CN111917771B - Data processing method applied to subway system - Google Patents
Data processing method applied to subway system Download PDFInfo
- Publication number
- CN111917771B CN111917771B CN202010758680.9A CN202010758680A CN111917771B CN 111917771 B CN111917771 B CN 111917771B CN 202010758680 A CN202010758680 A CN 202010758680A CN 111917771 B CN111917771 B CN 111917771B
- Authority
- CN
- China
- Prior art keywords
- subway
- target
- token
- key parameter
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a data processing method applied to a subway system, which comprises the steps that a subway client acquires a subway line determined by a user, wherein the subway line comprises a subway station starting point and a subway station terminal point; the subway client determines a target action starting area and a target action ending area, wherein the linear distance between each position in the target action starting area and the starting point of the subway station is less than a preset first distance, and the linear distance between each position in the target action ending area and the terminal point of the subway station is less than a preset second distance; the subway client sends a prompt to a user when detecting that the user enters a target action starting area, acquires a target image of the user and transmits the target image to a subway server; and the subway client detects that the user enters a target action ending area, and triggers the server to execute data processing service for the user. The invention obviously improves the user experience.
Description
Technical Field
The invention relates to the field of intelligent data interaction of intelligent subway stations, in particular to a data processing method applied to a subway system.
Background
The traditional subway station can provide data service for users only in subway ticket purchase on an automatic teller machine, other businesses need to rely on manual service, and convenient service is difficult to provide for the users, so that the congestion phenomenon of the subway station is worsened. It is necessary to provide more intelligent service for the user, further reduce cost, liberate manpower, alleviate and block up when promoting user experience.
Disclosure of Invention
In order to solve the technical problem, the invention provides a data processing method applied to a subway system. The invention is realized by the following technical scheme:
a data processing method applied to a subway system, the method comprising:
the method comprises the steps that a subway client side obtains a subway line determined by a user, wherein the subway line comprises a subway station starting point and a subway station terminal point;
the subway client determines a target action starting area and a target action ending area, wherein the linear distance between each position in the target action starting area and the starting point of the subway station is less than a preset first distance, and the linear distance between each position in the target action ending area and the terminal point of the subway station is less than a preset second distance;
the subway client sends a prompt to a user when detecting that the user enters a target action starting area, acquires a target image of the user and transmits the target image to a subway server;
and the subway client detects that the user enters a target action ending area, and triggers the server to execute data processing service for the user.
Preferably, before the trigger server executes the data processing service for the user:
the subway server determines a target data identifier corresponding to the target image according to the target image, if the target data identifier exists, a first token is generated, key parameters of the first token are extracted, and a communication token is generated according to the key parameters; the subway server also correspondingly generates a first record and stores the first record in a first record table, wherein the first record comprises a first identifier, a subway station starting point and a target data identifier, and the communication token and the first identifier are transmitted to the subway client side;
the data processing service executed by the trigger server for the user is as follows:
encrypting the identifier of the subway station terminal and the first identifier according to the communication token, and transmitting an encryption result and the communication token to a subway server;
the subway server recovers to obtain a decryption token based on the communication token, and decrypts the encryption result according to the decryption token to obtain the identifier of the destination of the target subway station and the first target identifier; and determining a corresponding target first record in a first record table according to the target first identifier, obtaining a data service parameter according to the identifier of the target subway station terminal and the subway station starting point in the target first record, performing data processing service for a user according to the data service parameter and the target data identifier in the target first record, and feeding back the result of the data processing service to a subway client.
Preferably, the communication token is uniquely determined from the first token; and the number of the first and second electrodes,
the subway client uniquely determines the encrypted token based on the communication token and the subway server uniquely determines the decrypted token.
Preferably, the extracting key parameters of the first token and generating a communication token according to the key parameters includes:
determining the length of the first token as a first key parameter;
determining the encryption complexity of the first token as a second key parameter;
determining the number of code segments in the first token, in which the same key character appears continuously, as a third key parameter;
determining the maximum length of code segments in which the same key character continuously appears in the first token as a fourth key parameter;
connecting the first key parameter, the second key parameter, the third key parameter and the fourth key parameter by preset characters to obtain a communication token; the preset characters do not exist in the first key parameter, the second key parameter, the third key parameter and the fourth key parameter.
Preferably, the first key parameter is greater than the second key parameter;
the fourth key parameter is smaller than the first key parameter, and 2 x the value of the third key parameter + the fourth key parameter is smaller than the first key parameter.
Preferably, the data service parameter may be a virtual article consumption value, and further include deducting a virtual article corresponding to the virtual article consumption value from a virtual article pointed by the target data identifier in the target first record, and feeding back a deduction result to the subway client.
Preferably, the method further comprises the following steps:
and generating a second record based on the data processing result and storing the second record into a second record table, wherein the second record comprises but is not limited to a second record identifier, a subway station starting point, a subway station ending point, target action starting time, a first token, data processing time, a target data identifier and a data processing parameter.
The embodiment of the invention provides a data processing method applied to a subway system, which can respond to the behavior of a user in advance in the process that the user enters a subway and leaves the subway, safely and automatically perform related data processing services for the user in advance, avoid the situation that the user can participate in data processing activities related to the subway behavior after going through complicated active operations after entering a subway station, improve the automation safety of the data processing services and remarkably improve the user experience.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a data processing method applied to a subway system according to an embodiment of the present invention;
FIG. 2 is a flowchart of acquiring a target image of a user according to an embodiment of the present invention;
fig. 3 is a flowchart for extracting key parameters of the first token and generating a communication token according to the key parameters, according to an embodiment of the present invention;
fig. 4 is a flowchart for encrypting both the identifier of the subway station terminal and the first identifier according to the communication token provided in the embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses a data processing method applied to a subway system, which comprises the following steps of:
s101, a subway client acquires a subway line determined by a user, wherein the subway line comprises a subway station starting point and a subway station terminal point.
S102, the subway client determines a target action starting area and a target action ending area, wherein the linear distance between each position in the target action starting area and the starting point of the subway station is smaller than a preset first distance, and the linear distance between each position in the target action ending area and the terminal point of the subway station is smaller than a preset second distance.
And S103, when the subway client detects that the user enters a target action starting area, sending a prompt to the user, acquiring a target image of the user, and transmitting the target image to a subway server.
Specifically, the target image is used to search for a target digital identifier, and a target image may be obtained by using the prior art, but an embodiment of the present invention is not particularly limited, and in an embodiment, the obtaining of the target image of the user, as shown in fig. 2, includes:
and S1031, continuously acquiring a group of face pictures until a first characteristic value of the group of face pictures is smaller than a preset threshold value, wherein the group of face pictures comprise a plurality of face pictures.
Specifically, the first characteristic value is represented by a formulaIs calculated to obtain, wherein, Ni,ti,si,ciAnd delta and n respectively represent a relative value, exposure time, photosensitivity and exposure compensation obtained by the focal length/lens light transmission diameter of the lens of the ith picture, and preset constants (usually 100) and the number of pictures. And the focal length of the lens/the light transmission diameter of the lens of different pictures in a group obtain at least one of different relative values, exposure time, photosensitive sensitivity and exposure compensation.
S1032, determining a target picture in the group of face pictures.
Specifically, the determining a target picture in the group of face pictures includes:
s10321, calculating an exposure characteristic difference value alpha of each target picture i and a picture adjacent to the next target picture iiWherein the exposure characteristics are represented by the formulaAnd (4) calculating.
Of course, the last picture will not be selected as the target picture.
S10322, calculating the association characteristic difference value beta of each target picture i and the next adjacent pictureiWherein the correlation characteristic difference value is represented by a formulaTo obtain wherein i, Li(k) K and gamma represent the number of the picture, the gray level distribution statistical function of the preset area of the picture, the order of the gray level distribution statistical function and the total order.
S10323, calculating a second characteristic value T2(i)=k1αi+k2(βi-1), wherein T2,k1,k2And respectively representing a second characteristic value, a first weight and a second weight.
S10324, determining the picture with the minimum second characteristic value as a target picture.
S1033, determining a target image of the target picture.
Specifically, the determining the target image of the target picture includes:
s10331, determining an image boundary in the target picture.
Of course, the boundary extraction may be performed based on the existing boundary extraction method, and the embodiment of the present invention is not limited. Specifically, in one embodiment, the determining the image boundary in the target picture includes:
and acquiring a brightness feature set corresponding to each pixel point in the target picture, wherein the brightness feature set is a set formed by brightness values of pixel points adjacent to the pixel points.
And if the difference between the maximum value and the minimum value of the elements of the brightness feature set is greater than a preset threshold value, determining the pixel points corresponding to the brightness feature set as edge pixel points.
And determining the image boundary by the edge pixel points.
S10332, extracting an effective image from the target picture according to the image boundary, wherein the effective image is an image of a region defined by the image boundary in the target picture.
S10333, zooming the effective image according to the preset template image specification to obtain a target image.
S104, the subway server determines a target data identifier corresponding to the target image according to the target image, if the target data identifier exists, a first token is generated, key parameters of the first token are extracted, and a communication token is generated according to the key parameters; and the subway server also correspondingly generates a first record and stores the first record in a first record table, wherein the first record comprises a first identifier, a subway station starting point and a target data identifier, and the communication token and the first identifier are transmitted to the subway client side together.
In one embodiment, the first record further includes a target action start time and a first token.
The embodiment of the present invention does not limit the specific generation methods of the first token, the communication token, and the following decryption token, and only needs to achieve the following purposes:
(1) uniquely determining a communication token from the first token;
(2) the subway client uniquely determines an encryption token based on the communication token, and the subway server uniquely determines a decryption token;
of course, the first token may be the same as the encrypted token as well as the decrypted token. In this way, the process of uniquely determining the encryption token by the subway client may be understood as a process of recovering the first token based on the communication token, and the process of uniquely determining the decryption token by the subway server may be understood as a process of recovering the first token based on the communication token. Therefore, the subway client uniquely determines the encryption token, the subway server uniquely determines the decryption token by using the same method, the method can be executed for multiple times based on the same parameter to obtain the same result, and the method has idempotent property, can be clearly determined in the actual coding design process, and does not belong to the limited range of the embodiment of the invention.
In one embodiment, the extracting key parameters of the first token and generating a communication token according to the key parameters, as shown in fig. 3, includes:
s1, determining the length of the first token as a first key parameter;
s2, determining the encryption complexity of the first token as a second key parameter;
s3, determining the number of code segments in the first token, in which the same key character continuously appears, as a third key parameter;
s4, determining the maximum length of code segments in the first token, wherein the code segments continuously appear in the same key character, as a fourth key parameter;
specifically, in this embodiment, the first token may be randomly generated on the premise that it is ensured that the following condition is satisfied:
(1) the first key parameter is greater than the second key parameter;
(2) the fourth key parameter is less than the first key parameter, and 2 x the value of the third key parameter + the fourth key parameter is less than the first key parameter;
s5, connecting the first key parameter, the second key parameter, the third key parameter and the fourth key parameter by preset characters to obtain a communication token; the preset characters do not exist in the first key parameter, the second key parameter, the third key parameter and the fourth key parameter.
And S105, the subway client detects that the user enters a target action ending area, encrypts both the identifier of the subway station terminal and the first identifier according to the communication token, and transmits an encryption result and the communication token to a subway server.
Specifically, the encrypting the identifier of the subway station terminal and the first identifier according to the communication token, as shown in fig. 4, includes:
and S10, analyzing the communication token to obtain a first key parameter, a second key parameter, a third key parameter and a fourth key parameter.
And S20, calculating a target value according to the first key parameter, the second key parameter, the third key parameter and the fourth key parameter.
The embodiment of the invention does not limit the calculation method of the target value, and the following purposes can be met:
(1) uniquely determining according to the first key parameter, the second key parameter, the third key parameter and the fourth key parameter;
(2) not greater than the number of alternative encrypted token sequences that follow.
Showing a first key parameter, a second key parameter, a third key parameter and a fourth key parameter, symbolsRespectively represent an integer not greater than X and an integer not less than Δ.
S30, calculating alternative encryption token sequences based on a preset key character table, so that each alternative encryption token in the alternative encryption token sequences meets the following requirements: the length of the alternative encryption token is a first key parameter, the number of key character types in the alternative encryption token is a second key parameter, the number of code segments in which the same key character of the alternative encryption token continuously appears is a third key parameter, and the maximum length of the code segments in which the same key character of the alternative encryption token continuously appears is a fourth key parameter.
Specifically, the embodiment of the present invention of the specific calculation method for the alternative encrypted token sequence is not specifically limited, as long as the requirement in S30 can be met and the algorithms related to the subway station client and the subway server are unified, and it is not difficult to obtain a character string meeting the requirement of a key parameter based on some key parameters.
In one embodiment, the number of the key character types may be uniquely associated with the key character selected to appear in the alternative encryption token, and if the key character table is 26 english character tables, the number of the key character types is 1, and the key character is a; if the key character type is 3, the key character is abc.
In one embodiment, the alternate encrypted token may be a cryptographic string of: the method comprises the steps of replacing data in a preset data string based on a code corresponding relation in a first code table to obtain a first result, replacing the data in the preset data string based on a preset replacement method and a key character table to obtain a second result, replacing the first result based on the preset replacement method and the key character table to obtain a third result, wherein the third result is the same as the second result, and the third result and the second result both meet the requirements of alternative encrypted tokens.
In the embodiment of the present invention, specific content of the first encoding table is not limited, and only that each character in the preset data string is replaced by a uniquely determined encoding character in the first encoding table, and different characters in the preset data string are replaced by different encoding characters in the first encoding table is required.
The embodiment of the present invention does not limit the specific steps of the preset replacement method, and only needs the preset replacement method to be based on position replacement, for example, for a character string to be replaced, a first key character in the key character table is used to replace a first character in the character string to be replaced, and other characters identical to the first character; replacing the first character which is not replaced and other characters which are the same as the first character which is not replaced in the character string to be replaced by using the t (t is more than or equal to 2) th key character in the key character table; and (t) increasing by one, repeating the steps until no character which is not replaced exists, and outputting a replacement result.
And S40, determining a target value candidate encryption token in the candidate encryption token sequence as an encryption token.
And S50, encrypting the identifier of the subway station terminal and the first identifier by using the encryption token.
Of course, the embodiment of the present invention does not limit the encryption method, and the existing technology may be used.
S106, the subway server recovers to obtain a decryption token based on the communication token, and decrypts the encryption result according to the decryption token to obtain an identifier of a target subway station terminal and a target first identifier; and determining a corresponding target first record in a first record table according to the target first identifier, obtaining a data service parameter according to the identifier of the target subway station terminal and the subway station starting point in the target first record, performing data processing service for a user according to the data service parameter and the target data identifier in the target first record, and feeding back the result of the data processing service to a subway client.
The embodiment of the invention does not limit the specific content of the data processing service, which can be common payment consumption or user feedback, and the embodiment of the invention does not limit the specific content of the data service, and aims to provide the subway client with the capability of automatically and safely performing the data processing service for the user, improve the automation degree of the subway client and be capable of being in butt joint with various specific data processing services.
Taking payment consumption as an example, the data service parameter may be a virtual article consumption value, and specifically, in the embodiment of the present invention, a virtual article corresponding to the virtual article consumption value is deducted from a virtual article pointed by the target data identifier in the target first record, and a deduction result is fed back to the subway client.
In one embodiment, the subway server further generates a second record based on the data processing result and stores the second record into a second record table, where the second record includes, but is not limited to, a second record identifier, a subway station start point, a subway station end point, a target action start time, a first token, a data processing time, a target data identifier, and a data processing parameter. Of course, after the second record is generated, the corresponding first record in the first record table may also be deleted.
The data processing method applied to the subway system provided by the embodiment of the invention can react to the behavior of the user in advance in the process that the user enters the subway and leaves the subway, safely and automatically perform related data processing services for the user in advance, avoid the situation that the user can participate in data processing activities related to the subway behavior after going through complicated active operations after entering the subway station, improve the automation safety of the data processing services and remarkably improve the user experience.
It should be noted that: the sequence of the above embodiments of the present invention is only for description, and does not represent the advantages and disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (4)
1. A data processing method applied to a subway system is characterized by comprising the following steps:
the method comprises the steps that a subway client side obtains a subway line determined by a user, wherein the subway line comprises a subway station starting point and a subway station terminal point;
the subway client determines a target action starting area and a target action ending area, wherein the linear distance between each position in the target action starting area and the starting point of the subway station is less than a preset first distance, and the linear distance between each position in the target action ending area and the terminal point of the subway station is less than a preset second distance;
the subway client sends a prompt to a user when detecting that the user enters a target action starting area, acquires a target image of the user and transmits the target image to a subway server;
the subway client detects that the user enters a target action ending area, and triggers a server to execute data processing service for the user;
before the trigger server performs data processing service for the user:
the subway server determines a target data identifier corresponding to the target image according to the target image, if the target data identifier exists, a first token is generated, key parameters of the first token are extracted, and a communication token is generated according to the key parameters; the subway server also correspondingly generates a first record and stores the first record in a first record table, wherein the first record comprises a first identifier, a subway station starting point and a target data identifier, and the communication token and the first identifier are transmitted to the subway client side;
the data processing service executed by the trigger server for the user is as follows:
encrypting the identifier of the subway station terminal and the first identifier according to the communication token, and transmitting an encryption result and the communication token to a subway server;
the subway server recovers to obtain a decryption token based on the communication token, and decrypts the encryption result according to the decryption token to obtain the identifier of the destination of the target subway station and the first target identifier; determining a corresponding target first record in a first record table according to the target first identifier, obtaining a data service parameter according to the identifier of the target subway station terminal and the subway station starting point in the target first record, performing data processing service for a user according to the data service parameter and the target data identifier in the target first record, and feeding back the result of the data processing service to a subway client;
uniquely determining a communication token from the first token; and the number of the first and second electrodes,
the subway client uniquely determines an encryption token based on the communication token, and the subway server uniquely determines a decryption token;
the extracting key parameters of the first token and generating a communication token according to the key parameters comprises:
determining the length of the first token as a first key parameter;
determining the encryption complexity of the first token as a second key parameter;
determining the number of code segments in the first token, in which the same key character appears continuously, as a third key parameter;
determining the maximum length of code segments in which the same key character continuously appears in the first token as a fourth key parameter;
connecting the first key parameter, the second key parameter, the third key parameter and the fourth key parameter by preset characters to obtain a communication token; the preset characters do not exist in the first key parameter, the second key parameter, the third key parameter and the fourth key parameter.
2. The method of claim 1, wherein:
the first key parameter is greater than the second key parameter;
the fourth key parameter is smaller than the first key parameter, and 2 x the value of the third key parameter + the fourth key parameter is smaller than the first key parameter.
3. The method of claim 2, wherein:
the data service parameter may be a virtual article consumption value, and further includes deducting a virtual article corresponding to the virtual article consumption value from a virtual article pointed by the target data identifier in the target first record, and feeding back a deduction result to the subway client.
4. The method of claim 3, further comprising:
and generating a second record based on the data processing result and storing the second record into a second record table, wherein the second record comprises but is not limited to a second record identifier, a subway station starting point, a subway station ending point, target action starting time, a first token, data processing time, a target data identifier and a data processing parameter.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010758680.9A CN111917771B (en) | 2020-07-31 | 2020-07-31 | Data processing method applied to subway system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010758680.9A CN111917771B (en) | 2020-07-31 | 2020-07-31 | Data processing method applied to subway system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111917771A CN111917771A (en) | 2020-11-10 |
CN111917771B true CN111917771B (en) | 2021-03-30 |
Family
ID=73287801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010758680.9A Active CN111917771B (en) | 2020-07-31 | 2020-07-31 | Data processing method applied to subway system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111917771B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368975A (en) * | 2013-07-31 | 2013-10-23 | 飞天诚信科技股份有限公司 | Method and system for safe transmission of batch of data |
CN104134142A (en) * | 2014-08-11 | 2014-11-05 | 东南大学 | Metro ticket buying and checking method based on two-dimension code recognition |
CN105405170A (en) * | 2015-12-07 | 2016-03-16 | 广西米付网络技术有限公司 | Subway ticket checking terminal based on low-power-consumption bluetooth and two-dimensional code scanning |
CN106780792A (en) * | 2015-11-18 | 2017-05-31 | 航天信息股份有限公司 | A kind of subway quick payment method and system |
US10277407B2 (en) * | 2016-04-19 | 2019-04-30 | Microsoft Technology Licensing, Llc | Key-attestation-contingent certificate issuance |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN211087310U (en) * | 2019-12-11 | 2020-07-24 | 成都智元汇信息技术股份有限公司 | Ticket selling and checking system based on face recognition |
CN111462368A (en) * | 2020-04-13 | 2020-07-28 | 佛山职业技术学院 | Subway station entering and exiting identification method and system and computer equipment |
-
2020
- 2020-07-31 CN CN202010758680.9A patent/CN111917771B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368975A (en) * | 2013-07-31 | 2013-10-23 | 飞天诚信科技股份有限公司 | Method and system for safe transmission of batch of data |
CN104134142A (en) * | 2014-08-11 | 2014-11-05 | 东南大学 | Metro ticket buying and checking method based on two-dimension code recognition |
CN106780792A (en) * | 2015-11-18 | 2017-05-31 | 航天信息股份有限公司 | A kind of subway quick payment method and system |
CN105405170A (en) * | 2015-12-07 | 2016-03-16 | 广西米付网络技术有限公司 | Subway ticket checking terminal based on low-power-consumption bluetooth and two-dimensional code scanning |
US10277407B2 (en) * | 2016-04-19 | 2019-04-30 | Microsoft Technology Licensing, Llc | Key-attestation-contingent certificate issuance |
Also Published As
Publication number | Publication date |
---|---|
CN111917771A (en) | 2020-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10089490B2 (en) | Business card management server, business card image acquiring apparatus, business card management method, business card image acquiring method, and storage medium | |
US10922435B2 (en) | Image encryption method, image viewing method, system, and terminal | |
CN100463483C (en) | Image processing system | |
CN107124444A (en) | A kind of method and apparatus of block chain data syn-chronization | |
CN109450777B (en) | Session information extraction method, device, equipment and medium | |
CN108777615B (en) | Dynamic password authentication method and device | |
CN114285575B (en) | Image encryption and decryption method and device, storage medium and electronic device | |
CN110336786A (en) | Message method, device, computer equipment and storage medium | |
CN109068150A (en) | A kind of excellent picture extracting method, terminal and the computer-readable medium of video | |
CN111475785A (en) | Information acquisition method and device, computer equipment and storage medium | |
CN111917771B (en) | Data processing method applied to subway system | |
CN116756761B (en) | Method and device for encrypting data | |
CN107948700A (en) | Program commending method, system and computer-readable recording medium | |
CN117061151A (en) | File processing method, sending terminal, receiving terminal and file processing system | |
WO2008029059A2 (en) | Securing of code for personal entity | |
CN116150780A (en) | Method and device for dynamically generating token, electronic equipment and storage medium | |
CN115242779A (en) | File transmission method and system based on small program and electronic equipment | |
CN113537931A (en) | Electronic seal generation method and device and electronic seal verification method and device | |
KR20220088112A (en) | System of generating contents inserted copyright information and method distinguishing contents copyright | |
CN112580762A (en) | Dynamic two-dimensional code and identification method and identification device thereof | |
CN114286178B (en) | Privacy data protection method, device and medium based on remote control | |
CN112995107A (en) | Communication method and device | |
CN110545263A (en) | Decryption method, encryption method, terminal device, server and readable storage medium | |
CN115374462B (en) | Storage management system based on financial service data | |
CN116881850B (en) | Safety early warning system based on multi-mode data fusion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |