Device sharing method and system, computer device and storage medium

A technology for sharing systems and equipment, applied in the blockchain field, can solve problems such as low GPS positioning accuracy and non-refundable user deposits, and achieve accurate timing and reasonable and fair fees

Inactive Publication Date: 2019-01-04
HANGZHOU FUZAMEI TECH CO LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventive method can better track and disclose the entire bicycle use process, ensure that the shared bicycles are parked in a suitable location, and monitor and manage malicious users; but the GPS positioning accuracy is not high, and there are still some problems in actual operation, which cannot meet The purpose that the technical solution wants to achieve, and there is still the possibility that the user's deposit cannot be refunded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device sharing method and system, computer device and storage medium
  • Device sharing method and system, computer device and storage medium
  • Device sharing method and system, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] A device sharing system such as figure 1 As shown, it includes a key generation module, a device identification code generation module, an acquisition module, a storage module, a smart contract module and a verification module; the key generation module generates public keys and private keys on the blockchain for users and device owners. key; the device identification code generation module generates a unique device identification code for the device and stores it on the storage module; the collection module collects the user's voice, image and fingerprint information and stores it on the storage module, and the storage module is used to store the device identification code and user Voice, image and fingerprint information; the smart contract module is associated with the key of the user and the device owner; the verification module is used to verify user information, and the acquisition module, verification module and smart contract module are connected in sequence.

...

Embodiment 2

[0044] A device sharing system in this embodiment is further improved on the basis of Embodiment 1, such as figure 2 As shown, it also includes an authorization module. The authorization module interacts with the smart contract module and the verification module. After the user information verification is successful, the device owner authorizes the user to use through the authorization module.

[0045] In order to further expand the control authority of the device owner, after the verification module is successfully verified, it sends information to the authorization module. After seeing the user's information, the device owner can decide whether the user is free to use or pay, and communicate with the smart contract module Interaction, if the authorization module sends the smart contract module free use, the device starts to use the timer, and the smart contract module enforces the deposit to be frozen. The contract module sends a fee for use, and the device starts to use th...

Embodiment 3

[0048] A device sharing system in this embodiment is further improved on the basis of Embodiments 1 and 2, such as figure 2 As shown, the device owner releases the use rights according to the user's information through the authorization module, and the use rights include free use and paid use. The device owner can authorize specific users to use it for free, and record it in the smart contract module. After the verification is passed, the smart contract module detects the user authorized by the device owner for free use, and automatically executes the smart contract for the user to use.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device sharing method and a system, a computer device and a storage medium, belonging to the technical field of block chains. The system comprises a key generation module, adevice identification code generation module, a collection module, a storage module, an intelligent contract module and a verification module. The method comprises the following steps: a user and a device owner generate a public key and a private key on a block chain and interact with an intelligent contract; the block chain judges the credit rating of the user to determine whether to collect thedeposit or not, and interacts with the intelligent contract; the user's voice, image and fingerprint information are encrypted by Hash and stored on the block chain; a device identifier is assigned tothe device; user information is collected to verify if the verification passes, the device is turned on, the smart contract and the device start timing simultaneously, the smart contract is enforced,and the cost reaches the public key encrypted address of the device owner. For the non-refundable deposit or equipment stolen or damaged, the technical scheme can prevent the equipment from being damaged or stolen, ensure the deposit returned, and automatically deduct fees.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a device sharing method and system, computer equipment and storage media. Background technique [0002] Existing devices such as shared bicycles and unmanned cars that require key authentication will always be stolen or placed in some non-compliant places when they are used by users, resulting in the loss or waste of the device, causing serious harm to the operator of the device. property loss. When the user uses it, the operator of the device will charge a relatively high deposit from the user. When the operator cannot support the operation due to losses or other reasons, if the operator does not return the deposit to the user on the premise of integrity, the user deposit will not be returned. Users bring property losses; including personal belongings, such as cars, bicycles, battery cars, computers, etc., when they are used for sharing, the above problems exist. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/06G06Q20/38G06Q40/04
CPCG06Q20/382G06Q20/389G06Q30/0645G06Q40/04
Inventor 吴思进王志文
Owner HANGZHOU FUZAMEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products