CN110598469B - Information processing method, device and computer storage medium - Google Patents
Information processing method, device and computer storage medium Download PDFInfo
- Publication number
- CN110598469B CN110598469B CN201910860693.4A CN201910860693A CN110598469B CN 110598469 B CN110598469 B CN 110598469B CN 201910860693 A CN201910860693 A CN 201910860693A CN 110598469 B CN110598469 B CN 110598469B
- Authority
- CN
- China
- Prior art keywords
- check
- user
- request
- reservation
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/12—Hotels or restaurants
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- Bioethics (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Databases & Information Systems (AREA)
- Primary Health Care (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application discloses an information processing method, an information processing device and a computer storage medium, wherein the method comprises the following steps: the management equipment acquires a check-in request carrying reservation check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request; acquiring a user public key and user check-in reservation information in the target block; checking a terminal signature carried in the check-in request according to the user public key; and if the terminal signature is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target room number according to the user check-in reservation information. By adopting the application, the illegal molecules can be prevented from providing false information to enter the room, and the success rate and the safety of information booking are improved.
Description
Technical Field
The present application relates to the field of internet technologies, and in particular, to an information processing method, an information processing device, and a computer storage medium.
Background
At present, when people go out to select a hotel to check in, hotel information is mostly inquired on related application software, and the hotel is reserved online. When people arrive at the reserved hotel, the people need to provide hotel reservation information and identity cards to a hotel foreground, and check the check-in procedure after the hotel foreground checks.
Such a way of booking hotels has the following real problems: with the rapid development of network technology, personal information of people is easy to be stolen, hotel reservation information is easy to be tampered by lawbreakers, and the situation that reservation is unsuccessful or an order is cancelled temporarily occurs when people check in to a hotel.
Disclosure of Invention
The embodiment of the application provides an information processing method, an information processing device and a computer storage medium, which can improve the success rate and the safety of information booking.
In one aspect, an embodiment of the present application provides an information processing method, including:
The management equipment acquires a check-in request carrying reservation check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request;
acquiring a user public key and user check-in reservation information in the target block;
checking a terminal signature carried in the check-in request according to the user public key;
and if the terminal signature is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target room number according to the user check-in reservation information.
The signing verification of the terminal signature carried in the check-in request according to the user public key comprises the following steps:
Acquiring a first hash value corresponding to the user check-in reservation information in the target block;
decrypting the terminal signature by adopting the user public key to obtain a second hash value;
comparing the first hash value with the second hash value;
If the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
And if the first hash value is different from the second hash value, determining that the terminal signature is an illegal signature.
Wherein, still include:
If the terminal signature is verified to be illegal, the management equipment returns failure prompt information to the request terminal;
And sending a request receiving time stamp corresponding to the check-in request, the failure prompt information, the terminal signature carried in the check-in request and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
The determining the check-in authority of the request terminal for the target room number according to the user check-in reservation information comprises the following steps:
Acquiring the check-in time and the check-out time of the user check-in reservation information in the target block;
determining a user check-in time range according to the check-in time and the check-out time;
acquiring the request receiving time stamp corresponding to the check-in request;
and if the request receiving time stamp is in the user check-in time range, determining that the request terminal has check-in authority, and unlocking a door lock according to the check-in authority.
Wherein, still include:
when the request terminal is in a check-in success state according to the check-in authority, transmitting actual check-in time, user information and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing;
And when the request terminal is successful in the room-returning, controlling the door lock to be closed, and sending the actual room-returning time, the user information and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
In one aspect, an embodiment of the present application provides an information processing method, including:
the block link point obtains user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user;
Generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a blockchain; the user check-in reservation information comprises a target room number reserved by the reservation terminal and reservation check-in time;
When a query request sent by management equipment is received, acquiring the target block in the block chain according to the reservation time and the target room number carried by the query request;
and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in authority of the request terminal initiating the check-in request according to the user check-in reservation information and the user public key.
An aspect of an embodiment of the present application provides an information processing apparatus, including:
The first acquisition module is used for acquiring an admission request carrying reservation admission time sent by a request terminal by management equipment, and acquiring a target block from a block chain according to the admission request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request;
The second acquisition module is used for acquiring the user public key and the user check-in reservation information in the target block;
the signature verification module is used for verifying the terminal signature carried in the check-in request according to the user public key;
And the determining module is used for determining the check-in authority of the request terminal for the target room number according to the user check-in reservation information if the terminal signature is verified to be a legal signature.
Wherein, the signature verification module includes:
The acquisition unit is used for acquiring a first hash value corresponding to the user check-in reservation information in the target block;
the decryption unit is used for decrypting the terminal signature by adopting the user public key to obtain a second hash value;
the comparison unit is used for comparing the first hash value with the second hash value;
The first determining unit is used for determining that the terminal signature is a legal signature if the first hash value is the same as the second hash value; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
The first determining unit is further configured to determine that the terminal signature is an illegal signature if the first hash value is different from the second hash value.
Wherein, the signature verification module further comprises:
The return unit is used for returning failure prompt information to the request terminal if the terminal signature is verified to be an illegal signature;
and the sending unit is used for sending the request receiving time stamp corresponding to the check-in request, the failure prompt information, the terminal signature carried in the check-in request and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
Wherein, the determining module includes:
A first obtaining unit, configured to obtain a check-in time and a check-out time in the user check-in reservation information in the target block;
The second determining unit is used for determining a user check-in time range according to the check-in time and the check-out time;
The second acquisition unit is used for acquiring the request receiving time stamp corresponding to the check-in request;
And the second determining unit is further configured to determine that the request terminal has a check-in authority if the request receiving timestamp is in the user check-in time range, and unlock a door lock according to the check-in authority.
Wherein, still include:
the first sending module is used for sending the actual check-in time, the user information and the target room number to a blockchain node when the request terminal is in a check-in success state according to the check-in authority so as to enable the blockchain node to perform uplink processing;
And the second sending module is used for controlling the door lock to be closed when the request terminal is successful in the room-returning, and sending the actual room-returning time, the user information and the target room number to the blockchain node so as to enable the blockchain node to carry out the uplink processing.
An aspect of an embodiment of the present application provides an information processing apparatus, including:
The first acquisition module is used for acquiring user check-in reservation information and a user public key which are sent by the service server and are associated with the reserved user by the block chain link point;
the generation and addition module is used for generating a target block according to the user check-in reservation information and the user public key and adding the target block into a blockchain; the user check-in reservation information comprises a target room number reserved by the reservation terminal and reservation check-in time;
the second acquisition module is used for acquiring the target block in the block chain according to the reservation time and the target room number carried by the inquiry request when the inquiry request sent by the management device is received;
And the sending module is used for sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in authority of the request terminal initiating the check-in request according to the user check-in reservation information and the user public key.
In one aspect, an embodiment of the present application provides a computer device, including: a processor and a memory; the processor is connected to the memory, wherein the memory is used for storing a computer program, and the processor is used for calling the computer program to execute the method according to the embodiment of the application.
An aspect of the present application provides a computer storage medium storing a computer program comprising program instructions which, when executed by a processor, perform a method as in an embodiment of the present application.
According to the embodiment of the application, the management equipment acquires the check-in request carrying the reservation check-in time sent by the request terminal, and acquires the target block from the block chain according to the check-in request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request; acquiring a user public key and user check-in reservation information in the target block; checking a terminal signature carried in the check-in request according to the user public key; and if the terminal signature is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target room number according to the user check-in reservation information. The above-mentioned request terminal can obtain the user public key and user check-in reservation information in the blockchain, but because the user check-in reservation information and the user public key on the blockchain are not changed or illegally tampered once they are determined, and because the terminal signature of the request terminal is encrypted by the private key of the request terminal, the management device can confirm whether the request terminal is consistent with the user terminal by matching the related information provided by the request terminal and the user check-in reservation information on the blockchain, thereby avoiding that illegal molecules provide false information to check in the room and improving the success rate and safety of information reservation.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a system architecture for information processing according to an embodiment of the present application;
Fig. 2 is a schematic flow chart of an information processing method according to an embodiment of the present application;
FIG. 3 is a flowchart of another information processing method according to an embodiment of the present application;
FIG. 4 is a flowchart of another information processing method according to an embodiment of the present application;
FIG. 5 is a timing diagram of an information processing method according to an embodiment of the present application;
fig. 6a is a schematic diagram of a data uplink scenario provided in an embodiment of the present application;
FIG. 6b is a schematic diagram of another data uplink scenario provided by an embodiment of the present application;
FIG. 7 is a flowchart of another information processing method according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a management apparatus device according to an embodiment of the present application;
FIG. 9 is a schematic block chain node device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of another electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a schematic diagram of a system architecture of information processing according to an embodiment of the present application. After booking the hotel room, the business server feeds back the booking result to the booking terminal, if booking is successful, the business server saves the room booking information and the user information of the booking user and sends the room booking information and the user information to a blockchain node in a blockchain link point system, and the blockchain node links the room booking information and the user information. When the request user arrives at the hotel, the management device sends a query request to the blockchain when the request terminal is used for requesting to check in on the management device, after the room reservation information and the user information fed back by the blockchain are obtained, the management device judges whether the reservation user and the request user are the same user or not, further judges whether the request user can check in the hotel room based on the room reservation information, if the request user can check in the hotel room, a corresponding room door lock is opened, and if the request user cannot check in the hotel room, a prompt message that the request terminal cannot check in is returned to the request terminal.
The subscription terminal, the request terminal, and the blockchain node may include a mobile phone, a tablet computer, a notebook computer, a palm computer, a mobile internet device (MID, mobile INTERNET DEVICE), and the like. The service server is a background server of a booking Application (APP), and provides hotel information for users, stores and transmits room booking information and user information of the users. The blockchain contains a series of information of hotel rooms and user information, and provides inquiry for management equipment. The management device may include an on-door authentication device for a reservation room, an authentication device for a hotel lobby, or an authentication device in a hotel lobby.
Fig. 2 is a schematic flow chart of an information processing method according to an embodiment of the application. As shown in fig. 2, the method may include:
Step S101, a management device acquires a check-in request carrying reservation check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request.
Specifically, when the requesting user arrives at the hotel and requests to check in, the requesting user may use the requesting terminal to send a check-in request to the management device, for example, the requesting terminal displays a two-dimensional code to the management device, the management device may acquire room reservation information and user information of the requesting user by scanning the two-dimensional code, the room reservation information may include reservation check-in time, target room number, reservation check-out time, and the like, and the user information may include a terminal signature of the requesting terminal, identity document or other document detailed information of the requesting user, and the like. The management equipment records a request receiving time stamp (namely the time of receiving the check-in request), a target room number and a terminal signature, and sends a query request carrying the reservation check-in time and the target room number to the blockchain node according to the information carried by the check-in request; the blockchain node obtains a target block based on the reserved time of stay and the target room number. The above-mentioned manner of generating the check-in request is not limited, and the request terminal may be used by the requesting user to scan the two-dimensional code on the management device, where the page of the requesting terminal is converted into a page for filling in the hotel target room number and booking the check-in time, and the request user fills in the page and submits the page to the management device, and the management device sends the query request to the blockchain node according to the information contained in the page; the manner of generating the check-in request may be a serial number or face recognition, and specific processes are not repeated here.
Step S102, the public key of the user and the user check-in reservation information in the target block are acquired.
Specifically, the user public key and the user check-in reservation information are generated by the reservation user and the reservation terminal in fig. 1, the user check-in reservation information includes the room reservation information and the user information in fig. 1, the room reservation information may include the check-in time, the target room number, the check-out time, and the like, the user information may include a terminal signature of the reservation terminal, identity document or other certificate details of the reservation user, and the reservation user public key (i.e., the user public key), and the like, and are transmitted to the blockchain node by the service server in fig. 1, and the blockchain node calculates the user check-in reservation information into a first hash value according to a preset hash algorithm, and generates the target blockchain with the first hash value, the user check-in reservation information, and the user public key.
And step S103, checking the terminal signature carried in the check-in request according to the public key of the user.
Specifically, please refer to fig. 3, which is a flowchart illustrating another information processing method according to an embodiment of the present application. In one aspect, the management device obtains a first hash value in the target block; on the other hand, the management device decrypts the terminal signature by adopting the user public key in the target block to obtain a second hash value, wherein the terminal signature is obtained by signing the second hash value (for distinguishing whether the terminal signature is legal) of the request terminal by utilizing the private key of the request user, and the second hash value is calculated and generated based on the reservation information of the request terminal; comparing the first hash value with the second hash value, if the first hash value is the same as the second hash value, determining that the terminal signature is legal signature, and also indicating that the reservation information of the request terminal is consistent with the user check-in reservation information of the reservation terminal, so that the request user can be determined to be the reservation user, namely, the terminal signature belonging to legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key; if the first hash value is different from the second hash value, the terminal signature can be determined to be an illegal signature, and further it can be determined that the requesting user and the subscribing user are not the same person because the subscription information of the requesting user and the subscribing user is different, and the generated signature is different. Of course, when the public key of the user in the target block cannot decrypt the terminal signature, it may also be determined that the requesting user and the subscribing user are not the same person, and the terminal signature cannot be decrypted because the private keys of the requesting user and the subscribing user are different.
On the one hand, the management equipment refuses the check-in request of the requesting user and returns failure prompt information to the requesting terminal under the condition that the terminal signature is an illegal signature; and on the other hand, the request receiving time stamp, the failure prompt information, the terminal signature carried in the check-in request and the target room number corresponding to the check-in request are sent to a blockchain node so that the blockchain node performs uplink processing, and the later-stage service server or management equipment can conveniently inquire.
In the case that the terminal signature is a legal signature, the subsequent processing refers to step S104.
And step S104, if the terminal signature is verified to be a legal signature, determining the check-in authority of the request terminal for the target room number according to the user check-in reservation information.
As can be seen from step S103, the requesting user is a subscriber, in which case the management device needs to verify the living authority of the requesting user to prevent the subscriber from recording the wrong living time and entering the target room of the other subscribers on the same day.
Specifically, please refer to fig. 4, which is a flowchart illustrating another information processing method according to an embodiment of the present application. After acquiring the user check-in reservation information in the target block, the management equipment confirms the check-in time and the check-out time of the requesting user, and determines the check-in time range of the requesting user according to the check-in time and the check-out time; if the request user requests to check in within the user check-in time range, namely the request receiving timestamp is within the user check-in time range, the request user is determined to have check-in authority, the management equipment opens a target room door lock for the request user, otherwise, the check-in request of the request user is refused and the request user is prompted to not check in time.
Fig. 5 is a timing diagram of an information processing method according to an embodiment of the present application. As shown in fig. 5, the method may include:
S201, receiving user check-in reservation information and a user public key.
Specifically, any block link point receives user check-in reservation information and a user public key sent by a service server, wherein the user check-in reservation information is generated by reservation user information and hotel room information reserved by the user check-in reservation information, the user public key is generated by a user private key, the user public key is available to all persons and the server, the user private key is generated by a user terminal and is private to a user, others cannot steal the user private key, and the user public key cannot be derived.
S202, generating a target block.
Specifically, after receiving the user check-in reservation information and the user public key, the block link point checks the user check-in reservation information and the user public key, stores the user check-in reservation information and the user public key after checking, calculates the user check-in reservation information into a first hash value according to a preset hash algorithm, and generates a target block from the first hash value, the user check-in reservation information and the user public key.
S203, adding the data to the block chain.
Specifically, the block chain link points send the target blocks to other nodes on the block chain respectively, the other nodes check the target blocks, and the target blocks are added to the block chain after the checking is completed.
The step S201 to the step S203 may refer to fig. 6a, which is a schematic diagram of a data uplink scenario provided in an embodiment of the present application. In fig. 6a, a subscriber uses a subscriber terminal to view hotel information on a subscriber application, and after the subscriber has succeeded in subscribing to a hotel room, a service server (a background server for the subscriber application) saves the subscriber's room subscription information and user information and transmits the room subscription information and user information to a blockchain node, which links the room subscription information and user information. The to-be-uplinked data in fig. 6a, that is, the room reservation information and the user information, may include the user check-in reservation information, the user public key, the target room number, and the first hash value corresponding to the user check-in reservation information described in the steps S201 to S202, and the to-be-uplinked data is added to the target block 1004 in the blockchain 100.
S204, entering a request.
Specifically, the requesting user sends a check-in request to the management device by using the requesting terminal, and the method of generating the check-in request refers to step S101 in fig. 2, where the check-in request carries the reserved check-in time and the target room number.
S205, inquiring the request.
Specifically, according to the check-in request, the management device sends a query request to the blockchain node to carry the reserved check-in time and the target room number.
S206, acquiring a target block.
Specifically, according to the reservation time and the target room number carried by the inquiry request, the management device acquires the target block on the blockchain node.
S207, acquiring the user check-in reservation information and the user public key.
Specifically, after the target block of the blockchain feedback is obtained, the management device obtains the user check-in reservation information and the user public key from the target block.
S208, a first hash value and a second hash value are obtained.
Specifically, the management device obtains a first hash value from the target block, and performs signature verification on a terminal signature carried in a check-in request sent by the request terminal by using a user public key to obtain a second hash value.
S209, determining whether the terminal signature is legal.
Specifically, the management device determines whether the terminal signature is legal according to whether the first hash value is the same as the second hash value, and if the terminal signature is illegal, the management device executes step S210-step S212; if the terminal signature is a legal signature, step S213 and the following steps are performed.
S210, returning failure prompt information.
Specifically, the management device returns failure prompt information to the request terminal.
S211, returning a request receiving time stamp, failure prompt information, a terminal signature and a target room number.
Specifically, the management device returns the request receipt timestamp, the failure prompt message, the terminal signature, the target room number to the blockchain node.
S212, adding the data into a block chain.
Specifically, please refer to fig. 6b, which is a schematic diagram of another data uplink scenario provided in an embodiment of the present application. In fig. 6b, the requesting terminal sends a check-in request carrying reservation information to the management device, the reservation information including reservation check-in time, target room number, etc., and the mode of generating the check-in request is shown as step S101 in fig. 2; according to the reservation time and the target room number carried by the check-in request, the management device sends a query request to the block chain link point, and after the target block fed back by the block chain is acquired, the management device matches reservation information carried by the request terminal and user check-in reservation information in the target block, and the specific matching process refers to step S208-step S209; in the case that the request user check-in request fails, the blockchain node receives the data to be uplink returned by the management device, as shown in fig. 6b, where the data to be uplink may include a request receiving timestamp, failure prompt information, a terminal signature, and a target room number; the block chain node checks the data to be uplinked, stores the data to be uplinked after the checking is completed, calculates the data to be uplinked into corresponding hash values according to a preset hash algorithm, generates a block 1005 from the corresponding hash values and the data to be uplinked, sends the block 1005 to other nodes on the block chain respectively by the block chain link node, checks the block 1005 by the other nodes, and adds the block 1005 to the block chain 100 after the checking is completed.
S213, acquiring the check-in time, the check-out time and the request receiving time stamp.
Specifically, the management apparatus acquires the reservation in-time, the reservation out-of-house time, and the request reception time stamp after confirming that the requesting user is the reservation user.
S214, determining whether the request terminal has the check-in authority.
Specifically, the management device determines whether the request terminal has the check-in authority by judging whether the request receiving time stamp is in the reserved check-in time and the reserved check-out time.
If the request terminal has the check-in authority, the step S215-the step S221 are executed; if the request terminal does not have the check-in authority, step S222 is executed.
S215, unlocking the door lock.
Specifically, in the case that the requesting terminal has the access right, the management device unlocks the door lock for the requesting user, and records the actual access time (i.e., the door lock unlocking time).
S216, transmitting the actual check-in time, the user information and the target room number.
Specifically, the management device sends the actual check-in time, the user information, and the target room number to the blockchain node.
S217, adding the block chain.
In particular, please refer to fig. 6b. The specific execution process between the request terminal and the management device is similar to the step S212, but the management device does not send failure prompt information to the request terminal under the condition that the request user check-in is successful; as shown in fig. 6b, the blockchain node receives data to be uplink sent by the management device, where the data to be uplink may include an actual time of stay, user information, and a target room number; the block chain node checks the data to be uplinked, stores the data to be uplinked after the checking is completed, calculates the data to be uplinked into corresponding hash values according to a preset hash algorithm, generates a block 1005 from the corresponding hash values and the data to be uplinked, sends the block 1005 to other nodes on the block chain respectively by the block chain link node, checks the block 1005 by the other nodes, and adds the block 1005 to the block chain 100 after the checking is completed.
S218, successfully making a return to the room.
Specifically, the request terminal sends an escape request to the management device, and the management device successfully performs an escape.
S219, controlling the door lock to be closed.
Specifically, after receiving a prompt of successful room return from the request terminal, the management device controls the door lock to be closed.
S220, the actual time of the stay, the user information and the target room number are sent.
Specifically, the management device sends the actual time of the stay away, the user information, and the target room number to the blockchain node.
S221, adding the block chain.
In particular, please refer to fig. 6b. In the case of successful room exit, the to-be-uplink data in fig. 6b may include the actual room exit time, the user information and the target room number, and the to-be-uplink data is added to the target block 1006 in the blockchain 100, and the specific uplink process is referred to in step S217, which is not repeated here.
S222, the door lock is not unlocked.
Specifically, when the requesting user does not have the check-in right, the management device will send the actual check-in time to the requesting terminal.
Referring to fig. 7, a flowchart of another information processing method according to an embodiment of the present application is shown. As shown in fig. 7, the method may include:
In step S301, the block link point acquires the user check-in subscription information and the user public key associated with the subscriber sent by the service server.
Specifically, the service server is a background server of a reservation Application (APP), and provides hotel information, save and transmit user check-in reservation information and a user public key for the user.
The blockchain node is a client in the data sharing system, and may include a mobile phone, a tablet computer, a notebook computer, a palm computer, a mobile internet device (MID, mobile INTERNET DEVICE), and the like. When any blockchain node acquires the user check-in reservation information and the user public key which are sent by the service server and are associated with the reservation user, the user check-in reservation information and the user public key are checked, and after the checking is completed, the information is stored.
Step S302, generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a blockchain; the user check-in reservation information includes a target room number reserved by the reservation terminal and a reserved check-in time.
Specifically, the block link point calculates user check-in reservation information transmitted by the service server according to a preset hash algorithm to obtain a first hash value, and generates a target block from the user check-in reservation information, the user public key and the first hash value, as shown in block 1005 in fig. 6 a; other nodes in the data sharing system acquire the target block according to the consensus algorithm and verify the target block, and after the verification is completed, the target block is added to the blockchain 100 as shown in fig. 6 a.
Step S303, when a query request sent by the management device is received, the target block is acquired in the block chain according to the reservation time and the target room number carried by the query request.
And step S304, the user check-in reservation information and the user public key in the target block are sent to the management equipment, so that the management equipment determines the check-in authority of the request terminal initiating the check-in request according to the user check-in reservation information and the user public key.
The specific implementation process of step S303 to step S304 is shown in fig. 5, and will not be described here again.
Fig. 8 is a schematic structural diagram of a management apparatus according to an embodiment of the present application. As shown in fig. 8, the management apparatus 1 may include: the device comprises a first acquisition module 11, a second acquisition module 12, a signature verification module 13 and a determination module 14.
A first obtaining module 11, configured to obtain, by using a management device, an entry request carrying a reservation for an entry time sent by a request terminal, and obtain a target block from a blockchain according to the entry request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request;
a second obtaining module 12, configured to obtain a user public key and user check-in subscription information in the target block;
The signature verification module 13 is configured to verify a terminal signature carried in the check-in request according to the public key of the user;
And the determining module 14 is configured to determine the check-in authority of the requesting terminal for the target room number according to the user check-in reservation information if the terminal signature is verified to be a legal signature.
The specific functional implementation manners of the first obtaining module 11, the second obtaining module 12, the signature verification module 13, and the determining module 14 may refer to step S101 to step S104 in the corresponding embodiment of fig. 2, which are not described herein.
Referring again to fig. 8, the signature verification module 13 may include: an acquisition unit 131, a decryption unit 132, a comparison unit 133, a first determination unit 134, a second determination unit 135.
An obtaining unit 131, configured to obtain a first hash value corresponding to the user check-in subscription information in the target block;
A decryption unit 132, configured to decrypt the terminal signature by using the user public key, to obtain a second hash value;
A comparing unit 133, configured to compare the first hash value with the second hash value;
A first determining unit 134, configured to determine that the terminal signature is a legal signature if the first hash value is the same as the second hash value; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
And a second determining unit 135 configured to determine that the terminal signature is an illegal signature if the first hash value is different from the second hash value.
The specific functional implementation manners of the obtaining unit 131, the decrypting unit 132, the comparing unit 133, the first determining unit 134, and the second determining unit 135 may refer to step S103 in the corresponding embodiment of fig. 2, and are not described herein.
Referring again to fig. 8, the signature verification module 13 may further include: return unit 136 and transmitting unit 137.
A return unit 136, configured to return failure prompt information to the requesting terminal if the terminal signature is verified to be an illegal signature;
And a sending unit 137, configured to send a request receiving timestamp corresponding to the check-in request, the failure prompt information, the terminal signature carried in the check-in request, and the target room number to a blockchain node, so that the blockchain node performs uplink processing.
The specific functional implementation manner of the returning unit 136 and the sending unit 137 may refer to step S210-step S212 in the corresponding embodiment of fig. 5, which is not described herein.
Referring again to fig. 8, the determining module 14 may include: a first acquisition unit 141, a first determination unit 142, a second acquisition unit 143, and a second determination unit 144.
A first obtaining unit 141, configured to obtain a check-in time and a check-out time in the user check-in reservation information in the target block;
a first determining unit 142, configured to determine a user's occupancy time range according to the occupancy time and the time of the occupancy;
a second obtaining unit 143, configured to obtain the request receiving timestamp corresponding to the check-in request;
and the second determining unit 144 is configured to determine that the request terminal has a check-in authority if the request receiving timestamp is in the user check-in time range, and unlock a door lock according to the check-in authority.
The specific functional implementation manner of the first obtaining unit 141, the first determining unit 142, the second obtaining unit 143, and the second determining unit 144 may refer to step S104 in the corresponding embodiment of fig. 2, which is not described herein.
Referring again to fig. 8, the management apparatus device 1 may further include: a first transmitting module 15, a second transmitting module 16.
The first sending module 15 is configured to send, when it is determined that the request terminal is in a successful state of check-in according to the check-in authority, an actual check-in time, user information, and the target room number to a blockchain node, so that the blockchain node performs uplink processing;
And the second sending module 16 is configured to control the door lock to close when the request terminal is successful in a room-exit, and send the actual room-exit time, the user information and the target room number to a blockchain node, so that the blockchain node performs uplink processing.
The specific functional implementation manner of the first sending module 15 and the second sending module 16 may refer to step S215-step S221 in the corresponding embodiment of fig. 5, which is not described herein.
According to the embodiment of the application, the management equipment acquires the check-in request carrying the reservation check-in time sent by the request terminal, and acquires the target block from the block chain according to the check-in request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request; acquiring a user public key and user check-in reservation information in the target block; checking a terminal signature carried in the check-in request according to the user public key; and if the terminal signature is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target room number according to the user check-in reservation information. The request terminal can acquire the user public key and the user check-in reservation information in the blockchain, but the user check-in reservation information and the user public key on the blockchain cannot be changed or illegally tampered once being determined, and the terminal signature of the request terminal is encrypted by the private key of the request terminal, so that whether the request terminal is consistent with the user terminal or not can be confirmed by matching the related information provided by the request terminal and the user check-in reservation information on the blockchain, thereby avoiding illegal molecules from providing false information to check in a room and improving the success rate and the safety of information reservation.
Fig. 9 is a schematic structural diagram of a blockchain node device according to an embodiment of the present application. The blockchain node device 2 may include: a first acquisition module 21, a generation and addition module 22, a second acquisition module 23 and a transmission module 24.
A first obtaining module 21, configured to obtain, by using the block link point, user check-in subscription information and a user public key associated with a subscriber sent by the service server;
A generation and addition module 22, configured to generate a target block according to the user check-in subscription information and the user public key, and add the target block to a blockchain; the user check-in reservation information comprises a target room number reserved by the reservation terminal and reservation check-in time;
A second obtaining module 23, configured to obtain, when receiving a query request sent by a management device, the target block in the blockchain according to the reserved residence time and the target room number carried by the query request;
And the sending module 24 is configured to send the user check-in subscription information and the user public key in the target block to the management device, so that the management device determines the check-in authority of the requesting terminal that initiates the check-in request according to the user check-in subscription information and the user public key.
The specific function implementation manner of the first obtaining module 21, the generating and adding module 22, the second obtaining module 23, and the sending module 24 may refer to step S201-step S203 in the corresponding embodiment of fig. 5, which is not described herein.
According to the embodiment of the application, the user check-in reservation information and the user public key which are sent by the service server and associated with the reservation user are acquired through the block chain link point; generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a blockchain; the user check-in reservation information comprises a target room number reserved by the reservation terminal and reservation check-in time; when a query request sent by management equipment is received, acquiring the target block in the block chain according to the reservation time and the target room number carried by the query request; and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in authority of the request terminal initiating the check-in request according to the user check-in reservation information and the user public key. The block chain link point receives the user public key and the user entry reservation information sent by the service server, generates the target block for uplink processing, and once uplink determination is carried out, the user entry reservation information and the user public key cannot be changed or illegally tampered due to the uniqueness of the block chain, so that strong protection is provided for network security, further, the situation that false information is provided by an lawbreaker to enter a room can be avoided, and the success rate and the security of information reservation are improved.
Fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 10, the electronic device 1000 may include: processor 1001, network interface 1004a and memory 1005a, in addition, the electronic device 1000 may further comprise: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004a may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005a may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005a may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 10, an operating system, a network communication module, a user interface module, and a device control application program may be included in the memory 1005a, which is one type of computer storage medium.
In the electronic device 1000 shown in fig. 10, the network interface 1004a may provide a network communication function; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be used to invoke the device control application stored in the memory 1005a to implement:
The management equipment acquires a check-in request carrying reservation check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is a block associated with the reserved check-in time and a target room number; the target room number is the room number requested by the check-in request;
acquiring a user public key and user check-in reservation information in the target block;
checking a terminal signature carried in the check-in request according to the user public key;
and if the terminal signature is verified to be a legal signature, determining the check-in authority of the request terminal aiming at the target room number according to the user check-in reservation information.
In one embodiment, the processor 1001 performs signature verification on the terminal signature carried in the check-in request according to the public key of the user, specifically performs the following steps:
Acquiring a first hash value corresponding to the user check-in reservation information in the target block;
Decrypting the terminal signature by adopting the user public key to obtain a second hash value; comparing the first hash value with the second hash value;
If the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
And if the first hash value is different from the second hash value, determining that the terminal signature is an illegal signature.
The following steps are also specifically performed:
If the terminal signature is verified to be illegal, the management equipment returns failure prompt information to the request terminal;
And sending a request receiving time stamp corresponding to the check-in request, the failure prompt information, the terminal signature carried in the check-in request and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
In one embodiment, the processor 1001 determines the check-in authority of the requesting terminal for the target room number according to the user check-in subscription information, specifically performs the following steps:
Acquiring the check-in time and the check-out time of the user check-in reservation information in the target block;
determining a user check-in time range according to the check-in time and the check-out time;
acquiring the request receiving time stamp corresponding to the check-in request;
and if the request receiving time stamp is in the user check-in time range, determining that the request terminal has check-in authority, and unlocking a door lock according to the check-in authority.
In one embodiment, the processor 1001 further performs the following specific steps:
when the request terminal is in a check-in success state according to the check-in authority, transmitting actual check-in time, user information and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing;
And when the request terminal is successful in the room-returning, controlling the door lock to be closed, and sending the actual room-returning time, the user information and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
The request terminal can acquire the user public key and the user check-in reservation information in the blockchain, but the user check-in reservation information and the user public key on the blockchain cannot be changed or illegally tampered once being determined, and the terminal signature of the request terminal is encrypted by the private key of the request terminal, so that whether the request terminal is consistent with the user terminal or not can be confirmed by matching the related information provided by the request terminal and the user check-in reservation information on the blockchain, thereby avoiding illegal molecules from providing false information to check in a room and improving the success rate and the safety of information reservation.
It should be understood that the electronic device 1000 described in the embodiments of the present application may perform the description of the information processing method in the embodiments corresponding to fig. 2 to 7, and may also perform the description of the management device apparatus 1 and the blockchain node apparatus 2 in the embodiments corresponding to fig. 8 to 9, which are not repeated herein. In addition, the description of the beneficial effects of the same method is omitted.
Referring to fig. 11, a schematic structural diagram of another electronic device according to an embodiment of the present application is shown. As shown in fig. 11, the electronic device 2000 may include: processor 2001, network interface 2004 and memory 2005, in addition, the electronic device 2000 may further include: a user interface 2003, and at least one communication bus 2002. Wherein a communication bus 2002 is used to enable connected communications between these components. The user interface 2003 may include a Display screen (Display), a Keyboard (Keyboard), and the optional user interface 2003 may further include a standard wired interface, a wireless interface, among others. The network interface 2004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 2005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 2005 may also optionally be at least one storage device located remotely from the aforementioned processor 2001. As shown in fig. 11, an operating system, a network communication module, a user interface module, and a device control application program may be included in the memory 2005 as one type of computer storage medium.
In the electronic device 2000 illustrated in fig. 11, the network interface 2004 may provide network communication functions; while user interface 2003 is primarily an interface for providing input to a user; and processor 2001 may be used to invoke device control applications stored in memory 2005 to implement:
the block link point obtains user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user;
Generating a target block according to the user check-in reservation information and the user public key, and adding the target block into a blockchain; the user check-in reservation information comprises a target room number reserved by the reservation terminal and reservation check-in time;
When a query request sent by management equipment is received, acquiring the target block in the block chain according to the reservation time and the target room number carried by the query request;
and sending the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment determines the check-in authority of the request terminal initiating the check-in request according to the user check-in reservation information and the user public key.
The block chain link point receives the user public key and the user entry reservation information sent by the service server, generates the target block for uplink processing, and once uplink determination is carried out, the user entry reservation information and the user public key cannot be changed or illegally tampered due to the uniqueness of the block chain, so that strong protection is provided for network security, further, the situation that false information is provided by an lawbreaker to enter a room can be avoided, and the success rate and the security of information reservation are improved.
It should be understood that the electronic device 2000 described in the embodiment of the present application may perform the description of the information processing method in the embodiment corresponding to fig. 2 to 7, and may also perform the description of the management device apparatus 1 and the blockchain node apparatus 2 in the embodiment corresponding to fig. 8 to 9, which are not repeated herein. In addition, the description of the beneficial effects of the same method is omitted.
Furthermore, it should be noted here that: the embodiment of the present application further provides a computer storage medium, in which the aforementioned computer programs executed by the management apparatus device 1 and the blockchain node device 2 are stored, and the computer programs include program instructions, when executed by the processor, enable the execution of the descriptions of the information processing method in the corresponding embodiments of fig. 2 to 7, and therefore, the descriptions will not be repeated here. In addition, the description of the beneficial effects of the same method is omitted. For technical details not disclosed in the embodiments of the computer storage medium according to the present application, please refer to the description of the method embodiments of the present application.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), or the like.
The foregoing disclosure is illustrative of the present application and is not to be construed as limiting the scope of the application, which is defined by the appended claims.
Claims (9)
1. An information processing method, characterized by comprising:
The management equipment acquires a check-in request carrying reservation check-in time sent by a request terminal, and acquires a target block from a block chain according to the check-in request; the target block is generated by a block link point according to a first hash value, user check-in reservation information and a user public key when the first hash value of the user check-in reservation information of a reservation user is generated; the user check-in reservation information includes room reservation information of the reservation user and user information of the reservation user; the room reservation information of the reservation user comprises the reservation time and a target room number; the target room number is the room number requested by the check-in request;
Acquiring the first hash value, the user public key and the user check-in reservation information in the target block;
According to the public key of the user, decrypting the terminal signature carried in the check-in request to obtain a second hash value; the second hash value is generated by the request terminal through hash calculation on room reservation information of a request user and user information of the request user;
If the first hash value is the same as the second hash value, acquiring the check-in time and the check-out time in the user check-in reservation information;
determining a user check-in time range according to the check-in time and the check-out time;
acquiring a request receiving time stamp corresponding to the check-in request;
and if the request receiving time stamp is in the user check-in time range, determining that the request terminal has check-in authority, and unlocking a door lock according to the check-in authority.
2. The method as recited in claim 1, further comprising:
If the first hash value is the same as the second hash value, determining that the terminal signature is a legal signature; the terminal signature which is the legal signature is obtained by encrypting the first hash value by the request terminal based on a user private key corresponding to the user public key;
And if the first hash value is different from the second hash value, determining that the terminal signature is an illegal signature.
3. The method as recited in claim 2, further comprising:
If the terminal signature is verified to be illegal, the management equipment returns failure prompt information to the request terminal;
And sending a request receiving time stamp corresponding to the check-in request, the failure prompt information, the terminal signature carried in the check-in request and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
4. The method as recited in claim 1, further comprising:
when the request terminal is in a check-in success state according to the check-in authority, transmitting actual check-in time, user information and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing;
And when the request terminal is successful in the room-returning, controlling the door lock to be closed, and sending the actual room-returning time, the user information and the target room number to a blockchain node so as to enable the blockchain node to perform uplink processing.
5. An information processing method, characterized by comprising:
the block link point obtains user check-in reservation information and a user public key which are sent by a service server and are associated with a reservation user;
Generating a first hash value of the user check-in reservation information, generating a target block according to the first hash value, the user check-in reservation information and the user public key, and adding the target block into a blockchain; the user check-in reservation information comprises a target room number reserved by a reservation terminal and reservation check-in time;
When a query request sent by management equipment is received, acquiring the target block in the block chain according to the reservation time and the target room number carried by the query request;
The first hash value, the user check-in reservation information and the user public key in the target block are sent to the management device, so that the management device decrypts the terminal signature carried in the check-in request according to the user public key to obtain a second hash value; the second hash value is generated by the request terminal through hash calculation on room reservation information of a request user and user information of the request user; if the second hash value is the same as the first hash value, the management device is configured to obtain the check-in time and the check-out time in the user check-in reservation information; the check-in time and the check-out time are used for determining a user check-in time range; and if the request receiving time stamp corresponding to the check-in request is in the user check-in time range, the management equipment is used for determining that the request terminal has check-in authority and unlocking a door lock according to the check-in authority.
6. An information processing apparatus, the apparatus operating on a management device, the apparatus comprising:
The first acquisition module is used for acquiring an admission request carrying reservation of admission time sent by a request terminal and acquiring a target block from a block chain according to the admission request; the target block is generated by a block link point according to a first hash value, user check-in reservation information and a user public key when the first hash value of the user check-in reservation information of a reservation user is generated; the user check-in reservation information includes room reservation information of the reservation user and user information of the reservation user; the room reservation information of the reservation user comprises the reservation time and a target room number; the target room number is the room number requested by the check-in request;
a second obtaining module, configured to obtain the first hash value, the user public key, and the user in-service subscription information in the target block;
The signature verification module is used for decrypting the terminal signature carried in the check-in request according to the user public key to obtain a second hash value; the second hash value is generated by the request terminal through hash calculation on room reservation information of a request user and user information of the request user;
The determining module is used for acquiring the check-in time and the check-out time in the user check-in reservation information if the first hash value is the same as the second hash value;
the determining module is further used for determining a user check-in time range according to the check-in time and the check-out time;
the determining module is further configured to obtain a request receiving timestamp corresponding to the check-in request;
And the determining module is further used for determining that the request terminal has the check-in authority if the request receiving timestamp is in the user check-in time range, and unlocking a door lock according to the check-in authority.
7. An information processing apparatus, the apparatus operating at a blockchain node, the apparatus comprising:
The first acquisition module is used for acquiring user check-in reservation information and a user public key which are sent by the service server and are associated with the reserved user;
The generation and addition module is used for generating a first hash value of the user check-in reservation information, generating a target block according to the first hash value, the user check-in reservation information and the user public key, and adding the target block into a blockchain; the user check-in reservation information comprises a target room number reserved by a reservation terminal and reservation check-in time;
the second acquisition module is used for acquiring the target block in the block chain according to the reservation time and the target room number carried by the inquiry request when the inquiry request sent by the management device is received;
The sending module is used for sending the first hash value, the user check-in reservation information and the user public key in the target block to the management equipment so that the management equipment can decrypt the terminal signature carried in the check-in request according to the user public key to obtain a second hash value; the second hash value is generated by the request terminal through hash calculation on room reservation information of a request user and user information of the request user; if the second hash value is the same as the first hash value, the management device is configured to obtain the check-in time and the check-out time in the user check-in reservation information; the check-in time and the check-out time are used for determining a user check-in time range; and if the request receiving time stamp corresponding to the check-in request is in the user check-in time range, the management equipment is used for determining that the request terminal has check-in authority and unlocking a door lock according to the check-in authority.
8. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1 to 5.
9. A computer storage medium storing a computer program comprising program instructions which, when executed by a processor, perform the steps of the method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910860693.4A CN110598469B (en) | 2019-09-11 | 2019-09-11 | Information processing method, device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910860693.4A CN110598469B (en) | 2019-09-11 | 2019-09-11 | Information processing method, device and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110598469A CN110598469A (en) | 2019-12-20 |
CN110598469B true CN110598469B (en) | 2024-05-17 |
Family
ID=68858986
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910860693.4A Active CN110598469B (en) | 2019-09-11 | 2019-09-11 | Information processing method, device and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110598469B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111209334B (en) * | 2019-12-23 | 2024-03-22 | 国网河北省电力有限公司雄安新区供电公司 | Blockchain-based power terminal data security management method |
CN112162726B (en) * | 2020-09-30 | 2024-11-15 | 深圳前海微众银行股份有限公司 | Target user determination method, device, equipment and storage medium |
CN112862132B (en) * | 2021-02-23 | 2024-01-23 | 杭州趣链科技有限公司 | Block chain-based hotel management method, system, device, equipment and medium |
CN113221166A (en) * | 2021-05-11 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Method and device for acquiring block chain data, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN109800897A (en) * | 2018-12-26 | 2019-05-24 | 中链科技有限公司 | Hotel occupancy processing method, device, system and calculating equipment based on block chain |
-
2019
- 2019-09-11 CN CN201910860693.4A patent/CN110598469B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN109800897A (en) * | 2018-12-26 | 2019-05-24 | 中链科技有限公司 | Hotel occupancy processing method, device, system and calculating equipment based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110598469A (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110598469B (en) | Information processing method, device and computer storage medium | |
CN1714529B (en) | Domain-based digital-rights management system with easy and secure device enrollment | |
US10445487B2 (en) | Methods and apparatus for authentication of joint account login | |
US8590024B2 (en) | Method for generating digital fingerprint using pseudo random number code | |
CN110719173B (en) | Information processing method and device | |
US5491752A (en) | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | |
CN1224213C (en) | Method for issuing an electronic identity | |
EP2115993B1 (en) | Method for generating digital fingerprint | |
CN100438421C (en) | Method and system for conducting user verification to sub position of network position | |
CN110690956B (en) | Bidirectional authentication method and system, server and terminal | |
CN105553926A (en) | Authentication method, server, and terminal | |
EP3579595B1 (en) | Improved system and method for internet access age-verification | |
US10348496B2 (en) | Method for leveraging a secure telecommunication session | |
CN110995654B (en) | Terminal temporary authorization method, device and system based on dynamic two-dimensional code | |
JP6723422B1 (en) | Authentication system | |
CN114531277A (en) | User identity authentication method based on block chain technology | |
CN115842680A (en) | Network identity authentication management method and system | |
US20100273552A1 (en) | Method for Authentication of Game Executing Authority Recording Medium for Storing Authentication Program of Game Executing Authority, and Server for Storing Authentication Program of Game Executing Authority | |
CN114244505B (en) | Safety communication method based on safety chip | |
CN108667800B (en) | Access authority authentication method and device | |
KR101451638B1 (en) | Identification and theft prevention system, and method thereof | |
CN116866093B (en) | Identity authentication method, identity authentication device, and readable storage medium | |
KR20150005788A (en) | User authentication method using user key value | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
CN111131140A (en) | Method and system for enhancing login security of Windows operating system based on message pushing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TG01 | Patent term adjustment | ||
TG01 | Patent term adjustment |