WO2021208615A1 - 用户邀请方法、装置、计算机设备及计算机可读存储介质 - Google Patents
用户邀请方法、装置、计算机设备及计算机可读存储介质 Download PDFInfo
- Publication number
- WO2021208615A1 WO2021208615A1 PCT/CN2021/078467 CN2021078467W WO2021208615A1 WO 2021208615 A1 WO2021208615 A1 WO 2021208615A1 CN 2021078467 W CN2021078467 W CN 2021078467W WO 2021208615 A1 WO2021208615 A1 WO 2021208615A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- user
- invitation
- code
- page
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 92
- 230000004044 response Effects 0.000 claims abstract description 55
- 230000000977 initiatory effect Effects 0.000 claims description 21
- 230000015654 memory Effects 0.000 claims description 21
- 230000007246 mechanism Effects 0.000 claims description 14
- 238000012552 review Methods 0.000 claims description 13
- 238000012797 qualification Methods 0.000 claims description 11
- 230000009471 action Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 22
- 230000008569 process Effects 0.000 description 12
- 230000002093 peripheral effect Effects 0.000 description 10
- 230000001133 acceleration Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 9
- 230000008520 organization Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000012550 audit Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 238000013473 artificial intelligence Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 239000000919 ceramic Substances 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000004927 fusion Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- This application relates to the field of Internet technology, and in particular to a user invitation method, device, computer equipment, and computer-readable storage medium.
- QR codes can be used to convey user invitation information, invite users to join a group, and be invited. Users can scan the QR code to join the group.
- this QR code can be forwarded unlimited times, and its spread range cannot be controlled.
- Each user who has obtained the QR code can obtain the information in the QR code by scanning the code, that is, Users who have obtained the QR code can respond to the user invitation, which results in the initiating user being unable to control the scope of the user invitation.
- the solution of inviting users through the QR code has the risk of the QR code being stolen.
- the code data has low security.
- the embodiments of the present application provide a user invitation method, device, computer equipment, and computer-readable storage medium, which can prevent the QR code from being stolen and ensure the security of the two-dimensional code data.
- the embodiment of the present application provides a user invitation method, the method is executed by a terminal, and the method includes:
- the target QR code is encrypted with a public key, and is used to instruct to jump to the target invitation page;
- the user information that has been filled in the target invitation page is submitted.
- the embodiment of the present application also provides a user invitation method, the method is executed by the server, and the method includes:
- the private key is used to decrypt the target QR code, so as to display the target invitation page when the target QR code is successfully decrypted;
- the user information is stored in the blockchain.
- An embodiment of the present application also provides a user invitation device, which includes:
- the identity obtaining module is configured to obtain the user identity of the currently logged-in user in response to a triggering operation on the target invitation link corresponding to the target QR code;
- the target QR code is encrypted with a public key, and is used to instruct to jump to the target invitation page;
- the private key obtaining module is configured to access the target invitation link based on the user ID, and obtain the private key corresponding to the public key when the user ID is consistent with the target user ID corresponding to the target invitation link;
- the decryption module is configured to use the private key to decrypt the target QR code, and display the target invitation page when the target QR code is successfully decrypted;
- the sending module is configured to submit the user information filled in the target invitation page in response to the submission operation of the target invitation page.
- An embodiment of the present application also provides a user invitation device, which includes:
- the sending module is configured to send the target invitation link corresponding to the target QR code; wherein the target QR code is encrypted with a public key, and is used to instruct to jump to the target invitation page;
- the receiving module is configured to receive an access request for the target invitation link, and the access request carries a user identifier
- the sending module is configured to send the private key corresponding to the public key when the user ID is consistent with the target user ID;
- the private key is used to decrypt the target QR code, so as to display the target invitation page when the target QR code is successfully decrypted;
- the obtaining module is configured to obtain the user information that has been filled in the target invitation page in response to the submission request of the target invitation page;
- the storage module is configured to store the user information in the blockchain based on the consensus mechanism.
- the embodiment of the present application also provides a computer device, which includes one or more processors and one or more memories, and at least one piece of program code is stored in the one or more memories.
- One or more processors are loaded and executed to implement the user invitation method provided in the embodiments of the present application.
- the embodiment of the present application also provides a computer-readable storage medium.
- the computer-readable storage medium stores at least one piece of program code.
- the at least one piece of program code is loaded and executed by a processor to implement the user invitation provided by the embodiment of the present application. method.
- the user ID of the currently logged-in user of the terminal is provided to determine whether the currently logged-in user is a registered user.
- Inviting user if the currently logged-in user is an invited user, obtain the private key of the target QR code corresponding to the target invitation link from the server, and use the private key to decrypt the target QR code encrypted by the public key.
- the QR code is successfully decrypted, the target invitation page indicated by the target QR code is displayed; in response to the submission operation of the target invitation page, the user information that has been filled in the target invitation page is submitted to the server.
- the target QR code by encrypting the target QR code, only the invited users can get the private key of the target QR code, and then the target QR code can be decrypted to ensure the security of the information in the QR code and prevent the QR code from being compromised. Fraudulent.
- FIG. 1 is a schematic diagram of an implementation environment of a user invitation method provided by an embodiment of the present application
- FIG. 2 is a schematic diagram of data interaction of an authentication platform provided by an embodiment of the present application.
- Fig. 3 is a flowchart of a user invitation method provided by an embodiment of the present application.
- FIG. 4 is a flowchart of a user invitation method provided by an embodiment of the present application.
- FIG. 5 is a flowchart of a user invitation method provided by an embodiment of the present application.
- FIG. 6 is a schematic diagram of a user introduction page provided by an embodiment of the present application.
- FIG. 7 is a schematic diagram of an invitation card provided by an embodiment of the present application.
- FIG. 8 is a schematic diagram of a target invitation page provided by an embodiment of the present application.
- FIG. 9 is a schematic diagram of a submission success page provided by an embodiment of the present application.
- FIG. 10 is a schematic diagram of inviting merchants to settle on a live broadcast platform provided by an embodiment of the present application.
- FIG. 11 is a schematic structural diagram of a user invitation device provided by an embodiment of the present application.
- FIG. 12 is a schematic structural diagram of a user invitation device provided by an embodiment of the present application.
- FIG. 13 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
- FIG. 14 is a schematic structural diagram of a server provided by an embodiment of the present application.
- Blockchain It is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
- the blockchain is essentially a decentralized database. It is a series of data blocks associated with cryptographic methods. Each data block contains information about a network transaction to verify the validity of its information (anti-counterfeiting) ) And generate the next block, each block contains a timestamp and a link to the previous block.
- a blockchain is a chained data structure in which data blocks are sequentially connected in chronological order, and a distributed ledger that cannot be tampered with and is guaranteed by cryptography, namely Once recorded, the data in the blockchain is irreversible.
- Consensus mechanism It is a mathematical algorithm that realizes the establishment of trust between different nodes and the acquisition of rights and interests in the blockchain system.
- the verification and confirmation of the transaction can be completed in a very short time.
- For a transaction if several nodes with irrelevant interests can reach a consensus, it can be considered as in the system All nodes in the network can also reach a consensus on this.
- Public key and private key A key pair (that is, a public key and a private key) obtained through an algorithm, the public key is the public part of the key pair, and the private key is It is a private part.
- the public key is usually used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with the corresponding private key.
- the key pair obtained by this algorithm can be guaranteed to be unique.
- Using this key pair can achieve asymmetric encryption, that is, if one key is used to encrypt a piece of data, the other key must be used to decrypt it. For example, if you use a public key to encrypt data, you must use the private key to decrypt it. If you use the private key to encrypt data, you must also use the public key to decrypt, otherwise the decryption will not succeed.
- Hash table It is a data structure that is directly accessed based on the key code value, that is, the key element. That is, the key code value can be mapped to a position in the table, and then the data at that position can be directly accessed to speed up the search.
- this solution can be combined with the live broadcast field.
- the service provider is inviting When users or businesses with better qualifications enter the live broadcast platform, they can apply the user invitation method mentioned in this application.
- the service provider shares the QR code carrying the invitation information with the invited target users, they can use the public key pair. The key encrypts the two-dimensional code, and only the invited target user can obtain the private key corresponding to the two-dimensional code, and then decrypt the two-dimensional code to obtain the information in the two-dimensional code.
- Applying the user invitation method provided in this application can prevent the QR code from being stolen by other users, avoid unqualified users from entering the live broadcast platform, and ensure the user quality of the live broadcast platform.
- the user invitation method provided in this application can also be applied to user invitation scenarios in other fields. In this application, only the application of the method in the live broadcast field is used as an example for description.
- FIG. 1 is a schematic diagram of an implementation environment of a user invitation method provided by an embodiment of the present application.
- the implementation environment may include a first terminal 110, a second terminal 120, a server 130, a computer device 140 corresponding to an authentication platform, and a zone.
- Block chain system 150 may be used to store and retrieve data.
- the first terminal 110 may be a terminal used by the initiating user, for example, the initiating user may be a service provider of a live broadcast platform, the second terminal 120 may be a terminal used by the invited user, and the first terminal Both 110 and the second terminal 120 can install and run a client with a target application.
- the target application can be a social application.
- the initiating user and the invited user can communicate through the target application, that is, through The target application performs QR code sharing. Both the first terminal 110 and the second terminal 120 can log in user accounts.
- the first terminal 110 and the second terminal 120 may be smart phones, tablet computers, e-book readers, moving picture experts compression standard audio layer 3 (Moving Picture Experts Group Audio Layer III, MP3) players, moving picture expert compression standards Audio Layer 4 (Moving Picture Experts Group Audio Layer IV, MP4) players, laptop portable computers and desktop computers, etc.
- moving picture experts compression standard audio layer 3 Moving Picture Experts Group Audio Layer III, MP3
- moving picture expert compression standards Audio Layer 4 Moving Picture Experts Group Audio Layer IV, MP4
- the server 130 may be a server corresponding to the target application program and used to provide background services for the target application program.
- the server 130 may be an independent physical server, or a server cluster or a distributed system composed of multiple physical servers. It can also provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (CDN), and big data Cloud servers for basic cloud computing services such as artificial intelligence platforms.
- the computer device 140 corresponding to the authentication platform can be used to authenticate users and generate key pairs.
- the authentication platform can be a third-party authentication platform, or other institutions or platforms. Take the application of this solution in the live broadcast field as an example.
- the authentication platform may be a live broadcast platform.
- the live broadcast platform may perform identity authentication on the service provider and the users who settle in, and may also generate a key pair based on the data transmission request of the service provider or the user.
- Figure 2 is a schematic diagram of data interaction of an authentication platform provided by an embodiment of the present application.
- the authentication platform 140 can perform identity authentication on institution A and institution B, and in response to the identity authentication of each institution, issue a signature certificate for each institution
- the signature certificate may carry the private key signature of the authentication platform 140.
- the authentication platform 140 can be an independent physical server, a server cluster or a distributed system composed of multiple physical servers, and it can also provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, and cloud services. Cloud servers for basic cloud computing services such as communications, middleware services, domain name services, security services, CDN, and big data and artificial intelligence platforms.
- the blockchain system 150 may include multiple node devices 1501. Each node device 1501 may be a computer device belonging to a different organization, or a computer device belonging to the same organization, or a computer device of an ordinary user. There is no restriction on this.
- the node device 1501 may be any form of computing device in the network, such as a server, a host, a user terminal, and so on.
- the node device 1501 and the node device 1501 can share data.
- the node devices 1501 may establish a P2P network based on a peer-to-peer (Peer To Peer, P2P) protocol.
- P2P protocol is an application layer protocol that runs on top of the Transmission Control Protocol (TCP) protocol.
- each node device 1501 can receive input information, and maintain the shared data in the blockchain system 150 based on the received input information, that is, maintain the shared data in the blockchain system 150 Blockchain.
- there may be an information connection between each node device 1501 in the blockchain system 150 and the node devices 1501 may transmit information through the above-mentioned information connection.
- other node devices 1501 in the blockchain system 150 can also obtain the input information, and store the input information as data in the shared data , So that the data stored on all node devices 1501 in the blockchain system 150 are consistent.
- the first terminal 110, the second terminal 120, the server 130, the computer device 140 corresponding to the authentication platform, and the blockchain system 150 can be connected through a wired or wireless network, so that data interaction can be performed between various devices.
- Fig. 3 is a flowchart of a user invitation method provided by an embodiment of the present application. This method can be applied to the second terminal in the foregoing implementation environment.
- the second terminal is used as the execution subject, and the user invitation method is briefly introduced with reference to FIG. 3.
- the second terminal obtains the user ID of the currently logged-in user of the terminal in response to the triggering operation on the target invitation link of the server. Make a jump.
- the target invitation link may be a link sent by the initiating user, and the target invitation page indicated by the target QR code may be used to collect user information of the invited user.
- a service provider of a live broadcast platform invites a user to live on the live broadcast platform, it can send the target invitation link to the user, and share the target QR code through the target invitation link, so that the The inviting user can obtain the target invitation page based on the target QR code to perform subsequent user information filling steps.
- the second terminal may display the received target invitation link, and when a user triggers the target invitation link, it may obtain the user identification of the currently logged-in user of the terminal.
- the trigger operation may be a click operation, a long press operation, etc., which is not limited in the embodiment of the present application.
- the second terminal accesses the target invitation link based on the user ID, and in response to the user ID being consistent with the target user ID corresponding to the target invitation link, obtains the private key of the target QR code from the server.
- the target user ID is the user ID of the invited user.
- the target QR code is encrypted based on asymmetric encryption technology.
- the target QR code can be encrypted using the public key in the key pair.
- the private key in the key pair needs to be decrypted to obtain the information in the QR code.
- the second terminal may initiate an access request to the target invitation link to the server based on the user identification of the currently logged-in user, and the server will use the user identification in the access request with the target user corresponding to the target invitation link. logo for comparison.
- the second terminal is allowed to obtain the private key corresponding to the target QR code; if the two user IDs are inconsistent, it is determined that the currently logged-in user is not the invited user, The second terminal is not allowed to obtain the private key corresponding to the target QR code.
- the shared QR code is encrypted, and only the invited user can decrypt it.
- the information in the QR code can be obtained, which can prevent the QR code from being stolen and improve the QR code. Information security of the code.
- the second terminal uses the private key to decrypt the target two-dimensional code pointed to by the target invitation link, and in response to the successful decryption of the target two-dimensional code, displays the target invitation page.
- the target QR code can be automatically scanned and recognized, and the target indicated by the target QR code is displayed.
- the invitation page so that the user can complete the subsequent information filling steps.
- the second terminal decrypts the target two-dimensional code, it can automatically scan and recognize the target two-dimensional code image without displaying the image of the target two-dimensional code. The information in the dimension code is leaked.
- the second terminal In response to the submission operation of the target invitation page, the second terminal submits the user information filled in the target invitation page to the server.
- the user can fill in relevant user information in the target invitation page.
- the user information may include the user’s identity information, etc.
- the user information may include the merchant’s store name, main business category, and business For information such as license information, the number of fans of the merchant on a certain platform, etc.
- this embodiment of the application does not limit the specific content of the user information.
- the second terminal may submit the user information filled in by the user to the server.
- the technical solution provided by the embodiment of the present application by receiving the target invitation link, provides the user identification of the currently logged-in user of the terminal when accessing the target invitation link, determines whether the currently logged-in user is an invited user, and responds to the current logged-in user is an invited user, Obtain the private key of the target QR code corresponding to the target invitation link from the server, use the private key to decrypt the target QR code, and in response to the successful decryption of the target QR code, display the target invitation indicated by the target QR code Page; in response to the submission operation of the target invitation page, the user information that has been filled in the target invitation page is submitted to the server. Applying the above solution, by encrypting the QR code, only invited users can decrypt it, ensuring the security of the information in the QR code and preventing the QR code from being stolen.
- Fig. 4 is a flowchart of a user invitation method provided by an embodiment of the present application. This method can be applied to the server in the above-mentioned implementation environment.
- the server is used as the execution subject, and the user invitation method is briefly introduced with reference to FIG. 4.
- the server sends a target invitation link to the second terminal, where the target invitation link corresponds to a target user identifier, and the target invitation link is a link of a target two-dimensional code, and the target two-dimensional code is used to indicate a jump to a target invitation page.
- the target user identifier may be the user identifier of the invited user.
- one user identifier may uniquely indicate one user.
- the server may receive a user invitation request from the initiating user, and the user invitation request may carry the target QR code and the target user identification, and the server may be based on the target QR code and the target user identification, The target invitation link is created, and the target invitation link is sent to the terminal of the invited user, that is, the second terminal.
- the server receives an access request for the target invitation link, where the access request carries the user identifier of the currently logged-in user of the terminal.
- the second terminal when it detects the user's triggering operation on the target invitation link, it can obtain the user ID of the currently logged-in user, and generate an access request for the target invitation link based on the user ID of the currently logged-in user. Send the access request to the server.
- the server sends the private key of the target QR code to the terminal, and the terminal decrypts the target QR code based on the private key, and displays the target invitation page.
- the server may verify whether the currently logged-in user of the terminal is an invited user based on the user identification in the access request and the target user identification. If the user ID is consistent with the user ID of the target user, it is determined that the currently logged-in user of the terminal is an invited user, and the second terminal is allowed to obtain the private key corresponding to the target QR code, decrypt the target QR code, and the user Perform subsequent information filling steps based on the decrypted target QR code. If the user ID is inconsistent with the user ID of the target user, it is determined that the currently logged-in user of the terminal is not an invited user, the second terminal is not allowed to obtain the private key, and the user cannot obtain the target invitation page indicated by the target QR code .
- the server obtains the user information that has been filled in the target invitation page.
- the server may also perform user qualification audits on the acquired user information, which is not limited in the embodiment of the present application. For example, taking the application of this solution in the field of live broadcasting as an example, the service can determine whether the user has the qualifications to be stationed on the live broadcasting platform based on user information.
- the server stores the user information in the blockchain based on the consensus mechanism.
- the server may store the user information submitted by the user in the blockchain. Due to the non-tamperable and non-deletable characteristics of the data stored in the blockchain, it can be ensured that user information will not be lost or tampered with, facilitating subsequent information inspection.
- the server verifies the user requesting access to the target invitation link, and determines whether the user is an invited user, so as to ensure that only the invited user can obtain the private key of the target QR code and prevent the QR code from being stolen. ; Storing the acquired user information on the blockchain can ensure the security and validity of the data, and ensure that the user information can be traced and inspected.
- FIG. 5 is a flowchart of a user invitation method provided by an embodiment of the present application. The method can be applied to the implementation environment shown in FIG. 1. Referring to FIG. 5, the user invitation method may include the following steps:
- the server generates a target two-dimensional code, and sends the target two-dimensional code to the first terminal.
- the server may generate the target two-dimensional code in response to the two-dimensional code acquisition request of the first terminal.
- the first terminal may be a terminal used by a service provider of a live broadcast platform.
- the service provider may send a QR code acquisition request to the server through the first terminal, and the server may be based on the QR code.
- the acquisition request generates the target two-dimensional code and sends the target two-dimensional code to the first terminal.
- the service provider can share the target two-dimensional code with other users to invite other users to enter the live broadcast platform.
- the first terminal may display a user introduction page. See FIG. 6.
- FIG. 6 is a schematic diagram of a user introduction page provided by an embodiment of the present application.
- the user introduction page may be as shown in Figure 6 (a), and the user introduction page may display a login control 601 to prompt the user to log in.
- the user introduction page can be as shown in Figure 6 (b), and the user introduction page can display the target QR code 602 and the sharing control 603, where the The sharing control can be used to share the target QR code.
- the first terminal detects that the service provider has accessed the user introduction page, and the service provider has logged in, it may send a QR code acquisition request to the server, and the server may generate a target based on the QR code acquisition request QR code, the target QR code can carry the address of the target invitation page.
- the first terminal sends a sharing request for the target two-dimensional code to the server.
- the contact list of the initiating user may be displayed, and the initiating user may receive the invitation from the Select the invited user from the contact list.
- the invitation initiating user can select one or more users, or can select a group, which is not limited in the embodiment of this application. In the embodiment of this application, only one user selected by the initiating user is taken as an example for description.
- the first terminal may use the user selected by the initiating user in the contact list as the invited user, obtain the target user ID of the invited user, and generate a sharing request based on the target user ID and the target QR code, Send the sharing request to the server.
- the server In response to the sharing request for the target QR code, the server generates the target invitation link based on the QR code.
- the server in response to the request to share the target QR code, may send a key pair acquisition request to the authentication platform, obtain the public key and private key corresponding to the target QR code from the authentication platform, and apply the The public key encrypts the target two-dimensional code, and generates the target invitation link based on the encrypted target two-dimensional code.
- the authentication platform may generate a key pair based on the RSA encryption algorithm, that is, generate the public key and the private key.
- the authentication platform can randomly generate two prime numbers p and q, where the prime number can be a prime number greater than a target threshold, and the target threshold can be set by the developer, which is not limited in the embodiment of the application .
- the authentication platform can obtain the product of p and q, denoted as n, and obtain the product of p-1 and q-1, denoted as ⁇ (n); and then select a random integer e with a value greater than 1 and less than ⁇ (n), Make the greatest common divisor of e and ⁇ (n) 1.
- the authentication platform can obtain the parameter d based on e and ⁇ (n), where the value of d must satisfy the following formula (1):
- mod represents the remainder operation
- e is a random integer
- ⁇ (n) is the product of p-1 and q-1.
- the authentication platform can determine ⁇ e,n ⁇ as the public key and ⁇ d,n ⁇ as the private key.
- ⁇ e,n ⁇ the specific process of encrypting based on the key pair
- ⁇ d,n ⁇ the private key
- x can represent the encrypted object, for example, the target QR code
- y can represent the encrypted object, for example, the encrypted target QR code
- Ek() can represent encryption operation
- Dk() can represent decryption Operation.
- the target two-dimensional code is encrypted by asymmetric encryption technology, which can effectively improve the security of the target two-dimensional code and prevent the target two-dimensional code from being stolen.
- the server sends the target invitation link to the second terminal.
- the server may send the invited user’s terminal, that is, the second terminal. Target invitation link.
- the second terminal receives the target invitation link, and displays the invitation card corresponding to the target invitation link.
- the target invitation link may be displayed in the form of an invitation card, that is, the invitation card is associated with the target invitation link, and the user's triggering operation on the invitation card is the triggering operation on the target invitation link.
- FIG. 7 is a schematic diagram of an invitation card provided by an embodiment of the present application.
- the invitation card 701 may be displayed, and the invitation card 701 may include a card title 702 to remind the user of the main content of the link corresponding to the invitation card.
- the above description of the display method of the target invitation link is only an exemplary description, and the target invitation link may also be displayed in other forms, which is not limited in the embodiment of the present application.
- the second terminal In response to the triggering operation on the target invitation link, the second terminal obtains the user identification of the currently logged-in user of the terminal, and sends an access request for the target invitation link to the server based on the user identification.
- the second terminal when the second terminal detects the user's triggering operation on the invitation card, that is, the target invitation link, it can obtain the user ID of the currently logged-in user, and generate an access request for the target invitation link based on the user ID. Send the access request to the server.
- the server When receiving the access request for the target invitation link, the server can obtain the user identification carried in the access request, and the server can perform subsequent user verification steps based on the user identification.
- the server verifies the currently logged-in user of the second terminal based on the user identification in the invitation request and the target user identification corresponding to the target invitation link.
- the server may determine whether the user ID is consistent with the user ID of the target user, so as to determine whether the currently logged-in user of the second terminal is an invited user. If the two user IDs are the same, it can be determined that the currently logged-in user of the second terminal is an invited user, and the server can send the private key of the target QR code to the terminal, that is, perform the following step 508. If the two user IDs are inconsistent, it can be determined that the currently logged-in user of the second terminal is not an invited user, and the server can send a prompt message of denying access to the second terminal. Applying the above solution, by verifying that the access target invites to connect to the user, it is possible to prevent the target QR code from being illegally obtained.
- the server may also determine whether the currently logged-in user of the second terminal has been invited. Taking this solution applied to the field of live broadcasting as an example, the server may determine whether the currently logged-in user of the second terminal has already resided in the live broadcast. platform.
- the user information of each user who has entered the live broadcast platform can be stored on the blockchain, and the server can query the user information corresponding to the user ID from the blockchain based on the user ID. According to the user information corresponding to the user ID, it is determined that the user has been registered on the live broadcast platform. If the user authentication fails this time, the server can send to the first terminal and the second terminal a prompt that the user has been registered on the live broadcast platform and the user invitation has failed. information.
- the server continues to perform the following step 508. It should be noted that the embodiment of the present application does not limit which method is used to find user information in the blockchain. In the embodiment of the present application, by looking up user information on the blockchain to determine whether the user has been invited, repeated invitations can be avoided and data conflicts can be avoided.
- the server In response to passing the verification, the server sends the private key corresponding to the target two-dimensional code to the second terminal.
- the second terminal uses the private key to decrypt the target two-dimensional code pointed to by the target invitation link, and in response to the successful decryption of the target two-dimensional code, displays the target invitation page.
- the second terminal after the second terminal obtains the private key, it can use the private key to decrypt the target QR code, and automatically scan and recognize the QR code, and display the location of the target QR code.
- the indicated target invitation page After the second terminal obtains the private key, it can use the private key to decrypt the target QR code, and automatically scan and recognize the QR code, and display the location of the target QR code.
- the indicated target invitation page After the second terminal obtains the private key, it can use the private key to decrypt the target QR code, and automatically scan and recognize the QR code, and display the location of the target QR code.
- the indicated target invitation page the second terminal obtains the private key
- the target invitation page may include multiple levels of pages.
- Figure 8 is a schematic diagram of a target invitation page provided by an embodiment of this application.
- the target invitation page may include a first-level application page, as shown in Figure 8 (a), the application page may It includes an invitation code display area 801 and a confirmation application control 802.
- the target invitation page may also include a second-level information filling page, as shown in FIG. 8(b), the information filling page may include an information filling area 803 and a submission control 804.
- the second terminal after the second terminal completes the identification of the target QR code, it can display the application page in the target invitation page, and also display the target invitation code in the invitation code display area of the application page.
- the invitation code may associate the initiating user with the invited user, and the invitation code can be used to trace the source of the invitation process and determine which user initiating the invitation invites each user.
- the target invitation code can be obtained in any of the following ways.
- Method 1 In response to displaying the target invitation page, the target invitation code is obtained from the card title of the invitation card, and the target invitation code is filled into the invitation code display area of the target invitation page.
- the target invitation link may correspond to a target invitation code, and the target invitation code may be displayed in the card title of the invitation card.
- Manner 2 In response to displaying the target invitation page, a target invitation code is generated based on the private key, and the target invitation code is filled into the invitation code display area of the target invitation page.
- the second terminal can use the private key as the target invitation code or convert the private key into the target invitation code based on preset conditions.
- the preset condition can be set by the developer, which is not limited in the embodiment of this province.
- the target invitation code can also be obtained in other ways, for example, it can be input by the user, which is not limited in the embodiment of the present application.
- the user's click operation of the confirmation application control in the application page can trigger a submission request to the application page, and the second terminal responds to the submission request to the application page and displays the information filled in the target invitation page Page, the user can fill in the page based on this information to provide relevant user information.
- the second terminal submits the user information filled in the target invitation page to the server.
- the second terminal when it detects the user's triggering operation of the submission control in the information filling page, it can obtain the user information filled in by the user in the information filling area, generate a submission request based on the user information, and submit the The request is sent to the server.
- the server In response to the submission request for the target invitation page, the server may obtain the user information filled in the target invitation page, and perform subsequent user qualification review steps based on the user information.
- the server performs user qualification review based on the user information, and sends the review result to the second terminal.
- the server may perform user qualification review based on the target conditions and the user information.
- the target condition may include data restriction information corresponding to the user information, and the specific content of the target condition may be set by the developer, which is not limited in the embodiment of the present application.
- the target condition may include the business's main business category range, the number of fans limit information of the business, and so on.
- the server can compare the acquired user information with the data restriction information in the target condition, and if the user information meets the target condition, it can be determined that the user qualification review is passed.
- the server can send the review result to the second terminal.
- the second terminal can detect whether the terminal is currently installed with a target client.
- the target client can be a live broadcast
- the second terminal may display a download guide option on the submission success page, and the download guide option is used to guide the user to download the target client provided by the server.
- FIG. 9 is a schematic diagram of a submission success page provided by an embodiment of the present application, and the page may display a prompt message of approval and a download guide option 901.
- the second terminal may display a prompt message indicating that the audit failed to prompt the user to fill in again and submit the user information.
- the server stores the user information in the blockchain based on the consensus mechanism.
- the user information can be stored in the blockchain for future inspection.
- the server can obtain the user ID of the initiating user; based on the user ID of the initiating user and the user information, target data is constructed.
- the target data can be expressed as a key-value pair (key-value pair). value), where the identification of the user who initiated the invitation may be a key element in the target data, and the user information may be a value element in the target data.
- the target data is constructed based on the user identification of the initiating user and the user information of the invited user, and the user information of the initiating user is associated with the user information of the invited user, so that each invitation process can be traced.
- the target data can also be expressed in other forms, which are not limited in the embodiment of the present application.
- the server may send the target data to a target node device in the blockchain system, and the target node device broadcasts the target data in the blockchain system.
- Each node device in the blockchain system verifies the target data. After the target data is verified, each node device can store the target data in the local transaction pool.
- the node device in the blockchain system can package the data in the transaction pool according to the target cycle, generate a new block, and then broadcast the new block.
- Each node device or consensus node device in the blockchain system will Consensus on this new block.
- the new block can be added to the end of the target block chain, that is, the target data containing user information is stored in the block chain; if the consensus fails, there is no need to execute the new block Block adding step.
- the transaction pool may be a database maintained locally by each node device, and the transaction pool may be used to store transaction data that has not yet been connected to the chain.
- the target period can be set by the developer, which is not limited in the embodiment of the present application. For example, in the Bitcoin system, the target period can be set to 10 minutes.
- the involved consensus mechanism may be a workload proof mechanism, etc., which is not limited in the embodiment of the application.
- the target node device may also construct a chained hash table based on the target data received in the target period.
- the chained hash table may include multiple sub-linked tables, and the target data with the same key element may be stored in In the same sub-linked list, the target node device can summarize the target data in the form of a chained hash table and store it in the blockchain. For example, the target node device may perform a hash operation based on the key element in the target data, and map the key element to a position code, which may be used to indicate the storage of the target data in the chained hash table Location.
- the technical solution provided by the embodiment of the present application by receiving the target invitation link, provides the user identification of the currently logged-in user of the terminal when accessing the target invitation link, determines whether the currently logged-in user is an invited user, and responds to the current logged-in user is an invited user, Obtain the private key of the target QR code corresponding to the target invitation link from the server, use the private key to decrypt the target QR code, and in response to the successful decryption of the target QR code, display the target invitation indicated by the target QR code Page; in response to the submission operation of the target invitation page, the user information that has been filled in the target invitation page is submitted to the server. Applying the above solution, by encrypting the QR code, only invited users can decrypt it, ensuring the security of the information in the QR code and preventing the QR code from being stolen.
- FIG. 10 is an inviting merchant to settle on a live broadcast platform provided by an embodiment of this application.
- the service provider sends a registration invitation link to the merchant, that is, step 1001 is performed.
- the registration invitation link can be generated based on the service provider’s name, logo, and encrypted QR code.
- the merchant visits the entry invitation link to obtain the private key corresponding to the QR code, that is, the merchant performs step 1002, fills in the entry information based on the entry invitation link, and submits it for review, that is, step 1003 is performed.
- step 1004 If the review fails, the submitted information will be returned , Modified by the merchant information, if the review is passed, the server executes step 1004, generates a block based on the service provider’s identity, the merchant’s identity, the entry information of the business opportunity, etc., and then executes the step 1005 of storing the block in the blockchain , That is, each node agrees on the blockchain to complete data storage on the chain.
- step 1005 Applying the above solutions in the live broadcast field, on the one hand, you can encrypt the QR code to prevent the QR code from being stolen and prevent unqualified merchants from entering the live broadcast platform; on the other hand, store the business information on the blockchain to enable The information can be traced and inquired.
- FIG. 11 is a schematic structural diagram of a user invitation device provided by an embodiment of the present application.
- the device includes:
- the identification obtaining module 1101 is configured to obtain the user identification of the currently logged-in user of the terminal in response to a triggering operation on the target invitation link of the server.
- the target invitation link is a link to a target QR code, and the target QR code is used to indicate the target Jump to the invitation page;
- the private key obtaining module 1102 is configured to access the target invitation link based on the user ID, and in response to the user ID being consistent with the target user ID corresponding to the target invitation link, obtain the private key of the target QR code from the server;
- the decryption module 1103 is configured to use the private key to decrypt the target QR code pointed to by the target invitation link, and display the target invitation page in response to the successful decryption of the target QR code;
- the sending module 1104 is configured to submit the user information filled in the target invitation page to the server in response to the submission operation of the target invitation page.
- the decryption module 1103 is configured to:
- the information filling page in the target invitation page is displayed.
- the device further includes:
- the display module is configured to display the invitation card, and the invitation card is associated with the target invitation link.
- the display module is configured as:
- the target invitation code is obtained from the card title of the invitation card, and the target invitation code is filled into the invitation code display area of the target invitation page.
- the display module is configured as:
- a target invitation code is generated based on the private key, and the target invitation code is filled in the invitation code display area of the target invitation page.
- the device further includes:
- the detection module is configured to detect whether the target client is currently installed on the terminal; if it is not installed, a download guide option is displayed on the submission success page, and the download guide option is used to guide the user to download the target client provided by the server.
- the device receives the target invitation link, provides the user identification of the currently logged-in user of the terminal when accessing the target invitation link, determines whether the currently logged-in user is an invited user, and responds to the current logged-in user being an invited user.
- the server obtains the private key of the target QR code corresponding to the target invitation link, uses the private key to decrypt the target QR code, and in response to the successful decryption of the target QR code, displays the target invitation page indicated by the target QR code ;
- the user information that has been filled in the target invitation page is submitted to the server.
- FIG. 12 is a schematic structural diagram of a user invitation device provided by an embodiment of the present application. Referring to FIG. 12, the device includes:
- the sending module 1201 is configured to send a target invitation link to the terminal, the target invitation link corresponding to a target user identifier, the target invitation link is a link to a target QR code, and the target QR code is used to indicate a jump to the target invitation page ;
- the receiving module 1202 is configured to receive an access request for the target invitation link, where the access request carries the user identifier of the currently logged-in user of the terminal;
- the sending module 1201 is configured to send the private key of the target QR code to the terminal in response to the user ID being consistent with the user ID of the target user, and the terminal will decrypt the target QR code based on the private key, Display the target invitation page;
- the obtaining module 1203 is configured to obtain user information filled in the target invitation page in response to a submission request for the target invitation page;
- the storage module 1204 is configured to store the user information in the blockchain based on a consensus mechanism.
- the device further includes:
- the generating module is configured to generate the target two-dimensional code; in response to the sharing request of the target two-dimensional code, generate the target invitation link based on the two-dimensional code.
- the generating module is configured to:
- the target invitation link is generated based on the encrypted target QR code.
- the device further includes:
- the audit module is configured to perform user qualification audit based on target conditions and the user information, where the target conditions include data restriction information corresponding to the user information; in response to the user qualification audit being passed, the step of storing the user information in the blockchain is executed.
- the storage module 1204 is configured to:
- the target data is stored in the blockchain.
- the user inviting device provided in the above embodiment only uses the division of the above functional modules to illustrate when a user invites.
- the above functions can be allocated by different functional modules according to needs, i.e.
- the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
- the user invitation device provided in the foregoing embodiment and the user invitation method embodiment belong to the same concept. For the specific implementation process, please refer to the method embodiment, which will not be repeated here.
- FIG. 13 is a schematic structural diagram of a terminal provided in an embodiment of the present application.
- the terminal 1300 may be: a smart phone, a tablet computer, an MP3 player, an MP4 player, a notebook computer, or a desktop computer.
- the terminal 1300 may also be called user equipment, portable terminal, laptop terminal, desktop terminal and other names.
- the terminal 1300 includes: one or more processors 1301 and one or more memories 1302.
- the processor 1301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on.
- the processor 1301 can adopt at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA).
- DSP Digital Signal Processing
- FPGA Field-Programmable Gate Array
- PDA Programmable Logic Array
- the processor 1301 may also include a main processor and a coprocessor.
- the main processor is a processor configured to process data in the wake state, also called a central processing unit (CPU);
- the coprocessor is A low-power processor configured to process data in the standby state.
- the processor 1301 may be integrated with a graphics processing unit (GPU), and the GPU is configured to be responsible for rendering and drawing content that needs to be displayed on the display screen.
- the processor 1301 may further include an artificial intelligence (Artificial Intelligence, AI) processor configured to process computing operations related to machine learning.
- AI artificial
- the memory 1302 may include one or more computer-readable storage media, which may be non-transitory.
- the memory 1302 may also include high-speed random access memory and non-volatile memory, such as one or more magnetic disk storage devices and flash memory storage devices.
- the non-transitory computer-readable storage medium in the memory 1302 is used to store at least one piece of program code, and the at least one piece of program code is used to be executed by the processor 1301 to implement the method provided in the method embodiment of the present application. User invitation method.
- the terminal 1300 may optionally further include: a peripheral device interface 1303 and at least one peripheral device.
- the processor 1301, the memory 1302, and the peripheral device interface 1303 may be connected by a bus or a signal line.
- Each peripheral device can be connected to the peripheral device interface 1303 through a bus, a signal line, or a circuit board.
- the peripheral device includes: at least one of a radio frequency circuit 1304, a display screen 1305, a camera component 1306, an audio circuit 1307, a positioning component 1308, and a power supply 1309.
- the peripheral device interface 1303 may be used to connect at least one peripheral device related to Input/Output (I/O) to the processor 1301 and the memory 1302.
- the processor 1301, the memory 1302, and the peripheral device interface 1303 are integrated on the same chip or circuit board; in some other embodiments, any one of the processor 1301, the memory 1302, and the peripheral device interface 1303 or The two can be implemented on a separate chip or circuit board, which is not limited in this embodiment.
- the radio frequency circuit 1304 is configured to receive and transmit radio frequency (RF) signals, also called electromagnetic signals.
- the radio frequency circuit 1304 communicates with a communication network and other communication devices through electromagnetic signals.
- the radio frequency circuit 1304 converts electrical signals into electromagnetic signals for transmission, or converts received electromagnetic signals into electrical signals.
- the radio frequency circuit 1304 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so on.
- the radio frequency circuit 1304 can communicate with other terminals through at least one wireless communication protocol.
- the wireless communication protocol includes, but is not limited to: metropolitan area networks, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or wireless fidelity (Wireless Fidelity, WiFi) networks.
- the radio frequency circuit 1304 may also include a circuit related to Near Field Communication (NFC), which is not limited in this application.
- NFC Near Field Communication
- the display screen 1305 is configured to display a user interface (UI).
- UI user interface
- the UI can include graphics, text, icons, videos, and any combination thereof.
- the display screen 1305 also has the ability to collect touch signals on or above the surface of the display screen 1305.
- the touch signal may be input to the processor 1301 as a control signal for processing.
- the display screen 1305 may also be configured to provide virtual buttons and/or virtual keyboards, also called soft buttons and/or soft keyboards.
- the display screen 1305 may be a flexible display screen, which is disposed on the curved surface or the folding surface of the terminal 1300.
- the display screen 1305 can also be set as a non-rectangular irregular pattern, that is, a special-shaped screen.
- the display screen 1305 may be made of materials such as liquid crystal display (LCD) and organic light-emitting diode (OLED).
- the camera assembly 1306 is configured to capture images or videos.
- the camera assembly 1306 includes a front camera and a rear camera.
- the front camera is set on the front panel of the terminal, and the rear camera is set on the back of the terminal.
- the camera assembly 1306 may also include a flash.
- the flash can be a single-color flash or a dual-color flash. Dual color temperature flash refers to a combination of warm light flash and cold light flash, which can be used for light compensation under different color temperatures.
- the audio circuit 1307 may include a microphone and a speaker.
- the microphone is used to collect sound waves of the user and the environment, and convert the sound waves into electrical signals and input them to the processor 1301 for processing, or input to the radio frequency circuit 1304 to implement voice communication. For the purpose of stereo collection or noise reduction, there may be multiple microphones, which are respectively set in different parts of the terminal 1300.
- the microphone can also be an array microphone or an omnidirectional collection microphone.
- the speaker is used to convert the electrical signal from the processor 1301 or the radio frequency circuit 1304 into sound waves.
- the speaker can be a traditional thin-film speaker or a piezoelectric ceramic speaker.
- the speaker When the speaker is a piezoelectric ceramic speaker, it can not only convert the electrical signal into human audible sound waves, but also convert the electrical signal into human inaudible sound waves for distance measurement and other purposes.
- the audio circuit 1307 may also include a headphone jack.
- the positioning component 1308 is configured to locate the current geographic location of the terminal 1300 to implement navigation or location-based service (LBS).
- LBS location-based service
- the positioning component 1308 may be a positioning component based on the Global Positioning System (GPS) of the United States, the Beidou system of China, the Granus system of Russia, or the Galileo system of the European Union.
- GPS Global Positioning System
- the power supply 1309 is configured to supply power to various components in the terminal 1300.
- the power source 1309 may be alternating current, direct current, disposable batteries, or rechargeable batteries.
- the rechargeable battery may support wired charging or wireless charging.
- the rechargeable battery can also be used to support fast charging technology.
- the terminal 1300 further includes one or more sensors 1310.
- the one or more sensors 1310 include, but are not limited to: an acceleration sensor 1311, a gyroscope sensor 1312, a pressure sensor 1313, a fingerprint sensor 1314, an optical sensor 1315, and a proximity sensor 1316.
- the acceleration sensor 1311 can detect the magnitude of acceleration on the three coordinate axes of the coordinate system established by the terminal 1300.
- the acceleration sensor 1311 may be configured to detect the components of gravitational acceleration on three coordinate axes.
- the processor 1301 may control the display screen 1305 to display the user interface in a horizontal view or a vertical view according to the gravitational acceleration signal collected by the acceleration sensor 1311.
- the acceleration sensor 1311 may also be configured to collect game or user motion data.
- the gyroscope sensor 1312 can detect the body direction and rotation angle of the terminal 1300, and the gyroscope sensor 1312 can cooperate with the acceleration sensor 1311 to collect the user's 3D actions on the terminal 1300.
- the processor 1301 can implement the following functions according to the data collected by the gyroscope sensor 1312: motion sensing (for example, changing the UI according to the user's tilt operation), image stabilization during shooting, game control, and inertial navigation.
- the pressure sensor 1313 may be arranged on the side frame of the terminal 1300 and/or the lower layer of the display screen 1305.
- the processor 1301 performs left and right hand recognition or quick operation according to the holding signal collected by the pressure sensor 1313.
- the processor 1301 controls the operability controls on the UI interface according to the user's pressure operation on the display screen 1305.
- the operability control includes at least one of a button control, a scroll bar control, an icon control, and a menu control.
- the fingerprint sensor 1314 is configured to collect the user's fingerprint, and the processor 1301 can identify the user's identity according to the fingerprint collected by the fingerprint sensor 1314, or the fingerprint sensor 1314 can identify the user's identity according to the collected fingerprint. When the user's identity is recognized as a trusted identity, the processor 1301 authorizes the user to perform related sensitive operations, including unlocking the screen, viewing encrypted information, downloading software, paying, and changing settings.
- the fingerprint sensor 1314 may be provided on the front, back or side of the terminal 1300. When a physical button or a manufacturer logo is provided on the terminal 1300, the fingerprint sensor 1314 can be integrated with the physical button or the manufacturer logo.
- the optical sensor 1315 is configured to collect the ambient light intensity.
- the processor 1301 may control the display brightness of the display screen 1305 according to the ambient light intensity collected by the optical sensor 1315. Specifically, when the ambient light intensity is high, the display brightness of the display screen 1305 is increased; when the ambient light intensity is low, the display brightness of the display screen 1305 is decreased.
- the processor 1301 may also dynamically adjust the shooting parameters of the camera assembly 1306 according to the ambient light intensity collected by the optical sensor 1315.
- the proximity sensor 1316 also called a distance sensor, is usually arranged on the front panel of the terminal 1300.
- the proximity sensor 1316 is configured to collect the distance between the user and the front of the terminal 1300.
- the processor 1301 controls the display screen 1305 to switch from the on-screen state to the off-screen state; when the proximity sensor 1316 detects When the distance between the user and the front of the terminal 1300 gradually increases, the processor 1301 controls the display screen 1305 to switch from the rest screen state to the bright screen state.
- FIG. 13 does not constitute a limitation on the terminal 1300, and may include more or fewer components than shown in the figure, or combine certain components, or adopt different component arrangements.
- the server 1400 may have relatively large differences due to different configurations or performance, and may include one or more processors (Central Processing Units, CPU) 1401 and one Or multiple memories 1402, wherein at least one program code is stored in the one or more memories 1402, and the at least one program code is loaded and executed by the one or more processors 1401 to implement the methods provided in the foregoing various method embodiments method.
- the server 1400 may also have components such as a wired or wireless network interface, a keyboard, and an input/output interface for input and output.
- the server 1400 may also include other components for implementing device functions, which will not be repeated here.
- a computer-readable storage medium such as a memory including at least one piece of program code, and the aforementioned at least one piece of program code can be executed by a processor to complete the user invitation method in the aforementioned embodiment.
- the computer-readable storage medium may be Read-Only Memory (ROM), Random Access Memory (RAM), Compact Disc Read-Only Memory (CD-ROM), Magnetic tapes, floppy disks and optical data storage devices, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (17)
- 一种用户邀请方法,所述方法由终端执行,所述方法包括:响应于针对与目标二维码对应的目标邀请链接的触发操作,获取当前登录用户的用户标识;其中,所述目标二维码采用公钥加密,用于指示向目标邀请页面进行跳转;基于所述用户标识访问所述目标邀请链接,并在所述用户标识与所述目标邀请链接对应的目标用户标识一致时,获取与所述公钥对应的私钥;应用所述私钥对所述目标二维码进行解密,并在对所述目标二维码解密成功时,显示所述目标邀请页面;响应于对所述目标邀请页面的提交操作,提交所述目标邀请页面中已填写的用户信息。
- 根据权利要求1所述的方法,其中,所述在对所述目标二维码解密成功时,显示所述目标邀请页面,包括:当所述目标邀请页面包括申请页面及信息填写页面时,显示所述目标邀请页面中的申请页面;响应于对所述申请页面的提交请求,显示所述目标邀请页面中的信息填写页面。
- 根据权利要求1所述的方法,其中,所述响应于针对与目标二维码对应的目标邀请链接的触发操作,获取当前登录用户的用户标识之前,所述方法还包括:显示邀请卡片,所述邀请卡片关联有所述目标邀请链接;当接收到针对所述邀请卡片的触发操作时,将对所述邀请卡片的触发操作作为针对所述目标邀请链接的触发操作。
- 根据权利要求3所述的方法,其中,所述显示所述目标邀请页面,包括:显示所述目标邀请页面,并在所述目标邀请页面中显示邀请码显示区域;从所述邀请卡片的卡片题目中获取目标邀请码,将所述目标邀请码 填充至所述目标邀请页面的邀请码显示区域。
- 根据权利要求1所述的方法,其中,所述显示所述目标邀请页面,包括:显示所述目标邀请页面,并在所述目标邀请页面中显示邀请码显示区域;基于所述私钥生成目标邀请码,将所述目标邀请码填充至所述目标邀请页面的邀请码显示区域。
- 根据权利要求1所述的方法,其中,所述响应于对所述目标邀请页面的提交操作,提交所述目标邀请页面中已填写的用户信息之后,所述方法还包括:显示提交成功页面,并检测所述终端当前是否安装有目标客户端;当检测到所述终端未安装所述目标客户端时,在所述提交成功页面上显示下载引导选项;其中,所述下载引导选项,用于引导用户下载所述目标客户端。
- 一种用户邀请方法,所述方法由服务器执行,所述方法包括:发送与目标二维码对应的目标邀请链接;其中,所述目标二维码采用公钥加密,用于指示向目标邀请页面进行跳转;接收对所述目标邀请链接的访问请求,所述访问请求携带用户标识;当所述用户标识与所述目标邀请链接对应的目标用户标识一致时,发送与所述公钥对应的私钥;其中,所述私钥用于对所述目标二维码进行解密,以在对所述目标二维码解密成功时显示所述目标邀请页面;响应于对所述目标邀请页面的提交请求,获取所述目标邀请页面中已填写的用户信息;基于共识机制,将所述用户信息存储至区块链中。
- 根据权利要求7所述的方法,其中,所述发送与目标二维码对应的目标邀请链接之前,所述方法还包括:生成所述目标二维码;响应于对所述目标二维码的分享请求,基于所述目标二维码生成所述目标邀请链接。
- 根据权利要求8所述的方法,其中,所述响应于对所述目标二维 码的分享请求,基于所述目标二维码生成所述目标邀请链接,包括:响应于对所述目标二维码的分享请求,从认证平台获取所述目标二维码对应的所述公钥;应用所述公钥对所述目标二维码进行加密;基于已加密的所述目标二维码生成所述目标邀请链接。
- 根据权利要求7所述的方法,其中,所述将所述用户信息存储至区块链中之前,所述方法还包括:基于目标条件以及所述用户信息进行用户资质审核,所述目标条件包括用户信息对应的数据限制信息;当用户资质审核通过时,执行将所述用户信息存储至区块链的步骤。
- 根据权利要求7所述的方法,其中,所述基于共识机制,将所述用户信息存储至区块链中,包括:获取邀请发起用户的用户标识;基于所述邀请发起用户的用户标识以及所述用户信息,构造目标数据;基于共识机制,将所述目标数据存储在区块链中。
- 一种用户邀请装置,所述装置包括:标识获取模块,配置为响应于针对与目标二维码对应的目标邀请链接的触发操作,获取当前登录用户的用户标识;其中,所述目标二维码采用公钥加密,用于指示向目标邀请页面进行跳转;私钥获取模块,配置为基于所述用户标识访问所述目标邀请链接,并在所述用户标识与所述目标邀请链接对应的目标用户标识一致时,获取与所述公钥对应的私钥;解密模块,配置为应用所述私钥对所述目标二维码进行解密,并在对所述目标二维码解密成功时,显示所述目标邀请页面;发送模块,配置为响应于对所述目标邀请页面的提交操作,提交所述目标邀请页面中已填写的用户信息。
- 一种用户邀请装置,所述装置包括:发送模块,配置为发送与目标二维码对应的目标邀请链接;其中,所述目标二维码采用公钥加密,用于指示向目标邀请页面进行跳转;接收模块,配置为接收对所述目标邀请链接的访问请求,所述访问请求携带用户标识;所述发送模块,配置为当所述用户标识与所述目标邀请链接对应的目标用户标识一致时,发送与所述公钥对应的私钥;其中,所述私钥用于对所述目标二维码进行解密,以在对所述目标二维码解密成功时显示所述目标邀请页面;获取模块,配置为响应于对所述目标邀请页面的提交请求,获取所述目标邀请页面中已填写的用户信息;存储模块,配置为基于共识机制,将所述用户信息存储至区块链中。
- 一种计算机设备,所述计算机设备包括一个或多个处理器和一个或多个存储器,所述一个或多个存储器中存储有至少一条程序代码,所述至少一条程序代码由所述一个或多个处理器加载并执行以实现如权利要求1至权利要求6任一项所述的用户邀请方法所执行的操作。
- 一种计算机设备,所述计算机设备包括一个或多个处理器和一个或多个存储器,所述一个或多个存储器中存储有至少一条程序代码,所述至少一条程序代码由所述一个或多个处理器加载并执行以实现如权利要求7至权利要求11任一项所述的用户邀请方法所执行的操作。
- 一种计算机可读存储介质,所述计算机可读存储介质中存储有至少一条程序代码,所述至少一条程序代码由处理器加载并执行以实现如权利要求1至权利要求6任一项所述的用户邀请方法所执行的操作。
- 一种计算机可读存储介质,所述计算机可读存储介质中存储有至少一条程序代码,所述至少一条程序代码由处理器加载并执行以实现如权利要求7至权利要求11任一项所述的用户邀请方法所执行的操作。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2022533401A JP7506155B2 (ja) | 2020-04-15 | 2021-03-01 | ユーザ招待方法、装置、コンピュータ装置及びプログラム |
US17/710,034 US20220224677A1 (en) | 2020-04-15 | 2022-03-31 | User inviting method and apparatus, computer device, and computer-readable storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010296248.2A CN111506884A (zh) | 2020-04-15 | 2020-04-15 | 用户邀请方法、装置、计算机设备及计算机可读存储介质 |
CN202010296248.2 | 2020-04-15 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/710,034 Continuation US20220224677A1 (en) | 2020-04-15 | 2022-03-31 | User inviting method and apparatus, computer device, and computer-readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021208615A1 true WO2021208615A1 (zh) | 2021-10-21 |
Family
ID=71874280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/078467 WO2021208615A1 (zh) | 2020-04-15 | 2021-03-01 | 用户邀请方法、装置、计算机设备及计算机可读存储介质 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20220224677A1 (zh) |
JP (1) | JP7506155B2 (zh) |
CN (1) | CN111506884A (zh) |
WO (1) | WO2021208615A1 (zh) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111506884A (zh) * | 2020-04-15 | 2020-08-07 | 腾讯科技(深圳)有限公司 | 用户邀请方法、装置、计算机设备及计算机可读存储介质 |
CN112464265A (zh) * | 2020-12-07 | 2021-03-09 | 北京天威诚信电子商务服务有限公司 | 一种私有数据的存储访问方法及*** |
CN112541743B (zh) * | 2020-12-22 | 2024-01-23 | 北京百家科技集团有限公司 | 一种信息处理方法、装置、计算机设备和存储介质 |
CN114666327B (zh) * | 2020-12-23 | 2023-12-19 | 富泰华工业(深圳)有限公司 | 基于区块链交易的区块打包方法、装置及电子设备 |
CN112686008A (zh) * | 2021-02-03 | 2021-04-20 | 广州市久邦数码科技有限公司 | 一种电子书阅读笔记的记录、查看管理方法和*** |
CN112861038A (zh) * | 2021-02-19 | 2021-05-28 | 南京苏宁软件技术有限公司 | 与通讯对象建立通讯关系的方法、终端和服务器 |
CN113052285A (zh) * | 2021-03-29 | 2021-06-29 | 北京达佳互联信息技术有限公司 | 二维码的分发方法及装置、设备 |
CN114492355B (zh) * | 2021-12-30 | 2023-03-24 | 博思数采科技发展有限公司 | 一种生成ofd格式的电子投标邀请函及回执函的方法和*** |
CN115410301B (zh) * | 2022-08-26 | 2023-08-25 | 大连爱加加智慧科技有限公司 | 基于二维码的访客邀请门禁权限管理方法、装置及*** |
CN115442161B (zh) * | 2022-11-08 | 2023-04-11 | 知安视娱(北京)科技有限公司 | 提高云游戏资源链接分享安全性的方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104796380A (zh) * | 2014-01-16 | 2015-07-22 | 腾讯科技(深圳)有限公司 | 安全校验的方法和***、终端、验证服务器 |
US20160140570A1 (en) * | 2014-11-17 | 2016-05-19 | Amazon Technologies, Inc. | Tracking and verifying authenticity of items |
CN110086625A (zh) * | 2019-03-27 | 2019-08-02 | 深圳市星火电子工程公司 | 一种基于加密二维码的双向认证方法及*** |
CN110648413A (zh) * | 2018-06-26 | 2020-01-03 | 触信(厦门)智能科技有限公司 | 一种区块链智能签到方法、***、设备及其存储介质 |
CN111506884A (zh) * | 2020-04-15 | 2020-08-07 | 腾讯科技(深圳)有限公司 | 用户邀请方法、装置、计算机设备及计算机可读存储介质 |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4233259B2 (ja) * | 2002-02-08 | 2009-03-04 | 株式会社電通テック | コード情報を用いた情報提供システム |
JP4948198B2 (ja) * | 2007-02-16 | 2012-06-06 | 株式会社三共 | サービス提供システム、携帯端末、携帯端末用プログラムおよびサービス提供システム用プログラム。 |
JP2009026034A (ja) * | 2007-07-19 | 2009-02-05 | Dainippon Printing Co Ltd | ソフウェア・ライセンス管理システム |
US20100023757A1 (en) * | 2008-07-22 | 2010-01-28 | Winmagic Data Security | Methods and systems for sending secure electronic data |
JP5201067B2 (ja) * | 2009-04-17 | 2013-06-05 | 株式会社デンソーウェーブ | 二次元コードを用いて公開する情報の内容を認証する認証システム |
US8943320B2 (en) * | 2011-10-31 | 2015-01-27 | Novell, Inc. | Techniques for authentication via a mobile device |
US9070000B2 (en) * | 2012-10-18 | 2015-06-30 | Dell Products L.P. | Secondary information for an information handling system matrix bar code function |
US10491587B2 (en) * | 2013-10-28 | 2019-11-26 | Singou Technology Ltd. | Method and device for information system access authentication |
CA2844724A1 (en) * | 2014-03-04 | 2015-09-04 | Guest Tek Interactive Entertainment Ltd. | Leveraging push notification capabilities of mobile app to send event-triggered invitations to upgrade service offered by hospitality establishment |
US10235691B2 (en) * | 2014-03-18 | 2019-03-19 | Biglizard, LLC | System and method for viral marketing and management |
US11122047B2 (en) * | 2014-04-02 | 2021-09-14 | Ctera Networks, Ltd. | Invitation links with enhanced protection |
US20160087949A1 (en) * | 2014-09-24 | 2016-03-24 | Intel Corporation | Establishing secure digital relationship using symbology |
CN105007155B (zh) * | 2015-07-28 | 2017-12-08 | 福建联迪商用设备有限公司 | 二维码掩膜加密和解密方法及*** |
US20180144421A1 (en) * | 2016-11-21 | 2018-05-24 | Velites Consulting Group, LLC | System and Methods for Complaint Evaluation |
US20190075456A1 (en) * | 2017-09-07 | 2019-03-07 | Bae Systems Information And Electronic Systems Integration Inc. | Secure wireless pairing of master slave devices withqr codes |
JP2020046925A (ja) * | 2018-09-19 | 2020-03-26 | 凸版印刷株式会社 | 認証システム |
WO2020085141A1 (ja) * | 2018-10-22 | 2020-04-30 | 株式会社ソニー・インタラクティブエンタテインメント | 情報処理システム、入力装置、ユーザ認証方法、サーバ装置および生体認証装置 |
US20200344046A1 (en) * | 2019-04-24 | 2020-10-29 | Tom Lindeman | Product Tracking System and Method |
US11132460B2 (en) * | 2019-06-07 | 2021-09-28 | Mo Ac Blockchain Tech Inc. | Apparatus and method for controlling access to user information |
US20220122066A1 (en) * | 2019-12-13 | 2022-04-21 | Xiaonan Du | System and method for remote management of digital assets |
-
2020
- 2020-04-15 CN CN202010296248.2A patent/CN111506884A/zh active Pending
-
2021
- 2021-03-01 WO PCT/CN2021/078467 patent/WO2021208615A1/zh active Application Filing
- 2021-03-01 JP JP2022533401A patent/JP7506155B2/ja active Active
-
2022
- 2022-03-31 US US17/710,034 patent/US20220224677A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104796380A (zh) * | 2014-01-16 | 2015-07-22 | 腾讯科技(深圳)有限公司 | 安全校验的方法和***、终端、验证服务器 |
US20160140570A1 (en) * | 2014-11-17 | 2016-05-19 | Amazon Technologies, Inc. | Tracking and verifying authenticity of items |
CN110648413A (zh) * | 2018-06-26 | 2020-01-03 | 触信(厦门)智能科技有限公司 | 一种区块链智能签到方法、***、设备及其存储介质 |
CN110086625A (zh) * | 2019-03-27 | 2019-08-02 | 深圳市星火电子工程公司 | 一种基于加密二维码的双向认证方法及*** |
CN111506884A (zh) * | 2020-04-15 | 2020-08-07 | 腾讯科技(深圳)有限公司 | 用户邀请方法、装置、计算机设备及计算机可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
JP2023506406A (ja) | 2023-02-16 |
JP7506155B2 (ja) | 2024-06-25 |
CN111506884A (zh) | 2020-08-07 |
US20220224677A1 (en) | 2022-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021208615A1 (zh) | 用户邀请方法、装置、计算机设备及计算机可读存储介质 | |
KR102350462B1 (ko) | 서명 생성 방법, 전자 장치 및 저장 매체 | |
WO2020143414A1 (zh) | 无线网络接入方法、装置、设备及*** | |
US11783630B2 (en) | Method for transmitting face image data, transferring value, apparatus, and electronic device | |
CN109615515B (zh) | 债权凭证转移方法、装置、电子设备及存储介质 | |
CN110245144B (zh) | 协议数据管理方法、装置、存储介质及*** | |
WO2017041599A1 (zh) | 业务处理方法及电子设备 | |
WO2020258748A1 (zh) | 银行卡绑定的***、方法、装置、设备及存储介质 | |
CN111080443B (zh) | 基于区块链的业务处理方法、装置、设备及存储介质 | |
WO2021169382A1 (zh) | 链接检测方法、装置、电子设备及存储介质 | |
CN112417425A (zh) | 设备认证方法、装置、***、终端设备及存储介质 | |
US20230161918A1 (en) | Key management method, key management device, and computing device | |
CN110597924B (zh) | 基于区块链的用户标识处理方法、装置、设备及存储介质 | |
WO2015144066A1 (en) | Sensitive operation verification method, apparatus, and system | |
CN110826103B (zh) | 基于区块链的文档权限处理方法、装置、设备及存储介质 | |
CN110598386B (zh) | 基于区块链的数据处理方法、装置、设备及存储介质 | |
CN111212074B (zh) | 基于区块链的资格认定方法、装置、设备及存储介质 | |
CN113821821B (zh) | 安全架构***、安全架构***的密码运算方法和计算设备 | |
CN111970298B (zh) | 应用访问方法、装置、存储介质及计算机设备 | |
CN110597840A (zh) | 基于区块链的伴侣关系建立方法、装置、设备及存储介质 | |
CN108683684B (zh) | 登录目标即时通讯应用的方法、装置和*** | |
CN113469799B (zh) | 贷款资质确定方法、装置、设备及存储介质 | |
CN110569631B (zh) | 基于区块链的账号检测方法、装置、设备及存储介质 | |
KR20230015257A (ko) | 분산 키 생성 및 임계 서명 과정 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21787701 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022533401 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/03/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21787701 Country of ref document: EP Kind code of ref document: A1 |