CN108764921A - A kind of method and apparatus for realizing Transaction Information verification - Google Patents

A kind of method and apparatus for realizing Transaction Information verification Download PDF

Info

Publication number
CN108764921A
CN108764921A CN201810506808.5A CN201810506808A CN108764921A CN 108764921 A CN108764921 A CN 108764921A CN 201810506808 A CN201810506808 A CN 201810506808A CN 108764921 A CN108764921 A CN 108764921A
Authority
CN
China
Prior art keywords
public key
transaction information
key source
encrypted result
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810506808.5A
Other languages
Chinese (zh)
Inventor
李志波
张理
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Midoqi Technology Co ltd
Original Assignee
Beijing Bitmain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bitmain Technology Co Ltd filed Critical Beijing Bitmain Technology Co Ltd
Priority to CN201810506808.5A priority Critical patent/CN108764921A/en
Publication of CN108764921A publication Critical patent/CN108764921A/en
Priority to PCT/CN2018/117567 priority patent/WO2019223276A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

This application provides a kind of methods for realizing Transaction Information verification, including:The verification of Transaction Information is realized using digital certificate.Present invention also provides a kind of devices for realizing Transaction Information verification, are used for:The verification of Transaction Information is realized using digital certificate.Present invention also provides a kind of electronic equipment, including:At least one processor;And the memory being connect at least one processor communication;Wherein, the memory is stored with the instruction that can be executed by least one processor, when described instruction is executed by least one processor, at least one processor is made to execute the above-mentioned method for realizing Transaction Information verification.Present invention also provides a kind of servers, including the above-mentioned device for realizing Transaction Information verification.

Description

A kind of method and apparatus for realizing Transaction Information verification
Technical field
This application involves technical field of data processing, such as are related to a kind of method and apparatus for realizing Transaction Information verification.
Background technology
When be related to the transaction of digital cash, in order to verify the authenticity of Transaction Information (for example, transaction address etc.), One section of message decided through consultation in advance is usually encrypted based on the transaction address by the owner of the transaction address or initiates a payment.
Invention content
The embodiment of the present disclosure provides a kind of method for realizing Transaction Information verification, including:It is realized and is handed over using digital certificate The verification of easy information.
The embodiment of the present disclosure additionally provides a kind of device for realizing Transaction Information verification, is used for:It is realized using digital certificate The verification of Transaction Information.
The embodiment of the present disclosure additionally provides a kind of server, including the above-mentioned device for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of computer readable storage medium, is stored with computer executable instructions, institute It states computer executable instructions and is arranged to carry out the above-mentioned method for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of computer program product, and the computer program product includes being stored in meter Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted When calculation machine executes, the computer is made to execute the above-mentioned method for realizing Transaction Information verification.
The embodiment of the present disclosure additionally provides a kind of electronic equipment, including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one processor, and described instruction is by described at least one When a processor executes, at least one processor is made to execute the above-mentioned method for realizing Transaction Information verification.
Description of the drawings
One or more embodiments are illustrated by corresponding attached drawing, these exemplary illustrations and attached drawing The restriction to embodiment is not constituted, the element with same reference numbers label is expressed as similar element, attached drawing in attached drawing Composition does not limit, and wherein:
Fig. 1 is the method schematic diagram for realizing Transaction Information verification of the embodiment of the present disclosure;
Fig. 2 is the method schematic diagram that Transaction Information is encrypted of the embodiment of the present disclosure;
Fig. 3 is the method schematic diagram that public key source is encrypted of the embodiment of the present disclosure;
Fig. 4 is the method schematic diagram that Transaction Information encrypted result is decrypted of the embodiment of the present disclosure;
Fig. 5 is the method schematic diagram of the embodiment of the present disclosure verified to Transaction Information;
Fig. 6 is the method schematic diagram that public key source encrypted result is decrypted of the embodiment of the present disclosure;
Fig. 7 is the method schematic diagram of the embodiment of the present disclosure verified to public key source;
Fig. 8 is the schematic device for realizing Transaction Information verification of the embodiment of the present disclosure;
Fig. 9 is the schematic device that Transaction Information is encrypted of the embodiment of the present disclosure;
Figure 10 is the schematic device for providing Transaction Information encrypted result of the embodiment of the present disclosure;
Figure 11 is the schematic device that public key source is encrypted of the embodiment of the present disclosure;
Figure 12 is the schematic device for providing public key source encrypted result of the embodiment of the present disclosure;
Figure 13 is the schematic device that Transaction Information encrypted result is decrypted of the embodiment of the present disclosure;
Figure 14 is the schematic device of the reception Transaction Information encrypted result of the embodiment of the present disclosure;
Figure 15 is the schematic device of the embodiment of the present disclosure verified to Transaction Information;
Figure 16 is the schematic device that public key source encrypted result is decrypted of the embodiment of the present disclosure;
Figure 17 is the schematic device for receiving public key source encrypted result of the embodiment of the present disclosure;
Figure 18 is the schematic device of the embodiment of the present disclosure verified to public key source;
Figure 19 is the schematic device of the realization delivery operation of the embodiment of the present disclosure;And
Figure 20 is the structural schematic diagram of the electronic equipment of the embodiment of the present disclosure.
Reference numeral:
10:Realize the device of Transaction Information verification;20:Encrypting module;30:Data-interface;40:Deciphering module;50:Data connect Mouthful;60:Authentication module;70:Payment module.
Specific implementation mode
The characteristics of in order to more fully hereinafter understand the embodiment of the present disclosure and technology contents, below in conjunction with the accompanying drawings to this public affairs The realization for opening embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used for limiting the embodiment of the present disclosure. Technology below description in, for convenience of explanation for the sake of, disclosed embodiment is fully understood with providing by multiple details. However, in the case of without these details, one or more embodiments still can be implemented.In other cases, it is simplification Attached drawing, well known construction and device can simplify displaying.
Referring to Fig. 1, the embodiment of the present disclosure provides a kind of method for realizing Transaction Information verification, including:It is demonstrate,proved using number Book realizes the verification of Transaction Information.
It is described to realize that the verification of Transaction Information may include using digital certificate referring to Fig. 2:Utilize the digital certificate Private key is encrypted the Transaction Information to obtain Transaction Information encrypted result.
As one embodiment, the Transaction Information encrypted result can be provided.(application entity can be with for example, beneficiary It is gathering method, apparatus, such as the Website server etc. of beneficiary;Also same below) it can (application entity can be paid to paying party The terminal devices such as money method, apparatus, such as the client of paying party;Also same below) send the Transaction Information encrypted result.
As one embodiment, the Transaction Information can be provided.For example, beneficiary can send the friendship to paying party Easy information.
As one embodiment, public key source can be provided.Come for example, beneficiary can send the public key to paying party Source.
Referring to Fig. 3, the private key of the digital certificate can be utilized to be encrypted to obtain public key source to the public key source Encrypted result.
As one embodiment, the encryption carried out at least one of the Transaction Information, public key source can be based on Request or actively initiation.For example, beneficiary based on paying party or other it is third-party request to the Transaction Information, public key come At least one of source is encrypted;Or, beneficiary based on preset strategy, condition etc. actively to the Transaction Information, public key come At least one of source is encrypted.
As one embodiment, public key source encrypted result can be provided.For example, beneficiary can be sent out to paying party Send public key source encrypted result.
As one embodiment, the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key come At least one of source can directly or indirectly provide.For example, beneficiary can be directly or indirectly to described in paying party transmission At least one of Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
As one embodiment, the indirect offer may include being provided by exchange intermediary.For example, beneficiary can lead to Crossing business site, (application entity can be the equipment of business site, such as the Website server etc. of business site;Also same below) Equal exchange intermediaries send the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source to paying party At least one of.
It is described to realize that Transaction Information verification may include using digital certificate referring to Fig. 4:Utilize the public affairs of the digital certificate Key is decrypted to obtain the Transaction Information to the Transaction Information encrypted result that the Transaction Information obtains after encryption.
It can receive the Transaction Information before decrypting the Transaction Information encrypted result as one embodiment and add Close result.For example, paying party can receive the Transaction Information encrypted result from beneficiary;Or, paying party can pass through The modes such as active inquiry, request are from Transaction Information encrypted result described in beneficiary active obtaining.
As one embodiment, the Transaction Information can be received.For example, paying party can receive the institute from beneficiary State Transaction Information;Or, paying party can be by modes such as active inquiry, requests from Transaction Information described in beneficiary active obtaining.
Referring to Fig. 5, the Transaction Information that can be received described in and the obtained Transaction Information of decrypting are tested Card, triggers delivery operation after being verified.For example, paying party can utilize received from or be obtained from the transaction of beneficiary The Transaction Information that information and paying party are decrypted is verified, and delivery operation is triggered after being verified.
As one embodiment, the verification may include:The Transaction Information received described in comparison and the decryption Consistency between obtained Transaction Information, between the Transaction Information that the Transaction Information received and the decryption obtain Confirm when with uniformity and is verified.For example, paying party can compare received from or be obtained from the transaction letter of beneficiary Breath it is whether identical as the Transaction Information that paying party is decrypted, paying party received from or be obtained from beneficiary the transaction letter When breath is identical as the Transaction Information that paying party is decrypted, confirmation is verified.
Referring to Fig. 6, the public key of the digital certificate can be utilized to add the public key source that public key source obtains after encryption Close result is decrypted to obtain the public key source.
It can receive the public key source before decrypting public key source encrypted result as one embodiment and add Close result.For example, paying party can receive the public key source encrypted result from beneficiary;Or, paying party can pass through The modes such as active inquiry, request are from public key source encrypted result described in beneficiary active obtaining.
As one embodiment, the public key source can be received.For example, paying party can receive the institute from beneficiary State public key source;Or, paying party can be by modes such as active inquiry, requests from public key source described in beneficiary active obtaining.
As one embodiment, the public key can be obtained according to the public key source received.For example, paying party can In a manner of by reception, active request etc. from the public key source obtain (such as:Download) public key.
Referring to Fig. 7, the public key source and the obtained public key source of decrypting that can be received described in are tested Card, triggers delivery operation after being verified.For example, paying party can utilize received from or be obtained from the public key of beneficiary The public key source that source and paying party are decrypted is verified, and delivery operation is triggered after being verified.
As one embodiment, the verification may include:The public key source received described in comparison and the decryption Consistency between obtained public key source, between the public key source that the public key source received and the decryption obtain Confirm when with uniformity and is verified.For example, the public key that paying party can compare received from or be obtained from beneficiary comes Whether source identical as the public key source that paying party is decrypted, paying party received from or be obtained from beneficiary the transaction letter When breath is identical as the public key source that paying party is decrypted, confirmation is verified.
As one embodiment, the delivery operation may include payout figure currency.
As one embodiment, at least one of the Transaction Information encrypted result, public key source encrypted result are carried out Decryption can be based on request or actively initiate.For example, paying party is based on beneficiary or other third-party requests to institute At least one of Transaction Information encrypted result, public key source encrypted result is stated to be decrypted;Or, paying party is based on preset plan Summary, condition etc. are actively decrypted at least one of the Transaction Information encrypted result, public key source encrypted result.
As one embodiment, the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key come At least one of source can directly or indirectly receive.For example, paying party can directly or indirectly be received from beneficiary At least one of the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source.
As one embodiment, the indirectly receive may include being received by exchange intermediary.For example, paying party can lead to The exchange intermediaries such as business site are crossed to receive the Transaction Information encrypted result from beneficiary, public key source encrypted result, hand over At least one of easy information, public key source.
As one embodiment, the digital certificate may include hypertext transfer protocol secure (Hypertext Transfer Protocol Secure, HTTPS) certificate;Can also include Secure Socket Layer (Secure Socket Layer, SSL) certificate, secure transport layers (Transport Layer Security, TLS) certificate etc..
The Transaction Information may include transaction address (such as:Pay address;Also same below), number of deals (such as:Branch Pay number;At least one of also same below).
As one embodiment, the public key source may include the uniform resource locator (Uniform of the websites HTTPS Resource Locator, URL).
As one embodiment, the digital cash can be encryption currency.
Referring to Fig. 8, the embodiment of the present disclosure additionally provides a kind of device 10 for realizing Transaction Information verification, is used for:Utilize number Word certificate realizes the verification of Transaction Information.Described device 10 can be set to beneficiary (application entity can be gathering method, apparatus, Such as the Website server etc. of beneficiary;Also same below).
Referring to Fig. 9, described device 10 may include encrypting module 20, be used for:Using the private key of the digital certificate to institute Transaction Information is stated to be encrypted to obtain Transaction Information encrypted result.
Referring to Figure 10, described device 10 can also include data-interface 30, be used for:The Transaction Information encryption knot is provided Fruit.For example, data-interface 30 can send the Transaction Information encrypted result to paying party.
The data-interface 30 can be also used for providing the Transaction Information.For example, data-interface 30 can be to paying party Send the Transaction Information.
The data-interface 30 can be also used for providing public key source.For example, data-interface 30 can be sent to paying party The public key source.
Referring to Figure 11, the encrypting module 20 can be used for:Using the private key of the digital certificate to the public key source It is encrypted to obtain public key source encrypted result.
As one embodiment, the encrypting module 20 can be used for:It initiates to believe the transaction based on request or active The encryption of at least one of breath, public key source.For example, encrypting module 20 is based on paying party or other third-party requests to described At least one of Transaction Information, public key source are encrypted;Or, encrypting module 20 is actively right based on preset strategy, condition etc. At least one of the Transaction Information, public key source are encrypted.
Referring to Figure 12, the data-interface 30 can be used for:Public key source encrypted result is provided.For example, data connect Mouth 30 can send public key source encrypted result to paying party.
As one embodiment, the data-interface 30 can be used for:The Transaction Information encryption is directly or indirectly provided As a result, at least one of public key source encrypted result, Transaction Information, public key source.Such as:Data-interface 30 can directly or Connect to paying party send in the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source at least it One.
As one embodiment, the data-interface 30 can be used for:The Transaction Information is provided by exchange intermediary to add At least one of close result, public key source encrypted result, Transaction Information, public key source.For example, data-interface 30 can pass through friendship The exchange intermediaries such as easy website send the Transaction Information encrypted result, public key source encrypted result, Transaction Information, public affairs to paying party At least one of key source.
Referring to Figure 13, described device 10 may include deciphering module 40, be used for:Using the public key of the digital certificate to institute The Transaction Information encrypted result that Transaction Information obtains after encryption is stated to be decrypted to obtain the Transaction Information.
Referring to Figure 14, described device 10 may include data-interface 50, be used for:Decrypting the Transaction Information encrypted result Before, the Transaction Information encrypted result is received.For example, data-interface 50 can receive the Transaction Information from beneficiary Encrypted result;Or, data-interface 50 can be by modes such as active inquiry, requests from Transaction Information described in beneficiary active obtaining Encrypted result.
As one embodiment, the data-interface 50 can be used for:Receive the Transaction Information.For example, data-interface 50 can receive the Transaction Information from beneficiary;Or, data-interface 50 can by the modes such as active inquiry, request from Transaction Information described in beneficiary active obtaining.
Referring to Figure 15, described device 10 may include authentication module 60, be used for:Using the Transaction Information received with And the obtained Transaction Information of decrypting is verified, and delivery operation is triggered after being verified.For example, authentication module 60 can be with Using received from or be obtained from the Transaction Information of beneficiary and Transaction Information that paying party is decrypted is verified, Delivery operation is triggered after being verified.
As one embodiment, the authentication module 60 can be used for:The Transaction Information received described in comparison and institute The consistency between the Transaction Information that decryption obtains is stated, in the Transaction Information received and the transaction letter decrypted and obtained Confirm when with uniformity between breath and is verified.For example, authentication module 60 can compare received from or be obtained from beneficiary Whether the Transaction Information decrypts that obtained Transaction Information is identical with deciphering module 40, received from or be obtained from the institute of beneficiary State Transaction Information and deciphering module 40 decrypt obtained Transaction Information it is identical when, confirmation is verified.
Referring to Figure 16, the deciphering module 40 can be used for:Public key source is being added using the public key of the digital certificate The public key source encrypted result obtained after close is decrypted to obtain the public key source.
Figure 17 is participated in, the data-interface 50 can be used for:Before decrypting public key source encrypted result, institute is received State public key source encrypted result.For example, data-interface 50 can receive the public key source encrypted result from beneficiary; Or, data-interface 50 can be by modes such as active inquiry, requests from public key source encrypted result described in beneficiary active obtaining.
As one embodiment, the data-interface 50 can be used for:Receive the public key source.For example, data-interface 50 can receive the public key source from beneficiary;Or, data-interface 50 can by the modes such as active inquiry, request from Public key source described in beneficiary active obtaining.
As one embodiment, the data-interface 50 can be used for:Institute is obtained according to the public key source received State public key.For example, data-interface 50 can be obtained from the public key source by modes such as reception, active requests (such as:Under Carry) public key.
Referring to Figure 18, the authentication module 60 can be used for:Utilize the public key source received and the decryption Obtained public key source is verified, and delivery operation is triggered after being verified.For example, authentication module 60 can utilize received from Or it is obtained from the public key source of beneficiary and deciphering module 40 is decrypted obtained public key source and verified, it is logical in verification Later delivery operation is triggered.
As one embodiment, the authentication module 60 can be used for:The public key source received described in comparison and institute The consistency between the public key source that decryption obtains is stated, is come in the public key source received and the obtained public key of decrypting Confirm when with uniformity between source and is verified.For example, authentication module 60 can compare received from or be obtained from beneficiary Whether the public key source decrypts that obtained public key source is identical with deciphering module 40, received from or be obtained from the institute of beneficiary State Transaction Information and deciphering module 40 decrypt obtained public key source it is identical when, confirmation is verified.
Figure 19 is participated in, described device 10 may include payment module 70, be used for:It is held according to the triggering of the authentication module 60 Row delivery operation.
As one embodiment, the payment module 70 can be used for:Payout figure currency.
As one embodiment, the deciphering module 40 can be used for:It initiates to believe the transaction based on request or active The decryption that at least one of encryption for information result, public key source encrypted result carry out.For example, deciphering module 40 be based on beneficiary or its He is decrypted at least one of the Transaction Information encrypted result, public key source encrypted result third-party request;Or, solution Close module 40 be based on the active such as preset strategy, condition in the Transaction Information encrypted result, public key source encrypted result extremely It is one of few to be decrypted.
As one embodiment, the data-interface 50 can be used for:Directly or indirectly receive the Transaction Information encryption As a result, at least one of public key source encrypted result, Transaction Information, public key source.For example, data-interface 50 can directly or It receives in the Transaction Information encrypted result from beneficiary, public key source encrypted result, Transaction Information, public key source extremely It is one of few.
As one embodiment, the data-interface 50 can be used for:The Transaction Information is received by exchange intermediary to add At least one of close result, public key source encrypted result, Transaction Information, public key source.For example, data-interface 50 can pass through friendship The exchange intermediaries such as easy website receive the Transaction Information encrypted result from beneficiary, public key source encrypted result, transaction letter At least one of breath, public key source.
As one embodiment, the digital certificate may include HTTPS certificates;Can also include SSL certificate, TLS cards Book etc..
The Transaction Information may include at least one of transaction address, number of deals.
As one embodiment, the public key source may include the URL of the websites HTTPS.
As one embodiment, the digital cash can be encryption currency.
Above-mentioned public key can be by the cachings such as paying party and other third parties.
Above-mentioned various data (such as:Transaction Information encrypted result, public key source encrypted result, Transaction Information, public key source Deng) offer, acquisition, encryption, decryption etc., can also be to be realized by other approach such as third parties.
The embodiment of the present disclosure additionally provides a kind of server, includes the device for realizing Transaction Information verification of above-described embodiment 10, such as:Including at least one of encrypting module 20, data-interface 30, or include deciphering module 40, data-interface 50, verification At least one of module 60, payment module 70.
The embodiment of the present disclosure additionally provides a kind of computer readable storage medium, is stored with computer executable instructions, institute The method for realizing Transaction Information verification that computer executable instructions are arranged to carry out above-described embodiment is stated, such as:With encryption mould The relevant method of at least one of block 20, data-interface 30, or with deciphering module 40, data-interface 50, authentication module 60, payment The relevant method of at least one of module 70.
The embodiment of the present disclosure additionally provides a kind of computer program product, and the computer program product includes being stored in meter Computer program on calculation machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is counted When calculation machine executes, the computer is made to execute the method for realizing Transaction Information verification of above-described embodiment, such as:With encrypting module 20, the relevant method of at least one of data-interface 30, or with deciphering module 40, data-interface 50, authentication module 60, payment mould The relevant method of at least one of block 70.
Above-mentioned computer readable storage medium can be transitory computer readable storage medium, can also be non-transient meter Calculation machine readable storage medium storing program for executing.
The embodiment of the present disclosure additionally provides a kind of electronic equipment, and structure is as shown in figure 20, which includes:
In 201, Figure 20 of at least one processor (processor) by taking a processor 201 as an example;And memory (memory) 202, can also include communication interface (Communication Interface) 203 and bus 204.Wherein, it handles Device 201, communication interface 203, memory 202 can complete mutual communication by bus 204.Communication interface 203 can be used It is transmitted in information.Processor 201 can call the logical order in memory 202, and the realization to execute above-described embodiment is merchandised The method of Information Authentication, such as:With the relevant method of at least one of encrypting module 20, data-interface 30, or and deciphering module 40, the relevant method of at least one of data-interface 50, authentication module 60, payment module 70.
In addition, the logical order in above-mentioned memory 202 can be realized and be used as by the form of SFU software functional unit Independent product sale in use, can be stored in a computer read/write memory medium.
Memory 202 is used as a kind of computer readable storage medium, can be used for storing software program, computer can perform journey Sequence, such as the corresponding program instruction/module of the method in the embodiment of the present disclosure.Processor 201 is stored in memory 202 by operation In software program, instruction and module, to execute application of function and data processing, that is, realize above method embodiment in Realize Transaction Information verification method, such as:With the relevant method of at least one of encrypting module 20, data-interface 30, or With the relevant method of at least one of deciphering module 40, data-interface 50, authentication module 60, payment module 70.
Memory 202 may include storing program area and storage data field, wherein storing program area can storage program area, Application program needed at least one function;Storage data field can be stored uses created data etc. according to terminal device. In addition, memory 202 may include high-speed random access memory, can also include nonvolatile memory.
The scheme for realizing Transaction Information verification of the embodiment of the present disclosure improves safety and the effect of Transaction Information verification Rate.
The technical solution of the embodiment of the present disclosure can be expressed in the form of software products, which deposits Storage in a storage medium, including one or more instruction is used so that computer equipment (can be personal computer, Server or the network equipment etc.) execute embodiment of the present disclosure the method all or part of step.And storage above-mentioned is situated between Matter can be non-transient storage media, including:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), with Machine accesses a variety of Jie that can store program code such as memory (RAM, Random Access Memory), magnetic disc or CD Matter can also be transitory memory medium.
When in for the application, although term " first ", " second " etc. may be used in this application to describe respectively Element, but these elements should not be limited by these terms.These terms are only used to by an element and another element region It does not open.For example, in the case where not changing the meaning of description, first element can be called second element, and same, second Element can be called first element, as long as " first element " occurred consistent renaming and occurred " second yuan The consistent renaming of part ".First element and second element are all elements, but can not be identical element.
Word used herein is only used for description embodiment and is not used in limitation claim.Such as embodiment with And used in the description of claim, unless context clearly illustrates, otherwise "one" (a) of singulative, "one" (an) and " described " (the) is intended to include equally plural form.Similarly, term "and/or" as used in this specification It includes one or more associated any and all possible combinations listed to refer to.In addition, when being used for the application When middle, term " comprising " (comprise) and its modification " comprising " (comprises) and/or refer to including (comprising) etc. old The presence of feature, entirety, step, operation, element and/or the component stated, but be not excluded for one or more other features, Entirety, step, operation, element, component and/or the presence or addition of these grouping.
Various aspects, embodiment, realization or feature in described embodiment can be used alone or in any combination Mode use.Various aspects in described embodiment being implemented in combination with by software, hardware or software and hardware.Described reality Applying example can also be embodied by the computer-readable medium for being stored with computer-readable code, which includes can be by The instruction that at least one computing device executes.The computer-readable medium can be filled with any data-storable data storage Set associated, which can be read by computer system.Computer-readable medium for citing may include read-only memory, Random access memory, CD-ROM, HDD, DVD, tape and optical data storage devices etc..The computer-readable medium may be used also To be distributed in the computer system by net connection, such computer-readable code distributed storage and can execute.
Above-mentioned technology description can refer to attached drawing, these attached drawings form the part of the application, and by describing attached The embodiment according to described embodiment is shown in figure.Although the description of these embodiments is enough in detail so that this field Technical staff can realize these embodiments, but these embodiments are non-limiting;Other implement can thus be used Example, and variation can also be made in the case where not departing from the range of described embodiment.For example, described in flow chart Operation order be non-limiting, therefore in flow charts illustrate and according to flow chart description two or more behaviour The sequence of work can be changed according to several embodiments.As another example, in several embodiments, it explains in flow charts It releases and is optional or deletable according to one or more operations that flow chart describes.In addition, certain steps or Function can be added in the disclosed embodiments or more than two sequence of steps are replaced.All these variations are considered Included in the disclosed embodiments and claim.
In addition, using term to provide the thorough understanding of described embodiment in above-mentioned technology description.However, and being not required to Will excessively detailed details to realize described embodiment.Therefore, the foregoing description of embodiment be in order to illustrate and describe and It presents.The embodiment and example disclosed according to these embodiments presented in foregoing description is provided separately, with Addition context simultaneously helps to understand described embodiment.Description above, which is not used in, accomplishes exhaustive or by described reality Apply the precise forms that example is restricted to the disclosure.According to the above instruction, it is several modification, selection be applicable in and variation be feasible.? In some cases, processing step well known is not described in avoid described embodiment is unnecessarily influenced.

Claims (39)

1. a kind of method for realizing Transaction Information verification, which is characterized in that including:Testing for Transaction Information is realized using digital certificate Card.
2. according to the method described in claim 1, it is characterized in that, the verification packet for realizing Transaction Information using digital certificate It includes:The Transaction Information is encrypted using the private key of the digital certificate to obtain Transaction Information encrypted result.
3. according to the method described in claim 2, it is characterized in that, further including:The Transaction Information encrypted result is provided.
4. according to the method in claim 2 or 3, which is characterized in that further include:The Transaction Information is provided.
5. according to the method described in claim 4, it is characterized in that, further including:Public key source is provided.
6. according to the method described in claim 5, it is characterized in that, further including:Using the private key of the digital certificate to described Public key source is encrypted to obtain public key source encrypted result.
7. according to the method described in claim 6, it is characterized in that, further including:Public key source encrypted result is provided.
8. according to the method described in claim 1, it is characterized in that, described realize Transaction Information verification packet using digital certificate It includes:The Transaction Information encrypted result that the Transaction Information obtains after encryption is decrypted using the public key of the digital certificate Obtain the Transaction Information.
9. according to the method described in claim 8, it is characterized in that, before decrypting the Transaction Information encrypted result, also wrap It includes:Receive the Transaction Information encrypted result.
10. method according to claim 8 or claim 9, which is characterized in that further include:Receive the Transaction Information.
11. according to the method described in claim 10, it is characterized in that, further including:Using the Transaction Information received with And the obtained Transaction Information of decrypting is verified, and delivery operation is triggered after being verified.
12. according to the method for claim 11, which is characterized in that further include:Using the public key of the digital certificate to public affairs The public key source encrypted result that key source obtains after encryption is decrypted to obtain the public key source.
13. according to the method for claim 12, which is characterized in that before decrypting public key source encrypted result, also Including:Receive public key source encrypted result.
14. method according to claim 12 or 13, which is characterized in that further include:Receive the public key source.
15. according to the method for claim 14, which is characterized in that further include:It is obtained according to the public key source received Take the public key.
16. according to the method for claim 14, which is characterized in that further include:Using the public key source received with And the obtained public key source of decrypting is verified, and delivery operation is triggered after being verified.
17. the method according to claim 1 or 8, which is characterized in that
The digital certificate includes hypertext transfer protocol secure HTTPS certificates;
The Transaction Information includes at least one of transaction address, number of deals.
18. the method according to claim 5 or 12, which is characterized in that the public key source includes the unification of the websites HTTPS Resource Locator URL.
19. a kind of device for realizing Transaction Information verification, which is characterized in that be used for:Transaction Information is realized using digital certificate Verification.
20. device according to claim 19, which is characterized in that described device includes encrypting module, is used for:Using described The private key of digital certificate is encrypted the Transaction Information to obtain Transaction Information encrypted result.
21. device according to claim 20, which is characterized in that further include data-interface, be used for:The transaction letter is provided Encryption for information result.
22. device according to claim 21, which is characterized in that the data-interface is additionally operable to:The transaction letter is provided Breath.
23. device according to claim 22, which is characterized in that the data-interface is additionally operable to:Public key source is provided.
24. device according to claim 23, which is characterized in that the encrypting module is additionally operable to:It is demonstrate,proved using the number The private key of book is encrypted the public key source to obtain public key source encrypted result.
25. device according to claim 24, which is characterized in that the data-interface is additionally operable to:The public key is provided Source encrypted result.
26. device according to claim 19, which is characterized in that described device includes deciphering module, is used for:Using described The public key of digital certificate is decrypted to obtain the friendship to the Transaction Information encrypted result that the Transaction Information obtains after encryption Easy information.
27. device according to claim 26, which is characterized in that further include data-interface, be used for:Decrypting the transaction Before information encrypted result, the Transaction Information encrypted result is received.
28. device according to claim 27, which is characterized in that the data-interface is additionally operable to:Receive the transaction letter Breath.
29. device according to claim 28, which is characterized in that further include authentication module, be used for:It is received using described Transaction Information and the obtained Transaction Information decrypted verified, delivery operation is triggered after being verified.
30. device according to claim 29, which is characterized in that the deciphering module is additionally operable to:It is demonstrate,proved using the number The public key of book is decrypted to obtain the public key source to the public key source encrypted result that public key source obtains after encryption.
31. device according to claim 30, which is characterized in that the data-interface is additionally operable to:Decrypting the public key Before the encrypted result of source, public key source encrypted result is received.
32. the device according to claim 30 or 31, which is characterized in that the data-interface is additionally operable to:Receive the public affairs Key source.
33. device according to claim 32, which is characterized in that the data-interface is additionally operable to:It is received according to described Public key source obtain the public key.
34. device according to claim 32, which is characterized in that the authentication module is additionally operable to:It is received using described Public key source and the obtained public key source of decrypting verified, delivery operation is triggered after being verified.
35. the device according to claim 29 or 34, which is characterized in that further include payment module, be used for:It is tested according to described The triggering for demonstrate,proving module executes delivery operation.
36. the device according to claim 19 or 26, which is characterized in that
The digital certificate includes HTTPS certificates;
The Transaction Information includes at least one of transaction address, number of deals.
37. the device according to claim 23 or 30, which is characterized in that the public key source includes the websites HTTPS URL。
38. a kind of electronic equipment, which is characterized in that including:
At least one processor;And
The memory being connect at least one processor communication;Wherein,
The memory is stored with the instruction that can be executed by least one processor, and described instruction is by least one place When managing device execution, make at least one processor perform claim that any one of 1-7,17-18 or claim 1,8-18 be required to appoint Method described in one.
39. a kind of server, which is characterized in that include any one of claim 19-25,36-37 or claim 19,26-37 Any one of them device.
CN201810506808.5A 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification Pending CN108764921A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810506808.5A CN108764921A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification
PCT/CN2018/117567 WO2019223276A1 (en) 2018-05-24 2018-11-27 Method and device for realizing authentication of transaction information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810506808.5A CN108764921A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification

Publications (1)

Publication Number Publication Date
CN108764921A true CN108764921A (en) 2018-11-06

Family

ID=64005374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810506808.5A Pending CN108764921A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification

Country Status (2)

Country Link
CN (1) CN108764921A (en)
WO (1) WO2019223276A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019223276A1 (en) * 2018-05-24 2019-11-28 赢威能源有限公司 Method and device for realizing authentication of transaction information

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008046246A1 (en) * 2006-10-18 2008-04-24 Kamfu Wong System and method for preventing spam by using pay-charge-contribution and authentication means
US20090183000A1 (en) * 2008-01-16 2009-07-16 Scott Krig Method And System For Dynamically Granting A DRM License Using A URL
CN102812480A (en) * 2010-04-02 2012-12-05 艾赛尼斯有限公司 Methods and systems for verifying transactions
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN107911222A (en) * 2017-11-21 2018-04-13 沃通电子认证服务有限公司 Digital signature generation, verification method and its equipment and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609841B (en) * 2012-01-13 2015-02-25 东北大学 Remote mobile payment system based on digital certificate and payment method
CN104182876B (en) * 2013-05-24 2018-08-03 中国电信股份有限公司 Secure payment transactions method and system
US9838205B2 (en) * 2014-09-16 2017-12-05 Keypasco Ab Network authentication method for secure electronic transactions
CN108846650A (en) * 2018-05-24 2018-11-20 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verifying
CN108764867A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification
CN108764921A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008046246A1 (en) * 2006-10-18 2008-04-24 Kamfu Wong System and method for preventing spam by using pay-charge-contribution and authentication means
US20090183000A1 (en) * 2008-01-16 2009-07-16 Scott Krig Method And System For Dynamically Granting A DRM License Using A URL
CN102812480A (en) * 2010-04-02 2012-12-05 艾赛尼斯有限公司 Methods and systems for verifying transactions
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN107911222A (en) * 2017-11-21 2018-04-13 沃通电子认证服务有限公司 Digital signature generation, verification method and its equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019223276A1 (en) * 2018-05-24 2019-11-28 赢威能源有限公司 Method and device for realizing authentication of transaction information

Also Published As

Publication number Publication date
WO2019223276A1 (en) 2019-11-28

Similar Documents

Publication Publication Date Title
AU2017204769B2 (en) Differential client-side encryption of information originating from a client
US10410209B2 (en) Electronic transaction system and method with participant authentication via separate authority from real-time payment validation
JP6838000B2 (en) Obfuscation of intentions in transactions using cryptographic techniques
US20150348017A1 (en) Method for integrating cryptocurrency transfer on a social network interface
CN110089087A (en) The across a network secure data of sensitive data absorbs
US10523644B2 (en) System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key
CN106537432A (en) Method and device for securing access to wallets in which cryptocurrencies are stored
CN106998331A (en) The implementation of secure communication in support system
CN105407097B (en) Based on third-party data furnishing method and device
CN110326267A (en) Network security with Alternative digital certificate
CN107370595A (en) One kind is based on fine-grained ciphertext access control method
CN110601855B (en) Root certificate management method and device, electronic equipment and storage medium
CN111723060B (en) Blacklist data sharing method and system based on blockchain
CN109792446A (en) Transient state trading server
US20220407729A1 (en) Data processing method and apparatus, device, and medium
CN105051769B (en) It is used for transmission the method and system of data
EP3446436A1 (en) Method for obtaining a security token by a mobile terminal
US20180152429A1 (en) Systems and methods for publicly verifiable authorization
CN108764867A (en) A kind of method and apparatus for realizing Transaction Information verification
JP7156889B2 (en) Payment processing method
CN108846650A (en) A kind of method and apparatus for realizing Transaction Information verifying
JP2013250937A (en) Communication device, communication system and communication method
CN108764921A (en) A kind of method and apparatus for realizing Transaction Information verification
CN117494151A (en) Improved memory system
US20200304317A1 (en) Secure file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200903

Address after: 3a17, 4th floor, building 20, Aobei science and Technology Park, Haidian District, Beijing 100192

Applicant after: Beijing midoqi Technology Co.,Ltd.

Address before: 100192 2 floor, building 25, North Science Park, Haidian District, Beijing.

Applicant before: BITMAIN TECHNOLOGIES Inc.

RJ01 Rejection of invention patent application after publication

Application publication date: 20181106