CN108764867A - A kind of method and apparatus for realizing Transaction Information verification - Google Patents
A kind of method and apparatus for realizing Transaction Information verification Download PDFInfo
- Publication number
- CN108764867A CN108764867A CN201810506405.0A CN201810506405A CN108764867A CN 108764867 A CN108764867 A CN 108764867A CN 201810506405 A CN201810506405 A CN 201810506405A CN 108764867 A CN108764867 A CN 108764867A
- Authority
- CN
- China
- Prior art keywords
- transaction information
- public key
- key source
- encrypted result
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
This application provides a kind of methods for realizing Transaction Information verification, including:Transaction Information is encrypted using the private key of digital certificate to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.Present invention also provides a kind of devices for realizing Transaction Information verification, including encrypting module, are used for:Transaction Information is encrypted using the private key of digital certificate to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.Present invention also provides a kind of electronic equipment, including:At least one processor;And the memory being connect at least one processor communication;Wherein, the memory is stored with the instruction that can be executed by least one processor, when described instruction is executed by least one processor, at least one processor is made to execute the above-mentioned method for realizing Transaction Information verification.Present invention also provides a kind of servers, including the above-mentioned device for realizing Transaction Information verification.
Description
Technical field
This application involves technical field of data processing, such as are related to a kind of method and apparatus for realizing Transaction Information verification.
Background technology
When be related to the transaction of digital cash, in order to verify the authenticity of Transaction Information (for example, transaction address etc.),
One section of message decided through consultation in advance is usually encrypted based on the transaction address by the owner of the transaction address or initiates a payment.
Invention content
The embodiment of the present disclosure provides a kind of method for realizing Transaction Information verification, including:Utilize the private key of digital certificate
Transaction Information is encrypted to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
The embodiment of the present disclosure additionally provides a kind of device for realizing Transaction Information verification, including encrypting module, is used for:It utilizes
The private key of digital certificate is encrypted Transaction Information to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
The embodiment of the present disclosure additionally provides a kind of server, including the above-mentioned device for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of computer readable storage medium, is stored with computer executable instructions, institute
It states computer executable instructions and is arranged to carry out the above-mentioned method for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of computer program product, and the computer program product includes being stored in meter
Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted
When calculation machine executes, the computer is made to execute the above-mentioned method for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of electronic equipment, including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one processor, and described instruction is by described at least one
When a processor executes, at least one processor is made to execute the above-mentioned method for realizing Transaction Information verification.
Description of the drawings
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing
The restriction to embodiment is not constituted, the element with same reference numbers label is expressed as similar element, attached drawing in attached drawing
Composition does not limit, and wherein:
Fig. 1 is the method schematic diagram for realizing Transaction Information verification of the embodiment of the present disclosure;
Fig. 2 is the method schematic diagram that Transaction Information is encrypted of the embodiment of the present disclosure;
Fig. 3 is the method schematic diagram that public key source is encrypted of the embodiment of the present disclosure;
Fig. 4 is the method schematic diagram that Transaction Information encrypted result is decrypted of the embodiment of the present disclosure;
Fig. 5 is the method schematic diagram of the embodiment of the present disclosure verified to Transaction Information;
Fig. 6 is the method schematic diagram that public key source encrypted result is decrypted of the embodiment of the present disclosure;
Fig. 7 is the method schematic diagram of the embodiment of the present disclosure verified to public key source;
Fig. 8 is the schematic device for realizing Transaction Information verification of the embodiment of the present disclosure;
Fig. 9 is the schematic device that Transaction Information is encrypted of the embodiment of the present disclosure;
Figure 10 is the schematic device for providing Transaction Information encrypted result of the embodiment of the present disclosure;
Figure 11 is the schematic device that public key source is encrypted of the embodiment of the present disclosure;
Figure 12 is the schematic device for providing public key source encrypted result of the embodiment of the present disclosure;
Figure 13 is the schematic device that Transaction Information encrypted result is decrypted of the embodiment of the present disclosure;
Figure 14 is the schematic device of the reception Transaction Information encrypted result of the embodiment of the present disclosure;
Figure 15 is the schematic device of the embodiment of the present disclosure verified to Transaction Information;
Figure 16 is the schematic device that public key source encrypted result is decrypted of the embodiment of the present disclosure;
Figure 17 is the schematic device for receiving public key source encrypted result of the embodiment of the present disclosure;
Figure 18 is the schematic device of the embodiment of the present disclosure verified to public key source;
Figure 19 is the schematic device of the realization delivery operation of the embodiment of the present disclosure;And
Figure 20 is the structural schematic diagram of the electronic equipment of the embodiment of the present disclosure.
Reference numeral:
10:Realize the device of Transaction Information verification;20:Encrypting module;30:Data-interface;40:Deciphering module;50:Data connect
Mouthful;60:Authentication module;70:Payment module.
Specific implementation mode
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, below in conjunction with the accompanying drawings to this public affairs
The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used for limiting the embodiment of the present disclosure.
Technology below description in, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details.
However, in the case of without these details, one or more embodiments still can be implemented.In other cases, it is simplification
Attached drawing, well known construction and device can simplify displaying.
Referring to Fig. 1, the embodiment of the present disclosure provides a kind of method for realizing Transaction Information verification, including:It is demonstrate,proved using number
Book realizes the verification of Transaction Information.
It is described to realize that the verification of Transaction Information may include using digital certificate referring to Fig. 2:Utilize the digital certificate
Private key is encrypted the Transaction Information to obtain Transaction Information encrypted result.
As one embodiment, the Transaction Information encrypted result can be provided.(application entity can be with for example, beneficiary
It is gathering method, apparatus, such as the Website server etc. of beneficiary;Also same below) it can (application entity can be paid to paying party
The terminal devices such as money method, apparatus, such as the client of paying party;Also same below) send the Transaction Information encrypted result.
As one embodiment, the Transaction Information can be provided.For example, beneficiary can send the friendship to paying party
Easy information.
As one embodiment, public key source can be provided.Come for example, beneficiary can send the public key to paying party
Source.
Referring to Fig. 3, the private key of the digital certificate can be utilized to be encrypted to obtain public key source to the public key source
Encrypted result.
As one embodiment, the encryption carried out at least one of the Transaction Information, public key source can be based on
Request or actively initiation.For example, beneficiary based on paying party or other it is third-party request to the Transaction Information, public key come
At least one of source is encrypted;Or, beneficiary based on preset strategy, condition etc. actively to the Transaction Information, public key come
At least one of source is encrypted.
As one embodiment, public key source encrypted result can be provided.For example, beneficiary can be sent out to paying party
Send public key source encrypted result.
As one embodiment, the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key come
At least one of source can directly or indirectly provide.For example, beneficiary can be directly or indirectly to described in paying party transmission
At least one of Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
As one embodiment, the indirect offer may include being provided by exchange intermediary.For example, beneficiary can lead to
Crossing business site, (application entity can be the equipment of business site, such as the Website server etc. of business site;Also same below)
Equal exchange intermediaries send the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source to paying party
At least one of.
It is described to realize that Transaction Information verification may include using digital certificate referring to Fig. 4:Utilize the public affairs of the digital certificate
Key is decrypted to obtain the Transaction Information to the Transaction Information encrypted result that the Transaction Information obtains after encryption.
It can receive the Transaction Information before decrypting the Transaction Information encrypted result as one embodiment and add
Close result.For example, paying party can receive the Transaction Information encrypted result from beneficiary;Or, paying party can pass through
The modes such as active inquiry, request are from Transaction Information encrypted result described in beneficiary active obtaining.
As one embodiment, the Transaction Information can be received.For example, paying party can receive the institute from beneficiary
State Transaction Information;Or, paying party can be by modes such as active inquiry, requests from Transaction Information described in beneficiary active obtaining.
Referring to Fig. 5, the Transaction Information that can be received described in and the obtained Transaction Information of decrypting are tested
Card, triggers delivery operation after being verified.For example, paying party can utilize received from or be obtained from the transaction of beneficiary
The Transaction Information that information and paying party are decrypted is verified, and delivery operation is triggered after being verified.
As one embodiment, the verification may include:The Transaction Information received described in comparison and the decryption
Consistency between obtained Transaction Information, between the Transaction Information that the Transaction Information received and the decryption obtain
Confirm when with uniformity and is verified.For example, paying party can compare received from or be obtained from the transaction letter of beneficiary
Breath it is whether identical as the Transaction Information that paying party is decrypted, paying party received from or be obtained from beneficiary the transaction letter
When breath is identical as the Transaction Information that paying party is decrypted, confirmation is verified.
Referring to Fig. 6, the public key of the digital certificate can be utilized to add the public key source that public key source obtains after encryption
Close result is decrypted to obtain the public key source.
It can receive the public key source before decrypting public key source encrypted result as one embodiment and add
Close result.For example, paying party can receive the public key source encrypted result from beneficiary;Or, paying party can pass through
The modes such as active inquiry, request are from public key source encrypted result described in beneficiary active obtaining.
As one embodiment, the public key source can be received.For example, paying party can receive the institute from beneficiary
State public key source;Or, paying party can be by modes such as active inquiry, requests from public key source described in beneficiary active obtaining.
As one embodiment, the public key can be obtained according to the public key source received.For example, paying party can
In a manner of by reception, active request etc. from the public key source obtain (such as:Download) public key.
Referring to Fig. 7, the public key source and the obtained public key source of decrypting that can be received described in are tested
Card, triggers delivery operation after being verified.For example, paying party can utilize received from or be obtained from the public key of beneficiary
The public key source that source and paying party are decrypted is verified, and delivery operation is triggered after being verified.
As one embodiment, the verification may include:The public key source received described in comparison and the decryption
Consistency between obtained public key source, between the public key source that the public key source received and the decryption obtain
Confirm when with uniformity and is verified.For example, the public key that paying party can compare received from or be obtained from beneficiary comes
Whether source identical as the public key source that paying party is decrypted, paying party received from or be obtained from beneficiary the transaction letter
When breath is identical as the public key source that paying party is decrypted, confirmation is verified.
As one embodiment, the delivery operation may include payout figure currency.
As one embodiment, at least one of the Transaction Information encrypted result, public key source encrypted result are carried out
Decryption can be based on request or actively initiate.For example, paying party is based on beneficiary or other third-party requests to institute
At least one of Transaction Information encrypted result, public key source encrypted result is stated to be decrypted;Or, paying party is based on preset plan
Summary, condition etc. are actively decrypted at least one of the Transaction Information encrypted result, public key source encrypted result.
As one embodiment, the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key come
At least one of source can directly or indirectly receive.For example, paying party can directly or indirectly be received from beneficiary
At least one of the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
As one embodiment, the indirectly receive may include being received by exchange intermediary.For example, paying party can lead to
The exchange intermediaries such as business site are crossed to receive the Transaction Information encrypted result from beneficiary, public key source encrypted result, hand over
At least one of easy information, public key source.
As one embodiment, the digital certificate may include hypertext transfer protocol secure (Hypertext
Transfer Protocol Secure, HTTPS) certificate;Can also include Secure Socket Layer (Secure Socket Layer,
SSL) certificate, secure transport layers (Transport Layer Security, TLS) certificate etc..
The Transaction Information may include transaction address (such as:Pay address;Also same below), number of deals (such as:Branch
Pay number;At least one of also same below).
As one embodiment, the public key source may include the uniform resource locator (Uniform of the websites HTTPS
Resource Locator, URL).
As one embodiment, the digital cash can be encryption currency.
Referring to Fig. 8, the embodiment of the present disclosure additionally provides a kind of device 10 for realizing Transaction Information verification, is used for:Utilize number
Word certificate realizes the verification of Transaction Information.Described device 10 can be set to beneficiary (application entity can be gathering method, apparatus,
Such as the Website server etc. of beneficiary;Also same below).
Referring to Fig. 9, described device 10 may include encrypting module 20, be used for:Using the private key of the digital certificate to institute
Transaction Information is stated to be encrypted to obtain Transaction Information encrypted result.
Referring to Figure 10, described device 10 can also include data-interface 30, be used for:The Transaction Information encryption knot is provided
Fruit.For example, data-interface 30 can send the Transaction Information encrypted result to paying party.
The data-interface 30 can be also used for providing the Transaction Information.For example, data-interface 30 can be to paying party
Send the Transaction Information.
The data-interface 30 can be also used for providing public key source.For example, data-interface 30 can be sent to paying party
The public key source.
Referring to Figure 11, the encrypting module 20 can be used for:Using the private key of the digital certificate to the public key source
It is encrypted to obtain public key source encrypted result.
As one embodiment, the encrypting module 20 can be used for:It initiates to believe the transaction based on request or active
The encryption of at least one of breath, public key source.For example, encrypting module 20 is based on paying party or other third-party requests to described
At least one of Transaction Information, public key source are encrypted;Or, encrypting module 20 is actively right based on preset strategy, condition etc.
At least one of the Transaction Information, public key source are encrypted.
Referring to Figure 12, the data-interface 30 can be used for:Public key source encrypted result is provided.For example, data connect
Mouth 30 can send public key source encrypted result to paying party.
As one embodiment, the data-interface 30 can be used for:The Transaction Information encryption is directly or indirectly provided
As a result, at least one of public key source encrypted result, Transaction Information, public key source.Such as:Data-interface 30 can directly or
Connect to paying party send in the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source at least it
One.
As one embodiment, the data-interface 30 can be used for:The Transaction Information is provided by exchange intermediary to add
At least one of close result, public key source encrypted result, Transaction Information, public key source.For example, data-interface 30 can pass through friendship
The exchange intermediaries such as easy website send the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public affairs to paying party
At least one of key source.
Referring to Figure 13, described device 10 may include deciphering module 40, be used for:Using the public key of the digital certificate to institute
The Transaction Information encrypted result that Transaction Information obtains after encryption is stated to be decrypted to obtain the Transaction Information.
Referring to Figure 14, described device 10 may include data-interface 50, be used for:Decrypting the Transaction Information encrypted result
Before, the Transaction Information encrypted result is received.For example, data-interface 50 can receive the Transaction Information from beneficiary
Encrypted result;Or, data-interface 50 can be by modes such as active inquiry, requests from Transaction Information described in beneficiary active obtaining
Encrypted result.
As one embodiment, the data-interface 50 can be used for:Receive the Transaction Information.For example, data-interface
50 can receive the Transaction Information from beneficiary;Or, data-interface 50 can by the modes such as active inquiry, request from
Transaction Information described in beneficiary active obtaining.
Referring to Figure 15, described device 10 may include authentication module 60, be used for:Using the Transaction Information received with
And the obtained Transaction Information of decrypting is verified, and delivery operation is triggered after being verified.For example, authentication module 60 can be with
Using received from or be obtained from the Transaction Information of beneficiary and Transaction Information that paying party is decrypted is verified,
Delivery operation is triggered after being verified.
As one embodiment, the authentication module 60 can be used for:The Transaction Information received described in comparison and institute
The consistency between the Transaction Information that decryption obtains is stated, in the Transaction Information received and the transaction letter decrypted and obtained
Confirm when with uniformity between breath and is verified.For example, authentication module 60 can compare received from or be obtained from beneficiary
Whether the Transaction Information decrypts that obtained Transaction Information is identical with deciphering module 40, received from or be obtained from the institute of beneficiary
State Transaction Information and deciphering module 40 decrypt obtained Transaction Information it is identical when, confirmation is verified.
Referring to Figure 16, the deciphering module 40 can be used for:Public key source is being added using the public key of the digital certificate
The public key source encrypted result obtained after close is decrypted to obtain the public key source.
Figure 17 is participated in, the data-interface 50 can be used for:Before decrypting public key source encrypted result, institute is received
State public key source encrypted result.For example, data-interface 50 can receive the public key source encrypted result from beneficiary;
Or, data-interface 50 can be by modes such as active inquiry, requests from public key source encrypted result described in beneficiary active obtaining.
As one embodiment, the data-interface 50 can be used for:Receive the public key source.For example, data-interface
50 can receive the public key source from beneficiary;Or, data-interface 50 can by the modes such as active inquiry, request from
Public key source described in beneficiary active obtaining.
As one embodiment, the data-interface 50 can be used for:Institute is obtained according to the public key source received
State public key.For example, data-interface 50 can be obtained from the public key source by modes such as reception, active requests (such as:Under
Carry) public key.
Referring to Figure 18, the authentication module 60 can be used for:Utilize the public key source received and the decryption
Obtained public key source is verified, and delivery operation is triggered after being verified.For example, authentication module 60 can utilize received from
Or it is obtained from the public key source of beneficiary and deciphering module 40 is decrypted obtained public key source and verified, it is logical in verification
Later delivery operation is triggered.
As one embodiment, the authentication module 60 can be used for:The public key source received described in comparison and institute
The consistency between the public key source that decryption obtains is stated, is come in the public key source received and the obtained public key of decrypting
Confirm when with uniformity between source and is verified.For example, authentication module 60 can compare received from or be obtained from beneficiary
Whether the public key source decrypts that obtained public key source is identical with deciphering module 40, received from or be obtained from the institute of beneficiary
State Transaction Information and deciphering module 40 decrypt obtained public key source it is identical when, confirmation is verified.
Figure 19 is participated in, described device 10 may include payment module 70, be used for:It is held according to the triggering of the authentication module 60
Row delivery operation.
As one embodiment, the payment module 70 can be used for:Payout figure currency.
As one embodiment, the deciphering module 40 can be used for:It initiates to believe the transaction based on request or active
The decryption that at least one of encryption for information result, public key source encrypted result carry out.For example, deciphering module 40 be based on beneficiary or its
He is decrypted at least one of the Transaction Information encrypted result, public key source encrypted result third-party request;Or, solution
Close module 40 be based on the active such as preset strategy, condition in the Transaction Information encrypted result, public key source encrypted result extremely
It is one of few to be decrypted.
As one embodiment, the data-interface 50 can be used for:Directly or indirectly receive the Transaction Information encryption
As a result, at least one of public key source encrypted result, Transaction Information, public key source.For example, data-interface 50 can directly or
It receives in the Transaction Information encrypted result from beneficiary, public key source encrypted result, Transaction Information, public key source extremely
It is one of few.
As one embodiment, the data-interface 50 can be used for:The Transaction Information is received by exchange intermediary to add
At least one of close result, public key source encrypted result, Transaction Information, public key source.For example, data-interface 50 can pass through friendship
The exchange intermediaries such as easy website receive the Transaction Information encrypted result from beneficiary, public key source encrypted result, transaction letter
At least one of breath, public key source.
As one embodiment, the digital certificate may include HTTPS certificates;Can also include SSL certificate, TLS cards
Book etc..
The Transaction Information may include at least one of transaction address, number of deals.
As one embodiment, the public key source may include the URL of the websites HTTPS.
As one embodiment, the digital cash can be encryption currency.
Above-mentioned public key can be by the cachings such as paying party and other third parties.
Above-mentioned various data (such as:Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source
Deng) offer, acquisition, encryption, decryption etc., can also be to be realized by other approach such as third parties.
The embodiment of the present disclosure additionally provides a kind of server, includes the device for realizing Transaction Information verification of above-described embodiment
10, such as:Including at least one of encrypting module 20, data-interface 30, or include deciphering module 40, data-interface 50, verification
At least one of module 60, payment module 70.
The embodiment of the present disclosure additionally provides a kind of computer readable storage medium, is stored with computer executable instructions, institute
The method for realizing Transaction Information verification that computer executable instructions are arranged to carry out above-described embodiment is stated, such as:With encryption mould
The relevant method of at least one of block 20, data-interface 30, or with deciphering module 40, data-interface 50, authentication module 60, payment
The relevant method of at least one of module 70.
The embodiment of the present disclosure additionally provides a kind of computer program product, and the computer program product includes being stored in meter
Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted
When calculation machine executes, the computer is made to execute the method for realizing Transaction Information verification of above-described embodiment, such as:With encrypting module
20, the relevant method of at least one of data-interface 30, or with deciphering module 40, data-interface 50, authentication module 60, payment mould
The relevant method of at least one of block 70.
Above-mentioned computer readable storage medium can be transitory computer readable storage medium, can also be non-transient meter
Calculation machine readable storage medium storing program for executing.
The embodiment of the present disclosure additionally provides a kind of electronic equipment, and structure is as shown in figure 20, which includes:
In 201, Figure 20 of at least one processor (processor) by taking a processor 201 as an example;And memory
(memory) 202, can also include communication interface (Communication Interface) 203 and bus 204.Wherein, it handles
Device 201, communication interface 203, memory 202 can complete mutual communication by bus 204.Communication interface 203 can be used
It is transmitted in information.Processor 201 can call the logical order in memory 202, and the realization to execute above-described embodiment is merchandised
The method of Information Authentication, such as:With the relevant method of at least one of encrypting module 20, data-interface 30, or and deciphering module
40, the relevant method of at least one of data-interface 50, authentication module 60, payment module 70.
In addition, the logical order in above-mentioned memory 202 can be realized and be used as by the form of SFU software functional unit
Independent product sale in use, can be stored in a computer read/write memory medium.
Memory 202 is used as a kind of computer readable storage medium, can be used for storing software program, computer can perform journey
Sequence, such as the corresponding program instruction/module of the method in the embodiment of the present disclosure.Processor 201 is stored in memory 202 by operation
In software program, instruction and module, to execute application of function and data processing, that is, realize above method embodiment in
Realize Transaction Information verification method, such as:With the relevant method of at least one of encrypting module 20, data-interface 30, or
With the relevant method of at least one of deciphering module 40, data-interface 50, authentication module 60, payment module 70.
Memory 202 may include storing program area and storage data field, wherein storing program area can storage program area,
Application program needed at least one function;Storage data field can be stored uses created data etc. according to terminal device.
In addition, memory 202 may include high-speed random access memory, can also include nonvolatile memory.
The scheme for realizing Transaction Information verification of the embodiment of the present disclosure improves safety and the effect of Transaction Information verification
Rate.
The technical solution of the embodiment of the present disclosure can be expressed in the form of software products, which deposits
Storage in a storage medium, including one or more instruction is used so that computer equipment (can be personal computer,
Server or the network equipment etc.) execute embodiment of the present disclosure the method all or part of step.And storage above-mentioned is situated between
Matter can be non-transient storage media, including:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), with
Machine accesses a variety of Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD
Matter can also be transitory memory medium.
When in for the application, although term " first ", " second " etc. may be used in this application to describe respectively
Element, but these elements should not be limited by these terms.These terms are only used to by an element and another element region
It does not open.For example, in the case where not changing the meaning of description, first element can be called second element, and same, second
Element can be called first element, as long as " first element " occurred consistent renaming and occurred " second yuan
The consistent renaming of part ".First element and second element are all elements, but can not be identical element.
Word used herein is only used for description embodiment and is not used in limitation claim.Such as embodiment with
And used in the description of claim, unless context clearly illustrates, otherwise "one" (a) of singulative, "one"
(an) and " described " (the) is intended to include equally plural form.Similarly, term "and/or" as used in this specification
It includes one or more associated any and all possible combinations listed to refer to.In addition, when being used for the application
When middle, term " comprising " (comprise) and its modification " comprising " (comprises) and/or refer to including (comprising) etc. old
The presence of feature, entirety, step, operation, element and/or the component stated, but be not excluded for one or more other features,
Entirety, step, operation, element, component and/or the presence or addition of these grouping.
Various aspects, embodiment, realization or feature in described embodiment can be used alone or in any combination
Mode use.Various aspects in described embodiment being implemented in combination with by software, hardware or software and hardware.Described reality
Applying example can also be embodied by the computer-readable medium for being stored with computer-readable code, which includes can be by
The instruction that at least one computing device executes.The computer-readable medium can be filled with any data-storable data storage
Set associated, which can be read by computer system.Computer-readable medium for citing may include read-only memory,
Random access memory, CD-ROM, HDD, DVD, tape and optical data storage devices etc..The computer-readable medium may be used also
To be distributed in the computer system by net connection, such computer-readable code distributed storage and can execute.
Above-mentioned technology description can refer to attached drawing, these attached drawings form the part of the application, and by describing attached
The embodiment according to described embodiment is shown in figure.Although the description of these embodiments is enough in detail so that this field
Technical staff can realize these embodiments, but these embodiments are non-limiting;Other implement can thus be used
Example, and variation can also be made in the case where not departing from the range of described embodiment.For example, described in flow chart
Operation order be non-limiting, therefore in flow charts illustrate and according to flow chart description two or more behaviour
The sequence of work can be changed according to several embodiments.As another example, in several embodiments, it explains in flow charts
It releases and is optional or deletable according to one or more operations that flow chart describes.In addition, certain steps or
Function can be added in the disclosed embodiments or more than two sequence of steps are replaced.All these variations are considered
Included in the disclosed embodiments and claim.
In addition, using term to provide the thorough understanding of described embodiment in above-mentioned technology description.However, and being not required to
Will excessively detailed details to realize described embodiment.Therefore, the foregoing description of embodiment be in order to illustrate and describe and
It presents.The embodiment and example disclosed according to these embodiments presented in foregoing description is provided separately, with
Addition context simultaneously helps to understand described embodiment.Description above, which is not used in, accomplishes exhaustive or by described reality
Apply the precise forms that example is restricted to the disclosure.According to the above instruction, it is several modification, selection be applicable in and variation be feasible.?
In some cases, processing step well known is not described in avoid described embodiment is unnecessarily influenced.
Claims (24)
1. a kind of method for realizing Transaction Information verification, which is characterized in that including:Using the private key of digital certificate to Transaction Information
It is encrypted to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
2. according to the method described in claim 1, it is characterized in that, further including:The Transaction Information encrypted result is provided.
3. method according to claim 1 or 2, which is characterized in that further include:The Transaction Information is provided.
4. according to the method described in claim 3, it is characterized in that, further including:Public key source is provided.
5. according to the method described in claim 4, it is characterized in that, further including:Using the private key of the digital certificate to described
Public key source is encrypted to obtain public key source encrypted result.
6. according to the method described in claim 5, it is characterized in that, at least one of the Transaction Information, public key source into
Capable encryption is based on request or actively initiation.
7. according to the method described in claim 5, it is characterized in that, further including:Public key source encrypted result is provided.
8. the method according to the description of claim 7 is characterized in that the Transaction Information encrypted result, public key source encryption knot
At least one of fruit, Transaction Information, public key source directly or indirectly provide.
9. according to the method described in claim 8, it is characterized in that, the indirect offer includes being provided by exchange intermediary.
10. according to the method described in claim 1, it is characterized in that,
The digital certificate includes hypertext transfer protocol secure HTTPS certificates;
The Transaction Information includes at least one of transaction address, number of deals.
11. according to the method described in claim 4, it is characterized in that, the public key source includes the unified resource of the websites HTTPS
Finger URL URL.
12. a kind of device for realizing Transaction Information verification, which is characterized in that including encrypting module, be used for:Utilize digital certificate
Private key is encrypted Transaction Information to obtain Transaction Information encrypted result, to realize that Transaction Information is verified.
13. device according to claim 12, which is characterized in that further include data-interface, be used for:The transaction letter is provided
Encryption for information result.
14. device according to claim 13, which is characterized in that the data-interface is additionally operable to:The transaction letter is provided
Breath.
15. device according to claim 14, which is characterized in that the data-interface is additionally operable to:Public key source is provided.
16. device according to claim 15, which is characterized in that the encrypting module is additionally operable to:It is demonstrate,proved using the number
The private key of book is encrypted the public key source to obtain public key source encrypted result.
17. device according to claim 16, which is characterized in that the encrypting module is used for:It is sent out based on request or active
Play the encryption at least one of the Transaction Information, public key source.
18. device according to claim 16, which is characterized in that the data-interface is additionally operable to:The public key is provided
Source encrypted result.
19. device according to claim 17, which is characterized in that the data-interface is used for:Institute is directly or indirectly provided
State at least one of Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
20. device according to claim 19, which is characterized in that the data-interface is used for:It is provided by exchange intermediary
At least one of the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
21. device according to claim 12, which is characterized in that
The digital certificate includes HTTPS certificates;
The Transaction Information includes at least one of transaction address, number of deals.
22. device according to claim 15, which is characterized in that the public key source includes the URL of the websites HTTPS.
23. a kind of electronic equipment, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one processor, and described instruction is by least one place
When managing device execution, at least one processor perform claim is made to require 1-11 any one of them methods.
24. a kind of server, which is characterized in that include claim 12-22 any one of them devices.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810506405.0A CN108764867A (en) | 2018-05-24 | 2018-05-24 | A kind of method and apparatus for realizing Transaction Information verification |
PCT/CN2018/112025 WO2019223231A1 (en) | 2018-05-24 | 2018-10-26 | Method and device for realizing authentication of transaction information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810506405.0A CN108764867A (en) | 2018-05-24 | 2018-05-24 | A kind of method and apparatus for realizing Transaction Information verification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108764867A true CN108764867A (en) | 2018-11-06 |
Family
ID=64005304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810506405.0A Pending CN108764867A (en) | 2018-05-24 | 2018-05-24 | A kind of method and apparatus for realizing Transaction Information verification |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108764867A (en) |
WO (1) | WO2019223231A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019223276A1 (en) * | 2018-05-24 | 2019-11-28 | 赢威能源有限公司 | Method and device for realizing authentication of transaction information |
WO2019223231A1 (en) * | 2018-05-24 | 2019-11-28 | 赢威能源有限公司 | Method and device for realizing authentication of transaction information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150193772A1 (en) * | 2010-04-02 | 2015-07-09 | Isignthis Ltd | Methods and systems for verifying transactions |
CN106651331A (en) * | 2016-12-22 | 2017-05-10 | 飞天诚信科技股份有限公司 | Digital currency-based electronic transaction method and system |
CN107077674A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Transaction verification processing method and device and node equipment |
CN107911222A (en) * | 2017-11-21 | 2018-04-13 | 沃通电子认证服务有限公司 | Digital signature generation, verification method and its equipment and storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160189151A1 (en) * | 2014-12-31 | 2016-06-30 | Ebay Enterprise, Inc. | Distributed authentication for mobile devices |
US10026082B2 (en) * | 2015-05-21 | 2018-07-17 | Mastercard International Incorporated | Method and system for linkage of blockchain-based assets to fiat currency accounts |
CN107248994B (en) * | 2017-06-26 | 2020-08-14 | 联动优势科技有限公司 | Information sending method, processing method and device |
CN107528886B (en) * | 2017-07-25 | 2020-07-31 | 中国科学院计算技术研究所 | Block chain full-network splitting method and system |
CN108063752B (en) * | 2017-11-02 | 2020-05-08 | 暨南大学 | Credible gene detection and data sharing method based on block chain and agent re-encryption |
CN108764867A (en) * | 2018-05-24 | 2018-11-06 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verification |
-
2018
- 2018-05-24 CN CN201810506405.0A patent/CN108764867A/en active Pending
- 2018-10-26 WO PCT/CN2018/112025 patent/WO2019223231A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150193772A1 (en) * | 2010-04-02 | 2015-07-09 | Isignthis Ltd | Methods and systems for verifying transactions |
CN106651331A (en) * | 2016-12-22 | 2017-05-10 | 飞天诚信科技股份有限公司 | Digital currency-based electronic transaction method and system |
CN107077674A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Transaction verification processing method and device and node equipment |
CN107911222A (en) * | 2017-11-21 | 2018-04-13 | 沃通电子认证服务有限公司 | Digital signature generation, verification method and its equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019223276A1 (en) * | 2018-05-24 | 2019-11-28 | 赢威能源有限公司 | Method and device for realizing authentication of transaction information |
WO2019223231A1 (en) * | 2018-05-24 | 2019-11-28 | 赢威能源有限公司 | Method and device for realizing authentication of transaction information |
Also Published As
Publication number | Publication date |
---|---|
WO2019223231A1 (en) | 2019-11-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2017204769B2 (en) | Differential client-side encryption of information originating from a client | |
JP7351591B2 (en) | Multi-authorization system that uses M out of N keys to restore customer wallets | |
US10956901B2 (en) | Methods, apparatus and computer program products for securely accessing account data | |
US10410209B2 (en) | Electronic transaction system and method with participant authentication via separate authority from real-time payment validation | |
US20150348017A1 (en) | Method for integrating cryptocurrency transfer on a social network interface | |
CN106537432A (en) | Method and device for securing access to wallets in which cryptocurrencies are stored | |
EP1288829A1 (en) | Anonymous acquisition of digital products based on secret splitting | |
US20080104709A1 (en) | System and method for secure data storage | |
US20170093826A1 (en) | System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key | |
CN110049016A (en) | Data query method, apparatus, system, equipment and the storage medium of block chain | |
US20210097530A1 (en) | Block chain trading system and block chain trading method | |
CN110601855B (en) | Root certificate management method and device, electronic equipment and storage medium | |
US20230360040A1 (en) | Quantum-safe payment system | |
WO2021169767A1 (en) | Data processing method and apparatus, device and medium | |
CN111723060A (en) | Blacklist data sharing method and system based on block chain | |
CN105051769B (en) | It is used for transmission the method and system of data | |
US9756031B1 (en) | Portable access to auditing information | |
JP7156889B2 (en) | Payment processing method | |
KR102085997B1 (en) | Method and system for real estate transaction service based on block chain | |
CN108764867A (en) | A kind of method and apparatus for realizing Transaction Information verification | |
CN108846650A (en) | A kind of method and apparatus for realizing Transaction Information verifying | |
CN108764921A (en) | A kind of method and apparatus for realizing Transaction Information verification | |
CN114616563A (en) | Secure environment for encryption key generation | |
CN117494151A (en) | Improved memory system | |
US20200304317A1 (en) | Secure file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181106 |