CN113660200A - Network breaking processing method and system for full-automatic car washing - Google Patents
Network breaking processing method and system for full-automatic car washing Download PDFInfo
- Publication number
- CN113660200A CN113660200A CN202110773644.4A CN202110773644A CN113660200A CN 113660200 A CN113660200 A CN 113660200A CN 202110773644 A CN202110773644 A CN 202110773644A CN 113660200 A CN113660200 A CN 113660200A
- Authority
- CN
- China
- Prior art keywords
- information
- disconnected
- order
- car washing
- station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005406 washing Methods 0.000 title claims abstract description 72
- 238000003672 processing method Methods 0.000 title claims abstract description 9
- 238000012795 verification Methods 0.000 claims abstract description 64
- 238000000034 method Methods 0.000 claims abstract description 17
- 238000012545 processing Methods 0.000 claims abstract description 7
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 230000002354 daily effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
- G06Q20/0855—Payment architectures involving remote charge determination or related payment systems involving a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Medical Informatics (AREA)
- Electromagnetism (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a network breaking processing method for full-automatic car washing, which comprises the following steps: after the server detects that the offline car washing station is disconnected, determining disconnected station information, wherein the disconnected station information comprises: identifying a disconnected network station; when a car washing order request corresponding to the disconnected website identification and sent by the user terminal is received, the server and a third party interactively complete payment to obtain order information; the server generates a graphic code according to the network disconnection site information and the order information and sends the graphic code to the user terminal; and the code scanning machine receives the graphic code displayed by the user terminal, verifies the scanned graphic code, and instructs to start the car washing gate machine to carry out full-automatic car washing if the verification is passed. The method can still acquire the order information under the condition that the online car washing station is disconnected, so that the normal operation of the offline service is not influenced under the condition that the online network is disconnected. In addition, a full-automatic car washing network breaking processing system is also provided.
Description
Technical Field
The application relates to the technical field of information processing, in particular to a network breaking processing method and system for full-automatic car washing.
Background
With the development of the internet of things, car washing gradually enters a full-automatic mode, and in the aspect of car washing payment, cash payment is gradually converted into online payment. However, online payment is adopted to ensure the smoothness of the network, and particularly for offline station washing, if the offline station washing is disconnected, the order information of the customer cannot be received, so that offline car washing service cannot be continuously carried out.
Therefore, a method for acquiring order information of a customer in case of offline car washing station network failure is needed.
Disclosure of Invention
The application provides a network breaking processing method and system for full-automatic car washing, and the network breaking processing method for full-automatic car washing can enable an offline car washing station to obtain order information under the condition that a car washer is disconnected, so that development of offline car washing business is not influenced.
A full-automatic car washing network breaking processing method is applied to a full-automatic car washing network breaking processing system, and the system comprises: a server and a code scanner;
the method comprises the following steps:
after the server detects that the offline car washing station is disconnected, determining disconnected station information, wherein the disconnected station information comprises: identifying a disconnected network station;
when a car washing order request corresponding to the disconnected website identification and sent by a user terminal is received, the server and a third party interactively complete payment to obtain order information;
the server generates a graphic code according to the offline site identification and the order information, and sends the graphic code to the user terminal;
and the code scanning machine receives the graphic code displayed by the user terminal, verifies the scanned graphic code, and instructs to start the car washing gate machine to carry out full-automatic car washing if the verification is passed.
A network outage handling system for full automatic vehicle washing, the system comprising: a server and a code scanner;
the server is used for determining the information of the disconnected network station after detecting that the offline station for washing is disconnected, wherein the information of the disconnected network station comprises the following steps: identifying a disconnected network station; when a car washing order request corresponding to the disconnected website identification and sent by a user terminal is received, the server and a third party interactively complete payment to obtain order information;
the server is also used for generating a graphic code according to the offline site identification and the order information and sending the graphic code to the user terminal;
the code scanning machine is used for receiving the graphic codes displayed by the user terminal, verifying the scanned graphic codes, and if the graphic codes pass the verification, indicating to start the car washing gate machine to carry out full-automatic car washing.
Firstly, when a server detects that an offline station for washing a vehicle is disconnected, determining disconnected station information, wherein the disconnected station information comprises: and identifying the disconnected network site, normally finishing payment with a third party in an interactive manner to obtain order information when a car washing order request corresponding to the disconnected network site identification and sent by the user terminal is received, and generating a graphic code according to the disconnected network site identification and the order information to return to the user terminal, so that the code scanner can obtain the order information by scanning the graphic code displayed by the user terminal. Therefore, the online station can still acquire order information under the condition that the online station for washing the car is disconnected.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
FIG. 1 is a flow chart of a network disconnection processing method of a fully automatic car wash in one embodiment;
fig. 2 is an architecture diagram of a broken network processing system of the full-automatic car washing in one embodiment.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
As shown in fig. 1, a method for processing a network interruption of a full-automatic car wash is provided, which is applied to a system for processing a network interruption of a full-automatic car wash, and the system includes: a server and a code scanner;
the method comprises the following steps:
The server monitors the network condition of each offline car washing station in real time, determines the station information of the offline station when the offline car washing station is monitored to be offline, and calls the station information of the offline station as the offline station information for distinguishing. The network breaking site identification is used for uniquely identifying a network breaking site.
And 104, when a car washing order request corresponding to the offline site identifier sent by the user terminal is received, the server and a third party interactively complete payment to obtain order information.
When the off-line car washing station is disconnected and a car washing order request corresponding to the disconnected station identification is received, the car washing order request still interacts with a third party (WeChat or Payment treasure or bank) according to a normal flow to complete payment to obtain order information.
And 106, the server generates a graphic code according to the offline site identification and the order information and sends the graphic code to the user terminal.
The server can not send order information to the offline site due to the offline site being disconnected, and at the moment, the server generates a graphic code according to the offline site identifier and the order information and then returns the graphic code to the user terminal. The graphic code may be a two-dimensional code, a bar code, or other forms of graphic codes. The user terminal may be a terminal device such as a mobile phone or a telephone watch of the user.
And step 108, scanning the graphic code displayed by the user terminal by the code scanning machine, verifying the scanned graphic code, and if the verification is passed, indicating to start the car washing gate machine to carry out full-automatic car washing.
In order to enable the offline station to obtain the order information, the user terminal displays the graphic code, the code scanning machine of the offline station obtains the order information by scanning the graphic code displayed by the user terminal, then the legality of the obtained order information is verified, and if the order information passes the verification, the car washing gate is instructed to be started to carry out full-automatic car washing.
Firstly, when the server detects that the offline station for washing the car is disconnected, determining the information of the disconnected station, wherein the information of the disconnected station comprises the following steps: and identifying the disconnected network site, normally finishing payment with a third party in an interactive manner to obtain order information when a car washing order request corresponding to the disconnected network site identification and sent by the user terminal is received, and generating a graphic code according to the disconnected network site identification and the order information to return to the user terminal, so that the code scanner can obtain the order information by scanning the graphic code displayed by the user terminal. Therefore, the online station can still acquire order information under the condition that the online station for washing the car is disconnected.
In one embodiment, the generating, by the server, a graphic code according to the offline site information and the order information includes: the server encrypts the offline site information and the order information by adopting a preset encryption algorithm to obtain encrypted information; and the server generates the graphic code according to the encryption information.
In order to guarantee the safety and the privacy of the information, the encryption algorithm is adopted to encrypt the information of the disconnected network site and the order information to obtain encrypted information, and then a graphic code is generated according to the encrypted information. If the graphic code is stolen, only encrypted information can be obtained, and order information cannot be intercepted.
And scanning the graphic code by adopting a code scanning machine of the offline car washing station to obtain encrypted information, and decrypting the encrypted information to obtain the information of the offline station and the order information.
In one embodiment, the encrypting the offline site information and the order information by the server using a preset encryption algorithm to obtain encrypted information includes: the server encrypts the offline site information and the order information by adopting an encryption private key to obtain an encryption character string; the server encrypts the disconnected network site information and the order information by adopting a signature private key to obtain a first signature verification character string, wherein the encrypted character string and the first signature verification character string are the encrypted information.
In order to guarantee the safety of information, a double encryption mode is adopted, a first double encryption mode is adopted, and an encryption private key is adopted to encrypt site information and order information to obtain an encryption character string. And a second re-encryption mode, namely encrypting by adopting a signature private key to obtain a first signature verification character string for verification.
In one embodiment, the verifying the scanned graphic code further includes: the code scanning machine reads the encrypted information in the graphic code, and decrypts the encrypted character string by adopting a decryption public key to obtain the information of the disconnected network site and the order information; encrypting the disconnected network site information and the order information by using a verification private key to obtain a second signature verification character string; and when the first signature verification character string is consistent with the second signature verification character string, judging that the verification is passed.
Because the double encryption is adopted, the corresponding code scanning machine not only has decryption, but also has signature verification. First, the encrypted character string is decrypted by using a decryption public key corresponding to the encryption private key. The server issues the decryption public key to a code scanner of the offline site in advance, so as to avoid leakage, a daily updating mode can be adopted, and the decryption public key is synchronized to each offline site after the encryption private key and the decryption public key are generated every day. And after decryption by using the decryption public key, encrypting the acquired site information and the order information by using the signature verification private key, wherein the signature private key and the signature verification private key are theoretically the same, so that if the first signature verification character string and the second signature verification character string are obtained after encryption, the verification is legal, and the verification is passed.
In one embodiment, different private and public key pairs can be generated for different sites in advance, so that only the order corresponding to each carwash site can be decrypted, and the order passes the verification as long as the decryption passes.
In one embodiment, the verifying the scanned graphic code further includes: the code scanning machine reads the encrypted information in the graphic code, and decrypts the encrypted character string by adopting a public key to obtain the information of the disconnected network site and the order information; encrypting the disconnected network site information and the order information by using a verification private key to obtain a second signature verification character string; when the first signature verification character string is consistent with the second signature verification character string, judging that the first signature verification character string is legal; judging whether the information of the disconnected network station is consistent with the information of the current station of the code scanner, and whether the order information is an order to be washed; and when the information of the disconnected network station is consistent with the information of the current station of the code scanner and the order information is the order to be washed, judging that the verification is passed.
Firstly, the scanned graphic code is ensured to be legal through decryption and signature verification, and then whether the network disconnection site information in the graphic code is consistent with the site information of the current site or not is further judged according to the network disconnection site information and the order information contained in the graphic code, so that the vehicle washing of the current site due to the order information of other sites is avoided. And judging whether the order information is a valid order, for example, whether the order information is a consumed order, according to the order information, and if the site information is consistent and the order information is a valid order, judging that the verification is passed.
In one embodiment, the generating, by the server, a graphic code according to the offline site information and the order information includes: the server acquires license plate information contained in the car washing order request; and the server generates the graphic code according to the disconnected network site information, the order information and the license plate information.
The graphic code can also comprise license plate information, so that the problem of wrong car washing is avoided. The license plate information can be carried in the order request sent by the user, and the license plate information can be contained in the subsequent generation of the graphic code.
In one embodiment, the order information includes: the order time; the verifying the scanned graphic code includes: reading the graphic code to obtain the disconnected website information, order information and license plate information; and if the information of the disconnected network station is consistent with the information of the station where the code scanner is located currently, the license plate information is consistent with the current license plate information, and the order time is in a preset time range, judging that the verification is passed.
When the graphic code includes the website information of the disconnected network, the order information and the license plate information, the three kinds of information need to be verified respectively. The order information includes order time, and the valid time of the order can be set, for example, if the order time is within one hour, the order is determined to be a valid order.
As shown in fig. 2, in one embodiment, a system for handling a broken network of a fully automatic car wash is provided, the system comprising: the system comprises a server 202 and a code scanning machine 204, wherein the server 202 is connected with a user terminal 206 through a network, the user terminal 206 displays a graphic code, the code scanning machine 204 scans the graphic code to acquire order information, and then the car washing end is instructed to start a gate machine to start full-automatic car washing.
The server 202 is configured to determine network disconnection site information after detecting that a network disconnection occurs at an offline station for washing, where the network disconnection site information includes: identifying a disconnected network station; and when a car washing order request corresponding to the disconnected website identification and sent by the user terminal is received, the server and a third party interactively complete payment to obtain order information.
The server 202 is further configured to generate a graphic code according to the offline site identifier and the order information, and send the graphic code to the user terminal.
The code scanning machine 204 is configured to receive the graphic code displayed by the user terminal, verify the scanned graphic code, and instruct the car washing gate to be turned on to perform full-automatic car washing if the verification passes.
In one embodiment, the server is further configured to encrypt the offline site information and the order information by using a preset encryption algorithm to obtain encrypted information; and generating the graphic code according to the encryption information.
In one embodiment, the server is further configured to encrypt the offline site information and the order information by using a private key to obtain an encrypted character string; and encrypting the disconnected network site information and the order information by adopting a signature private key to obtain a first signature verification character string, wherein the encrypted character string and the first signature verification character string are the encrypted information.
In one embodiment, the code scanner is further configured to read encrypted information in the graphic code, and decrypt the encrypted character string by using a decryption public key to obtain the offline site information and the order information; encrypting the disconnected network site information and the order information by using a verification private key to obtain a second signature verification character string; and when the first signature verification character string is consistent with the second signature verification character string, judging that the verification is passed.
In one embodiment, the code scanner is further configured to read encrypted information in the graphic code, and decrypt the encrypted character string by using a public key to obtain the offline site information and the order information; encrypting the disconnected network site information and the order information by using a verification private key to obtain a second signature verification character string; when the first signature verification character string is consistent with the second signature verification character string, judging that the first signature verification character string is legal; judging whether the information of the disconnected network station is consistent with the information of the current station of the code scanner, and whether the order information is an order to be washed; and when the information of the disconnected network station is consistent with the information of the current station of the code scanner and the order information is the order to be washed, judging that the verification is passed.
In one embodiment, the server is further configured to obtain license plate information included in the car washing order request; and generating the graphic code according to the disconnected network site information, the order information and the license plate information.
In one embodiment, the order information includes: the order time; the code scanning machine is also used for reading the graphic code to obtain the disconnected network site information, the order information and the license plate information; and if the information of the disconnected network station is consistent with the information of the station where the code scanner is located currently, the license plate information is consistent with the current license plate information, and the order time is in a preset time range, judging that the verification is passed.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A full-automatic car washing network breaking processing method is applied to a full-automatic car washing network breaking processing system, and is characterized in that the system comprises: a server and a code scanner;
the method comprises the following steps:
after the server detects that the offline car washing station is disconnected, determining disconnected station information, wherein the disconnected station information comprises: identifying a disconnected network station;
when a car washing order request corresponding to the disconnected website identification and sent by a user terminal is received, the server and a third party interactively complete payment to obtain order information;
the server generates a graphic code according to the offline site information and the order information and sends the graphic code to the user terminal;
and the code scanning machine receives the graphic code displayed by the user terminal, verifies the scanned graphic code, and instructs to start the car washing gate machine to carry out full-automatic car washing if the verification is passed.
2. The method of claim 1, wherein the server generates a graphic code according to the website information and the order information, and comprises:
the server encrypts the offline site information and the order information by adopting a preset encryption algorithm to obtain encrypted information;
and the server generates the graphic code according to the encryption information.
3. The method according to claim 2, wherein the server encrypts the website information and the order information by using a preset encryption algorithm to obtain encrypted information, and the method comprises:
the server encrypts the offline site information and the order information by adopting an encryption private key to obtain an encryption character string;
the server encrypts the disconnected network site information and the order information by adopting a signature private key to obtain a first signature verification character string, wherein the encrypted character string and the first signature verification character string are the encrypted information.
4. The method of claim 3, wherein the verifying the scanned graphic code further comprises:
the code scanning machine reads the encrypted information in the graphic code, and decrypts the encrypted character string by adopting a decryption public key to obtain the information of the disconnected network site and the order information;
encrypting the disconnected network site information and the order information by using a verification private key to obtain a second signature verification character string;
and when the first signature verification character string is consistent with the second signature verification character string, judging that the verification is passed.
5. The method of claim 3, wherein the verifying the scanned graphic code further comprises:
the code scanning machine reads the encrypted information in the graphic code, and decrypts the encrypted character string by adopting a public key to obtain the information of the disconnected network site and the order information;
encrypting the disconnected network site information and the order information by using a verification private key to obtain a second signature verification character string;
when the first signature verification character string is consistent with the second signature verification character string, judging that the first signature verification character string is legal;
judging whether the information of the disconnected network station is consistent with the information of the current station of the code scanner, and whether the order information is an order to be washed;
and when the information of the disconnected network station is consistent with the information of the current station of the code scanner and the order information is the order to be washed, judging that the verification is passed.
6. The method of claim 2, wherein the server generates a graphic code according to the website information and the order information, and comprises:
the server acquires license plate information contained in the car washing order request;
and the server generates the graphic code according to the disconnected network site information, the order information and the license plate information.
7. The method of claim 6, wherein the order information comprises: the order time;
the verifying the scanned graphic code includes:
reading the graphic code to obtain the disconnected website information, order information and license plate information;
and if the information of the disconnected network station is consistent with the information of the station where the code scanner is located currently, the license plate information is consistent with the current license plate information, and the order time is in a preset time range, judging that the verification is passed.
8. A network breaking processing system of full-automatic car washing is characterized in that the system comprises: a server and a code scanner;
the server is used for determining the information of the disconnected network station after detecting that the offline station for washing is disconnected, wherein the information of the disconnected network station comprises the following steps: identifying a disconnected network station; when a car washing order request corresponding to the disconnected website identification and sent by a user terminal is received, the server and a third party interactively complete payment to obtain order information;
the server is also used for generating a graphic code according to the offline site identification and the order information and sending the graphic code to the user terminal;
the code scanning machine is used for receiving the graphic codes displayed by the user terminal, verifying the scanned graphic codes, and if the graphic codes pass the verification, indicating to start the car washing gate machine to carry out full-automatic car washing.
9. The system according to claim 8, wherein the server is further configured to encrypt the offline site information and the order information by using a preset encryption algorithm to obtain encrypted information; and generating the graphic code according to the encryption information.
10. The system according to claim 9, wherein the server is further configured to encrypt the website information and the order information with a private key to obtain an encrypted string; and encrypting the disconnected network site information and the order information by adopting a signature private key to obtain a first signature verification character string, wherein the encrypted character string and the first signature verification character string are the encrypted information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110773644.4A CN113660200A (en) | 2021-07-08 | 2021-07-08 | Network breaking processing method and system for full-automatic car washing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110773644.4A CN113660200A (en) | 2021-07-08 | 2021-07-08 | Network breaking processing method and system for full-automatic car washing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113660200A true CN113660200A (en) | 2021-11-16 |
Family
ID=78477187
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110773644.4A Pending CN113660200A (en) | 2021-07-08 | 2021-07-08 | Network breaking processing method and system for full-automatic car washing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113660200A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594615A (en) * | 2008-12-01 | 2009-12-02 | 北京易路联动技术有限公司 | Network management method, system and the equipment of terminal triple information security |
CN101754202A (en) * | 2008-12-01 | 2010-06-23 | 北京易路联动技术有限公司 | Method, system and device for terminal information security networking management |
CN104618255A (en) * | 2014-12-29 | 2015-05-13 | 国家电网公司 | Front acquiring service system and data processing method |
CN105095978A (en) * | 2015-09-30 | 2015-11-25 | 张华� | Ordering method and device based on two-dimension code and door control system |
CN108711206A (en) * | 2018-05-17 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Gate control method, relevant device, system and storage medium |
CN108737394A (en) * | 2018-05-08 | 2018-11-02 | 腾讯科技(深圳)有限公司 | Off-line verification system, barcode scanning equipment and server |
CN110958142A (en) * | 2019-11-26 | 2020-04-03 | 华为技术有限公司 | Device maintenance method, maintenance device, storage medium, and computer program product |
CN212782168U (en) * | 2020-06-24 | 2021-03-23 | 深圳市比特安科技有限公司 | Offline charging device supporting mobile payment |
-
2021
- 2021-07-08 CN CN202110773644.4A patent/CN113660200A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101594615A (en) * | 2008-12-01 | 2009-12-02 | 北京易路联动技术有限公司 | Network management method, system and the equipment of terminal triple information security |
CN101754202A (en) * | 2008-12-01 | 2010-06-23 | 北京易路联动技术有限公司 | Method, system and device for terminal information security networking management |
CN104618255A (en) * | 2014-12-29 | 2015-05-13 | 国家电网公司 | Front acquiring service system and data processing method |
CN105095978A (en) * | 2015-09-30 | 2015-11-25 | 张华� | Ordering method and device based on two-dimension code and door control system |
CN108737394A (en) * | 2018-05-08 | 2018-11-02 | 腾讯科技(深圳)有限公司 | Off-line verification system, barcode scanning equipment and server |
CN108711206A (en) * | 2018-05-17 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Gate control method, relevant device, system and storage medium |
CN110958142A (en) * | 2019-11-26 | 2020-04-03 | 华为技术有限公司 | Device maintenance method, maintenance device, storage medium, and computer program product |
CN212782168U (en) * | 2020-06-24 | 2021-03-23 | 深圳市比特安科技有限公司 | Offline charging device supporting mobile payment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789018B (en) | Secret key remote acquisition methods and device | |
JP5212642B2 (en) | Validity confirmation system, validity confirmation method, information processing card, confirmation device, and authentication device | |
CN109583181B (en) | Authentication method, authentication device and machine-readable storage medium | |
CN111031047B (en) | Device communication method, device, computer device and storage medium | |
CN111770057B (en) | Identity verification system and identity verification method | |
CN110719203B (en) | Operation control method, device and equipment of intelligent household equipment and storage medium | |
CN107360131B (en) | Method, server and system for controlling validity of service request | |
CN111107073B (en) | Application automatic login method and device, computer equipment and storage medium | |
CN109120395B (en) | Tag data generation method, tag and data processing based on NFC tag | |
CN103067401A (en) | Method and system for key protection | |
CN111814132B (en) | Security authentication method and device, security authentication chip and storage medium | |
CN107124279B (en) | Method and device for erasing terminal data | |
CN111583482A (en) | Access control system based on two-dimensional code and control method thereof | |
CN112468294A (en) | Access method and authentication equipment for vehicle-mounted TBOX | |
CN108881256B (en) | Secret key exchange method and device, hydroelectric pile and network equipment | |
CN109587683B (en) | Method and system for preventing short message from being monitored, application program and terminal information database | |
CN111541708B (en) | Identity authentication method based on power distribution | |
CN112733127A (en) | Bidirectional authentication method and system based on block chain | |
CN110971610A (en) | Control system identity verification method and device, computer equipment and storage medium | |
CN113660200A (en) | Network breaking processing method and system for full-automatic car washing | |
US20240073028A1 (en) | Anti-counterfeiting verifying method, hardware apparatus, system, electronic device, and storage medium | |
CN112202549B (en) | Charging management method, charging terminal data processing method and charging management platform data processing method | |
CN110071908B (en) | Terminal binding method and device, computer equipment and storage medium | |
CN113850591A (en) | Method for verifying authenticity of payment two-dimensional code based on encryption and digital signature algorithm | |
CN116318899B (en) | Data encryption and decryption processing method, system, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20211116 |