CN110719264A - Information processing method and related device - Google Patents

Information processing method and related device Download PDF

Info

Publication number
CN110719264A
CN110719264A CN201910880715.3A CN201910880715A CN110719264A CN 110719264 A CN110719264 A CN 110719264A CN 201910880715 A CN201910880715 A CN 201910880715A CN 110719264 A CN110719264 A CN 110719264A
Authority
CN
China
Prior art keywords
merchant
user information
node
encrypted
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910880715.3A
Other languages
Chinese (zh)
Other versions
CN110719264B (en
Inventor
黄惠娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910880715.3A priority Critical patent/CN110719264B/en
Priority to PCT/CN2019/116977 priority patent/WO2021051525A1/en
Publication of CN110719264A publication Critical patent/CN110719264A/en
Application granted granted Critical
Publication of CN110719264B publication Critical patent/CN110719264B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a security mechanism, and discloses an information processing method and a related device, which comprise the following steps: a merchant node sends a user information extraction request to a user node, wherein the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to acquire user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information; the merchant node receives a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information; the merchant node decrypts the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key; and the merchant node generates an electronic membership card based on the unencrypted user information. The embodiment of the invention is beneficial to improving the information accuracy.

Description

Information processing method and related device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an information processing method and a related apparatus.
Background
With the rapid development of internet technology, more and more merchants are turning physical membership cards into electronic membership cards in order to better serve customers. Generally, when a user purchases goods in a physical store or a virtual store and wants to transact a membership card, a merchant often needs the user to fill in user information to generate an electronic membership card based on the user information of the user, so as to provide better membership service for the user through the electronic membership card.
However, the user information may be wrongly written in by the way that the user writes in the user information by himself, which may cause the information to be inaccurate.
Disclosure of Invention
The embodiment of the invention provides an information processing method and a related device, and the implementation of the embodiment of the invention is beneficial to improving the information accuracy.
A first aspect of an embodiment of the present invention provides an information processing method, including:
a merchant node sends a user information extraction request to a user node, wherein the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to acquire user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
the merchant node receives a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
the merchant node decrypts the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and the merchant node generates an electronic membership card based on the unencrypted user information.
A second aspect of an embodiment of the present invention provides an information processing apparatus, including:
the system comprises a sending module, a receiving module and a processing module, wherein the sending module is used for sending a user information extraction request to a user node, the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to obtain user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
a receiving module, configured to receive a user information extraction response sent by the user node, where the user information extraction response carries the encrypted user information;
the decryption module is used for decrypting the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and the generating module is used for generating the electronic membership card based on the unencrypted user information.
It can be seen that, in the above technical scheme, a merchant node sends a user information extraction request to a user node, so that the user node obtains user information to be encrypted, encrypts the user information to be encrypted by using a merchant public key carried in the user information extraction request to obtain encrypted user information, and then, the merchant node receives a user information extraction response carrying the encrypted user information sent by the user node, so that the encrypted user information is decrypted by using a merchant private key to obtain unencrypted user information, thereby avoiding that a user fills in the user information on site, and avoiding the problem of incorrect information caused by a user filling error. Meanwhile, the efficiency of acquiring the user information by the merchant node is improved by acquiring the user information to be encrypted from the user node. In addition, the merchant node receives the user information extraction response carrying the encrypted user information sent by the user node, so that the security of the user information is improved, and the risk of user information leakage is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1A is a schematic structural diagram of a communication system according to an embodiment of the present invention;
fig. 1B is a schematic structural diagram of a merchant node according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an information processing method according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating another information processing method according to an embodiment of the present invention;
fig. 4A is a schematic structural diagram of another communication system according to an embodiment of the present invention;
FIG. 4B is a flowchart illustrating a further information processing method according to an embodiment of the invention;
fig. 5 is a schematic diagram of a merchant node structure of a hardware operating environment according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following are detailed below.
The terms "first," "second," and "third" in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Referring first to fig. 1A, fig. 1A is a schematic structural diagram of a communication system according to an embodiment of the present invention, where the communication system may include a merchant node 110 and a terminal 120 interconnected via a network. Merchant node 110 may perform all of the functions mentioned in embodiments of the present invention, but is not limited to all of the functions mentioned in embodiments of the present invention. The terminal 120 may implement all functions mentioned in the embodiments of the present invention, but is not limited to all functions mentioned in the embodiments of the present invention.
Referring to fig. 1B, fig. 1B is a schematic structural diagram of an exemplary merchant node 110 according to an embodiment of the present invention, where the merchant node 110 may include: a sending module 111, a receiving module 112, a decrypting module 113, a generating module 114, and the like.
The system comprises a sending module, a receiving module and a processing module, wherein the sending module is used for sending a user information extraction request to a user node, the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to obtain user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
the user information to be encrypted may include, for example: name, gender, contact, year and month of birth, etc.
The user node includes, but is not limited to, a legacy server, a mass storage system, a desktop computer, a notebook computer, a tablet computer, a palm computer, a smart phone, a portable digital player, a smart watch, a smart bracelet, and the like.
A receiving module, configured to receive a user information extraction response sent by the user node, where the user information extraction response carries the encrypted user information;
the decryption module is used for decrypting the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and the generating module is used for generating the electronic membership card based on the unencrypted user information.
It can be seen that, in the above technical scheme, a merchant node sends a user information extraction request to a user node, so that the user node obtains user information to be encrypted, encrypts the user information to be encrypted by using a merchant public key carried in the user information extraction request to obtain encrypted user information, and then, the merchant node receives a user information extraction response carrying the encrypted user information sent by the user node, so that the encrypted user information is decrypted by using a merchant private key to obtain unencrypted user information, thereby avoiding that a user fills in the user information on site, and avoiding the problem of incorrect information caused by a user filling error. Meanwhile, the efficiency of acquiring the user information by the merchant node is improved by acquiring the user information to be encrypted from the user node. In addition, the merchant node receives the user information extraction response carrying the encrypted user information sent by the user node, so that the security of the user information is improved, and the risk of user information leakage is avoided.
Of course, the modular architecture of merchant node 110 is not limited to the above example.
The technical solution of the embodiment of the present invention may be implemented based on the communication system with the architecture illustrated in fig. 1A as an example or a modified architecture thereof.
Referring to fig. 2, fig. 2 is a schematic flow chart of an information processing method according to an embodiment of the present invention, which may include, but is not limited to, the following steps:
201. a merchant node sends a user information extraction request to a user node, wherein the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to acquire user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
the user information to be encrypted may include, for example: name, gender, contact, year and month of birth, etc.
The user node includes, but is not limited to, a legacy server, a mass storage system, a desktop computer, a notebook computer, a tablet computer, a palm computer, a smart phone, a portable digital player, a smart watch, a smart bracelet, and the like.
The merchant node includes, but is not limited to, a traditional server, a mass storage system, a desktop computer, a notebook computer, a tablet computer, a palm computer, a smart phone, a portable digital player, a smart watch, a smart bracelet, and the like.
Optionally, in a possible implementation, before the merchant node sends the user information extraction request to the user node, the method further includes:
the merchant node sends a merchant identity verification request to a verification node, wherein the merchant identity verification request carries merchant identity information and a merchant address identifier, the merchant identity verification request is used for indicating the verification node to verify the merchant identity information, when the verification is passed, a one-way encryption algorithm is adopted to encrypt the merchant identity information to obtain the merchant identity fingerprint, and the merchant identity fingerprint and the merchant address identifier are stored in an association chain in an associated manner;
the merchant node receives a merchant identity verification response sent by the verification node, wherein the merchant identity verification response carries prompt information of successful storage;
and the merchant node displays prompt information of successful storage on a display interface of the merchant node.
Optionally, each node (including a merchant node and a user node) in the federation chain generates its own private key, public key and address identifier through the federation chain, and performs identity verification on each other node through a verification node in the federation chain, when the verification passes, records the public key, the address identifier and the identity fingerprint of each node in the federation chain into an account book of the federation chain, and after passing through a consensus mechanism, accesses the block book into the federation chain.
Wherein the verification node may be a third party trust authority, e.g. for a merchant, the third party trust authority may be a business administration system.
The merchant identity information may include, for example: merchant name, organization code, contact, merchant address, business scope, etc.
The merchant address identifier is generated by the merchant node according to the address of the merchant node, and the address of the merchant node may include: the domain name of the merchant node, the IP address (Internet Protocol) of the merchant node, and the IP address + port number of the merchant node.
The display interface comprises at least one display frame, and the merchant node displays prompt information of successful storage on the display interface of the merchant node, wherein the prompt information comprises:
and the merchant node displays prompt information of successful storage in the at least one display frame on the display interface.
The one-way encryption algorithm can only encrypt the merchant identity information to obtain encrypted merchant identity information, but cannot obtain the merchant identity information from the encrypted merchant identity information. The merchant identity information can be encrypted by using the one-way encryption algorithm to obtain the merchant identity fingerprint, and the corresponding decryption algorithm does not exist to decrypt the merchant identity fingerprint to obtain the merchant identity information. Among them, the one-way encryption Algorithm may include a Message-Digest Algorithm (MD), an Algorithm and Secure Hash Algorithm 1 (SHA-1), a Hash Message Authentication Code (HMAC), and the like. For example, when the one-way encryption algorithm is the MD algorithm, the hash operation is performed on the merchant identity information to obtain a hash value, and the hash value is set as the merchant identity fingerprint.
It can be seen that, in the above technical scheme, the merchant node sends the merchant identity verification request to the verification node, when the verification node verifies the merchant identity information carried in the merchant identity verification request, and when the verification passes, the verification node encrypts the merchant identity information by using a one-way encryption algorithm to obtain the merchant identity fingerprint, and the merchant identity fingerprint and the merchant address identifier carried in the merchant identity verification request are stored in association in the federation chain, so that the merchant node is successfully joined in the federation chain, and a preparation is made for subsequently obtaining the merchant identity fingerprint from the federation chain according to the merchant address identifier, thereby improving the search efficiency. Meanwhile, prompt information of successful storage is displayed on a display interface of the merchant node, so that the merchant can be informed of the successful chaining condition in real time.
Optionally, the user information extraction request further carries encrypted merchant identity information and a merchant address identifier, where the user information extraction request is used to instruct the user node to obtain the merchant identity fingerprint corresponding to the merchant address identifier from the federation chain, compare the merchant identity fingerprint with the encrypted merchant identity information, obtain the user information to be encrypted when the comparison is successful, and encrypt the user information to be encrypted by using the merchant public key to obtain the encrypted user information.
The encrypted merchant identity information is obtained by encrypting the merchant identity information by the merchant node by adopting a merchant private key.
202. The merchant node receives a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
203. the merchant node decrypts the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
204. and the merchant node generates an electronic membership card based on the unencrypted user information.
It can be seen that, in the above technical scheme, a merchant node sends a user information extraction request to a user node, so that the user node obtains user information to be encrypted, encrypts the user information to be encrypted by using a merchant public key carried in the user information extraction request to obtain encrypted user information, and then, the merchant node receives a user information extraction response carrying the encrypted user information sent by the user node, so that the encrypted user information is decrypted by using a merchant private key to obtain unencrypted user information, thereby avoiding that a user fills in the user information on site, and avoiding the problem of incorrect information caused by a user filling error. Meanwhile, the efficiency of acquiring the user information by the merchant node is improved by acquiring the user information to be encrypted from the user node. In addition, the merchant node receives the user information extraction response carrying the encrypted user information sent by the user node, so that the security of the user information is improved, and the risk of user information leakage is avoided.
Optionally, in a possible implementation, after the merchant node generates an electronic membership card based on the unencrypted user information, the method further includes:
the merchant node acquires a shopping list, wherein the shopping list comprises a shopping amount;
the merchant node sends a payment request to the user node, wherein the payment request carries the shopping list, the payment request is used for indicating the user node to extract the shopping amount in the shopping list, generating a payment two-dimensional code comprising the shopping amount, and displaying the payment two-dimensional code on a display interface of the user node;
and the merchant node obtains the income corresponding to the shopping amount by scanning the payment two-dimensional code.
For example, if the user may set the balance of the electronic membership card to pay first, then the merchant node obtains the benefit corresponding to the shopping amount by scanning the payment two-dimensional code, including:
and the merchant node acquires the income corresponding to the shopping amount from the balance included in the electronic membership card by scanning the payment two-dimensional code.
Further, when the balance of the electronic membership card is insufficient, the merchant node obtains a benefit corresponding to the shopping amount from the balance of an electronic account by scanning the payment two-dimensional code, wherein the balance of the electronic account corresponds to the unencrypted user information.
Referring to fig. 3, fig. 3 is a schematic flowchart of an information processing method provided by an embodiment of the present invention, where the merchant node generates an electronic membership card based on the unencrypted user information, and the method includes:
301. the merchant node analyzes the unencrypted user information to obtain a plurality of fields included by the unencrypted user information;
302. the merchant node compares the fields with a preset field set to obtain a plurality of first fields matched with the preset field set in the fields;
the preset field set comprises a plurality of preset fields, and the number of the preset fields is less than or equal to that of the fields.
For example, the plurality of fields include, for example: zhang Min, women, 19980708, 13687637281, Guangdong Shenzhen City xx district, etc.; the plurality of preset fields include: atopy, female, 19980708, 13687637281; then, a first plurality of fields of the plurality of fields that match the preset set of fields includes: zhangmin, woman, 19980708, 13687637281.
Optionally, in a possible implementation, before the merchant node compares the plurality of fields with a preset field set to obtain a plurality of first fields in the plurality of fields that match the preset field set, the method further includes:
the merchant node captures N pieces of member information from the Internet through a web crawler, wherein N is a positive integer;
the merchant node sends N training requests to N training devices, wherein the N training requests carry N member information, an ith training request in the N training requests carries ith member information in the N member information, the ith training request is used for indicating the ith training device in the N training devices to input the ith member information into a field acquisition model so as to obtain L member information fields included by the ith member information, the N training devices correspond to the N training requests in a one-to-one manner, wherein i is greater than 0 and less than or equal to N, i is an integer, and L is a positive integer;
the merchant node receives N training responses sent by the N training devices, wherein each training response in the N training responses carries L member information fields, an ith training response in the N training responses carries L member information fields included in the ith member information, and the N training devices are in one-to-one correspondence with the N training responses;
the merchant node counts L member information fields carried by each training response in the N training responses to obtain M member information fields, wherein M is (N L) and M is a positive integer;
the merchant node screens out repeated member information fields from the M member information fields to obtain the member information field with the most repeated number;
and the merchant node sets the member information field with the largest number of repetitions as the preset field set.
Where N may be equal to 1, 2, 3, 5, 6, 11, 13, 20, or other values, for example.
Where i may be equal to 1, 2, 3, 5, 6, 11, 13, 20, or other values, for example.
Where j may be equal to 1, 2, 3, 5, 6, 11, 13, 20, or other values, for example.
Where M may be equal to 1, 2, 3, 5, 6, 11, 13, 20, or other values, for example.
Where L may be equal to 1, 2, 3, 5, 6, 11, 13, 20, or other values, for example.
Among them, a web crawler (also called web spider, web robot, among FOAF communities, more often called web chasers) is a program or script that automatically captures web information according to a certain rule.
Optionally, the web crawler includes: general Purpose Web crawlers (General Purpose Web Crawler), Focused Web Crawler (Focused Web Crawler), Incremental Web Crawler (Incremental Web Crawler), Deep Web Crawler (Deep Web Crawler).
The training device may comprise, for example, a server.
Wherein, the member information is the user information included in the electronic member card.
It can be seen that, in the above technical scheme, the web crawler captures N pieces of member information from the internet, and simultaneously sends each piece of member information in the N pieces of member information to the N training devices, so that the N training devices concurrently input the N pieces of member information into the field acquisition model to obtain a plurality of member information fields corresponding to each piece of member information, thereby improving the acquisition efficiency of the member information fields. Then, when the merchant node receives N training responses sent by N training devices, L member information fields carried by each training response in the N training responses are counted, repeated member information fields are screened out to obtain the member information fields with the largest number of repetitions, and finally the member information fields with the largest number of repetitions are set as a preset field set, so that the uniformity of user information included in the electronic member card is improved, and the situation that the user information included in the electronic member card is completely different among different merchants in the prior art is avoided.
303. And the merchant node calls an electronic membership card generation algorithm to process the plurality of first fields so as to generate the electronic membership card comprising the plurality of first fields.
Referring to fig. 4A, fig. 4A is a schematic structural diagram of a communication system according to an embodiment of the present invention, where the communication system may include a merchant node 410 and a plurality of merchant nodes 420 interconnected by a network. Merchant node 410 may perform all of the functions mentioned in embodiments of the present invention, but is not limited to all of the functions mentioned in embodiments of the present invention. Multiple merchant nodes 420 may implement all of the functionality mentioned in embodiments of the present invention, but are not limited to all of the functionality mentioned in embodiments of the present invention.
Wherein merchant node 410 is not included in plurality of merchant nodes 420.
Referring to fig. 4B, fig. 4B is a schematic flowchart of an information processing method provided by an embodiment of the present invention, where the federation chain includes a plurality of merchant nodes, and the method further includes:
the merchant node sending a plurality of user information acquisition requests to the plurality of merchant nodes, wherein, each user information acquisition request in the plurality of user information acquisition requests carries the merchant public key, the encrypted merchant identity information and the merchant address identifier, each user information acquisition request in the plurality of user information acquisition requests is used for instructing each merchant node in the plurality of merchant nodes to acquire the merchant identity fingerprint corresponding to the merchant address identifier from the alliance chain, comparing the merchant identity fingerprint with the encrypted merchant identity information, and acquiring a plurality of user information to be encrypted when the comparison is successful, encrypting the user information to be encrypted by adopting the merchant public key to obtain a plurality of encrypted user information, wherein the merchant nodes correspond to the user information acquisition requests one by one;
the merchant node receives a plurality of user information acquisition responses sent by the merchant nodes, wherein each user information acquisition response in the plurality of user information acquisition responses carries the plurality of encrypted user information;
the merchant node acquires each user information acquisition response in the plurality of user information acquisition responses, carries the plurality of encrypted user information, and obtains an encrypted user information set;
the merchant node decrypts the plurality of encrypted user information included in the encrypted user information set by adopting the merchant private key to obtain an unencrypted user information set;
and the merchant node generates a plurality of electronic member cards based on the unencrypted user information set, wherein the electronic member cards are generated when the merchant node acquires a plurality of authorization instructions of a plurality of user nodes corresponding to the unencrypted user information set.
In the technical scheme, the merchant node can acquire a plurality of user information from the alliance chain comprising a plurality of merchant nodes, so that the user information can be shared among different merchants, and the information islanding phenomenon is avoided. Meanwhile, when the merchant node acquires a plurality of authorization instructions of a plurality of user nodes corresponding to the unencrypted user information set, the merchant node generates a plurality of electronic membership cards, and the personal right of the user is protected.
Optionally, in a possible implementation, the method further includes:
the merchant node sends a plurality of electronic member card determination requests to the merchant nodes, wherein each electronic member card determination request in the plurality of electronic member card determination requests carries the merchant public key, the encrypted merchant identity information, the merchant address identifier and a plurality of user information identifiers, each electronic member card determination request in the plurality of electronic member card determination requests is used for indicating each merchant node in the plurality of merchant nodes to acquire the merchant identity fingerprint corresponding to the merchant address identifier from the federation chain, the merchant identity fingerprint is compared with the encrypted merchant identity information, whether a plurality of electronic member cards corresponding to the plurality of user information identifiers exist or not is determined when the comparison is successful, if yes, prompt information of the plurality of electronic member cards is generated, and the prompt information of the plurality of electronic member cards is encrypted by the merchant public key to obtain a plurality of first adding prompt information If not, generating prompt information without the plurality of electronic membership cards, encrypting the prompt information without the plurality of electronic membership cards by adopting the merchant public key to obtain a plurality of second encrypted prompt information, wherein the plurality of merchant nodes are in one-to-one correspondence with the plurality of electronic membership card determination requests;
the merchant node receives a plurality of electronic membership card determination responses sent by the merchant nodes, wherein each electronic membership card determination response in the plurality of electronic membership card determination responses carries the plurality of electronic membership card determination results;
the merchant node determines whether the plurality of electronic membership cards corresponding to the plurality of user information identifications exist according to each electronic membership card determination response in the plurality of electronic membership card determination responses, wherein the response carries the plurality of electronic membership card determination results;
if the plurality of electronic membership card determination results correspond to the plurality of first encryption prompt messages, the merchant node marks that each piece of unencrypted user information in the unencrypted user information set corresponds to the plurality of electronic membership cards;
the merchant node generating a plurality of electronic membership cards based on the unencrypted user information set, including:
and if the plurality of electronic membership card determination results correspond to the plurality of second encrypted prompt messages, the merchant node generates a plurality of electronic membership cards based on the unencrypted user information set.
Wherein the plurality of user information identifications are generated by the merchant node from each unencrypted user information in the set of unencrypted user information.
It can be seen that, in the above technical solution, whether other merchant nodes have multiple electronic membership cards corresponding to multiple user information identifiers is determined, so that when multiple electronic membership cards corresponding to multiple user information identifiers exist, the merchant nodes mark unencrypted user information sets without generating electronic membership cards, thereby implementing sharing of the same user electronic membership card among different merchants and saving data storage space. Meanwhile, when a plurality of electronic membership cards corresponding to a plurality of user information identifications do not exist, the merchant node generates a plurality of electronic membership cards, and a more flexible sharing mode is realized.
Optionally, in a possible implementation, the method further includes:
the merchant node sends a first user information extraction request to the user node, wherein the first user information extraction request carries the merchant public key, the first user information extraction request is used for indicating the user node to acquire family information associated with the user information to be encrypted, and the merchant public key is adopted to encrypt the family information to obtain encrypted family information;
the merchant node receives a first user information extraction response sent by the user node, wherein the first user information extraction response carries the encrypted family information;
the merchant node decrypts the encrypted family information by adopting the merchant private key to obtain unencrypted family information;
and the merchant node adds the unencrypted family information into the electronic member card.
The family information includes, for example, name, gender, year and month of birth, and the like. For example, the user has a parent and a sibling, and the family information associated with the user information to be encrypted includes names, genders, birth dates and months of the father, the mother and the sibling.
Therefore, in the technical scheme, the family information associated with the user information to be encrypted is acquired, and the family information is added into the electronic membership card, so that the sharing of the electronic membership card among the families is realized, the number of the electronic membership cards is reduced, and the storage space of the merchant node is increased.
Referring to fig. 5, fig. 5 is a schematic diagram of a merchant node structure of a hardware operating environment according to an embodiment of the present application.
An embodiment of the present invention provides an information processing electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor to perform instructions including steps in any of the information processing methods. As shown in fig. 5, a merchant node of a hardware operating environment according to an embodiment of the present application may include:
a processor 501, such as a CPU.
The memory 502 may alternatively be a high speed RAM memory or a stable memory such as a disk memory.
A communication interface 503 for implementing connection communication between the processor 501 and the memory 502.
Those skilled in the art will appreciate that the architecture of the merchant node shown in FIG. 5 is not intended to be limiting and may include more or fewer components than shown, or some components in combination, or a different arrangement of components.
As shown in fig. 5, the memory 502 may include an operating system, a network communication module, and a program for data processing. The operating system is a program that manages and controls the merchant node hardware and software resources, a program that supports personnel management, and other software or program operations. The network communication module is used to enable communication between components within the memory 502, as well as with other hardware and software within the merchant node.
In the merchant node shown in fig. 5, the processor 501 is configured to execute a program for people management stored in the memory 502, and implement the following steps:
sending a user information extraction request to a user node, wherein the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to acquire user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
receiving a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
decrypting the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and generating an electronic membership card based on the unencrypted user information.
Specific implementation of the merchant node related to the present application can refer to each embodiment of the information processing method, and details are not described herein.
The present application further provides a computer readable storage medium for storing a computer program, the stored computer program being executable by the processor to perform the steps of:
sending a user information extraction request to a user node, wherein the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to acquire user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
receiving a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
decrypting the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and generating an electronic membership card based on the unencrypted user information.
For specific implementation of the computer-readable storage medium related to the present application, reference may be made to the embodiments of the information processing method, which are not described herein again.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some interfaces, and may be in an electrical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a business node, or a network device) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An information processing method characterized by comprising:
a merchant node sends a user information extraction request to a user node, wherein the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to acquire user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
the merchant node receives a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
the merchant node decrypts the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and the merchant node generates an electronic membership card based on the unencrypted user information.
2. The method of claim 1, wherein prior to the merchant node sending a user information extraction request to a user node, the method further comprises:
the merchant node sends a merchant identity verification request to a verification node, wherein the merchant identity verification request carries merchant identity information and a merchant address identifier, the merchant identity verification request is used for indicating the verification node to verify the merchant identity information, when the verification is passed, a one-way encryption algorithm is adopted to encrypt the merchant identity information to obtain the merchant identity fingerprint, and the merchant identity fingerprint and the merchant address identifier are stored in an association chain in an associated manner;
the merchant node receives a merchant identity verification response sent by the verification node, wherein the merchant identity verification response carries prompt information of successful storage;
and the merchant node displays prompt information of successful storage on a display interface of the merchant node.
3. The method according to claim 1, wherein the user information extraction request further carries encrypted merchant identity information and a merchant address identifier, the user information extraction request is used for instructing the user node to acquire the merchant identity fingerprint corresponding to the merchant address identifier from the federation chain, compare the merchant identity fingerprint with the encrypted merchant identity information, acquire the user information to be encrypted when the comparison is successful, and encrypt the user information to be encrypted by using the merchant public key to acquire the encrypted user information.
4. The method of claim 1, wherein the merchant node generating an electronic membership card based on the unencrypted user information comprises:
the merchant node analyzes the unencrypted user information to obtain a plurality of fields included by the unencrypted user information;
the merchant node compares the fields with a preset field set to obtain a plurality of first fields matched with the preset field set in the fields;
and the merchant node calls an electronic membership card generation algorithm to process the plurality of first fields so as to generate the electronic membership card comprising the plurality of first fields.
5. The method of claim 4, wherein before the merchant node compares the plurality of fields to a set of preset fields to obtain a first plurality of fields of the plurality of fields that match the set of preset fields, the method further comprises:
the merchant node captures N pieces of member information from the Internet through a web crawler, wherein N is a positive integer;
the merchant node sends N training requests to N training devices, wherein the N training requests carry N member information, an ith training request in the N training requests carries ith member information in the N member information, the ith training request is used for indicating the ith training device in the N training devices to input the ith member information into a field acquisition model so as to obtain L member information fields included by the ith member information, the N training devices correspond to the N training requests in a one-to-one manner, wherein i is greater than 0 and less than or equal to N, i is an integer, and L is a positive integer;
the merchant node receives N training responses sent by the N training devices, wherein each training response in the N training responses carries L member information fields, an ith training response in the N training responses carries L member information fields included in the ith member information, and the N training devices are in one-to-one correspondence with the N training responses;
the merchant node counts L member information fields carried by each training response in the N training responses to obtain M member information fields, wherein M is (N L) and M is a positive integer;
the merchant node screens out repeated member information fields from the M member information fields to obtain the member information field with the most repeated number;
and the merchant node sets the member information field with the largest number of repetitions as the preset field set.
6. The method of claim 2 or 3, wherein the federation chain includes a plurality of merchant nodes, the method further comprising:
the merchant node sending a plurality of user information acquisition requests to the plurality of merchant nodes, wherein, each user information acquisition request in the plurality of user information acquisition requests carries the merchant public key, the encrypted merchant identity information and the merchant address identifier, each user information acquisition request in the plurality of user information acquisition requests is used for instructing each merchant node in the plurality of merchant nodes to acquire the merchant identity fingerprint corresponding to the merchant address identifier from the alliance chain, comparing the merchant identity fingerprint with the encrypted merchant identity information, and acquiring a plurality of user information to be encrypted when the comparison is successful, encrypting the user information to be encrypted by adopting the merchant public key to obtain a plurality of encrypted user information, wherein the merchant nodes correspond to the user information acquisition requests one by one;
the merchant node receives a plurality of user information acquisition responses sent by the merchant nodes, wherein each user information acquisition response in the plurality of user information acquisition responses carries the plurality of encrypted user information;
the merchant node acquires each user information acquisition response in the plurality of user information acquisition responses, carries the plurality of encrypted user information, and obtains an encrypted user information set;
the merchant node decrypts the plurality of encrypted user information included in the encrypted user information set by adopting the merchant private key to obtain an unencrypted user information set;
and the merchant node generates a plurality of electronic member cards based on the unencrypted user information set, wherein the electronic member cards are generated when the merchant node acquires a plurality of authorization instructions of a plurality of user nodes corresponding to the unencrypted user information set.
7. The method of any of claims 1-5, wherein after the merchant node generates an electronic membership card based on the unencrypted user information, the method further comprises:
the merchant node acquires a shopping list, wherein the shopping list comprises a shopping amount;
the merchant node sends a payment request to the user node, wherein the payment request carries the shopping list, the payment request is used for indicating the user node to extract the shopping amount in the shopping list, generating a payment two-dimensional code comprising the shopping amount, and displaying the payment two-dimensional code on a display interface of the user node;
and the merchant node obtains the income corresponding to the shopping amount by scanning the payment two-dimensional code.
8. An information processing apparatus characterized by comprising:
the system comprises a sending module, a receiving module and a processing module, wherein the sending module is used for sending a user information extraction request to a user node, the user information extraction request carries a merchant public key, the user information extraction request is used for indicating the user node to obtain user information to be encrypted, and the merchant public key is adopted to encrypt the user information to be encrypted so as to obtain encrypted user information;
a receiving module, configured to receive a user information extraction response sent by the user node, where the user information extraction response carries the encrypted user information;
the decryption module is used for decrypting the encrypted user information by adopting a merchant private key to obtain unencrypted user information, wherein the merchant private key corresponds to the merchant public key;
and the generating module is used for generating the electronic membership card based on the unencrypted user information.
9. An information processing electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and are generated as instructions that are executed by the processor to perform the steps of the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium is used to store a computer program, which is executed by the processor, to implement the method of any of claims 1-7.
CN201910880715.3A 2019-09-18 2019-09-18 Information processing method and device, electronic equipment and storage medium Active CN110719264B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910880715.3A CN110719264B (en) 2019-09-18 2019-09-18 Information processing method and device, electronic equipment and storage medium
PCT/CN2019/116977 WO2021051525A1 (en) 2019-09-18 2019-11-11 Information processing method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910880715.3A CN110719264B (en) 2019-09-18 2019-09-18 Information processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110719264A true CN110719264A (en) 2020-01-21
CN110719264B CN110719264B (en) 2022-07-22

Family

ID=69210585

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910880715.3A Active CN110719264B (en) 2019-09-18 2019-09-18 Information processing method and device, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN110719264B (en)
WO (1) WO2021051525A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737361A (en) * 2018-01-25 2018-11-02 阳光保险集团股份有限公司 A kind of data verification method based on block chain
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain
CN109951497A (en) * 2019-04-03 2019-06-28 陕西医链区块链集团有限公司 A kind of personal data authorization method of block chain
US20190253253A1 (en) * 2018-02-13 2019-08-15 Macrogen, Inc. Bio-information data providing method, bio-information data storing method and bio-information data transferring system based on multiple blockchains

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10306466B2 (en) * 2012-01-23 2019-05-28 SecureWiFi Technologies, LLC Customer/merchant interaction system for merchant branding and product information
CN103458010B (en) * 2013-08-19 2017-05-10 小米科技有限责任公司 Member registration method, device, server and mobile terminal
CN104754030B (en) * 2015-02-12 2017-05-10 腾讯科技(深圳)有限公司 User information obtaining method and device
CN110070926A (en) * 2019-03-21 2019-07-30 深圳壹账通智能科技有限公司 Data query method, apparatus, equipment and readable storage medium storing program for executing based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737361A (en) * 2018-01-25 2018-11-02 阳光保险集团股份有限公司 A kind of data verification method based on block chain
US20190253253A1 (en) * 2018-02-13 2019-08-15 Macrogen, Inc. Bio-information data providing method, bio-information data storing method and bio-information data transferring system based on multiple blockchains
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain
CN109951497A (en) * 2019-04-03 2019-06-28 陕西医链区块链集团有限公司 A kind of personal data authorization method of block chain

Also Published As

Publication number Publication date
WO2021051525A1 (en) 2021-03-25
CN110719264B (en) 2022-07-22

Similar Documents

Publication Publication Date Title
US11665147B2 (en) Blockchain systems and methods for user authentication
US11799668B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
RU2676231C2 (en) Image based key derivation function
CN101960762B (en) system and method for performing wireless financial transactions
CN107077670B (en) Method and apparatus for transmitting and processing transaction message, computer readable storage medium
ES2596308T3 (en) Method and provision for secure authentication
JP4866863B2 (en) Security code generation method and user device
US9722794B2 (en) System and method for remote access, remote digital signature
US20170344988A1 (en) System and method for facilitating blockchain-based validation
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
JP2022536645A (en) Key Recovery Using Encrypted Secret Share
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN106452775A (en) Method and apparatus for accomplishing electronic signing and signing server
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
EP4150879A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
CN109635572A (en) A kind of contract signing method, apparatus and terminal device based on block chain
CN110401542A (en) Electronic identity voucher generation method, terminal and server
CN107483432A (en) File encryption processing method and processing device
CN109818965B (en) Personal identity verification device and method
CN114270780A (en) Gateway agnostic tokenization
CN110719264B (en) Information processing method and device, electronic equipment and storage medium
CN114358932A (en) Authentication processing method and device
van Oorschot Public key cryptography’s impact on society: how Diffie and Hellman changed the world
Yu et al. A novel fair and verifiable data trading scheme

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40019550

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant