CN109064169B - Transaction method, apparatus and storage medium - Google Patents

Transaction method, apparatus and storage medium Download PDF

Info

Publication number
CN109064169B
CN109064169B CN201810767552.3A CN201810767552A CN109064169B CN 109064169 B CN109064169 B CN 109064169B CN 201810767552 A CN201810767552 A CN 201810767552A CN 109064169 B CN109064169 B CN 109064169B
Authority
CN
China
Prior art keywords
random number
contract
request information
hash value
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810767552.3A
Other languages
Chinese (zh)
Other versions
CN109064169A (en
Inventor
吴思进
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201810767552.3A priority Critical patent/CN109064169B/en
Publication of CN109064169A publication Critical patent/CN109064169A/en
Application granted granted Critical
Publication of CN109064169B publication Critical patent/CN109064169B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention provides a transaction method, equipment and a storage medium, wherein the method comprises the following steps: generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first block chain so as to generate a first contract on the first block chain; acquiring a plurality of first hash values; wherein, the first hash value is the hash value of the first random number; generating a second hash value according to the second random number and the plurality of first hash values; sending a second random number and a plurality of first hash values to the first contract to trigger the first contract to enter a verification state; sending a second random number to the first contract for the first contract to verify, and locking the cryptocurrency of the request transaction through a second hash value after the first contract passes the verification; the cryptocurrency is unlocked and issued to the holder after the identity of the holder of the first random number is verified by the first contract, and the payment receiving request information is generated according to the first random number. The invention can authenticate the identity without signature, thereby shortening the transaction time.

Description

Transaction method, apparatus and storage medium
Technical Field
The application relates to the technical field of internet finance, in particular to a transaction method, equipment and a storage medium.
Background
Currently, in a blockchain system, a method for performing signature verification by using a public and private key pair is generally adopted for identity authentication. For example, when a user A sends information which needs to pass identity authentication, the information needs to be signed by a held private key to generate signature information, the information and the signature information are sent to an authentication node, after the authentication node receives plaintext information and the signature information, the public key of the user A needs to be acquired, the signature information is decrypted and compared with the plaintext information for verification, and identity authentication is finally completed.
In the identity authentication process, time consumption is long due to the fact that encryption and decryption of an asymmetric encryption algorithm are complex, and multiple times of signature verification are usually needed when one transaction is conducted in a block chain system, so that the transaction time consumption is long.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a transaction method, device and storage medium that can authenticate an identity by performing signature authentication only once when initiating a transaction, thereby reducing transaction time.
In a first aspect, the present invention provides a transaction method applicable to a payment terminal, including:
generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first block chain so as to generate a first contract on the first block chain;
acquiring a plurality of first hash values; wherein, the first hash value is the hash value of the first random number;
generating a second hash value according to the second random number and the plurality of first hash values;
sending a second random number and a plurality of first hash values to the first contract to trigger the first contract to enter a verification state;
sending a second random number to the first contract for the first contract to verify, and locking the cryptocurrency of the transaction request information request transaction through a second hash value after the first contract passes the verification;
the encrypted currency is unlocked and issued to the holder after the first contract verifies that the holder identity of the first random number is correct according to the received money receiving request information, and the money receiving request information is generated according to the first random number.
In a second aspect, the present invention provides a transaction method suitable for a payment terminal, including:
generating a first random number and a first hash value; wherein, the first hash value is the hash value of the first random number;
sending a first hash value to a payment terminal so that the payment terminal can generate a second hash value according to a second random number and a plurality of acquired first hash values, sending the second random number and the first hash values to a first contract to trigger the first contract to enter a verification state, sending the second random number to the first contract so that the first contract can be verified, and locking encryption currency of a transaction request information request transaction through the second hash value after the verification is passed; generating, by the payment terminal, signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first blockchain to be generated on the first blockchain;
and generating collection request information according to the first random number and sending the collection request information to the first contract, so that the first contract unlocks and releases the encryption currency after verifying that the identity of the holder of the first random number is correct according to the collection request information.
In a third aspect, the present invention provides a transaction method applicable to a blockchain node, including:
receiving signed transaction request information sent by a payment terminal, and generating a first contract on a first block chain according to the transaction request information; wherein, the transaction request information is generated according to the second random number;
receiving a second random number and a plurality of first hash values sent by the payment terminal, and triggering a first contract to enter a verification state according to the second random number and the first hash values; the payment terminal acquires a plurality of first hash values, wherein the first hash values are generated by the payment terminal according to a first random number and a plurality of acquired first hash values;
receiving a second random number sent by the payment terminal, verifying through the first contract, and locking the encrypted currency of the transaction request information request transaction through a second hash value after the verification is passed;
receiving collection request information, and unlocking and issuing the encrypted currency to the holder after verifying that the holder of the first random number has no error according to the collection request information; wherein the receipt request information is generated based on the first random number.
In a fourth aspect, the present invention provides another transaction method applicable to a payment terminal, including:
generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first block chain so as to generate a first contract on the first block chain;
acquiring a plurality of addresses;
generating a second hash value according to the second random number and the plurality of addresses;
sending a second random number and a plurality of first hash values to the first contract to trigger the first contract to enter a verification state;
sending a second random number to the first contract for the first contract to verify, and locking the cryptocurrency of the transaction request information request transaction through a second hash value after the first contract passes the verification;
and the encrypted currency is unlocked and transferred to the address after the first contract verifies that the address for receiving the currency is correct according to the received collection request information.
In a fifth aspect, the present invention provides another transaction method suitable for a payment receiving terminal, including:
sending an address to a payment terminal so that the payment terminal generates a second hash value according to a second random number and the obtained addresses, sending the second random number and the first hash values to a first contract to trigger the first contract to enter a verification state, sending the second random number to the first contract for verification of the first contract, and locking the encrypted currency of the transaction request information request transaction through the second hash value after the verification is passed; generating, by the payment terminal, signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first blockchain to be generated on the first blockchain;
and generating a money receiving request message according to the address and sending the money receiving request message to the first contract so that the first contract unlocks the encrypted currency and transfers the encrypted currency to the address after verifying that the received address is correct.
In a sixth aspect, the present invention provides another transaction method for a blockchain node, including:
receiving signed transaction request information sent by a payment terminal, and generating a first contract on a first block chain according to the transaction request information; wherein, the transaction request information is generated according to the second random number;
receiving a second random number and a plurality of addresses sent by the payment terminal, and triggering a first contract to enter a verification state according to the second random number and the plurality of addresses; the payment terminal acquires a plurality of addresses, wherein the second hash value is generated by the payment terminal according to a second random number and the acquired addresses, and the first hash value is the hash value of the first random number;
receiving a second random number sent by the payment terminal, verifying through the first contract, and locking the encrypted currency of the transaction request information request transaction through a second hash value after the verification is passed;
and receiving the money receiving request information, verifying that the address for receiving the money is correct according to the money receiving request information, unlocking the encrypted money and transferring the money to the address.
In a seventh aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a transaction method provided according to embodiments of the present invention.
In an eighth aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute a transaction method provided according to embodiments of the present invention.
In the transaction method, the transaction device and the transaction storage medium provided by the embodiments of the invention, after a transaction is initiated by a signature, the encrypted asset to be transacted is locked by configuring the second hash value generated by the second random number and the identity verification information provided by the payee, so that the intelligent contract on the block chain can rapidly verify the identity of the payer through the second random number provided by the payer without performing signature verification for many times, the identity can be authenticated only by performing signature verification once when the transaction is initiated, and the transaction time is shortened;
the transaction method, the device and the storage medium provided by some embodiments of the invention generate the identity verification information of the payee in a hash locking mode, and the payee can be unlocked only by providing the first random number to the intelligent contract, thereby providing convenience for the flexibility of the transaction;
the transaction method, the device and the storage medium provided by some embodiments of the present invention further configure the first random number to be generated according to the signature information of the payee, and configure the freeze period for unlocking, so that the payee can send signature information to the intelligent contract within the freeze period when the first random number is stolen, so as to verify the identity of the payee and revoke the operations of unlocking and issuing, thereby further providing security guarantee for the payee;
the transaction method, the device and the storage medium provided by some embodiments of the present invention further configure the first random number as an address or a public key of a payee, thereby designating a fixed payee address, and guaranteeing the security of the transaction while sacrificing the flexibility of the transaction;
the transaction method, the device and the storage medium provided by some embodiments of the present invention further enhance the security and convenience of the transaction by designating the corresponding payee address and/or refund address when generating the second hash value;
the transaction method, the device and the storage medium provided by some embodiments of the invention ensure the security of the transaction by configuring the payee address as the identity verification information of the payee.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic diagram of a transaction scenario according to an embodiment of the present invention.
Fig. 2 is a flowchart of a transaction method applicable to a payment terminal according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a transaction scenario according to a preferred embodiment of the present invention.
Fig. 4 is a schematic diagram of a transaction scenario according to another preferred embodiment of the present invention.
Fig. 5 is a flowchart of a transaction method applicable to a payment receiving terminal according to an embodiment of the present invention.
FIG. 6 is a flow chart of a preferred embodiment of the method shown in FIG. 5.
Fig. 7 is a flowchart of a transaction method applicable to a blockchain node according to an embodiment of the present invention.
Fig. 8 is a flowchart of step S35 in a preferred embodiment of the method shown in fig. 7.
Fig. 9 is a flowchart of another transaction method applicable to a payment terminal according to an embodiment of the present invention.
Fig. 10 is a flowchart of another transaction method suitable for a checkout terminal according to an embodiment of the present invention.
Fig. 11 is a flowchart of another transaction method applicable to a blockchain node according to an embodiment of the present invention.
Fig. 12 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a schematic diagram of a transaction scenario according to an embodiment of the present invention. Fig. 2 is a flowchart of a transaction method applicable to a payment terminal according to an embodiment of the present invention.
As shown in fig. 1 and fig. 2, in the present embodiment, the present invention provides a transaction method suitable for a payment terminal, including:
s11: generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first block chain so as to generate a first contract on the first block chain;
s13: acquiring a plurality of first hash values; wherein, the first hash value is the hash value of the first random number;
s15: generating a second hash value according to the second random number and the plurality of first hash values;
s17: sending a second random number and a plurality of first hash values to the first contract to trigger the first contract to enter a verification state;
s19: sending a second random number to the first contract for the first contract to verify, and locking the cryptocurrency of the transaction request information request transaction through a second hash value after the first contract passes the verification;
the encrypted currency is unlocked and issued to the holder after the first contract verifies that the holder identity of the first random number is correct according to the received money receiving request information, and the money receiving request information is generated according to the first random number.
Specifically, in the scenario shown in fig. 1, the user a pays 10 first cryptocurrency xxx to the user b as an example:
in step S11, the payment terminal 100 of the user a generates a second random number r2And packaging the transaction request information sign (10xxx, hash (r) to generate a signature2),T1) Wherein, T1For the transaction category parameter, used to trigger the contract for the transaction of the corresponding category, the payment terminal 100 sends the transaction request information to the node 301 of the first blockchain, thereby triggering the generation of the contract corresponding to T on the first blockchain1A first contract for a category.
The receipt terminal 200 of the user b generates a first random number r1And a first hash value H1=hash(r1) And the first hash value H1To the payment terminal 100 of the user a.
In step S13, the payment terminal 100 of the user a receives the first hash value H1. In this embodiment, the user a only pays the user b and does not make change, so only one first hash value is obtained; in other embodiments, the first user pays for multiple users at the same time, or needs to make a change, receives the first hash value sent by the collection terminal of each collection user, or additionally generates a first hash value for making change and collection.
In this embodiment, the payment terminal 100 obtains the first hash value H by receiving information sent by the payment receiving terminal1In further embodiments, the acquisition may be performed in any one or more of the following different manners, or in more different manners as would be understood by one skilled in the art: the receiving terminal 200 sends the first hash value H1Writing the block chain or storing the block chain in other appointed positions for the payment terminal 100 to obtain; the payment terminal 100 automatically generates a first hash value H for receiving change1(ii) a And so on.
In step S15, the payment terminal 100 of the user a generates a second random number r2And according to the second random number r2And a first hash value H1Generating a second hash value H2=hash(r2,H1)。
In step S17, the payment terminal 100 of the user a sends the second hash value H to the first contract2And a first hash value H1Thereby triggering the first contract to enter a validation state.
In step S19, the payment terminal 100 of the user a sends a first contract includingA second random number r2The authentication request information of (1); the first contract is according to the second hash value H2And a first hash value H1For the second random number r2Performing verification and checking calculation H2And hash (r)2,H1) Whether they are equal:
is then r2Correct, verify correct, pass the second hash value H2Locking 10 first cryptocurrencies at the address of the user A, and enabling a first contract to enter an unlocking state;
otherwise, then r2The first contract continues to wait for the payer's authentication request information.
After the first contract enters the unlocking state, the cash receiving terminal 200 of the user b may receive the first random number r1Generating collection request information and sending the collection request information to a first contract;
after receiving the information of the collection request, the first contract passes the checking calculation H2And hash (r)2,hash(r1) Whether they are equal to each other) to verify whether the user b is the holder of the first random number:
and if the verification is correct, unlocking the 10 first encryption currencies, and transferring the 10 first encryption currencies to the address of the user B to finish the transaction.
The user B can also use the first random number r before collection1The user D obtains the first random number r1The 10 first cryptocurrencies may then likewise be unlocked and retrieved by the procedure described above.
In the above embodiment, the user a pays 10 first cryptocurrency to the user b, and in another embodiment, the user a may also pay multiple users at the same time, for example, pay 5, 3, 2 first cryptocurrency to the user A, B, C, respectively, and the transaction process is substantially the same as the above process except that:
the payment terminals of the user A, B, C pass through the first random numbers r respectively1-A、r1-B、r1-CGenerating a first hash value H1-A、H1-B、H1-C
In step S13, the first hash values transmitted from the respective cash receiving terminals of the users A, B, C are receivedH1-A、H1-B、H1-C
In step S15, according to the second random number r2And each item first hash value H1-A、H1-B、 H1-CGenerating a second hash value: h2=hash(r2,H1-A,H1-B,H1-C);
In step S17, the transaction request information specifies first hash values H1-A、H1-B、 H1-CThe amount of the corresponding first random numbers;
passing the second hash value H in the first contract2After locking the 10 first cryptocurrencies, user A may then be able to rely on the first random number r1-AGenerating collection request information and sending the collection request information to a first contract;
after receiving the information of the collection request, the first contract passes the checking calculation H2And hash (r)2,hash(r1-A), H1-B,H1-C) Whether equal to verify whether the user b is the holder of the first random number:
and if the verification is not wrong, unlocking 5 first encryption currencies specified by the transaction request information, and transferring to the address of the user A to finish the transaction.
User a may also assign a first random number r1-AAnd transferring to the user D for unlocking and collecting money by the user D.
User B and user C may collect money or transfer the first random number in the same manner.
In the above embodiment, the amount of collection corresponding to the first random number is specified by the transaction request information; in another embodiment, the first random number may correspond to a cash amount that is configured to be randomly assigned by the first contract, e.g., the first contract randomly assigns 10 first cryptocurrency paid by user A to user A, B, C.
In the above embodiments, the first contract is configured as an intelligent contract, and in further embodiments, the first contract may be configured as any base class contract, built-in contract, or other different contracts commonly used in the field according to different requirements, so that the same technical effect may be achieved.
In this embodiment, the payment terminal 100 and the payment receiving terminal 200 are configured as different user terminals, and in another embodiment, the user terminals of the users can be configured as the same user terminal having both the payment function and the payment receiving function, so that the same technical effect can be achieved.
In the embodiment, the encrypted asset to be transacted is locked by configuring the second hash value generated by the second random number and the identity verification information provided by the payee, so that the intelligent contract on the blockchain can quickly verify the identity of the payer through the second random number provided by the payer without decrypting and comparing the signature information, the identity can be authenticated without signature, and the transaction time is shortened;
meanwhile, identity verification information of a payee is generated in a Hash locking mode, and the payee can be unlocked only by providing a first random number for the intelligent contract, so that convenience is provided for flexibility of transaction.
Fig. 3 is a schematic diagram of a transaction scenario according to a preferred embodiment of the present invention. In a preferred embodiment, as shown in fig. 3, the first random number is generated according to signature information of the payee, and the unlocking is configured as a delayed unlocking with a predetermined freezing period; and when the first contract receives revocation issuing request information generated according to the signature information in the freezing period and verifies that the identity of the payee is correct according to the signature information, the first contract revokes the operation of unlocking and issuing to the holder.
Specifically, the first random number r of the user B is stolen by the user C1And attempts to collect money are examples:
a first random number r1The signature information of the user B is generated as follows: r is1=hash(sign(m));
The POS terminal 400 of the user C according to the stolen first random number r1Generating collection request information and sending the collection request information to a first contract;
the first contract enters a preset freezing period after successful verification;
at this time, the money receiving terminal 200 of the user b monitors the money receiving operation of the user c by synchronizing the data of the first block chain, generates the revocation and issuance request information according to the signature information sign (m), and sends the revocation and issuance request information to the first contract;
after the first contract receives the revocation request information, the public key of the user B is obtained to verify whether the signature information sign (m) is correct or not and verify r1And hash (sign (m)):
if yes, the user B is proved to be a real payee, and the unlocking and the operation of releasing the unlocking and the releasing to the user C are cancelled;
if the verification result is not received in the freezing period, the encrypted currency is unlocked and issued to the user C after the freezing period elapses.
The above embodiment further configures the first random number to be generated according to the signature information of the payee, and configures the freeze period for unlocking, so that the payee can send the signature information to the intelligent contract within the freeze period when the first random number is stolen, so as to verify the identity of the payee and revoke the unlocking and issuing operations, thereby further providing security guarantee for the payee.
In a preferred embodiment, the first random number may also be configured as an address or a public key of the payee. Specifically, when the first random number is configured as the address of the payee, the first contract also needs to verify whether the first random number and the payee address are the same when unlocking; when the first random number is configured as the public key of the payee, the first contract can obtain the address according to the public key calculation when unlocking, and verify whether the address is the same as the payee address.
The above embodiment further configures the first random number as an address or a public key of the payee, thereby specifying a fixed payee address, and guaranteeing the security of the transaction while sacrificing the flexibility of the transaction.
Fig. 4 is a schematic diagram of a transaction scenario according to another preferred embodiment of the present invention. As shown in fig. 4, in a preferred embodiment, step S15 includes:
generating a second hash value according to the second random number, the obtained first hash value, and at least one of: a payee address, a refund address corresponding to the first hash value;
wherein the transaction request information includes a payee address and/or a refund address.
Specifically, fig. 4 is different from the embodiment shown in fig. 2 in that the embodiment shown in fig. 4 may further specify the payee address add corresponding to the first random numberSecond step:H2=hash(r2,H1, addSecond step) The transaction request information includes address add of the payeeSecond step
Or further appointing a refund address add after the transaction fails due to overtime and the likeFirst of all: H2=hash(r2,H1,addFirst of all) The transaction request message includes a refund address addFirst of all
Or, simultaneously appointing the address add of the payeeSecond stepAnd refund address addFirst of all:H2=hash(r2, H1,addSecond step,addFirst of all) The transaction request information includes address add of the payeeSecond stepAnd refund address addFirst of all
Wherein, the address add of the payeeSecond stepThe obtaining mode of the refund address add is the same as the obtaining mode of the first hash valueFirst of allSpecified by the payment terminal 100 of the user a when generating the second hash value;
at unspecified refund address addFirst of allThe refund address defaults to the payment address.
The above-described embodiments further enhance the security and convenience of the transaction by specifying the corresponding payee address and/or refund address when generating the second hash value.
Fig. 5 is a flowchart of a transaction method applicable to a payment receiving terminal according to an embodiment of the present invention. The method of fig. 5 may be performed in conjunction with the method of fig. 2.
As shown in fig. 5, in this embodiment, the present invention further provides a transaction method suitable for a payment receiving terminal, including:
s21: generating a first random number and a first hash value; wherein, the first hash value is the hash value of the first random number;
s23: sending a first hash value to a payment terminal so that the payment terminal can generate a second hash value according to a second random number and a plurality of acquired first hash values, sending the second random number and the first hash values to a first contract to trigger the first contract to enter a verification state, sending the second random number to the first contract so that the first contract can be verified, and locking encryption currency of a transaction request information request transaction through the second hash value after the verification is passed; generating, by the payment terminal, signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first blockchain to be generated on the first blockchain;
s25: and generating collection request information according to the first random number and sending the collection request information to the first contract, so that the first contract unlocks and releases the encryption currency after verifying that the identity of the holder of the first random number is correct according to the collection request information.
The transaction principle of the method shown in fig. 5 can refer to the method shown in fig. 2, and is not described herein again.
In a preferred embodiment, the signature information is generated by a first private key signature in step S21, and a first random number is generated according to the signature information. The first contract also verifies the signature information by obtaining the public key of the payee when unlocking the payee.
FIG. 6 is a flow chart of a preferred embodiment of the method shown in FIG. 5. The method illustrated in fig. 6 may be performed in conjunction with the method performed by the payment terminal 100 in the scenario illustrated in fig. 3.
As shown in FIG. 6, in a preferred embodiment, the unlock is configured as a delayed unlock having a predetermined freeze period;
the method further comprises the following steps:
s27: synchronizing data of the first blockchain to monitor whether a third party requests collection from the first contract by pirating the first random number:
if yes, go to step S29: and generating revocation and issuing request information according to the signature information in the freezing period and sending the revocation and issuing request information to the first contract so as to enable the first contract to revoke unlocking and issue the revocation and issuing request information to a third party after verifying that the identity of the payee is correct according to the signature information.
The transaction principle of the method shown in fig. 6 can refer to the method described in conjunction with the scenario of fig. 3, and is not described herein again.
In a preferred embodiment, the first random number is configured as an address or public key of the payee.
In a preferred embodiment, the second hash value is generated from the second random number, the first hash value obtained by the payment terminal, and at least one of: a payee address, a refund address corresponding to the first hash value. Wherein the transaction request information includes a payee address and/or a refund address.
In a preferred embodiment, the amount collected for the first random number is specified by the transaction request message.
In a preferred embodiment, the collection amount corresponding to the first random number is randomly assigned by the first contract.
The transaction principles of the above preferred embodiments can be referred to the methods shown in fig. 2-4, and are not described in detail herein.
Fig. 7 is a flowchart of a transaction method applicable to a blockchain node according to an embodiment of the present invention. The method illustrated in fig. 7 may be performed in conjunction with the methods illustrated in fig. 2 and 5.
As shown in fig. 7, in this embodiment, the present invention further provides a transaction method applicable to a blockchain node, including:
s31: receiving signed transaction request information sent by a payment terminal, and generating a first contract on a first block chain according to the transaction request information; wherein, the transaction request information is generated according to the second random number;
s32: receiving a second random number and a plurality of first hash values sent by the payment terminal, and triggering a first contract to enter a verification state according to the second random number and the first hash values; the payment terminal acquires a plurality of first hash values, wherein the first hash values are generated by the payment terminal according to a first random number and a plurality of acquired first hash values;
s33: receiving a second random number sent by the payment terminal, verifying through the first contract, and locking the encrypted currency of the transaction request information request transaction through a second hash value after the verification is passed;
s35: receiving collection request information, and unlocking and issuing the encrypted currency to the holder after verifying that the holder of the first random number has no error according to the collection request information; wherein the receipt request information is generated based on the first random number.
Specifically, the transaction principle of the method shown in fig. 7 can refer to the method shown in fig. 2, and is not described herein again.
Fig. 8 is a flowchart of step S35 in a preferred embodiment of the method shown in fig. 7. The method illustrated in fig. 8 may be performed in conjunction with the methods illustrated in fig. 3 and 6.
As shown in fig. 8, in a preferred embodiment, the first random number is generated according to signature information of the payee, and the unlocking configuration is a delayed unlocking with a predetermined freezing period; step S35 includes:
s351: receiving the collection request information, verifying the holder identity of the first random number according to the collection request information:
if the verification is passed, step S352 is executed: waiting for a preset freezing period, and monitoring whether revocation request information generated according to the signature information is received or not in the freezing period:
if yes, go to step S353: verifying the identity of the payee according to the signature information: if the verification is correct, step S355 is executed: revoking the operations of unlocking and issuing to the first random number holder;
otherwise, step S354 is executed: the cryptocurrency is unlocked after the lapse of the freezing period and issued to the holder of the first random number.
The transaction principle of the method shown in fig. 8 can refer to the method shown in fig. 3, and is not described herein again.
Fig. 9 is a flowchart of another transaction method applicable to a payment terminal according to an embodiment of the present invention. As shown in fig. 9, in another embodiment, the present invention further provides another transaction method applicable to a payment terminal, including:
s41: generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first block chain so as to generate a first contract on the first block chain;
s43: acquiring a plurality of addresses;
s45: generating a second hash value according to the second random number and the plurality of addresses;
s47: sending a second random number and a plurality of first hash values to the first contract to trigger the first contract to enter a verification state;
s49: sending a second random number to the first contract for the first contract to verify, and locking the cryptocurrency of the transaction request information request transaction through a second hash value after the first contract passes the verification;
and the encrypted currency is unlocked and transferred to the address after the first contract verifies that the address for receiving the currency is correct according to the received collection request information.
Specifically, the method shown in fig. 9 is substantially the same as the method shown in fig. 2 in terms of transaction principle, except that: in the method shown in fig. 9, the address of the payee, not the first random number, is directly used as the identity verification information of the payee.
Fig. 10 is a flowchart of another transaction method suitable for a checkout terminal according to an embodiment of the present invention. The method illustrated in fig. 10 may be performed in conjunction with the method illustrated in fig. 9.
As shown in fig. 10, in another embodiment, the present invention further provides another transaction method suitable for a checkout terminal, including:
s51: sending an address to a payment terminal so that the payment terminal generates a second hash value according to a second random number and the obtained addresses, sending the second random number and the first hash values to a first contract to trigger the first contract to enter a verification state, sending the second random number to the first contract for verification of the first contract, and locking the encrypted currency of the transaction request information request transaction through the second hash value after the verification is passed; generating, by the payment terminal, signed transaction request information according to the second random number and sending the signed transaction request information to a node of the first blockchain to be generated on the first blockchain;
s53: and generating a money receiving request message according to the address and sending the money receiving request message to the first contract so that the first contract unlocks the encrypted currency and transfers the encrypted currency to the address after verifying that the received address is correct.
Similar to the method of fig. 9, the method of fig. 10 is substantially the same as the transaction principle of the method of fig. 5, except that: in the method shown in fig. 10, the address of the payee, not the first random number, is directly used as the identity verification information of the payee.
Fig. 11 is a flowchart of another transaction method applicable to a blockchain node according to an embodiment of the present invention. The method illustrated in fig. 11 may be performed in conjunction with the methods illustrated in fig. 9 and 10.
As shown in fig. 11, in another embodiment, the present invention further provides another transaction method applicable to a blockchain node, including:
s61: receiving signed transaction request information sent by a payment terminal, and generating a first contract on a first block chain according to the transaction request information; wherein, the transaction request information is generated according to the second random number;
s62: receiving a second random number and a plurality of addresses sent by the payment terminal, and triggering a first contract to enter a verification state according to the second random number and the plurality of addresses; the payment terminal acquires a plurality of addresses, wherein the second hash value is generated by the payment terminal according to a second random number and the acquired addresses, and the first hash value is the hash value of the first random number;
s63: receiving a second random number sent by the payment terminal, verifying through the first contract, and locking the encrypted currency of the transaction request information request transaction through a second hash value after the verification is passed;
s65: and receiving the money receiving request information, verifying that the address for receiving the money is correct according to the money receiving request information, unlocking the encrypted money and transferring the money to the address.
Similar to the methods shown in fig. 9 and 10, the method shown in fig. 11 is substantially the same as the transaction principle of the method shown in fig. 7, except that: in the method shown in fig. 11, the address of the payee, not the first random number, is directly used as the identity verification information of the payee.
The embodiment realizes identity authentication without signature, shortens transaction time, and further ensures transaction safety by configuring the address of the payee as the identity verification information of the payee.
Fig. 12 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 12, as another aspect, the present application also provides an apparatus 1200 including one or more Central Processing Units (CPUs) 1201 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. In the RAM1203, various programs and data necessary for the operation of the apparatus 1200 are also stored. The CPU1201, ROM1202, and RAM1203 are connected to each other by a bus 1204. An input/output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 1208 including a hard disk and the like; and a communication section 1209 including a network interface card such as a LAN card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. A driver 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 1210 as necessary, so that a computer program read out therefrom is mounted into the storage section 1208 as necessary.
In particular, according to an embodiment of the present disclosure, the transaction method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a transaction method. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 1209, and/or installed from the removable medium 1211.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the transaction methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (24)

1. A method of trading, comprising:
generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of a first block chain so as to generate a first contract on the first block chain;
acquiring a plurality of first hash values; wherein the first hash value is a hash value of a first random number;
generating a second hash value according to the second random number and the plurality of first hash values;
sending the second random number and the number of first hash values to the first contract to trigger the first contract to enter a verification state;
sending the second random number to the first contract for verification of the first contract, and locking the cryptocurrency of the requested transaction through the second hash value after the verification is passed;
and the encrypted currency is unlocked and issued to the holder after the first contract verifies that the identity of the holder of the first random number is correct according to the received money receiving request information, and the money receiving request information is generated according to the first random number.
2. The method of claim 1, wherein the first random number is generated according to signature information of a payee;
the unlock is configured as a delayed unlock having a predetermined freeze period;
and when the first contract receives revocation issuing request information generated according to the signature information in the freezing period and verifies that the identity of a payee is not wrong according to the signature information, the first contract revokes the operations of unlocking and issuing to the holder.
3. The method of claim 1, wherein the first random number is configured as an address or public key of a payee.
4. The method of claim 1, wherein generating the second hash value based on the second random number and the obtained first hash value comprises:
generating a second hash value according to the second random number, the obtained first hash value, and at least one of: a payee address, a refund address corresponding to the first hash value;
wherein the transaction request information includes the payee address and/or the refund address.
5. The method of any of claims 1-4, wherein a collect amount corresponding to the first random number is specified by the transaction request information.
6. The method of any of claims 1-4, wherein a payout amount corresponding to the first random number is randomly allocated by the first contract.
7. A method of trading, comprising:
generating a first random number and a first hash value; wherein the first hash value is a hash value of the first random number;
sending the first hash value to a payment terminal so that the payment terminal can generate a second hash value according to a second random number and the obtained first hash values, sending the second random number and the first hash values to a first contract to trigger the first contract to enter a verification state, sending the second random number to the first contract to verify the first contract, and locking the encrypted currency of the transaction request information request transaction through the second hash value after the verification is passed; wherein the first contract is generated by the payment terminal from a second random number into signed transaction request information and sent to a node of a first blockchain for generation on the first blockchain;
and generating collection request information according to the first random number and sending the collection request information to the first contract so that the first contract can unlock and send the encrypted currency after verifying that the identity of the holder of the first random number is correct according to the collection request information.
8. The method of claim 7, wherein generating the first random number comprises:
signature information is generated through a first private key signature, and a first random number is generated according to the signature information.
9. The method of claim 8, wherein the unlocking is configured as a delayed unlocking with a predetermined freeze period;
the method further comprises the following steps:
synchronizing data of the first blockchain to monitor whether a third party requests collection from the first contract by pirating the first random number:
if yes, canceling release request information is generated according to the signature information in the freezing period and sent to the first contract, so that the first contract cancels unlocking and releases the unlocking to the third party after verifying that the identity of a payee is correct according to the signature information.
10. The method of claim 7, wherein the first random number is configured as an address or a public key of a payee.
11. The method of claim 7, wherein the second hash value is generated based on the second random number, the first hash value obtained by the payment terminal, and at least one of: a payee address, a refund address corresponding to the first hash value;
wherein the transaction request information includes the payee address and/or the refund address.
12. The method of any of claims 7-11, wherein a collect amount corresponding to the first random number is specified by the transaction request information.
13. A method according to any of claims 7-11, wherein the first random number corresponds to a payout amount that is randomly allocated by the first contract.
14. A method of trading, comprising:
receiving signed transaction request information sent by a payment terminal, and generating a first contract on a first block chain according to the transaction request information; wherein the transaction request information is generated according to a second random number;
receiving a second random number and a plurality of first hash values sent by the payment terminal, and triggering the first contract to enter a verification state according to the second random number and the first hash values; the payment terminal acquires a second random number, wherein the second hash value is generated by the payment terminal according to the second random number and a plurality of acquired first hash values, and the first hash values are hash values of the first random number;
receiving a second random number sent by the payment terminal, verifying through the first contract, and locking the encryption currency of the transaction request information request transaction through the second hash value after the second random number passes the verification;
receiving collection request information, and unlocking the encrypted currency and issuing the encrypted currency to the holder after verifying that the holder identity of the first random number is correct according to the collection request information; wherein the receipt request information is generated based on the first random number.
15. The method of claim 14, wherein the first random number is generated according to signature information of a payee; the unlock is configured as a delayed unlock having a predetermined freeze period;
the receiving of the receipt request information, and the unlocking and issuing of the cryptocurrency to the holder after verifying that the holder of the first random number is correct according to the receipt request information includes:
receiving collection request information, verifying the holder identity of the first random number according to the collection request information:
if the verification is passed, waiting for a preset freezing period, and monitoring whether revocation request information generated according to the signature information is received in the freezing period:
if yes, verifying the identity of the payee according to the signature information: if the verification is correct, the operations of unlocking and issuing to the holder are cancelled;
and if not, unlocking the encrypted currency and issuing the encrypted currency to the holder after the freezing period elapses.
16. The method of claim 14, wherein the first random number is configured as an address or a public key of a payee.
17. The method of claim 14, wherein the second hash value is generated based on the second random number, the first hash value obtained by the payment terminal, and at least one of: a payee address, a refund address corresponding to the first hash value;
wherein the transaction request information includes the payee address and/or the refund address.
18. The method of any of claims 14-17, wherein a collect amount corresponding to the first random number is specified by the transaction request information.
19. A method according to any of claims 14-17, wherein the first random number corresponds to a collection amount that is randomly allocated by the first contract.
20. A method of trading, comprising:
generating signed transaction request information according to the second random number and sending the signed transaction request information to a node of a first block chain so as to generate a first contract on the first block chain;
acquiring a plurality of addresses;
generating a second hash value according to the second random number and the plurality of addresses;
sending the second random number and the number of first hash values to the first contract to trigger the first contract to enter a verification state;
sending the second random number to the first contract for the first contract to verify, and locking the cryptocurrency of the transaction request information request transaction through the second hash value after the first contract passes the verification;
and the encrypted currency is unlocked and transferred to the address after the first contract verifies that the address for receiving the currency is correct according to the received collection request information.
21. A method of trading, comprising:
sending an address to a payment terminal so that the payment terminal generates a second hash value according to a second random number and the obtained addresses, sending the second random number and the first hash values to a first contract to trigger the first contract to enter a verification state, sending the second random number to the first contract so that the first contract can be verified, and locking the encryption currency of the transaction request information request transaction through the second hash value after the verification is passed; wherein the first contract is generated by the payment terminal from a second random number into signed transaction request information and sent to a node of a first blockchain for generation on the first blockchain;
and generating a money receiving request message according to the address and sending the money receiving request message to the first contract so that the first contract unlocks the encrypted currency and transfers the encrypted currency to the address after verifying that the address for receiving money is correct.
22. A method of trading, comprising:
receiving signed transaction request information sent by a payment terminal, and generating a first contract on a first block chain according to the transaction request information; wherein the transaction request information is generated according to a second random number;
receiving a second random number and a plurality of addresses sent by the payment terminal, and triggering the first contract to enter a verification state according to the second random number and the addresses; the payment terminal acquires a plurality of addresses, wherein the second hash value is generated by the payment terminal according to a second random number and the acquired addresses, and the first hash value is the hash value of a first random number;
receiving a second random number sent by the payment terminal, verifying through the first contract, and locking the encryption currency of the transaction request information request transaction through the second hash value after the second random number passes the verification;
receiving the money receiving request information, and unlocking the encrypted money and transferring the encrypted money to the address after verifying that the address for receiving the money is correct according to the money receiving request information.
23. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-22.
24. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-22.
CN201810767552.3A 2018-07-13 2018-07-13 Transaction method, apparatus and storage medium Active CN109064169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810767552.3A CN109064169B (en) 2018-07-13 2018-07-13 Transaction method, apparatus and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810767552.3A CN109064169B (en) 2018-07-13 2018-07-13 Transaction method, apparatus and storage medium

Publications (2)

Publication Number Publication Date
CN109064169A CN109064169A (en) 2018-12-21
CN109064169B true CN109064169B (en) 2020-11-06

Family

ID=64816358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810767552.3A Active CN109064169B (en) 2018-07-13 2018-07-13 Transaction method, apparatus and storage medium

Country Status (1)

Country Link
CN (1) CN109064169B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110049087B (en) * 2018-12-28 2020-05-05 阿里巴巴集团控股有限公司 Credibility verification method, system, device and equipment of alliance chain
CN109697613B (en) * 2018-12-29 2020-08-25 链博(成都)科技有限公司 Security authentication method and system for network transaction in block chain
CN109872139B (en) * 2019-01-31 2020-10-23 杭州复杂美科技有限公司 Transaction replacement method, apparatus and storage medium
CN109829719B (en) * 2019-02-22 2021-06-25 中国农业银行股份有限公司 Connectionless cross account book DvP settlement method and system
CN110009343B (en) * 2019-02-27 2023-04-18 上海七印信息科技有限公司 Method for pre-locking Token by adopting intelligent contract
CN110351090B (en) * 2019-05-27 2021-04-27 平安科技(深圳)有限公司 Group signature digital certificate revoking method and device, storage medium and electronic equipment
US11232441B2 (en) 2019-10-30 2022-01-25 Accenture Global Solutions Limited Cryptologic coordinated symmetric conditional key release
SG10201910109RA (en) 2019-10-30 2020-07-29 Accenture Global Solutions Ltd Leading-party-initiated cryptologic coordinated symmetric conditional key release
CN111008004A (en) * 2019-11-14 2020-04-14 杭州复杂美科技有限公司 Random number generation method, game method, device and storage medium
CN111401909B (en) * 2020-03-11 2023-04-28 北京价值互联科技有限公司 Block chain-based decentralization random red packet processing method
CN111478907B (en) * 2020-04-08 2022-03-04 杭州复杂美科技有限公司 Anti-attack method, equipment and storage medium for parallel chain private transaction

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN107169764A (en) * 2017-05-10 2017-09-15 山东大学 Fair data trade method based on block chain
CN107438003A (en) * 2016-05-27 2017-12-05 索尼公司 Electronic equipment, method and information processing system for electronic equipment
WO2018006945A1 (en) * 2016-07-05 2018-01-11 Rwe International Se Observation system
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108009810A (en) * 2017-12-27 2018-05-08 光载无限(北京)科技有限公司 A kind of Trusted Digital transaction in assets method
CN108256859A (en) * 2018-01-02 2018-07-06 中国工商银行股份有限公司 Financial product transaction common recognition method, node and system based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN107438003A (en) * 2016-05-27 2017-12-05 索尼公司 Electronic equipment, method and information processing system for electronic equipment
WO2018006945A1 (en) * 2016-07-05 2018-01-11 Rwe International Se Observation system
CN107169764A (en) * 2017-05-10 2017-09-15 山东大学 Fair data trade method based on block chain
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN108009810A (en) * 2017-12-27 2018-05-08 光载无限(北京)科技有限公司 A kind of Trusted Digital transaction in assets method
CN108256859A (en) * 2018-01-02 2018-07-06 中国工商银行股份有限公司 Financial product transaction common recognition method, node and system based on block chain

Also Published As

Publication number Publication date
CN109064169A (en) 2018-12-21

Similar Documents

Publication Publication Date Title
CN109064169B (en) Transaction method, apparatus and storage medium
KR102044751B1 (en) Method for providing reward according to user authentication based on blockchain
US9978094B2 (en) Tokenization revocation list
JP5384773B2 (en) Use key escrow services to allow users to choose from secure service providers
CN105991287B (en) A kind of generation of signed data and finger print identifying requesting method and device
WO2015161699A1 (en) Secure data interaction method and system
US20210182863A1 (en) Authenticating Transactions Using Biometric Authentication
TWI775820B (en) Mobile payment subauthorization method and payment system realized by the method
CN109791671A (en) Method and system for realizing block chain
JP2002158650A (en) Proxy server for certification/ciphering processing, access card program recording medium and portable terminal
JP2009526321A (en) System for executing a transaction in a point-of-sale information management terminal using a changing identifier
CN110011957B (en) Security authentication method and device for enterprise account, electronic equipment and storage medium
CN110210207A (en) Authorization method and equipment
WO2015161690A1 (en) Secure data interaction method and system
US10325260B2 (en) System, method and computer program product for secure peer-to-peer transactions
US20200160340A1 (en) Distributed fraud detection system within mesh networks
KR20190132054A (en) Method for Providing Cryptocurrency Trading Platform by using Smart Contract based on Blockchain
KR20190132159A (en) Method for Providing Cryptocurrency Trading Platform based on Blockchain by using Smart Contract
US20180300717A1 (en) Cryptographically secure token exchange
CN107506998B (en) Fingerprint password payment method, device and system based on NFC verification
KR20190115553A (en) Method for Providing Cryptocurrency Trade based on Verification of Information by using Smart Contract based on Blockchain
JP2018137587A (en) Authentication key sharing system and authentication key sharing method
KR20140012335A (en) Apparatus and method for processing finance banking information of smart device using qr code
KR20190132160A (en) Method for Providing Cryptocurrency Trading Platform by using Smart Contract
JP3812419B2 (en) Billing unit device, billing system, authentication billing center device, purchase control terminal device, billing method, billing program, and storage medium storing billing program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant