and the user information of the subscriber and transmits the room reservation information and the user information to a block chain node, and the block chain node links the room reservation information and the user information. The data to be uplink, i.e., the room subscription information and the user information in fig. 6a, may include the user living subscription information, the user public key, the target house number and the first hash value corresponding to the user living subscription information described in the steps S201 to S202, and the data to be uplink is added to the target block 1004 in the block chain 100.
S204, a check-in request.
Specifically, the requesting user uses the requesting terminal to send a check-in request to the management device, and refers to step S101 in fig. 2 together with a manner of generating the check-in request, where the check-in request carries the reserved check-in time and the target house number.
And S205, inquiring the request.
Specifically, according to the check-in request, the management device sends a query request to be carried with the reserved check-in time and the target house number to the block link node.
S206, acquiring the target block.
Specifically, according to the reserved check-in time and the target house number carried by the query request, the management device acquires the target block on the block link point.
S207, obtaining the user check-in reservation information and the user public key.
Specifically, after the target block fed back by the block chain is obtained, the management device obtains the user check-in reservation information and the user public key from the target block.
S208, a first hash value and a second hash value are obtained.
Specifically, the management device obtains a first hash value from the target block, and verifies a terminal signature carried in a check-in request sent by the request terminal by using the user public key to obtain a second hash value.
S209, determine whether the terminal signature is legal.
Specifically, the management device determines whether the terminal signature is legal according to whether the first hash value is the same as the second hash value, and if the terminal signature is illegal, executes step S210-step S212; if the terminal signature is a valid signature, step S213 and the following steps are performed.
And S210, returning failure prompt information.
Specifically, the management device returns failure prompt information to the request terminal.
And S211, returning a request receiving time stamp, failure prompt information, a terminal signature and a target house number.
Specifically, the management device returns a request receiving timestamp, failure prompt information, a terminal signature, and a target house number to the block link point.
S212, add to the blockchain.
Specifically, please refer to fig. 6b, which is a schematic diagram of another uplink data scenario provided in the embodiment of the present application. In fig. 6b, the requesting terminal sends a check-in request carrying reservation information to the management device, where the reservation information includes reservation check-in time, target house number, and the like, and the manner of generating the check-in request refers to step S101 in fig. 2; according to the reservation check-in time and the target house number carried by the check-in request, the management equipment sends a query request to the block chain nodes, after the target block fed back by the block chain is obtained, the management equipment matches the reservation information carried by the request terminal and the user check-in reservation information in the target block, and the specific matching process refers to step S208-step S209; in case of failure of the check-in request of the requesting user, the block chain node receives the to-be-uplink data returned by the management device, as shown in fig. 6b, the to-be-uplink data may include a request receiving timestamp, failure prompt information, a terminal signature, and a target house number; the block chain node checks the data to be uplink, after the check is completed, the data to be uplink is stored, the data to be uplink is calculated into a corresponding hash value according to a preset hash algorithm, the corresponding hash value and the data to be uplink are generated into a block 1005, the block 1005 is sent to other nodes on the block chain by the block chain node, the block 1005 is checked by the other nodes, and the block 1005 is added to the block chain 100 after the check is completed.
S213, obtaining the check-in time, the check-out time, and the request receiving timestamp.
Specifically, the management device acquires the reservation check-in time, the reservation check-out time and the request receiving time stamp after confirming that the requesting user is the reservation user.
S214, determining whether the request terminal has the check-in authority.
Specifically, the management device determines whether the request terminal has the check-in authority by judging whether the request receiving time stamp is in the reservation check-in time and the reservation check-out time.
If the request terminal has the check-in authority, executing step S215-step S221; if the requesting terminal does not have the right to check in, step S222 is executed.
And S215, unlocking the door lock.
Specifically, when the request terminal has the check-in authority, the management device requests the user to unlock the door lock, and records the actual check-in time (i.e., the time for unlocking the door lock).
S216, the actual check-in time, the user information and the target house number are sent.
Specifically, the management device sends the actual check-in time, the user information, and the target house number to the block link point.
S217, add to the blockchain.
Specifically, please refer to fig. 6 b. The specific execution process between the request terminal and the management device is similar to step S212, except that the management device does not send a failure prompt message to the request terminal if the check-in of the request user is successful; as shown in fig. 6b, the block link node receives to-be-uplink data sent by the management device, where the to-be-uplink data may include actual time to live, user information, and a target house number; the block chain node checks the data to be uplink, after the check is completed, the data to be uplink is stored, the data to be uplink is calculated into a corresponding hash value according to a preset hash algorithm, the corresponding hash value and the data to be uplink are generated into a block 1005, the block 1005 is sent to other nodes on the block chain by the block chain node, the block 1005 is checked by the other nodes, and the block 1005 is added to the block chain 100 after the check is completed.
S218, successfully returning to the house.
Specifically, the request terminal sends a room returning request to the management device, and the room is successfully returned.
And S219, controlling the door lock to be closed.
Specifically, after receiving the prompt of the request terminal for successful room returning, the management device controls the door lock to close.
And S220, sending the actual room returning time, the user information and the target room number.
Specifically, the management device sends the actual room returning time, the user information and the target room number to the block link point.
S221, add to the blockchain.
Specifically, please refer to fig. 6 b. In case of successful room returning, the to-be-uplink data in fig. 6b may include the actual room returning time, the user information and the target room number, and the to-be-uplink data is added to the target block 1006 in the block chain 100, for a specific uplink procedure, refer to step S217, which is not described herein again.
And S222, not unlocking the door lock.
Specifically, when the requesting user does not have the right to enter into the residence, the management device sends the actual time to the requesting terminal.
Fig. 7 is a schematic flowchart of another information processing method provided in the embodiment of the present application. As shown in fig. 7, the method may include:
in step S301, the block link node obtains the user subscription information and the user public key associated with the subscriber and sent by the service server.
Specifically, the service server is a background server of a subscription Application (APP) and provides hotel information for the user, stores and transmits user check-in subscription information of the user and a user public key.
The blockchain node refers to a client in the data sharing system, and may include a mobile phone, a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), and the like. When any block link point acquires user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user, the user check-in reservation information and the user public key are verified, and after the verification is completed, the information is stored.
Step S302, generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and a reservation check-in time.
Specifically, the block link point calculates user check-in reservation information transmitted by the service server according to a preset hash algorithm to obtain a first hash value, and generates a target block from the user check-in reservation information, the user public key, and the first hash value, as shown in block 1005 in fig. 6 a; other nodes in the data sharing system acquire the target block according to the consensus algorithm and check the target block, and after the check is completed, the target block is added to the blockchain 100 shown in fig. 6 a.
Step S303, when receiving an inquiry request sent by the management device, acquiring the target block in the block chain according to the reserved check-in time and the target house number carried in the inquiry request.
Step S304, sending the user check-in reservation information and the user public key in the target block to the management device, so that the management device determines a check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
For the specific implementation process of steps S303 to S304, refer to fig. 5, which is not described herein again.
Fig. 8 is a schematic structural diagram of a management device according to an embodiment of the present application. As shown in fig. 8, the management device apparatus 1 may include: the system comprises a first acquisition module 11, a second acquisition module 12, a signature verification module 13 and a determination module 14.
A first obtaining module 11, configured to acquire, by a management device, a check-in request carrying a predetermined check-in time sent by a request terminal, and obtain a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request;
a second obtaining module 12, configured to obtain a public key of the user and subscription information of the user living in the target block;
the signature verification module 13 is configured to verify a terminal signature carried in the check-in request according to the user public key;
and the determining module 14 is configured to determine, according to the user check-in reservation information, a check-in permission of the requesting terminal for the target house number if the terminal signature is verified to be a legal signature.
For specific functional implementation manners of the first obtaining module 11, the second obtaining module 12, the signature verification module 13, and the determining module 14, reference may be made to steps S101 to S104 in the corresponding embodiment of fig. 2, which is not described herein again.
Referring again to fig. 8, the signature verification module 13 may include: an acquisition unit 131, a decryption unit 132, a comparison unit 133, a first determination unit 134, and a second determination unit 135.
An obtaining unit 131, configured to obtain a first hash value corresponding to the user check-in reservation information in the target block;
the decryption unit 132 is configured to decrypt the terminal signature by using the user public key to obtain a second hash value;
a comparing unit 133, configured to compare the first hash value with the second hash value;
a first determining unit 134, configured to determine that the terminal signature is a valid signature if the first hash value is the same as the second hash value; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
a second determining unit 135, configured to determine that the terminal signature is an illegal signature if the first hash value is different from the second hash value.
For specific functional implementation manners of the obtaining unit 131, the decrypting unit 132, the comparing unit 133, the first determining unit 134, and the second determining unit 135, reference may be made to step S103 in the corresponding embodiment of fig. 2, which is not described herein again.
Referring again to fig. 8, the signature verification module 13 may further include: a return unit 136 and a transmission unit 137.
A returning unit 136, configured to, if it is verified that the terminal signature is an illegal signature, return failure prompt information to the requesting terminal by the management device;
a sending unit 137, configured to send a request receiving timestamp corresponding to the check-in request, the failure prompt information, the terminal signature carried in the check-in request, and the target house number to a block chain node, so that the block chain node performs uplink processing.
The specific functional implementation manners of the returning unit 136 and the sending unit 137 may refer to steps S210 to S212 in the embodiment corresponding to fig. 5, which is not described herein again.
Referring again to fig. 8, the determining module 14 may include: a first acquiring unit 141, a first determining unit 142, a second acquiring unit 143, and a second determining unit 144.
A first obtaining unit 141, configured to obtain a check-in time and a check-out time in the user check-in reservation information in the target block;
a first determining unit 142, configured to determine a user check-in time range according to the check-in time and the check-out time;
a second obtaining unit 143, configured to obtain the request receiving timestamp corresponding to the check-in request;
a second determining unit 144, configured to determine that the request terminal has the check-in authority if the request receiving timestamp is within the check-in time range of the user, and unlock the door lock according to the check-in authority.
For specific functional implementation manners of the first obtaining unit 141, the first determining unit 142, the second obtaining unit 143, and the second determining unit 144, reference may be made to step S104 in the corresponding embodiment of fig. 2, which is not described herein again.
Referring again to fig. 8, the management device apparatus 1 may further include: a first sending module 15 and a second sending module 16.
A first sending module 15, configured to send the actual check-in time, the user information, and the target room number to a block chain node when it is determined that the request terminal is in a check-in successful state according to the check-in permission, so that the block chain node performs uplink processing;
and a second sending module 16, configured to control the door lock to close when the request terminal succeeds in returning, and send the actual returning time, the user information, and the target room number to the block chain node, so that the block chain node performs uplink processing.
For specific implementation of functions of the first sending module 15 and the second sending module 16, reference may be made to steps S215 to S221 in the embodiment corresponding to fig. 5, which is not described herein again.
According to the embodiment of the application, a check-in request carrying the reserved check-in time sent by a request terminal is obtained through management equipment, and a target block is obtained from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request; acquiring a user public key and user check-in reservation information in the target block; checking the terminal signature carried in the check-in request according to the user public key; and if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information. Therefore, the request terminal can acquire the user public key and the user check-in reservation information in the block chain, but the user check-in reservation information and the user public key on the block chain cannot be changed or illegally tampered once being determined, and the terminal signature of the request terminal is generated by encrypting the private key of the request terminal, so that whether the request terminal is consistent with the user terminal can be determined by matching the related information provided by the request terminal and the user check-in reservation information on the block chain, further, lawless persons can be prevented from providing false information to check in a room, and the success rate and the safety of information reservation are improved.
Fig. 9 is a schematic structural diagram of a block link point device according to an embodiment of the present disclosure. The block link point device 2 may include: a first acquiring module 21, a generating and adding module 22, a second acquiring module 23 and a sending module 24.
A first obtaining module 21, configured to obtain, by a block link node, user check-in reservation information and a user public key, which are sent by a service server and are associated with a reservation user;
a generating and adding module 22, configured to generate a target block according to the user check-in reservation information and the user public key, and add the target block to a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time;
a second obtaining module 23, configured to, when receiving an inquiry request sent by a management device, obtain the target block in the block chain according to the reserved check-in time and the target house number carried in the inquiry request;
a sending module 24, configured to send the user check-in reservation information and the user public key in the target block to the management device, so that the management device determines a check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
For specific functional implementation manners of the first obtaining module 21, the generating and adding module 22, the second obtaining module 23, and the sending module 24, reference may be made to steps S201 to S203 in the embodiment corresponding to fig. 5, which is not described herein again.
According to the embodiment of the application, user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user are obtained through a block link point; generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time; when an inquiry request sent by management equipment is received, acquiring the target block in the block chain according to the reserved check-in time and the target house number carried by the inquiry request; and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key. According to the method, the block chain link point receives the user public key and the user check-in reservation information sent by the service server and generates the target block for uplink processing, and due to the uniqueness of the block chain, the user check-in reservation information and the user public key cannot be changed or illegally tampered once uplink is determined, so that strong protection is provided for network security, further, lawbreakers can be prevented from providing false information to check in a room, and the success rate and the security of information reservation are improved.
Fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 10, the electronic device 1000 may include: the processor 1001, the network interface 1004, and the memory 1005, the electronic device 1000 may further include: a user interface 1003, and at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display) and a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a standard wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 10, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the electronic device 1000 shown in fig. 10, the network interface 1004 may provide a network communication function; the user interface 1003 is an interface for providing a user with input; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
the management equipment acquires a check-in request carrying the reserved check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request;
acquiring a user public key and user check-in reservation information in the target block;
checking the terminal signature carried in the check-in request according to the user public key;
and if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information.
In an embodiment, the processor 1001 performs signature verification on the terminal signature carried in the check-in request according to the user public key, and specifically performs the following steps:
acquiring a first hash value corresponding to the user check-in reservation information in the target block;
decrypting the terminal signature by adopting the user public key to obtain a second hash value; comparing the first hash value with the second hash value;
if the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
and if the first hash value is different from the second hash value, determining that the terminal signature is an illegal signature.
The following steps are also specifically performed:
if the terminal signature is verified to be an illegal signature, the management equipment returns failure prompt information to the request terminal;
and sending a request receiving timestamp corresponding to the check-in request, the failure prompt message, the terminal signature carried in the check-in request and the target house number to a block chain node so as to enable the block chain node to carry out uplink processing.
In an embodiment, the processor 1001 determines the check-in permission of the requesting terminal for the target house number according to the user check-in reservation information, and specifically performs the following steps:
acquiring the check-in time and the check-out time in the user check-in reservation information in the target block;
determining the user check-in time range according to the check-in time and the check-out time;
acquiring the request receiving time stamp corresponding to the check-in request;
and if the request receiving timestamp is in the user check-in time range, determining that the request terminal has the check-in authority, and unlocking the door lock according to the check-in authority.
In one embodiment, the processor 1001 further performs the following specific steps:
when the request terminal is determined to be in a successful check-in state according to the check-in permission, actual check-in time, user information and the target house number are sent to a block chain node so that the block chain node can carry out uplink processing;
and when the request terminal successfully returns the house, controlling a door lock to be closed, and sending the actual house returning time, the user information and the target house number to the block chain node so as to enable the block chain node to carry out chain winding processing.
Therefore, the request terminal can acquire the user public key and the user check-in reservation information in the block chain, but the user check-in reservation information and the user public key on the block chain cannot be changed or illegally tampered once being determined, and the terminal signature of the request terminal is generated by encrypting the private key of the request terminal, so that whether the request terminal is consistent with the user terminal can be determined by matching the related information provided by the request terminal and the user check-in reservation information on the block chain, further, lawless persons can be prevented from providing false information to check in a room, and the success rate and the safety of information reservation are improved.
It should be understood that the electronic device 1000 described in this embodiment of the application may perform the description of the information processing method in the embodiment corresponding to fig. 2 to fig. 7, and may also perform the description of the management device apparatus 1 and the block link point apparatus 2 in the embodiment corresponding to fig. 8 to fig. 9, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Fig. 11 is a schematic structural diagram of another electronic device provided in the embodiment of the present application. As shown in fig. 11, the electronic device 2000 may include: the processor 2001, the network interface 2004 and the memory 2005, the electronic device 2000 may further include: a user interface 2003, and at least one communication bus 2002. The communication bus 2002 is used to implement connection communication between these components. The user interface 2003 may include a Display (Display) and a Keyboard (Keyboard), and the optional user interface 2003 may further include a standard wired interface and a standard wireless interface. The network interface 2004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). Memory 2005 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 2005 may optionally also be at least one memory device located remotely from the aforementioned processor 2001. As shown in fig. 11, the memory 2005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the electronic device 2000 shown in fig. 11, the network interface 2004 may provide a network communication function; and the user interface 2003 is primarily used to provide an interface for user input; and processor 2001 may be used to invoke the device control application stored in memory 2005 to implement:
the method comprises the steps that a block chain node point obtains user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user;
generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time;
when an inquiry request sent by management equipment is received, acquiring the target block in the block chain according to the reserved check-in time and the target house number carried by the inquiry request;
and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
According to the method, the block chain link point receives the user public key and the user check-in reservation information sent by the service server and generates the target block for uplink processing, and due to the uniqueness of the block chain, the user check-in reservation information and the user public key cannot be changed or illegally tampered once uplink is determined, so that strong protection is provided for network security, further, lawbreakers can be prevented from providing false information to check in a room, and the success rate and the security of information reservation are improved.
It should be understood that the electronic device 2000 described in this embodiment may perform the description of the information processing method in the embodiments corresponding to fig. 2 to fig. 7, and may also perform the description of the management device apparatus 1 and the block link point apparatus 2 in the embodiments corresponding to fig. 8 to fig. 9, which is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Further, here, it is to be noted that: the embodiment of the present application further provides a computer storage medium, and the computer storage medium stores therein the aforementioned computer programs executed by the information processing apparatus 1 and the block link node apparatus 2, and the computer programs include program instructions, and when the processor executes the program instructions, the descriptions of the information processing method in the embodiments corresponding to fig. 2 to fig. 7 can be executed, and therefore, the descriptions will not be repeated here. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in the embodiments of the computer storage medium referred to in the present application, reference is made to the description of the embodiments of the method of the present application.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. An information processing method characterized by comprising:
the management equipment acquires a check-in request carrying the reserved check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request;
acquiring a user public key and user check-in reservation information in the target block;
checking the terminal signature carried in the check-in request according to the user public key;
and if the signature of the terminal is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target house number according to the user check-in reservation information.
2. The method according to claim 1, wherein said verifying the terminal signature carried in the check-in request according to the user public key comprises:
acquiring a first hash value corresponding to the user check-in reservation information in the target block;
decrypting the terminal signature by adopting the user public key to obtain a second hash value;
comparing the first hash value with the second hash value;
if the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
and if the first hash value is different from the second hash value, determining that the terminal signature is an illegal signature.
3. The method of claim 2, further comprising:
if the terminal signature is verified to be an illegal signature, the management equipment returns failure prompt information to the request terminal;
and sending a request receiving timestamp corresponding to the check-in request, the failure prompt message, the terminal signature carried in the check-in request and the target house number to a block chain node so as to enable the block chain node to carry out uplink processing.
4. The method of claim 1, wherein the determining the check-in authority of the requesting terminal for the target house number according to the user check-in reservation information comprises:
acquiring the check-in time and the check-out time in the user check-in reservation information in the target block;
determining the user check-in time range according to the check-in time and the check-out time;
acquiring the request receiving time stamp corresponding to the check-in request;
and if the request receiving timestamp is in the user check-in time range, determining that the request terminal has the check-in authority, and unlocking the door lock according to the check-in authority.
5. The method of claim 1, further comprising:
when the request terminal is determined to be in a successful check-in state according to the check-in permission, actual check-in time, user information and the target house number are sent to a block chain node so that the block chain node can carry out uplink processing;
and when the request terminal successfully returns the house, controlling a door lock to be closed, and sending the actual house returning time, the user information and the target house number to the block chain node so as to enable the block chain node to carry out chain winding processing.
6. An information processing method characterized by comprising:
the method comprises the steps that a block chain node point obtains user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user;
generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time;
when an inquiry request sent by management equipment is received, acquiring the target block in the block chain according to the reserved check-in time and the target house number carried by the inquiry request;
and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
7. An information processing apparatus characterized by comprising:
the first acquisition module is used for acquiring a check-in request which is sent by a request terminal and carries a reserved check-in time by a management device, and acquiring a target block from a block chain according to the check-in request; the target block is a block associated with the reservation check-in time and a target house number; the target house number is the house number requested by the check-in request;
the second acquisition module is used for acquiring the user public key and the user check-in reservation information in the target block;
the signature verification module is used for verifying the signature of the terminal carried in the check-in request according to the user public key;
and the determining module is used for determining the check-in permission of the request terminal aiming at the target house number according to the user check-in reservation information if the terminal signature is verified to be a legal signature.
8. An information processing apparatus characterized by comprising:
the first acquisition module is used for acquiring user check-in reservation information and a user public key which are sent by the service server and are associated with a reservation user;
the generating and adding module is used for generating a target block according to the user check-in reservation information and the user public key and adding the target block into a block chain; the user check-in reservation information comprises a target house number reserved by the reservation terminal and reservation check-in time;
a second obtaining module, configured to, when receiving an inquiry request sent by a management device, obtain the target block in the block chain according to the reserved check-in time and the target house number carried in the inquiry request;
and the sending module is used for sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in permission of a request terminal initiating a check-in request according to the user check-in reservation information and the user public key.
9. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 6.
10. A computer storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the steps of the method according to any one of claims 1-6.
CN201910860693.4A 2019-09-11 2019-09-11 Information processing method, device and computer storage medium Active CN110598469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910860693.4A CN110598469B (en) 2019-09-11 2019-09-11 Information processing method, device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910860693.4A CN110598469B (en) 2019-09-11 2019-09-11 Information processing method, device and computer storage medium

Publications (2)

Publication Number Publication Date
CN110598469A true CN110598469A (en) 2019-12-20
CN110598469B CN110598469B (en) 2024-05-17

Family

ID=68858986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910860693.4A Active CN110598469B (en) 2019-09-11 2019-09-11 Information processing method, device and computer storage medium

Country Status (1)

Country Link
CN (1) CN110598469B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111209334A (en) * 2019-12-23 2020-05-29 国网河北省电力有限公司雄安新区供电公司 Block chain-based power terminal data security management method
CN112862132A (en) * 2021-02-23 2021-05-28 杭州趣链科技有限公司 Hotel management method, system, device, equipment and medium based on block chain
WO2022237123A1 (en) * 2021-05-11 2022-11-17 蚂蚁区块链科技(上海)有限公司 Method and apparatus for acquiring blockchain data, electronic device, and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN109800897A (en) * 2018-12-26 2019-05-24 中链科技有限公司 Hotel occupancy processing method, device, system and calculating equipment based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN109800897A (en) * 2018-12-26 2019-05-24 中链科技有限公司 Hotel occupancy processing method, device, system and calculating equipment based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111209334A (en) * 2019-12-23 2020-05-29 国网河北省电力有限公司雄安新区供电公司 Block chain-based power terminal data security management method
CN111209334B (en) * 2019-12-23 2024-03-22 国网河北省电力有限公司雄安新区供电公司 Power terminal data security management method based on block chain
CN112862132A (en) * 2021-02-23 2021-05-28 杭州趣链科技有限公司 Hotel management method, system, device, equipment and medium based on block chain
CN112862132B (en) * 2021-02-23 2024-01-23 杭州趣链科技有限公司 Block chain-based hotel management method, system, device, equipment and medium
WO2022237123A1 (en) * 2021-05-11 2022-11-17 蚂蚁区块链科技(上海)有限公司 Method and apparatus for acquiring blockchain data, electronic device, and storage medium

Also Published As

Publication number Publication date
CN110598469B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
CN108809659B (en) Dynamic password generation method, dynamic password verification method, dynamic password system and dynamic password verification system
US8689300B2 (en) Method and system for generating digital fingerprint
CN109150548B (en) Digital certificate signing and signature checking method and system and digital certificate system
US9641521B2 (en) Systems and methods for network connected authentication
CN1714529B (en) Domain-based digital-rights management system with easy and secure device enrollment
US8590024B2 (en) Method for generating digital fingerprint using pseudo random number code
CN110719173B (en) Information processing method and device
CN110995710B (en) Smart home authentication method based on eUICC
KR101451639B1 (en) Identification and theft prevention system using one times random key, and method thereof
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
JP2004127142A (en) Authentication method and system and entrance/exit management method and system using the method and system
JP2007025802A (en) Gate system and gate release method using radio communication terminal
CN110598469B (en) Information processing method, device and computer storage medium
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN104660417B (en) Verification method, checking device and electronic equipment
CN105577619B (en) Client login method, client and system
CN108667800B (en) Access authority authentication method and device
US20100273552A1 (en) Method for Authentication of Game Executing Authority Recording Medium for Storing Authentication Program of Game Executing Authority, and Server for Storing Authentication Program of Game Executing Authority
CN112671534B (en) Service key management method, service terminal and system based on biological characteristics
KR20150005788A (en) Method for authenticating by using user's key value
CN115550002B (en) TEE-based intelligent home remote control method and related device
CN111131140A (en) Method and system for enhancing login security of Windows operating system based on message pushing
KR101451638B1 (en) Identification and theft prevention system, and method thereof
CN110995654A (en) Remote terminal temporary authorization method, device and system based on dynamic two-dimensional code
CN109936522B (en) Equipment authentication method and equipment authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant