CN108764867A - A kind of method and apparatus for realizing Transaction Information verification - Google Patents

A kind of method and apparatus for realizing Transaction Information verification Download PDF

Info

Publication number
CN108764867A
CN108764867A CN201810506405.0A CN201810506405A CN108764867A CN 108764867 A CN108764867 A CN 108764867A CN 201810506405 A CN201810506405 A CN 201810506405A CN 108764867 A CN108764867 A CN 108764867A
Authority
CN
China
Prior art keywords
transaction information
public key
key source
encrypted result
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810506405.0A
Other languages
Chinese (zh)
Inventor
李志波
张理
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bitmain Technologies Inc
Beijing Bitmain Technology Co Ltd
Original Assignee
Beijing Bitmain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bitmain Technology Co Ltd filed Critical Beijing Bitmain Technology Co Ltd
Priority to CN201810506405.0A priority Critical patent/CN108764867A/en
Priority to PCT/CN2018/112025 priority patent/WO2019223231A1/en
Publication of CN108764867A publication Critical patent/CN108764867A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

This application provides a kind of methods for realizing Transaction Information verification, including:Transaction Information is encrypted using the private key of digital certificate to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.Present invention also provides a kind of devices for realizing Transaction Information verification, including encrypting module, are used for:Transaction Information is encrypted using the private key of digital certificate to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.Present invention also provides a kind of electronic equipment, including:At least one processor;And the memory being connect at least one processor communication;Wherein, the memory is stored with the instruction that can be executed by least one processor, when described instruction is executed by least one processor, at least one processor is made to execute the above-mentioned method for realizing Transaction Information verification.Present invention also provides a kind of servers, including the above-mentioned device for realizing Transaction Information verification.

Description

A kind of method and apparatus for realizing Transaction Information verification
Technical field
This application involves technical field of data processing, such as are related to a kind of method and apparatus for realizing Transaction Information verification.
Background technology
When be related to the transaction of digital cash, in order to verify the authenticity of Transaction Information (for example, transaction address etc.), One section of message decided through consultation in advance is usually encrypted based on the transaction address by the owner of the transaction address or initiates a payment.
Invention content
The embodiment of the present disclosure provides a kind of method for realizing Transaction Information verification, including:Utilize the private key of digital certificate Transaction Information is encrypted to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
The embodiment of the present disclosure additionally provides a kind of device for realizing Transaction Information verification, including encrypting module, is used for:It utilizes The private key of digital certificate is encrypted Transaction Information to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
The embodiment of the present disclosure additionally provides a kind of server, including the above-mentioned device for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of computer readable storage medium, is stored with computer executable instructions, institute It states computer executable instructions and is arranged to carry out the above-mentioned method for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of computer program product, and the computer program product includes being stored in meter Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted When calculation machine executes, the computer is made to execute the above-mentioned method for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of electronic equipment, including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one processor, and described instruction is by described at least one When a processor executes, at least one processor is made to execute the above-mentioned method for realizing Transaction Information verification.
Description of the drawings
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing The restriction to embodiment is not constituted, the element with same reference numbers label is expressed as similar element, attached drawing in attached drawing Composition does not limit, and wherein:
Fig. 1 is the method schematic diagram for realizing Transaction Information verification of the embodiment of the present disclosure;
Fig. 2 is the method schematic diagram that Transaction Information is encrypted of the embodiment of the present disclosure;
Fig. 3 is the method schematic diagram that public key source is encrypted of the embodiment of the present disclosure;
Fig. 4 is the method schematic diagram that Transaction Information encrypted result is decrypted of the embodiment of the present disclosure;
Fig. 5 is the method schematic diagram of the embodiment of the present disclosure verified to Transaction Information;
Fig. 6 is the method schematic diagram that public key source encrypted result is decrypted of the embodiment of the present disclosure;
Fig. 7 is the method schematic diagram of the embodiment of the present disclosure verified to public key source;
Fig. 8 is the schematic device for realizing Transaction Information verification of the embodiment of the present disclosure;
Fig. 9 is the schematic device that Transaction Information is encrypted of the embodiment of the present disclosure;
Figure 10 is the schematic device for providing Transaction Information encrypted result of the embodiment of the present disclosure;
Figure 11 is the schematic device that public key source is encrypted of the embodiment of the present disclosure;
Figure 12 is the schematic device for providing public key source encrypted result of the embodiment of the present disclosure;
Figure 13 is the schematic device that Transaction Information encrypted result is decrypted of the embodiment of the present disclosure;
Figure 14 is the schematic device of the reception Transaction Information encrypted result of the embodiment of the present disclosure;
Figure 15 is the schematic device of the embodiment of the present disclosure verified to Transaction Information;
Figure 16 is the schematic device that public key source encrypted result is decrypted of the embodiment of the present disclosure;
Figure 17 is the schematic device for receiving public key source encrypted result of the embodiment of the present disclosure;
Figure 18 is the schematic device of the embodiment of the present disclosure verified to public key source;
Figure 19 is the schematic device of the realization delivery operation of the embodiment of the present disclosure;And
Figure 20 is the structural schematic diagram of the electronic equipment of the embodiment of the present disclosure.
Reference numeral:
10:Realize the device of Transaction Information verification;20:Encrypting module;30:Data-interface;40:Deciphering module;50:Data connect Mouthful;60:Authentication module;70:Payment module.
Specific implementation mode
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, below in conjunction with the accompanying drawings to this public affairs The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used for limiting the embodiment of the present disclosure. Technology below description in, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details. However, in the case of without these details, one or more embodiments still can be implemented.In other cases, it is simplification Attached drawing, well known construction and device can simplify displaying.
Referring to Fig. 1, the embodiment of the present disclosure provides a kind of method for realizing Transaction Information verification, including:It is demonstrate,proved using number Book realizes the verification of Transaction Information.
It is described to realize that the verification of Transaction Information may include using digital certificate referring to Fig. 2:Utilize the digital certificate Private key is encrypted the Transaction Information to obtain Transaction Information encrypted result.
As one embodiment, the Transaction Information encrypted result can be provided.(application entity can be with for example, beneficiary It is gathering method, apparatus, such as the Website server etc. of beneficiary;Also same below) it can (application entity can be paid to paying party The terminal devices such as money method, apparatus, such as the client of paying party;Also same below) send the Transaction Information encrypted result.
As one embodiment, the Transaction Information can be provided.For example, beneficiary can send the friendship to paying party Easy information.
As one embodiment, public key source can be provided.Come for example, beneficiary can send the public key to paying party Source.
Referring to Fig. 3, the private key of the digital certificate can be utilized to be encrypted to obtain public key source to the public key source Encrypted result.
As one embodiment, the encryption carried out at least one of the Transaction Information, public key source can be based on Request or actively initiation.For example, beneficiary based on paying party or other it is third-party request to the Transaction Information, public key come At least one of source is encrypted;Or, beneficiary based on preset strategy, condition etc. actively to the Transaction Information, public key come At least one of source is encrypted.
As one embodiment, public key source encrypted result can be provided.For example, beneficiary can be sent out to paying party Send public key source encrypted result.
As one embodiment, the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key come At least one of source can directly or indirectly provide.For example, beneficiary can be directly or indirectly to described in paying party transmission At least one of Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
As one embodiment, the indirect offer may include being provided by exchange intermediary.For example, beneficiary can lead to Crossing business site, (application entity can be the equipment of business site, such as the Website server etc. of business site;Also same below) Equal exchange intermediaries send the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source to paying party At least one of.
It is described to realize that Transaction Information verification may include using digital certificate referring to Fig. 4:Utilize the public affairs of the digital certificate Key is decrypted to obtain the Transaction Information to the Transaction Information encrypted result that the Transaction Information obtains after encryption.
It can receive the Transaction Information before decrypting the Transaction Information encrypted result as one embodiment and add Close result.For example, paying party can receive the Transaction Information encrypted result from beneficiary;Or, paying party can pass through The modes such as active inquiry, request are from Transaction Information encrypted result described in beneficiary active obtaining.
As one embodiment, the Transaction Information can be received.For example, paying party can receive the institute from beneficiary State Transaction Information;Or, paying party can be by modes such as active inquiry, requests from Transaction Information described in beneficiary active obtaining.
Referring to Fig. 5, the Transaction Information that can be received described in and the obtained Transaction Information of decrypting are tested Card, triggers delivery operation after being verified.For example, paying party can utilize received from or be obtained from the transaction of beneficiary The Transaction Information that information and paying party are decrypted is verified, and delivery operation is triggered after being verified.
As one embodiment, the verification may include:The Transaction Information received described in comparison and the decryption Consistency between obtained Transaction Information, between the Transaction Information that the Transaction Information received and the decryption obtain Confirm when with uniformity and is verified.For example, paying party can compare received from or be obtained from the transaction letter of beneficiary Breath it is whether identical as the Transaction Information that paying party is decrypted, paying party received from or be obtained from beneficiary the transaction letter When breath is identical as the Transaction Information that paying party is decrypted, confirmation is verified.
Referring to Fig. 6, the public key of the digital certificate can be utilized to add the public key source that public key source obtains after encryption Close result is decrypted to obtain the public key source.
It can receive the public key source before decrypting public key source encrypted result as one embodiment and add Close result.For example, paying party can receive the public key source encrypted result from beneficiary;Or, paying party can pass through The modes such as active inquiry, request are from public key source encrypted result described in beneficiary active obtaining.
As one embodiment, the public key source can be received.For example, paying party can receive the institute from beneficiary State public key source;Or, paying party can be by modes such as active inquiry, requests from public key source described in beneficiary active obtaining.
As one embodiment, the public key can be obtained according to the public key source received.For example, paying party can In a manner of by reception, active request etc. from the public key source obtain (such as:Download) public key.
Referring to Fig. 7, the public key source and the obtained public key source of decrypting that can be received described in are tested Card, triggers delivery operation after being verified.For example, paying party can utilize received from or be obtained from the public key of beneficiary The public key source that source and paying party are decrypted is verified, and delivery operation is triggered after being verified.
As one embodiment, the verification may include:The public key source received described in comparison and the decryption Consistency between obtained public key source, between the public key source that the public key source received and the decryption obtain Confirm when with uniformity and is verified.For example, the public key that paying party can compare received from or be obtained from beneficiary comes Whether source identical as the public key source that paying party is decrypted, paying party received from or be obtained from beneficiary the transaction letter When breath is identical as the public key source that paying party is decrypted, confirmation is verified.
As one embodiment, the delivery operation may include payout figure currency.
As one embodiment, at least one of the Transaction Information encrypted result, public key source encrypted result are carried out Decryption can be based on request or actively initiate.For example, paying party is based on beneficiary or other third-party requests to institute At least one of Transaction Information encrypted result, public key source encrypted result is stated to be decrypted;Or, paying party is based on preset plan Summary, condition etc. are actively decrypted at least one of the Transaction Information encrypted result, public key source encrypted result.
As one embodiment, the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key come At least one of source can directly or indirectly receive.For example, paying party can directly or indirectly be received from beneficiary At least one of the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
As one embodiment, the indirectly receive may include being received by exchange intermediary.For example, paying party can lead to The exchange intermediaries such as business site are crossed to receive the Transaction Information encrypted result from beneficiary, public key source encrypted result, hand over At least one of easy information, public key source.
As one embodiment, the digital certificate may include hypertext transfer protocol secure (Hypertext Transfer Protocol Secure, HTTPS) certificate;Can also include Secure Socket Layer (Secure Socket Layer, SSL) certificate, secure transport layers (Transport Layer Security, TLS) certificate etc..
The Transaction Information may include transaction address (such as:Pay address;Also same below), number of deals (such as:Branch Pay number;At least one of also same below).
As one embodiment, the public key source may include the uniform resource locator (Uniform of the websites HTTPS Resource Locator, URL).
As one embodiment, the digital cash can be encryption currency.
Referring to Fig. 8, the embodiment of the present disclosure additionally provides a kind of device 10 for realizing Transaction Information verification, is used for:Utilize number Word certificate realizes the verification of Transaction Information.Described device 10 can be set to beneficiary (application entity can be gathering method, apparatus, Such as the Website server etc. of beneficiary;Also same below).
Referring to Fig. 9, described device 10 may include encrypting module 20, be used for:Using the private key of the digital certificate to institute Transaction Information is stated to be encrypted to obtain Transaction Information encrypted result.
Referring to Figure 10, described device 10 can also include data-interface 30, be used for:The Transaction Information encryption knot is provided Fruit.For example, data-interface 30 can send the Transaction Information encrypted result to paying party.
The data-interface 30 can be also used for providing the Transaction Information.For example, data-interface 30 can be to paying party Send the Transaction Information.
The data-interface 30 can be also used for providing public key source.For example, data-interface 30 can be sent to paying party The public key source.
Referring to Figure 11, the encrypting module 20 can be used for:Using the private key of the digital certificate to the public key source It is encrypted to obtain public key source encrypted result.
As one embodiment, the encrypting module 20 can be used for:It initiates to believe the transaction based on request or active The encryption of at least one of breath, public key source.For example, encrypting module 20 is based on paying party or other third-party requests to described At least one of Transaction Information, public key source are encrypted;Or, encrypting module 20 is actively right based on preset strategy, condition etc. At least one of the Transaction Information, public key source are encrypted.
Referring to Figure 12, the data-interface 30 can be used for:Public key source encrypted result is provided.For example, data connect Mouth 30 can send public key source encrypted result to paying party.
As one embodiment, the data-interface 30 can be used for:The Transaction Information encryption is directly or indirectly provided As a result, at least one of public key source encrypted result, Transaction Information, public key source.Such as:Data-interface 30 can directly or Connect to paying party send in the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source at least it One.
As one embodiment, the data-interface 30 can be used for:The Transaction Information is provided by exchange intermediary to add At least one of close result, public key source encrypted result, Transaction Information, public key source.For example, data-interface 30 can pass through friendship The exchange intermediaries such as easy website send the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public affairs to paying party At least one of key source.
Referring to Figure 13, described device 10 may include deciphering module 40, be used for:Using the public key of the digital certificate to institute The Transaction Information encrypted result that Transaction Information obtains after encryption is stated to be decrypted to obtain the Transaction Information.
Referring to Figure 14, described device 10 may include data-interface 50, be used for:Decrypting the Transaction Information encrypted result Before, the Transaction Information encrypted result is received.For example, data-interface 50 can receive the Transaction Information from beneficiary Encrypted result;Or, data-interface 50 can be by modes such as active inquiry, requests from Transaction Information described in beneficiary active obtaining Encrypted result.
As one embodiment, the data-interface 50 can be used for:Receive the Transaction Information.For example, data-interface 50 can receive the Transaction Information from beneficiary;Or, data-interface 50 can by the modes such as active inquiry, request from Transaction Information described in beneficiary active obtaining.
Referring to Figure 15, described device 10 may include authentication module 60, be used for:Using the Transaction Information received with And the obtained Transaction Information of decrypting is verified, and delivery operation is triggered after being verified.For example, authentication module 60 can be with Using received from or be obtained from the Transaction Information of beneficiary and Transaction Information that paying party is decrypted is verified, Delivery operation is triggered after being verified.
As one embodiment, the authentication module 60 can be used for:The Transaction Information received described in comparison and institute The consistency between the Transaction Information that decryption obtains is stated, in the Transaction Information received and the transaction letter decrypted and obtained Confirm when with uniformity between breath and is verified.For example, authentication module 60 can compare received from or be obtained from beneficiary Whether the Transaction Information decrypts that obtained Transaction Information is identical with deciphering module 40, received from or be obtained from the institute of beneficiary State Transaction Information and deciphering module 40 decrypt obtained Transaction Information it is identical when, confirmation is verified.
Referring to Figure 16, the deciphering module 40 can be used for:Public key source is being added using the public key of the digital certificate The public key source encrypted result obtained after close is decrypted to obtain the public key source.
Figure 17 is participated in, the data-interface 50 can be used for:Before decrypting public key source encrypted result, institute is received State public key source encrypted result.For example, data-interface 50 can receive the public key source encrypted result from beneficiary; Or, data-interface 50 can be by modes such as active inquiry, requests from public key source encrypted result described in beneficiary active obtaining.
As one embodiment, the data-interface 50 can be used for:Receive the public key source.For example, data-interface 50 can receive the public key source from beneficiary;Or, data-interface 50 can by the modes such as active inquiry, request from Public key source described in beneficiary active obtaining.
As one embodiment, the data-interface 50 can be used for:Institute is obtained according to the public key source received State public key.For example, data-interface 50 can be obtained from the public key source by modes such as reception, active requests (such as:Under Carry) public key.
Referring to Figure 18, the authentication module 60 can be used for:Utilize the public key source received and the decryption Obtained public key source is verified, and delivery operation is triggered after being verified.For example, authentication module 60 can utilize received from Or it is obtained from the public key source of beneficiary and deciphering module 40 is decrypted obtained public key source and verified, it is logical in verification Later delivery operation is triggered.
As one embodiment, the authentication module 60 can be used for:The public key source received described in comparison and institute The consistency between the public key source that decryption obtains is stated, is come in the public key source received and the obtained public key of decrypting Confirm when with uniformity between source and is verified.For example, authentication module 60 can compare received from or be obtained from beneficiary Whether the public key source decrypts that obtained public key source is identical with deciphering module 40, received from or be obtained from the institute of beneficiary State Transaction Information and deciphering module 40 decrypt obtained public key source it is identical when, confirmation is verified.
Figure 19 is participated in, described device 10 may include payment module 70, be used for:It is held according to the triggering of the authentication module 60 Row delivery operation.
As one embodiment, the payment module 70 can be used for:Payout figure currency.
As one embodiment, the deciphering module 40 can be used for:It initiates to believe the transaction based on request or active The decryption that at least one of encryption for information result, public key source encrypted result carry out.For example, deciphering module 40 be based on beneficiary or its He is decrypted at least one of the Transaction Information encrypted result, public key source encrypted result third-party request;Or, solution Close module 40 be based on the active such as preset strategy, condition in the Transaction Information encrypted result, public key source encrypted result extremely It is one of few to be decrypted.
As one embodiment, the data-interface 50 can be used for:Directly or indirectly receive the Transaction Information encryption As a result, at least one of public key source encrypted result, Transaction Information, public key source.For example, data-interface 50 can directly or It receives in the Transaction Information encrypted result from beneficiary, public key source encrypted result, Transaction Information, public key source extremely It is one of few.
As one embodiment, the data-interface 50 can be used for:The Transaction Information is received by exchange intermediary to add At least one of close result, public key source encrypted result, Transaction Information, public key source.For example, data-interface 50 can pass through friendship The exchange intermediaries such as easy website receive the Transaction Information encrypted result from beneficiary, public key source encrypted result, transaction letter At least one of breath, public key source.
As one embodiment, the digital certificate may include HTTPS certificates;Can also include SSL certificate, TLS cards Book etc..
The Transaction Information may include at least one of transaction address, number of deals.
As one embodiment, the public key source may include the URL of the websites HTTPS.
As one embodiment, the digital cash can be encryption currency.
Above-mentioned public key can be by the cachings such as paying party and other third parties.
Above-mentioned various data (such as:Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source Deng) offer, acquisition, encryption, decryption etc., can also be to be realized by other approach such as third parties.
The embodiment of the present disclosure additionally provides a kind of server, includes the device for realizing Transaction Information verification of above-described embodiment 10, such as:Including at least one of encrypting module 20, data-interface 30, or include deciphering module 40, data-interface 50, verification At least one of module 60, payment module 70.
The embodiment of the present disclosure additionally provides a kind of computer readable storage medium, is stored with computer executable instructions, institute The method for realizing Transaction Information verification that computer executable instructions are arranged to carry out above-described embodiment is stated, such as:With encryption mould The relevant method of at least one of block 20, data-interface 30, or with deciphering module 40, data-interface 50, authentication module 60, payment The relevant method of at least one of module 70.
The embodiment of the present disclosure additionally provides a kind of computer program product, and the computer program product includes being stored in meter Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted When calculation machine executes, the computer is made to execute the method for realizing Transaction Information verification of above-described embodiment, such as:With encrypting module 20, the relevant method of at least one of data-interface 30, or with deciphering module 40, data-interface 50, authentication module 60, payment mould The relevant method of at least one of block 70.
Above-mentioned computer readable storage medium can be transitory computer readable storage medium, can also be non-transient meter Calculation machine readable storage medium storing program for executing.
The embodiment of the present disclosure additionally provides a kind of electronic equipment, and structure is as shown in figure 20, which includes:
In 201, Figure 20 of at least one processor (processor) by taking a processor 201 as an example;And memory (memory) 202, can also include communication interface (Communication Interface) 203 and bus 204.Wherein, it handles Device 201, communication interface 203, memory 202 can complete mutual communication by bus 204.Communication interface 203 can be used It is transmitted in information.Processor 201 can call the logical order in memory 202, and the realization to execute above-described embodiment is merchandised The method of Information Authentication, such as:With the relevant method of at least one of encrypting module 20, data-interface 30, or and deciphering module 40, the relevant method of at least one of data-interface 50, authentication module 60, payment module 70.
In addition, the logical order in above-mentioned memory 202 can be realized and be used as by the form of SFU software functional unit Independent product sale in use, can be stored in a computer read/write memory medium.
Memory 202 is used as a kind of computer readable storage medium, can be used for storing software program, computer can perform journey Sequence, such as the corresponding program instruction/module of the method in the embodiment of the present disclosure.Processor 201 is stored in memory 202 by operation In software program, instruction and module, to execute application of function and data processing, that is, realize above method embodiment in Realize Transaction Information verification method, such as:With the relevant method of at least one of encrypting module 20, data-interface 30, or With the relevant method of at least one of deciphering module 40, data-interface 50, authentication module 60, payment module 70.
Memory 202 may include storing program area and storage data field, wherein storing program area can storage program area, Application program needed at least one function;Storage data field can be stored uses created data etc. according to terminal device. In addition, memory 202 may include high-speed random access memory, can also include nonvolatile memory.
The scheme for realizing Transaction Information verification of the embodiment of the present disclosure improves safety and the effect of Transaction Information verification Rate.
The technical solution of the embodiment of the present disclosure can be expressed in the form of software products, which deposits Storage in a storage medium, including one or more instruction is used so that computer equipment (can be personal computer, Server or the network equipment etc.) execute embodiment of the present disclosure the method all or part of step.And storage above-mentioned is situated between Matter can be non-transient storage media, including:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), with Machine accesses a variety of Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD Matter can also be transitory memory medium.
When in for the application, although term " first ", " second " etc. may be used in this application to describe respectively Element, but these elements should not be limited by these terms.These terms are only used to by an element and another element region It does not open.For example, in the case where not changing the meaning of description, first element can be called second element, and same, second Element can be called first element, as long as " first element " occurred consistent renaming and occurred " second yuan The consistent renaming of part ".First element and second element are all elements, but can not be identical element.
Word used herein is only used for description embodiment and is not used in limitation claim.Such as embodiment with And used in the description of claim, unless context clearly illustrates, otherwise "one" (a) of singulative, "one" (an) and " described " (the) is intended to include equally plural form.Similarly, term "and/or" as used in this specification It includes one or more associated any and all possible combinations listed to refer to.In addition, when being used for the application When middle, term " comprising " (comprise) and its modification " comprising " (comprises) and/or refer to including (comprising) etc. old The presence of feature, entirety, step, operation, element and/or the component stated, but be not excluded for one or more other features, Entirety, step, operation, element, component and/or the presence or addition of these grouping.
Various aspects, embodiment, realization or feature in described embodiment can be used alone or in any combination Mode use.Various aspects in described embodiment being implemented in combination with by software, hardware or software and hardware.Described reality Applying example can also be embodied by the computer-readable medium for being stored with computer-readable code, which includes can be by The instruction that at least one computing device executes.The computer-readable medium can be filled with any data-storable data storage Set associated, which can be read by computer system.Computer-readable medium for citing may include read-only memory, Random access memory, CD-ROM, HDD, DVD, tape and optical data storage devices etc..The computer-readable medium may be used also To be distributed in the computer system by net connection, such computer-readable code distributed storage and can execute.
Above-mentioned technology description can refer to attached drawing, these attached drawings form the part of the application, and by describing attached The embodiment according to described embodiment is shown in figure.Although the description of these embodiments is enough in detail so that this field Technical staff can realize these embodiments, but these embodiments are non-limiting;Other implement can thus be used Example, and variation can also be made in the case where not departing from the range of described embodiment.For example, described in flow chart Operation order be non-limiting, therefore in flow charts illustrate and according to flow chart description two or more behaviour The sequence of work can be changed according to several embodiments.As another example, in several embodiments, it explains in flow charts It releases and is optional or deletable according to one or more operations that flow chart describes.In addition, certain steps or Function can be added in the disclosed embodiments or more than two sequence of steps are replaced.All these variations are considered Included in the disclosed embodiments and claim.
In addition, using term to provide the thorough understanding of described embodiment in above-mentioned technology description.However, and being not required to Will excessively detailed details to realize described embodiment.Therefore, the foregoing description of embodiment be in order to illustrate and describe and It presents.The embodiment and example disclosed according to these embodiments presented in foregoing description is provided separately, with Addition context simultaneously helps to understand described embodiment.Description above, which is not used in, accomplishes exhaustive or by described reality Apply the precise forms that example is restricted to the disclosure.According to the above instruction, it is several modification, selection be applicable in and variation be feasible.? In some cases, processing step well known is not described in avoid described embodiment is unnecessarily influenced.

Claims (24)

1. a kind of method for realizing Transaction Information verification, which is characterized in that including:Using the private key of digital certificate to Transaction Information It is encrypted to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
2. according to the method described in claim 1, it is characterized in that, further including:The Transaction Information encrypted result is provided.
3. method according to claim 1 or 2, which is characterized in that further include:The Transaction Information is provided.
4. according to the method described in claim 3, it is characterized in that, further including:Public key source is provided.
5. according to the method described in claim 4, it is characterized in that, further including:Using the private key of the digital certificate to described Public key source is encrypted to obtain public key source encrypted result.
6. according to the method described in claim 5, it is characterized in that, at least one of the Transaction Information, public key source into Capable encryption is based on request or actively initiation.
7. according to the method described in claim 5, it is characterized in that, further including:Public key source encrypted result is provided.
8. the method according to the description of claim 7 is characterized in that the Transaction Information encrypted result, public key source encryption knot At least one of fruit, Transaction Information, public key source directly or indirectly provide.
9. according to the method described in claim 8, it is characterized in that, the indirect offer includes being provided by exchange intermediary.
10. according to the method described in claim 1, it is characterized in that,
The digital certificate includes hypertext transfer protocol secure HTTPS certificates;
The Transaction Information includes at least one of transaction address, number of deals.
11. according to the method described in claim 4, it is characterized in that, the public key source includes the unified resource of the websites HTTPS Finger URL URL.
12. a kind of device for realizing Transaction Information verification, which is characterized in that including encrypting module, be used for:Utilize digital certificate Private key is encrypted Transaction Information to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
13. device according to claim 12, which is characterized in that further include data-interface, be used for:The transaction letter is provided Encryption for information result.
14. device according to claim 13, which is characterized in that the data-interface is additionally operable to:The transaction letter is provided Breath.
15. device according to claim 14, which is characterized in that the data-interface is additionally operable to:Public key source is provided.
16. device according to claim 15, which is characterized in that the encrypting module is additionally operable to:It is demonstrate,proved using the number The private key of book is encrypted the public key source to obtain public key source encrypted result.
17. device according to claim 16, which is characterized in that the encrypting module is used for:It is sent out based on request or active Play the encryption at least one of the Transaction Information, public key source.
18. device according to claim 16, which is characterized in that the data-interface is additionally operable to:The public key is provided Source encrypted result.
19. device according to claim 17, which is characterized in that the data-interface is used for:Institute is directly or indirectly provided State at least one of Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
20. device according to claim 19, which is characterized in that the data-interface is used for:It is provided by exchange intermediary At least one of the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
21. device according to claim 12, which is characterized in that
The digital certificate includes HTTPS certificates;
The Transaction Information includes at least one of transaction address, number of deals.
22. device according to claim 15, which is characterized in that the public key source includes the URL of the websites HTTPS.
23. a kind of electronic equipment, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one processor, and described instruction is by least one place When managing device execution, at least one processor perform claim is made to require 1-11 any one of them methods.
24. a kind of server, which is characterized in that include claim 12-22 any one of them devices.
CN201810506405.0A 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification Pending CN108764867A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810506405.0A CN108764867A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification
PCT/CN2018/112025 WO2019223231A1 (en) 2018-05-24 2018-10-26 Method and device for realizing authentication of transaction information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810506405.0A CN108764867A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification

Publications (1)

Publication Number Publication Date
CN108764867A true CN108764867A (en) 2018-11-06

Family

ID=64005304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810506405.0A Pending CN108764867A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification

Country Status (2)

Country Link
CN (1) CN108764867A (en)
WO (1) WO2019223231A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019223276A1 (en) * 2018-05-24 2019-11-28 赢威能源有限公司 Method and device for realizing authentication of transaction information
WO2019223231A1 (en) * 2018-05-24 2019-11-28 赢威能源有限公司 Method and device for realizing authentication of transaction information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150193772A1 (en) * 2010-04-02 2015-07-09 Isignthis Ltd Methods and systems for verifying transactions
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN107911222A (en) * 2017-11-21 2018-04-13 沃通电子认证服务有限公司 Digital signature generation, verification method and its equipment and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160189151A1 (en) * 2014-12-31 2016-06-30 Ebay Enterprise, Inc. Distributed authentication for mobile devices
US10026082B2 (en) * 2015-05-21 2018-07-17 Mastercard International Incorporated Method and system for linkage of blockchain-based assets to fiat currency accounts
CN107248994B (en) * 2017-06-26 2020-08-14 联动优势科技有限公司 Information sending method, processing method and device
CN107528886B (en) * 2017-07-25 2020-07-31 中国科学院计算技术研究所 Block chain full-network splitting method and system
CN108063752B (en) * 2017-11-02 2020-05-08 暨南大学 Credible gene detection and data sharing method based on block chain and agent re-encryption
CN108764867A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150193772A1 (en) * 2010-04-02 2015-07-09 Isignthis Ltd Methods and systems for verifying transactions
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN107911222A (en) * 2017-11-21 2018-04-13 沃通电子认证服务有限公司 Digital signature generation, verification method and its equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019223276A1 (en) * 2018-05-24 2019-11-28 赢威能源有限公司 Method and device for realizing authentication of transaction information
WO2019223231A1 (en) * 2018-05-24 2019-11-28 赢威能源有限公司 Method and device for realizing authentication of transaction information

Also Published As

Publication number Publication date
WO2019223231A1 (en) 2019-11-28

Similar Documents

Publication Publication Date Title
AU2017204769B2 (en) Differential client-side encryption of information originating from a client
JP7351591B2 (en) Multi-authorization system that uses M out of N keys to restore customer wallets
US10956901B2 (en) Methods, apparatus and computer program products for securely accessing account data
US10410209B2 (en) Electronic transaction system and method with participant authentication via separate authority from real-time payment validation
US20150348017A1 (en) Method for integrating cryptocurrency transfer on a social network interface
CN106537432A (en) Method and device for securing access to wallets in which cryptocurrencies are stored
EP1288829A1 (en) Anonymous acquisition of digital products based on secret splitting
US20080104709A1 (en) System and method for secure data storage
US20170093826A1 (en) System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key
CN110049016A (en) Data query method, apparatus, system, equipment and the storage medium of block chain
US20210097530A1 (en) Block chain trading system and block chain trading method
CN110601855B (en) Root certificate management method and device, electronic equipment and storage medium
US20230360040A1 (en) Quantum-safe payment system
WO2021169767A1 (en) Data processing method and apparatus, device and medium
CN111723060A (en) Blacklist data sharing method and system based on block chain
CN105051769B (en) It is used for transmission the method and system of data
US9756031B1 (en) Portable access to auditing information
JP7156889B2 (en) Payment processing method
KR102085997B1 (en) Method and system for real estate transaction service based on block chain
CN108764867A (en) A kind of method and apparatus for realizing Transaction Information verification
CN108846650A (en) A kind of method and apparatus for realizing Transaction Information verifying
CN108764921A (en) A kind of method and apparatus for realizing Transaction Information verification
CN114616563A (en) Secure environment for encryption key generation
CN117494151A (en) Improved memory system
US20200304317A1 (en) Secure file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181106