WO2021051525A1 - Procédé de traitement d'informations et dispositif associé - Google Patents

Procédé de traitement d'informations et dispositif associé Download PDF

Info

Publication number
WO2021051525A1
WO2021051525A1 PCT/CN2019/116977 CN2019116977W WO2021051525A1 WO 2021051525 A1 WO2021051525 A1 WO 2021051525A1 CN 2019116977 W CN2019116977 W CN 2019116977W WO 2021051525 A1 WO2021051525 A1 WO 2021051525A1
Authority
WO
WIPO (PCT)
Prior art keywords
merchant
user information
information
node
encrypted
Prior art date
Application number
PCT/CN2019/116977
Other languages
English (en)
Chinese (zh)
Inventor
黄惠娜
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021051525A1 publication Critical patent/WO2021051525A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services

Definitions

  • This application relates to the field of computer technology, and in particular to an information processing method and related devices.
  • the embodiments of the present invention provide an information processing method and related devices. Implementing the embodiments of the present invention is beneficial to improving the accuracy of information.
  • the first aspect of the embodiments of the present invention provides an information processing method, including:
  • the merchant node sends a user information extraction request to the user node, where the user information extraction request carries the merchant public key, and the user information extraction request is used to instruct the user node to obtain the user information to be encrypted, using the merchant public key pair Encrypting the user information to be encrypted to obtain encrypted user information;
  • the merchant node uses the merchant private key to decrypt the encrypted user information to obtain unencrypted user information, where the merchant private key corresponds to the merchant public key;
  • the merchant node generates an electronic membership card based on the unencrypted user information.
  • a second aspect of the embodiments of the present invention provides an information processing device, including:
  • the transceiver module is configured to send a user information extraction request to a user node, where the user information extraction request carries a merchant public key, and the user information extraction request is used to instruct the user node to obtain user information to be encrypted, and use the merchant Encrypting the user information to be encrypted with a public key to obtain encrypted user information; and receiving a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
  • the processing module is used to decrypt the encrypted user information using the merchant private key to obtain unencrypted user information, where the merchant private key corresponds to the merchant public key; and generate electronic information based on the unencrypted user information membership card.
  • a third aspect of the embodiments of the present invention provides an electronic device for data encryption, including a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory, and It is configured to be executed by the processor to execute part or all of the steps of any information processing method described in the foregoing method embodiments.
  • a fourth aspect of the embodiments of the present invention provides a computer non-volatile readable storage medium, where the computer non-volatile readable storage medium is used to store a computer program, and the stored computer program is executed by the processor, In order to achieve, it includes part or all of the steps of any information processing method described in the foregoing method embodiments.
  • the merchant node sends a user information extraction request to the user node, so that the user node obtains the user information to be encrypted, and uses the merchant public key carried in the user information extraction request to encrypt the user information to be encrypted to obtain
  • the user information is encrypted, and then, the merchant node receives the user information extraction response carrying the encrypted user information sent by the user node, and decrypts the encrypted user information by using the merchant private key to obtain unencrypted user information, avoiding the user to fill in on-site User information, thereby avoiding the problem of incorrect information caused by user filling errors.
  • the merchant node receives the user information extraction response carrying the encrypted user information sent by the user node, which is beneficial to improve the security of the user information and avoid the risk of user information leakage.
  • FIG. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an information processing method provided by an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of yet another information processing method provided by an embodiment of the present invention.
  • FIG. 4A is a schematic structural diagram of another communication system provided by an embodiment of the present invention.
  • FIG. 4B is a schematic flowchart of yet another information processing method according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a merchant node provided by an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of the structure of a merchant node in a hardware operating environment related to an embodiment of the present invention.
  • Fig. 1 is a schematic structural diagram of a communication system provided by an embodiment of the present invention.
  • the communication system may include a merchant node 110 and a terminal 120 that are interconnected through a network.
  • the merchant node 110 can implement all the functions mentioned in the embodiments of the present invention, but is not limited to all the functions mentioned in the embodiments of the present invention.
  • the terminal 120 can implement all the functions mentioned in the embodiments of the present invention, but is not limited to all the functions mentioned in the embodiments of the present invention.
  • the technical solution of the embodiment of the present invention may be implemented specifically based on the communication system of the architecture shown in FIG. 1 or its deformed architecture.
  • FIG. 2 is a schematic flowchart of an information processing method provided by an embodiment of the present invention. This method may include but is not limited to the following steps:
  • a merchant node sends a user information extraction request to a user node, where the user information extraction request carries a merchant public key, and the user information extraction request is used to instruct the user node to obtain user information to be encrypted, and use the merchant public key. Encrypting the user information to be encrypted with a key to obtain encrypted user information;
  • the user information to be encrypted may include, for example, name, gender, contact information, date of birth, and so on.
  • user nodes include but are not limited to traditional servers, large storage systems, desktop computers, notebook computers, tablet computers, palmtop computers, smart phones, portable digital players, smart watches, smart bracelets, and so on.
  • merchant nodes include but are not limited to traditional servers, large storage systems, desktop computers, notebook computers, tablet computers, palmtop computers, smart phones, portable digital players, smart watches, smart bracelets, and so on.
  • the method before the merchant node sends a user information extraction request to the user node, the method further includes:
  • the merchant node sends a merchant identity verification request to a verification node, where the merchant identity verification request carries merchant identity information and a merchant address identifier, and the merchant identity verification request is used to instruct the verification node to perform verification on the merchant identity information.
  • Verification when the verification is passed, the merchant identity information is encrypted by a one-way encryption algorithm to obtain the merchant identity fingerprint, and the merchant identity fingerprint and the merchant address identifier are associated and stored in the alliance chain;
  • the merchant node displays a prompt message indicating that the storage is successful on the display interface of the merchant node.
  • each node in the alliance chain (including merchant nodes and user nodes) generates its own private key, public key, and address identification through the alliance chain, and authenticates other nodes through the verification node in the alliance chain.
  • the verification is passed, the public key, address identification, and identity fingerprint of each node in the alliance chain are recorded in the ledger of the alliance chain, and after a consensus mechanism, the block ledger is connected to the alliance chain.
  • the verification node may be a third-party trusted organization.
  • the third-party trusted organization may be a business management system.
  • the business identity information may include, for example, business name, organization code, contact information, business address, business scope, and so on.
  • the merchant address identifier is generated by the merchant node according to the address of the merchant node.
  • the address of the merchant node may include, for example, the domain name of the merchant node, the IP address (Internet Protocol, Internet Protocol) of the merchant node, and the IP address of the merchant node. Address + port number.
  • the display interface includes at least one display frame
  • the merchant node displays the prompt information of successful storage on the display interface of the merchant node, including:
  • the merchant node displays, in the at least one display frame on the display interface, prompt information indicating that the storage is successful.
  • the one-way encryption algorithm can only encrypt the business identity information to obtain the encrypted business identity information, but cannot obtain the algorithm of the business identity information by encrypting the business identity information. That is, a one-way encryption algorithm can be used to encrypt the merchant identity information to obtain the merchant identity fingerprint, but there is no corresponding decryption algorithm to decrypt the merchant identity fingerprint to obtain the merchant identity information.
  • one-way encryption algorithms may include Message-Digest algorithm (MD), algorithm and secure hash algorithm 1 (Secure Hash Algorithm, SHA-1), hash message authentication code (Hash Message Authentication Code, HMAC) )Wait. For example, when the one-way encryption algorithm is the MD algorithm, a hash operation is performed on the merchant identity information to obtain a hash value, and the hash value is set as the merchant identity fingerprint.
  • MD Message-Digest algorithm
  • HMAC hash message authentication code
  • the merchant node sends a merchant identity verification request to the verification node.
  • the verification node verifies the merchant identity information carried in the merchant identity verification request, and when the verification is passed, the verification node uses a one-way encryption algorithm to verify the identity of the merchant.
  • the identity information is encrypted to obtain the merchant identity fingerprint, and the merchant identity fingerprint and the merchant address identification carried in the merchant identity verification request are associated and stored in the alliance chain, so as to realize the successful joining of the merchant node to the alliance chain, and for subsequent follow-up from the alliance based on the merchant address identification
  • the chain obtains the merchant’s identity fingerprint to prepare, which also improves the search efficiency.
  • a prompt message of successful storage is displayed on the display interface of the merchant node, so as to realize instant notification of the merchant's success on the chain.
  • the user information extraction request also carries encrypted merchant identity information and a merchant address identifier, and the user information extraction request is used to instruct the user node to obtain all information corresponding to the merchant address identifier from the alliance chain.
  • the merchant identity fingerprint, the merchant identity fingerprint and the encrypted merchant identity information are compared, the user information to be encrypted is obtained when the comparison is successful, and the user information to be encrypted is encrypted using the merchant public key to obtain all information.
  • the encrypted user information is also carries encrypted merchant identity information and a merchant address identifier, and the user information extraction request is used to instruct the user node to obtain all information corresponding to the merchant address identifier from the alliance chain.
  • the merchant identity fingerprint, the merchant identity fingerprint and the encrypted merchant identity information are compared, the user information to be encrypted is obtained when the comparison is successful, and the user information to be encrypted is encrypted using the merchant public key to obtain all information.
  • the encrypted user information is used to instruct the user node to obtain all information corresponding to the merchant address identifier from the alliance chain.
  • the encrypted merchant identity information is obtained by encrypting the merchant identity information by the merchant node using the merchant private key.
  • the merchant node receives a user information extraction response sent by the user node, where the user information extraction response carries the encrypted user information;
  • the merchant node uses a merchant private key to decrypt the encrypted user information to obtain unencrypted user information, where the merchant private key corresponds to the merchant public key;
  • the merchant node generates an electronic membership card based on the unencrypted user information.
  • the merchant node sends a user information extraction request to the user node, so that the user node obtains the user information to be encrypted, and uses the merchant public key carried in the user information extraction request to encrypt the user information to be encrypted to obtain
  • the user information is encrypted, and then, the merchant node receives the user information extraction response carrying the encrypted user information sent by the user node, and decrypts the encrypted user information by using the merchant private key to obtain unencrypted user information, avoiding the user to fill in on-site User information, thereby avoiding the problem of incorrect information caused by user filling errors.
  • the merchant node receives the user information extraction response carrying encrypted user information sent by the user node, which is beneficial to improve the security of user information and avoid the risk of user information leakage.
  • the method further includes:
  • the merchant node obtains a shopping list, where the shopping amount included in the shopping list;
  • the merchant node sends a payment request to the user node, wherein the payment request carries the shopping list, and the payment request is used to instruct the user node to extract the shopping amount in the shopping list, and generate The payment QR code of the shopping amount, displaying the payment QR code on the display interface of the user node;
  • the merchant node obtains the income corresponding to the shopping amount by scanning the payment QR code.
  • the user may set the priority payment of the electronic membership card balance, then the merchant node obtains the income corresponding to the shopping amount by scanning the payment QR code, including:
  • the merchant node obtains the income corresponding to the shopping amount from the balance included in the electronic membership card by scanning the payment QR code.
  • the merchant node obtains the income corresponding to the shopping amount from the electronic account balance by scanning the payment QR code, wherein the electronic account balance is the same as the unencrypted User information correspondence.
  • Fig. 3 is a schematic flowchart of an information processing method provided by an embodiment of the present invention.
  • the merchant node generates an electronic membership card based on the unencrypted user information, including:
  • the merchant node parses the unencrypted user information to obtain multiple fields included in the unencrypted user information;
  • the merchant node compares the multiple fields with a preset field set to obtain multiple first fields that match the preset field set among the multiple fields.
  • the preset field set includes a plurality of preset fields, and the number of the plurality of preset fields is less than or equal to the number of the plurality of fields.
  • multiple fields include: Zhang Min, female, 19980708, 13687637281, Shenzhen xx community, Guangdong province, etc.; multiple preset fields include: Zhang Min, female, 19980708, 13687637281; then, among the multiple fields, and The multiple first fields matched by the preset field set include: Zhang Min, female, 19980708, and 13687637281.
  • the multiple fields are compared with a preset field set to obtain the multiple of the multiple fields that match the preset field set.
  • the method further includes:
  • the merchant node grabs N pieces of member information from the Internet through a web crawler, where N is a positive integer;
  • the merchant node sends N training requests to N training devices, where the N training requests carry the N member information, and the ith training request in the N training requests carries the N members
  • the merchant node receives N training responses sent by the N training devices, wherein each of the N training responses carries L member information fields, and the ith one of the N training responses The training response carries L member information fields included in the i-th member information, and the N training devices correspond to the N training responses in a one-to-one manner;
  • the merchant node screens out repeated member information fields from the M member information fields to obtain the member information field with the largest number of repetitions;
  • the merchant node sets the member information field with the largest number of repetitions as the preset field set.
  • N can be equal to 1, 2, 3, 5, 6, 11, 13, 20 or other values, for example.
  • i can be equal to 1, 2, 3, 5, 6, 11, 13, 20 or other values, for example.
  • j can be equal to 1, 2, 3, 5, 6, 11, 13, 20 or other values, for example.
  • M can be equal to 1, 2, 3, 5, 6, 11, 13, 20 or other values, for example.
  • L can be equal to 1, 2, 3, 5, 6, 11, 13, 20 or other values, for example.
  • a web crawler also known as a web spider, web robot, in the FOAF community, more often a web chaser
  • a web crawler is a program or script that automatically crawls information on the World Wide Web in accordance with certain rules.
  • web crawlers include: General Purpose Web Crawler, Focused Web Crawler, Incremental Web Crawler, and Deep Web Crawler.
  • the training device may include a server, for example.
  • the member information is user information included in the electronic membership card.
  • N pieces of member information are captured from the Internet through a web crawler, and at the same time, each piece of member information in the N pieces of member information is sent to N training devices, so that N training devices can parallelize N pieces of member information.
  • Member information input field acquisition model to obtain multiple member information fields corresponding to each member information, thereby improving the efficiency of obtaining member information fields.
  • the merchant node receives N training responses sent by N training devices, by counting the L membership information fields carried in each of the N training responses, the repeated membership information fields are filtered out to obtain the number of repetitions The most member information fields, and finally the member information fields with the largest number of repetitions are set as the preset field set, which helps to improve the uniformity of the user information included in the electronic membership card, and avoids the electronic membership card between different businesses in the prior art.
  • the user information is completely different.
  • the merchant node invokes an electronic membership card generation algorithm to process the multiple first fields to generate the electronic membership card including the multiple first fields.
  • FIG. 4A is a schematic structural diagram of a communication system provided by an embodiment of the present invention.
  • the communication system may include a merchant node 410 and a plurality of merchant nodes 420 interconnected through a network.
  • the merchant node 410 can implement all the functions mentioned in the embodiments of the present invention, but is not limited to all the functions mentioned in the embodiments of the present invention.
  • Multiple merchant nodes 420 can implement all the functions mentioned in the embodiments of the present invention, but are not limited to all the functions mentioned in the embodiments of the present invention.
  • the merchant node 410 is not included in the plurality of merchant nodes 420.
  • Fig. 4B is a schematic flowchart of an information processing method provided by an embodiment of the present invention.
  • the alliance chain includes multiple merchant nodes, and the method further includes:
  • the merchant node sends a plurality of user information acquisition requests to the plurality of merchant nodes, wherein each user information acquisition request in the plurality of user information acquisition requests carries the merchant public key and the encrypted merchant
  • the identity information and the merchant address identifier, and each user information acquisition request in the plurality of user information acquisition requests is used to instruct each of the plurality of merchant nodes to obtain information from the alliance chain.
  • the merchant identity fingerprint corresponding to the merchant address identifier is compared, the merchant identity fingerprint and the encrypted merchant identity information are compared, a plurality of user information to be encrypted is obtained when the comparison is successful, and all user information to be encrypted is used for the plurality of user information to be encrypted.
  • the merchant public key is encrypted to obtain multiple encrypted user information, and the multiple merchant nodes correspond to the multiple user information acquisition requests one-to-one;
  • the merchant node receives multiple user information acquisition responses sent by the multiple merchant nodes, where each user information acquisition response in the multiple user information acquisition responses carries the multiple encrypted user information;
  • the merchant node obtains each of the multiple user information obtaining responses to carry the multiple encrypted user information to obtain an encrypted user information set.
  • the merchant node uses the merchant private key to decrypt multiple encrypted user information included in the encrypted user information set to obtain an unencrypted user information set.
  • the merchant node generates multiple electronic membership cards based on the unencrypted user information set, wherein the multiple electronic membership cards acquire multiple users corresponding to the unencrypted user information set at the merchant node Generated when multiple authorization instructions of the node.
  • the merchant node can obtain multiple user information from the alliance chain including multiple merchant nodes, which realizes the sharing of user information between different merchants and avoids the occurrence of information islands.
  • the merchant node obtains multiple authorization instructions from multiple user nodes corresponding to the unencrypted user information set, the merchant node generates multiple electronic membership cards, which is beneficial to protect the user's personal rights.
  • the method further includes:
  • the merchant node sends a plurality of electronic membership card determination requests to the plurality of merchant nodes, wherein each electronic membership card determination request in the plurality of electronic membership card determination requests carries the merchant public key and the encryption Merchant identity information, the merchant address identifier and multiple user information identifiers;
  • the merchant node receives multiple electronic membership card determination responses sent by the multiple merchant nodes, wherein each of the multiple electronic membership card determination responses carries the multiple electronic membership card determination responses. result;
  • the merchant node determines, according to the multiple electronic membership card determination results carried in the multiple electronic membership card determination responses in the multiple electronic membership card determination responses, whether there are the multiple user information identifiers corresponding to the Multiple electronic membership cards;
  • the merchant node marks that each unencrypted user information in the unencrypted user information set corresponds to the plurality of electronic members card.
  • each electronic membership card determination request in the plurality of electronic membership card determination requests is used to instruct each of the plurality of merchant nodes to obtain from the alliance chain corresponding to the merchant address identifier
  • the merchant identity fingerprint is to compare the merchant identity fingerprint and the encrypted merchant identity information, and when the comparison is successful, it is determined whether there are multiple electronic membership cards corresponding to the multiple user information identities.
  • the prompt information of the plurality of electronic membership cards, and the prompt information of the plurality of electronic membership cards are encrypted by the merchant public key to obtain a plurality of first encrypted prompt messages, if not, nothing is generated
  • the prompt information of the plurality of electronic membership cards, and the prompt information without the plurality of electronic membership cards are encrypted with the merchant public key to obtain a plurality of second encrypted prompt information, and the plurality of merchant nodes and all the
  • the multiple electronic membership card determination requests correspond one-to-one.
  • the merchant node generates multiple electronic membership cards based on the unencrypted user information set, including:
  • the merchant node If the multiple electronic membership card determination results correspond to the multiple second encrypted prompt messages, the merchant node generates multiple electronic membership cards based on the unencrypted user information set.
  • the multiple user information identifiers are generated by the merchant node according to each unencrypted user information in the unencrypted user information set.
  • the method further includes:
  • the merchant node sends a first user information extraction request to the user node, where the first user information extraction request carries the merchant public key, and the first user information extraction request is used to instruct the user node to obtain
  • the family information associated with the user information to be encrypted is encrypted using the merchant public key to obtain encrypted family information
  • the merchant node uses the merchant private key to decrypt the encrypted family information to obtain unencrypted family information
  • the merchant node adds the unencrypted family information to the electronic membership card.
  • family information includes, for example, name, gender, date of birth, and so on.
  • family information associated with the user information to be encrypted includes the names, genders, and dates of birth of the father, mother, and younger brother.
  • the family information associated with the user information to be encrypted is obtained, and the family information is added to the electronic membership card, so as to realize the sharing of electronic membership cards between families, reducing the number of electronic membership cards and increasing the number of electronic membership cards.
  • the storage space of the merchant node is increased.
  • FIG. 5 is a schematic structural diagram of a merchant node 550 exemplified in an embodiment of the present invention.
  • the merchant node 550 may include: a transceiver module 551 and a processing module 552.
  • the transceiver module 551 is configured to send a user information extraction request to a user node, where the user information extraction request carries a merchant public key, and the user information extraction request is used to instruct the user node to obtain user information to be encrypted, and use the The merchant public key encrypts the user information to be encrypted to obtain encrypted user information; and receives a user information extraction response sent by the user node, wherein the user information extraction response carries the encrypted user information;
  • the processing module 552 is configured to decrypt the encrypted user information by using the merchant private key to obtain unencrypted user information, where the merchant private key corresponds to the merchant public key; and generate based on the unencrypted user information Electronic membership card.
  • the transceiver module 551 is further configured to send a merchant identity verification request to a verification node, wherein the merchant identity verification request carries merchant identity information and a merchant address identifier, and the merchant identity verification request is used to indicate the
  • the verification node verifies the identity information of the merchant, and when the verification is passed, the identity information of the merchant is encrypted by a one-way encryption algorithm to obtain the identity fingerprint of the merchant, and the identity fingerprint of the merchant and the address of the merchant are combined in the alliance chain.
  • the identifier is associated and stored; and the merchant identity verification response sent by the verification node is received, where the merchant identity verification response carries prompt information indicating that the storage is successful; the processing module 552 is also configured to display the successful storage on the display interface. Prompt information.
  • the user information extraction request also carries encrypted merchant identity information and a merchant address identifier, and the user information extraction request is used to instruct the user node to obtain all information corresponding to the merchant address identifier from the alliance chain.
  • the merchant identity fingerprint, the merchant identity fingerprint and the encrypted merchant identity information are compared, the user information to be encrypted is obtained when the comparison is successful, and the user information to be encrypted is encrypted using the merchant public key to obtain all information.
  • the encrypted user information is also carries encrypted merchant identity information and a merchant address identifier, and the user information extraction request is used to instruct the user node to obtain all information corresponding to the merchant address identifier from the alliance chain.
  • the merchant identity fingerprint, the merchant identity fingerprint and the encrypted merchant identity information are compared, the user information to be encrypted is obtained when the comparison is successful, and the user information to be encrypted is encrypted using the merchant public key to obtain all information.
  • the encrypted user information is used to instruct the user node to obtain all information corresponding to the merchant address identifier from the alliance chain.
  • the processing module 552 is specifically configured to parse the unencrypted user information to obtain multiple fields included in the unencrypted user information; compare the multiple fields with a preset field set, To obtain a plurality of first fields matching the preset field set among the plurality of fields; call an electronic membership card generation algorithm to process the plurality of first fields to generate the plurality of first fields The said electronic membership card.
  • the processing module 552 is also used to grab N pieces of member information from the Internet through a web crawler, where N is a positive integer; the transceiver module 551 is also used to send N pieces of member information to N training devices A training request, wherein the N training requests carry the N pieces of member information, the ith training request in the N pieces of training requests carries the ith piece of member information in the N pieces of member information, and the The i training request is used to instruct the i-th training device among the N training devices to input the i-th member information into the field acquisition model to obtain the L member information fields included in the i-th member information ,
  • the N training devices have a one-to-one correspondence with the N training requests, where 0 ⁇ i ⁇ N, i is an integer, and L is a positive integer; and receiving N training responses sent by the N training devices, Wherein, each of the N training responses carries L member information fields, and the i-th training response among the N training responses carries L member information fields included in the i-th
  • the alliance chain includes multiple merchant nodes
  • the transceiving module 551 is further configured to send multiple user information acquisition requests to the multiple merchant nodes.
  • Each user information acquisition request carries the merchant public key, the encrypted merchant identity information, and the merchant address identifier
  • each user information acquisition request in the plurality of user information acquisition requests is used to instruct the plurality of merchants
  • Each merchant node in the node obtains the merchant identity fingerprint corresponding to the merchant address identifier from the alliance chain, compares the merchant identity fingerprint with the encrypted merchant identity information, and obtains more information when the comparison is successful.
  • User information to be encrypted using the merchant public key to encrypt the plurality of user information to be encrypted to obtain a plurality of encrypted user information, and the plurality of merchant nodes are in one-to-one correspondence with the plurality of user information acquisition requests; and Receiving multiple user information acquisition responses sent by the multiple merchant nodes, where each user information acquisition response in the multiple user information acquisition responses carries the multiple encrypted user information; the processing module 552 further Each user information acquisition response used to acquire the plurality of user information acquisition responses carries the plurality of encrypted user information to obtain an encrypted user information set; and using the merchant private key to collect the encrypted user information includes Decrypt a plurality of encrypted user information to obtain an unencrypted user information set; and generate a plurality of electronic membership cards based on the unencrypted user information set, wherein the plurality of electronic membership cards are obtained at the merchant node and Generated when multiple authorization instructions of multiple user nodes corresponding to the unencrypted user information set.
  • the processing module 552 is also used to obtain a shopping list, wherein the shopping list includes the amount of shopping; the transceiving module 551 is also used to send a payment request to the user node, where the The payment request carries the shopping list, and the payment request is used to instruct the user node to extract the shopping amount in the shopping list, generate a payment QR code including the shopping amount, and display it on the user node
  • the payment QR code is displayed on the interface; the processing module 552 is further configured to obtain the income corresponding to the shopping amount by scanning the payment QR code.
  • the transceiver module 551 is further configured to send multiple electronic membership card determination requests to the multiple merchant nodes, wherein each of the multiple electronic membership card determination requests carries The merchant public key, the encrypted merchant identity information, the merchant address identifier, and a plurality of user information identifiers; and receiving a plurality of electronic membership card determination responses sent by the plurality of merchant nodes, wherein the plurality of electronic Each electronic membership card determination response in the membership card determination response carries the multiple electronic membership card determination results; the processing module 552 is further configured to determine each electronic membership card in the response according to the multiple electronic membership cards The determination result of the plurality of electronic membership cards carried in the response is determined, determining whether there are the plurality of electronic membership cards corresponding to the plurality of user information identifiers; and if the determination result of the plurality of electronic membership cards is the same as that of the plurality of electronic membership cards; Corresponding to the first encrypted prompt information, it is marked that each unencrypted user information in the unencrypted user information set corresponds to
  • each electronic membership card determination request in the plurality of electronic membership card determination requests is used to instruct each of the plurality of merchant nodes to obtain an identification with the merchant address from the alliance chain
  • the merchant identity fingerprint and the encrypted merchant identity information are compared, and when the comparison is successful, it is determined whether there are multiple electronic membership cards corresponding to the multiple user information identifiers, if so, then
  • the prompt information with the plurality of electronic membership cards is generated, and the prompt information with the plurality of electronic membership cards is encrypted with the merchant public key to obtain a plurality of first encrypted prompt messages, if not, then generate
  • the prompt information without the plurality of electronic membership cards, and the prompt information without the plurality of electronic membership cards is encrypted with the merchant public key to obtain a plurality of second encrypted prompt information, the plurality of merchant nodes One-to-one correspondence with the multiple electronic membership card determination requests.
  • module architecture of the merchant node 550 is not limited to the above example.
  • FIG. 6 is a schematic diagram of the merchant node structure of the hardware operating environment involved in an embodiment of the application.
  • An embodiment of the present invention provides an information processing electronic device, including a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured by The processor executes to execute instructions including steps in any information processing method.
  • the merchant node of the hardware operating environment involved in the embodiment of the present application may include:
  • the processor 601 is, for example, a CPU.
  • the memory 602 optionally, the memory may be a high-speed RAM memory, or a stable memory, such as a disk memory.
  • the communication interface 603 is used to implement connection and communication between the processor 601 and the memory 602.
  • the structure of the merchant node shown in FIG. 6 does not constitute a limitation to it, and may include more or less components than shown in the figure, or a combination of certain components, or different component arrangements.
  • the memory 602 may include an operating system, a network communication module, and data processing programs.
  • the operating system is a program that manages and controls the hardware and software resources of merchant nodes, and supports the operation of personnel management programs and other software or programs.
  • the network communication module is used to implement communication between various components in the memory 602 and communication with other hardware and software in the merchant node.
  • the processor 601 is configured to execute the personnel management program stored in the memory 602, and implement the following steps:
  • the user information extraction request carries a merchant public key
  • the user information extraction request is used to instruct the user node to obtain user information to be encrypted, and use the merchant public key to pair the
  • the user information to be encrypted is encrypted to obtain encrypted user information
  • An electronic membership card is generated based on the unencrypted user information.
  • the present application also provides a computer nonvolatile readable storage medium, the computer nonvolatile readable storage medium is used to store a computer program, and the stored computer program is executed by the processor to implement the following steps :
  • the user information extraction request carries a merchant public key
  • the user information extraction request is used to instruct the user node to obtain user information to be encrypted, and use the merchant public key to pair the
  • the user information to be encrypted is encrypted to obtain encrypted user information
  • An electronic membership card is generated based on the unencrypted user information.
  • the computer non-volatile readable storage medium involved in the present application please refer to each embodiment of the foregoing information processing method, which will not be repeated here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un procédé de traitement d'informations et un dispositif associé. Le procédé comprend les étapes suivantes : un nœud de commerçant envoie une demande d'extraction d'informations d'utilisateur à un nœud d'utilisateur, la demande d'extraction d'informations d'utilisateur transportant une clé publique de commerçant, et étant utilisée pour ordonner au nœud d'utilisateur d'acquérir des informations d'utilisateur à chiffrer et d'utiliser la clé publique de commerçant pour chiffrer les informations d'utilisateur afin d'obtenir des informations d'utilisateur chiffrées ; le nœud de commerçant reçoit une réponse d'extraction d'informations d'utilisateur envoyée par le nœud d'utilisateur, la réponse d'extraction d'informations d'utilisateur transportant les informations d'utilisateur chiffrées ; le nœud de commerçant utilise une clé privée de commerçant pour déchiffrer les informations d'utilisateur chiffrées de façon à obtenir des informations d'utilisateur non chiffrées, la clé privée de commerçant correspondant à la clé publique de commerçant ; et le nœud de commerçant génère une carte de membre électronique sur la base des informations d'utilisateur non chiffrées. Le procédé améliore la précision des informations.
PCT/CN2019/116977 2019-09-18 2019-11-11 Procédé de traitement d'informations et dispositif associé WO2021051525A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910880715.3A CN110719264B (zh) 2019-09-18 2019-09-18 一种信息处理方法、装置、电子设备和存储介质
CN201910880715.3 2019-09-18

Publications (1)

Publication Number Publication Date
WO2021051525A1 true WO2021051525A1 (fr) 2021-03-25

Family

ID=69210585

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/116977 WO2021051525A1 (fr) 2019-09-18 2019-11-11 Procédé de traitement d'informations et dispositif associé

Country Status (2)

Country Link
CN (1) CN110719264B (fr)
WO (1) WO2021051525A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458010A (zh) * 2013-08-19 2013-12-18 小米科技有限责任公司 会员注册方法、装置、服务器和移动终端
CN104754030A (zh) * 2015-02-12 2015-07-01 腾讯科技(深圳)有限公司 用户信息获取方法及装置
US20170359718A1 (en) * 2012-01-23 2017-12-14 SecureWiFi Technologies, LLC Customer/merchant interaction system for merchant branding and product information
CN110070926A (zh) * 2019-03-21 2019-07-30 深圳壹账通智能科技有限公司 基于区块链的数据查询方法、装置、设备及可读存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737361B (zh) * 2018-01-25 2022-01-04 阳光保险集团股份有限公司 一种基于区块链的数据验证方法
KR101880175B1 (ko) * 2018-02-13 2018-07-19 주식회사 마크로젠 복수의 블록체인에 기반을 둔 생명정보 데이터 제공 방법, 생명정보 데이터 저장 방법 및 생명정보 데이터 전송 시스템
CN109639632B (zh) * 2018-11-02 2021-06-22 远光软件股份有限公司 基于区块链的用户信息管理方法、电子设备及存储介质
CN109951497A (zh) * 2019-04-03 2019-06-28 陕西医链区块链集团有限公司 一种区块链的个人数据授权方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170359718A1 (en) * 2012-01-23 2017-12-14 SecureWiFi Technologies, LLC Customer/merchant interaction system for merchant branding and product information
CN103458010A (zh) * 2013-08-19 2013-12-18 小米科技有限责任公司 会员注册方法、装置、服务器和移动终端
CN104754030A (zh) * 2015-02-12 2015-07-01 腾讯科技(深圳)有限公司 用户信息获取方法及装置
CN110070926A (zh) * 2019-03-21 2019-07-30 深圳壹账通智能科技有限公司 基于区块链的数据查询方法、装置、设备及可读存储介质

Also Published As

Publication number Publication date
CN110719264B (zh) 2022-07-22
CN110719264A (zh) 2020-01-21

Similar Documents

Publication Publication Date Title
US11963006B2 (en) Secure mobile initiated authentication
US11665147B2 (en) Blockchain systems and methods for user authentication
US11711219B1 (en) PKI-based user authentication for web services using blockchain
US10903976B2 (en) End-to-end secure operations using a query matrix
US11750591B2 (en) Key attestation statement generation providing device anonymity
US20220407720A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
WO2022206349A1 (fr) Procédé de vérification d'informations, appareil associé, dispositif, et support de stockage
US9838205B2 (en) Network authentication method for secure electronic transactions
US20180212753A1 (en) End-To-End Secure Operations Using a Query Vector
WO2022247576A1 (fr) Procédé et appareil de traitement de données, dispositif et support de stockage lisible par ordinateur
CN111835511A (zh) 数据安全传输方法、装置、计算机设备及存储介质
US10037544B2 (en) Technologies for collecting advertising statistics in a privacy sensitive manner
KR20150094548A (ko) 원격 액세스, 원격 디지털 서명을 위한 방법 및 시스템
TW200818838A (en) Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
US20180262471A1 (en) Identity verification and authentication method and system
US20210241270A1 (en) System and method of blockchain transaction verification
CN104202163A (zh) 一种基于移动终端的密码系统
CN110740136A (zh) 面向开放银行的网络安全控制方法及开放银行平台
CN110597836A (zh) 基于区块链网络的信息查询请求响应方法及装置
CN114223175A (zh) 在防止获取或操控时间数据的同时生成网络数据的序列
US10158490B2 (en) Double authentication system for electronically signed documents
JP2022546470A (ja) トランスポート層セキュリティおよび他のコンテキストでのデータの検証のための非集中型技術
SG175860A1 (en) Methods of robust multi-factor authentication and authorization and systems thereof
WO2022265740A1 (fr) Émission entre sessions de justificatif d'identité vérifiable
Mahinderjit Singh et al. A novel out-of-band biometrics authentication scheme for wearable devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19945648

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19945648

Country of ref document: EP

Kind code of ref document: A1