CN117394975A - E-Token loss report supplementing method and device, computer equipment and storage medium - Google Patents

E-Token loss report supplementing method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN117394975A
CN117394975A CN202311113457.9A CN202311113457A CN117394975A CN 117394975 A CN117394975 A CN 117394975A CN 202311113457 A CN202311113457 A CN 202311113457A CN 117394975 A CN117394975 A CN 117394975A
Authority
CN
China
Prior art keywords
token
user
identification
message
loss
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311113457.9A
Other languages
Chinese (zh)
Inventor
杨彬
陈颖
傅亚敏
郭雯
姚一泽
任方园
李昂
郝佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311113457.9A priority Critical patent/CN117394975A/en
Publication of CN117394975A publication Critical patent/CN117394975A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of blockchains, in particular to a loss report and compensation method, a device, computer equipment, a storage medium and a computer program product for E-Token, wherein the loss report and compensation method, the device, the computer equipment, the storage medium and the computer program product are used for acquiring a loss report and compensation application 5G message of the E-Token by a user, determining user information stored on a blockchain according to a user identifier in the loss report and compensation application 5G message, checking a first face image in the loss report and compensation application 5G message according to a second face image in the user information, acquiring an E-Token identifier set corresponding to the user identifier when the checking is passed, sending the E-Token identifier set to a client, receiving a target E-Token identifier 5G message fed back by the user according to the E-Token identifier set, and carrying out loss report and compensation on the corresponding E-Token according to the target E-Token identifier 5G message, so that the user can carry out loss report and compensation on the E-Token without arriving at the site, and the E-Token can be more efficient and convenient.

Description

E-Token loss report supplementing method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, an apparatus, a computer device, a storage medium, and a computer program product for loss report repair of an E-Token based on a blockchain technology.
Background
In the related art, when the E-Token of the user is lost, the E-Token can be processed only by taking out the number and queuing the belonging website, and for the unusual people or the people in the outside, the E-Token cannot be processed in time due to unclear approach to the website, so that the efficiency is low, the time and the labor are consumed, and the user experience is poor.
Therefore, there is a need for a solution for loss report repair of E-Token to solve the above-mentioned problems in the related art.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, apparatus, computer device, computer-readable storage medium, and computer program product for loss report repair of E-Token that can efficiently and conveniently repair the loss report of E-Token.
In a first aspect, the present application provides a method for loss report repair for an E-Token. The method comprises the following steps:
acquiring a loss report and repair application 5G message of the user to the electronic Token E-Token, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
determining user information stored on a blockchain according to the user identification, wherein the user information comprises a second face image;
verifying the first face image according to the second face image;
when the verification passes, acquiring an E-Token identification set of the electronic Token corresponding to the user identification;
the E-Token identification set is sent to a client, and a target E-Token identification 5G message fed back by the user according to the E-Token identification set is received;
and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
In one embodiment, before the acquiring the request for loss report and repair 5G message of the electronic Token E-Token from the user, the method further includes: receiving user information of the electronic Token successfully applied by the user; the user information is stored on the blockchain.
In one embodiment, when the verification passes, acquiring the electronic Token E-Token identifier set corresponding to the user identifier includes: when the verification passes, inquiring a corresponding electronic Token E-Token identifier according to the user identifier; and generating the electronic Token E-Token identifier set according to the electronic Token E-Token identifier obtained by inquiry.
In one embodiment, the reporting loss compensation processing according to the target electronic Token E-Token identification 5G message includes: when receiving the target electronic Token E-Token identification 5G message, opening a new account of the electronic Token E-Token according to the first face image and the user identification; transferring account balance corresponding to the target electronic Token E-Token identifier to the new account by calling the electronic Token E-Token transfer transaction; and calling the electronic Token E-Token loss reporting transaction, and reporting loss of the account corresponding to the target electronic Token E-Token identifier.
In one embodiment, the method further comprises: the transfer transaction and loss report records are stored on the blockchain.
In one embodiment, the user identification includes at least one of a cell phone number and a certificate number.
In a second aspect, the present application further provides an E-Token loss report device, the device comprising:
the loss report message acquisition module is used for acquiring a loss report and repair application 5G message of the electronic Token E-Token from a user, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
the user information determining module is used for determining user information stored on the blockchain according to the user identification, wherein the user information comprises a second face image;
the verification module is used for verifying the first face image according to the second face image;
the set acquisition module is used for acquiring an E-Token identification set corresponding to the user identification when the verification passes;
the loss reporting processing module is used for sending the electronic Token E-Token identification set to a client and receiving a target electronic Token E-Token identification 5G message fed back by the user according to the electronic Token E-Token identification set; and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the method according to the first aspect above when the processor executes the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method as described in the first aspect above.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, implements the steps of the method as described in the first aspect above.
According to the loss report and compensation method, device, computer equipment, storage medium and computer program product of the E-Token, through obtaining the loss report and compensation application 5G message of the E-Token by a user, determining the user information stored on a blockchain according to the user identification in the loss report and compensation application 5G message, and checking the first face image in the loss report and compensation application 5G message according to the second face image in the user information, when the verification is passed, obtaining the E-Token identification set corresponding to the user identification, sending the E-Token identification set to a client, receiving the target E-Token identification 5G message fed back by the user according to the E-Token identification set, and carrying out loss report and compensation on the corresponding E-Token according to the target E-Token identification 5G message, so that the E-Token can be more efficiently and conveniently carried out loss report and compensation on the E-Token without the user reaching the scene.
Drawings
FIG. 1 is a flow chart of a method of loss report repair for an E-Token in one embodiment;
FIG. 2 is a flow chart of a loss report back-up procedure in one embodiment;
FIG. 3 is a flow chart of a method for loss report repair of an E-Token in another embodiment;
FIG. 4 is a block diagram of a loss report back device of the E-Token in one embodiment;
fig. 5 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, an E-Token loss report method is provided, and the method is applied to a server of a banking system for illustration, and may include the following steps:
step 102, acquiring a loss report and repair application 5G message of the E-Token.
The loss report and repair application 5G message is an application message for carrying out loss report and repair on the E-Token, and the message is transmitted to the server in the form of a 5G message (the 5G message is an upgrade of a short message service, is a basic telecommunication service of an operator, realizes leap of service experience based on an IP technology, has more supported media formats and has more expression forms). Specifically, the loss report and repair application 5G message includes a first face image of the user and a user identifier of the user, where the first face image may be a face image of the user applying for loss report and repair that is currently collected. The user identification may then be a logo for distinguishing between different users, such as, but not limited to, a user's identification number (e.g., identification card number, passport number, etc.), cell phone number, mailbox, etc.
In this embodiment, when a user needs to transact the loss reporting and repairing service of the E-Token, an application may be initiated by the client, and the client may trigger to collect a face image of the user, that is, a first face image, based on the application of the user, and may generate an application message for loss reporting and repairing of the E-Token based on a user identifier carried during the application of the user, and send the message to the server in a form of a 5G message. The server can acquire the report loss compensation application 5G message of the E-Token.
Step 104, determining the user information stored on the blockchain according to the user identification.
The user information comprises a second face image. The block chain is a chain composed of blocks, each of which holds certain information, and they are connected into a chain according to the time sequence of each generation. Generally, when a user successfully applies for an E-Token, corresponding user information is stored in the blockchain, and specifically, the user information includes, but is not limited to, a user name, a user identifier (such as a mobile phone number, an identity card number, etc.), a home address, an E-Token identifier successfully applied for by the user, a face image of the applied user, that is, a second face image, etc. The E-Token identifier is a flag for distinguishing between different E-tokens, and may be, for example, an E-Token identifier.
In this embodiment, after the server obtains the request for loss report and repair 5G of the E-Token, the server may query the user information stored on the blockchain according to the user identifier in the request for loss report and repair 5G, and specifically, the server may obtain the second face image corresponding to the user identifier from the user information stored on the blockchain.
And 106, checking the first face image according to the second face image.
In particular, the server may verify the first face image based on the second face image of the user stored on the blockchain. And comparing the similarity between the first face image and the second face image, and when the similarity is greater than or equal to a set similarity threshold value, indicating that the user identity verification of the loss report repair application of the E-Token passes. And when the similarity is smaller than the set similarity threshold, the user identity verification of the loss report and repair application of the E-Token is not passed.
And step 108, when the verification passes, acquiring an E-Token identification set corresponding to the user identification.
The E-Token identifier set corresponding to the user identifier may be a set of all E-Token identifiers applied by the user and obtained by querying in the blockchain based on the user identifier. Specifically, when the user identity verification of the loss report and repair application of the E-Token passes through the steps, the server can further acquire the E-Token identifier set corresponding to the user identifier.
In one scenario, when the user identity verification of the loss report and repair application of the E-Token passes through the steps, the server may also query all E-Token identifications applied for by the corresponding user in the blockchain according to the user identification, and generate an E-Token identification set according to all E-Token identifications obtained by the query, so as to obtain an E-Token identification set corresponding to the user identification.
Step 110, the E-Token identification set is sent to the client, and the target E-Token identification 5G message fed back by the user according to the E-Token identification set is received.
The target E-Token identification 5G message is a target E-Token identification which is selected by a user according to the E-Token identification set and needs to be subjected to loss reporting and repair, and is generated according to the target E-Token identification.
In this embodiment, the server may send the E-Token identifier set corresponding to the user identifier obtained in the above step to the client, where the user may select, according to the E-Token identifier set received by the client, a target E-Token identifier that needs to be subjected to loss reporting and repair, and the client generates, according to the target E-Token identifier, a target E-Token identifier 5G message, and returns the target E-Token identifier 5G message to the server. The server may then receive the target E-Token identification 5G message.
And 112, performing loss report and repair according to the target E-Token identification 5G message.
Specifically, the server may perform loss reporting on the corresponding E-Token according to the received target E-Token identification 5G message.
In the loss report and repair method of the E-Token, the server determines the user information stored on the blockchain according to the user identification in the loss report and repair application 5G message by acquiring the loss report and repair application 5G message of the E-Token by the user, and performs verification on the first face image in the loss report and repair application 5G message according to the second face image in the user information, when the verification is passed, the E-Token identification set corresponding to the user identification is acquired, and the E-Token identification set is sent to the client so as to receive the target E-Token identification 5G message fed back by the user according to the E-Token identification set, and perform loss report and repair on the corresponding E-Token according to the target E-Token identification 5G message, so that the user can perform loss report and repair on the E-Token without arriving at the site, and the loss report and repair of the E-Token is more efficient and convenient.
In one embodiment, before obtaining the user request for loss report for E-Token 5G message in step 102, the method may further include: receiving user information of a user successfully applying for E-Token; user information is stored on the blockchain. Typically, when a user applies for opening a new account of an E-Token through a client or at a website, corresponding user information is collected, including, but not limited to, a user name, a user identification (e.g., a mobile phone number, an identification card number, etc.), a home address, a face image of the user to be applied, i.e., a second face image, etc. When the user successfully applies for the E-Token, the server can record the user information and the E-Token identification which is applied for success into the blockchain, so that the user information and the E-Token identification which is applied for success can be conveniently inquired when the user needs to be later.
In one embodiment, as shown in fig. 2, in step 112, the reporting loss repair process according to the target E-Token identifier 5G message may specifically include:
step 202, when receiving the target E-Token identification 5G message, opening a new account of the E-Token according to the first face image and the user identification.
Wherein the new account of the E-Token may be a newly opened E-Token account. Specifically, when the server receives the target E-Token identification 5G message, a new account of the E-Token can be opened according to the first face image and the user identification.
And 204, invoking E-Token transfer transaction, and transferring account balance corresponding to the target E-Token identifier to a new account.
The E-Token transfer transaction may be an interface or plug-in for conducting the E-Token transfer transaction. Specifically, the server may invoke an E-Token transfer transaction to transfer the account balance corresponding to the target E-Token identifier to a new account, i.e., transfer the account balance of the E-Token for which loss report is applied to the newly opened E-Token to the new account.
Step 206, calling the E-Token loss report transaction, and reporting loss of the account corresponding to the target E-Token identifier.
Wherein the E-Token loss report transaction may be an interface or plug-in for conducting E-Token loss report. Specifically, after the server transfers the account balance corresponding to the target E-Token identifier to the new account, the server may also call the E-Token loss report transaction to report the account corresponding to the target E-Token identifier, i.e. the account of the E-Token for which loss report repair is applied may be subjected to loss report processing, for example, the account may be frozen or logged off, or the state of the account may be modified, for example, the state of the account may be modified to be unavailable. Thus, the loss report repair processing of the E-Token applying for loss report repair is completed.
In one scenario, the server may also store the transfer transaction and loss report records described above on a blockchain. Thereby facilitating the user to conveniently inquire the related information when the user needs the related information later.
In one scenario, the E-Token identifier set obtained by the server and corresponding to the user identifier may further include account states, such as an available state or an unavailable state, corresponding to each E-Token identifier, so that a user can conveniently and quickly determine a target E-Token identifier needing loss reporting and repair according to the account states of each E-Token.
In one embodiment, as shown in FIG. 3, the method for reporting loss compensation of E-Token described above may specifically include:
step 302, receiving user information of a user successful application E-Token, and storing the user information on a blockchain.
Specifically, the user records the user information on the blockchain when each website successfully opens the E-Token. The user information includes, but is not limited to, a user name, a user identification (such as a mobile phone number, an identity card number, etc.), a home address, an E-Token identification successfully applied by the user, a face image of the applied user, i.e. a second face image, etc.
Step 304, acquire the report loss compensation application 5G message of the E-Token.
Specifically, when a user needs to transact the loss report and repair business of the E-Token, triggering the client to input a face image, namely a first face image, and initiate an application, and sending application information (the information comprises the first face image and a user identifier) of the loss report and repair to the 5G message receiving center by the client. The 5G message receiving center generates a corresponding loss report and repair application 5G message and sends the corresponding loss report and repair application 5G message to the server.
Step 306, determining a second face image in the user information stored on the blockchain according to the user identification in the loss report make-up application 5G message.
Specifically, the server queries corresponding user information in the blockchain according to the user identifier in the loss report repair application 5G message, and acquires a second face image in the user information.
Step 308, determining whether the first face image passes the verification according to the second face image.
Specifically, the verification may be performed based on the image similarity, and the verification method in step 106 may be referred to, which will not be described in detail in this embodiment.
And step 310, inquiring a corresponding E-Token identification set according to the user identification when the verification passes.
Specifically, when the verification is passed, the user can be confirmed to operate as the user himself, and then the E-Token identification under the name of the user can be queried according to the user identification, namely, the E-Token set under the user name is queried.
Step 312, the queried E-Token identification set is sent to the client.
Step 314, receiving a target E-Token identification 5G message fed back by the user according to the E-Token identification set.
For specific reference to step 110, the description of this embodiment is omitted.
Step 316, a new account for E-Token is opened based on the first face image and the user identification.
And step 318, calling 8E-Token transfer transaction, and transferring the account balance corresponding to the target E-Token identifier to the new account.
Step 320, call E-Token loss reporting transaction, and report loss to account corresponding to target E-Token identification.
At step 322, the transfer transaction and loss report records are stored on the blockchain.
Step 324, when the verification fails, the process is ended.
Specifically, when the verification fails, the operation is indicated as the operation of a non-user himself, and in order to ensure the property safety of the user, the process is ended, namely, the loss reporting and repairing operation is not continuously executed.
In the above embodiment, when each website opens an E-Token, the user records the information of the user in the blockchain; when the user needs to report loss, the application information is sent to a 5G message center, after the 5G message center receives the request, the user information in the blockchain is inquired according to the key information of the requested user information such as a mobile phone number, an identity card number and the like, and then whether the requested user is operated by the user is checked. And when the operation is confirmed to be the operation of the user, inquiring an E-Token list under the user of the user for the user to select the loss report, and storing the loss report repair record in the blockchain. The method solves the problem that in the prior art, if a customer needs to report the loss compensation E-Token, the customer must go to a counter for handling, so that the customer can report the loss compensation to the E-Token without arriving at the site, and the report of the E-Token is more efficient and convenient.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides an E-Token loss reporting and repairing device for realizing the E-Token loss reporting and repairing method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the loss report repairing device for one or more E-Token provided below may be referred to the limitation of the loss report repairing method for E-Token in the above description, and will not be repeated here.
In one embodiment, as shown in FIG. 4, there is provided an E-Token loss report device comprising: a loss report message acquisition module 402, a user information determination module 404, a verification module 406, a collection acquisition module 408, and a loss report processing module 410, wherein:
the loss report message obtaining module 402 is configured to obtain a loss report request 5G message of the electronic Token E-Token from a user, where the loss report request 5G message includes a first face image of the user and a user identifier of the user;
a user information determining module 404, configured to determine, according to the user identifier, user information stored on a blockchain, where the user information includes a second face image;
a verification module 406, configured to verify the first face image according to the second face image;
the set obtaining module 408 is configured to obtain an electronic Token E-Token identifier set corresponding to the user identifier when the verification passes;
the loss report processing module 410 is configured to send the electronic Token E-Token identifier set to a client, and receive a target electronic Token E-Token identifier 5G message fed back by the user according to the electronic Token E-Token identifier set; and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
In one embodiment, the device further comprises a storage module, configured to receive user information that the user successfully applies for the electronic Token; the user information is stored on the blockchain.
In one embodiment, the set acquisition module is further to: when the verification passes, inquiring a corresponding electronic Token E-Token identifier according to the user identifier; and generating the electronic Token E-Token identifier set according to the electronic Token E-Token identifier obtained by inquiry.
In one embodiment, the loss processing module is further configured to: when receiving the target electronic Token E-Token identification 5G message, opening a new account of the electronic Token E-Token according to the first face image and the user identification; transferring account balance corresponding to the target electronic Token E-Token identifier to the new account by calling the electronic Token E-Token transfer transaction; and calling the electronic Token E-Token loss reporting transaction, and reporting loss of the account corresponding to the target electronic Token E-Token identifier.
In one embodiment, the storage module is further configured to store transfer transactions and loss report records on the blockchain.
The modules in the loss report servicing device of the E-Token may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing user data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements an E-Token's loss report method.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
acquiring a loss report and repair application 5G message of the user to the electronic Token E-Token, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
determining user information stored on a blockchain according to the user identification, wherein the user information comprises a second face image;
verifying the first face image according to the second face image;
when the verification passes, acquiring an E-Token identification set of the electronic Token corresponding to the user identification;
the E-Token identification set is sent to a client, and a target E-Token identification 5G message fed back by the user according to the E-Token identification set is received;
and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving user information of the electronic Token successfully applied by the user; the user information is stored on the blockchain.
In one embodiment, the processor when executing the computer program further performs the steps of: when the verification passes, inquiring a corresponding electronic Token E-Token identifier according to the user identifier; and generating the electronic Token E-Token identifier set according to the electronic Token E-Token identifier obtained by inquiry.
In one embodiment, the processor when executing the computer program further performs the steps of: when receiving the target electronic Token E-Token identification 5G message, opening a new account of the electronic Token E-Token according to the first face image and the user identification; transferring account balance corresponding to the target electronic Token E-Token identifier to the new account by calling the electronic Token E-Token transfer transaction; and calling the electronic Token E-Token loss reporting transaction, and reporting loss of the account corresponding to the target electronic Token E-Token identifier.
In one embodiment, the processor when executing the computer program further performs the steps of: the transfer transaction and loss report records are stored on the blockchain.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring a loss report and repair application 5G message of the user to the electronic Token E-Token, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
determining user information stored on a blockchain according to the user identification, wherein the user information comprises a second face image;
verifying the first face image according to the second face image;
when the verification passes, acquiring an E-Token identification set of the electronic Token corresponding to the user identification;
the E-Token identification set is sent to a client, and a target E-Token identification 5G message fed back by the user according to the E-Token identification set is received;
and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving user information of the electronic Token successfully applied by the user; the user information is stored on the blockchain.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the verification passes, inquiring a corresponding electronic Token E-Token identifier according to the user identifier; and generating the electronic Token E-Token identifier set according to the electronic Token E-Token identifier obtained by inquiry.
In one embodiment, the computer program when executed by the processor further performs the steps of: when receiving the target electronic Token E-Token identification 5G message, opening a new account of the electronic Token E-Token according to the first face image and the user identification; transferring account balance corresponding to the target electronic Token E-Token identifier to the new account by calling the electronic Token E-Token transfer transaction; and calling the electronic Token E-Token loss reporting transaction, and reporting loss of the account corresponding to the target electronic Token E-Token identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of: the transfer transaction and loss report records are stored on the blockchain.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
acquiring a loss report and repair application 5G message of the user to the electronic Token E-Token, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
determining user information stored on a blockchain according to the user identification, wherein the user information comprises a second face image;
verifying the first face image according to the second face image;
when the verification passes, acquiring an E-Token identification set of the electronic Token corresponding to the user identification;
the E-Token identification set is sent to a client, and a target E-Token identification 5G message fed back by the user according to the E-Token identification set is received;
and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving user information of the electronic Token successfully applied by the user; the user information is stored on the blockchain.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the verification passes, inquiring a corresponding electronic Token E-Token identifier according to the user identifier; and generating the electronic Token E-Token identifier set according to the electronic Token E-Token identifier obtained by inquiry.
In one embodiment, the computer program when executed by the processor further performs the steps of: when receiving the target electronic Token E-Token identification 5G message, opening a new account of the electronic Token E-Token according to the first face image and the user identification; transferring account balance corresponding to the target electronic Token E-Token identifier to the new account by calling the electronic Token E-Token transfer transaction; and calling the electronic Token E-Token loss reporting transaction, and reporting loss of the account corresponding to the target electronic Token E-Token identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of: the transfer transaction and loss report records are stored on the blockchain.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (10)

1. A method for loss report repair of an E-Token, the method comprising:
acquiring a loss report and repair application 5G message of the user to the electronic Token E-Token, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
determining user information stored on a blockchain according to the user identification, wherein the user information comprises a second face image;
verifying the first face image according to the second face image;
when the verification passes, acquiring an E-Token identification set of the electronic Token corresponding to the user identification;
the E-Token identification set is sent to a client, and a target E-Token identification 5G message fed back by the user according to the E-Token identification set is received;
and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
2. The method of claim 1, wherein prior to obtaining the user's loss report back application 5G message for the electronic Token E-Token, the method further comprises:
receiving user information of the electronic Token successfully applied by the user;
the user information is stored on the blockchain.
3. The method according to claim 1, wherein when the verification passes, acquiring the set of E-Token identifications corresponding to the user identification comprises:
when the verification passes, inquiring a corresponding electronic Token E-Token identifier according to the user identifier;
and generating the electronic Token E-Token identifier set according to the electronic Token E-Token identifier obtained by inquiry.
4. The method of claim 1, wherein the reporting of the loss compensation based on the target electronic Token identification 5G message comprises:
when receiving the target electronic Token E-Token identification 5G message, opening a new account of the electronic Token E-Token according to the first face image and the user identification;
transferring account balance corresponding to the target electronic Token E-Token identifier to the new account by calling the electronic Token E-Token transfer transaction;
and calling the electronic Token E-Token loss reporting transaction, and reporting loss of the account corresponding to the target electronic Token E-Token identifier.
5. The method according to claim 4, wherein the method further comprises:
the transfer transaction and loss report records are stored on the blockchain.
6. The method of any one of claims 1 to 5, wherein the user identification comprises at least one of a cell phone number and a certificate number.
7. An E-Token loss report back device, the device comprising:
the loss report message acquisition module is used for acquiring a loss report and repair application 5G message of the electronic Token E-Token from a user, wherein the loss report and repair application 5G message comprises a first face image of the user and a user identifier of the user;
the user information determining module is used for determining user information stored on the blockchain according to the user identification, wherein the user information comprises a second face image;
the verification module is used for verifying the first face image according to the second face image;
the set acquisition module is used for acquiring an E-Token identification set corresponding to the user identification when the verification passes;
the loss reporting processing module is used for sending the electronic Token E-Token identification set to a client and receiving a target electronic Token E-Token identification 5G message fed back by the user according to the electronic Token E-Token identification set; and carrying out loss reporting and repairing according to the target electronic Token E-Token identification 5G message.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202311113457.9A 2023-08-31 2023-08-31 E-Token loss report supplementing method and device, computer equipment and storage medium Pending CN117394975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311113457.9A CN117394975A (en) 2023-08-31 2023-08-31 E-Token loss report supplementing method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311113457.9A CN117394975A (en) 2023-08-31 2023-08-31 E-Token loss report supplementing method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117394975A true CN117394975A (en) 2024-01-12

Family

ID=89469036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311113457.9A Pending CN117394975A (en) 2023-08-31 2023-08-31 E-Token loss report supplementing method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117394975A (en)

Similar Documents

Publication Publication Date Title
CN111008069B (en) Service processing method, device, computer equipment and storage medium
CN109598598A (en) Transaction processing method and device, electronic equipment based on block chain
CN109598504A (en) Transaction processing method and device, electronic equipment based on block chain
CN109255056B (en) Data reference processing method, device, equipment and storage medium of block chain
CN112819617B (en) Data uplink method and device, electronic equipment and storage medium
WO2018210097A1 (en) Method and device for execution transaction mode by classification
CN110309185B (en) Data query method, system, computer device and storage medium
CN117394975A (en) E-Token loss report supplementing method and device, computer equipment and storage medium
CN116015609A (en) Business record storage method, device, computer equipment and storage medium
CN115168203A (en) Interface simulation method, device, system, computer equipment and storage medium
CN107704557B (en) Processing method and device for operating mutually exclusive data, computer equipment and storage medium
CN117010889A (en) Data processing method, device, equipment, medium and product
CN113902415A (en) Financial data checking method and device, computer equipment and storage medium
CN110363537B (en) Remote surface signature screen calling method and device, storage medium and computer equipment
CN115221532A (en) Method and system for storing resource bill data, computer equipment and storage medium
CN112541764B (en) Asset management method, device and system based on intelligent contract
CN117439982A (en) Resource management method, device, computer equipment and storage medium
CN117155661A (en) Risk log data pushing method, apparatus, computer device and storage medium
CN117036013A (en) Information processing system, method, computer device, and storage medium
CN116166685A (en) Method, device, computer equipment and storage medium for matching offer object information
CN116225830A (en) Service operation log reporting method and device, computer equipment and storage medium
CN117955651A (en) Method, device, computer equipment and storage medium for processing public key certificate of issuer
CN117035779A (en) Account upgrading method, account upgrading device, computer equipment and storage medium
CN116709299A (en) Auxiliary card opening method, device, computer equipment and storage medium
CN117081782A (en) Network access method, system, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination