CN106713218B - Resource exchange method and device - Google Patents

Resource exchange method and device Download PDF

Info

Publication number
CN106713218B
CN106713218B CN201510425524.XA CN201510425524A CN106713218B CN 106713218 B CN106713218 B CN 106713218B CN 201510425524 A CN201510425524 A CN 201510425524A CN 106713218 B CN106713218 B CN 106713218B
Authority
CN
China
Prior art keywords
resource
resource exchange
exchange
information
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510425524.XA
Other languages
Chinese (zh)
Other versions
CN106713218A (en
Inventor
任杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510425524.XA priority Critical patent/CN106713218B/en
Publication of CN106713218A publication Critical patent/CN106713218A/en
Application granted granted Critical
Publication of CN106713218B publication Critical patent/CN106713218B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a resource exchange method, which comprises the following steps: when a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier; the decryption is completed through the verification information corresponding to the encrypted identification to obtain the resource exchange information corresponding to the resource exchange request; and after receiving the confirmation exchange instruction of the resource exchange information, finishing the resource exchange of the resource exchange request. The invention also discloses a resource exchange device. The invention provides a resource exchange scheme without a network environment, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.

Description

Resource exchange method and device
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a resource exchange method and apparatus.
Background
With the popularization of internet-based quick payment methods such as WeChat payment, Payment treasures or la Kara, users experience convenient payment, but at present, the transaction method has a defect that both parties need to own networks in the transaction process, or at least one party only needs to own the network (la Kara) to finish quick payment application, the requirement on the network state is very high, and in reality, a lot of networks such as three-line cities, mountain areas and the like do not necessarily have convenient real-time networks (3G, 4G, WIFI and the like), or the networks of the users are used up, and quick payment cannot be realized in the environment.
Disclosure of Invention
The embodiment of the invention provides a resource exchange method and a resource exchange device, and aims to solve the problem that quick payment cannot be realized due to no network or poor network condition or exhausted network flow in the conventional quick payment process.
In order to achieve the above object, an embodiment of the present invention provides a resource exchange method, including:
when a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier;
the decryption is completed through the verification information corresponding to the encrypted identification to obtain the resource exchange information corresponding to the resource exchange request;
and after receiving the confirmation exchange instruction of the resource exchange information, finishing the resource exchange of the resource exchange request.
In order to achieve the above object, an embodiment of the present invention further provides a resource exchanging apparatus, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring an encrypted identifier corresponding to a resource exchange request when the resource exchange request based on a network-free environment is received, and the encrypted identifier comprises a public key encrypted identifier and a private key encrypted identifier;
the decryption module is used for completing decryption through the verification information corresponding to the encrypted identifier to obtain the resource exchange information corresponding to the resource exchange request;
and the exchange module is used for finishing the resource exchange of the resource exchange request after receiving the confirmation exchange instruction of the resource exchange information.
The invention completes the resource exchange process by utilizing the public key and the private key under the network-free environment, so that the resource exchange can be completed without depending on the Internet. A resource exchange scheme without a network environment is provided, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.
Drawings
FIG. 1 is a diagram illustrating a hardware architecture of a resource exchange device according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a resource exchange method according to a first embodiment of the present invention;
FIG. 3 is a diagram illustrating an embodiment of a trusted public key according to the present invention;
FIG. 4 is a flowchart illustrating a resource exchange method according to a second embodiment of the present invention;
FIG. 5 is a flowchart illustrating a resource exchange method according to a third embodiment of the present invention;
FIG. 6 is a flowchart illustrating a resource exchange method according to a fourth embodiment of the present invention;
FIG. 7 is a flow chart illustrating resource exchange according to an embodiment of the present invention;
FIG. 8 is a functional block diagram of a resource switching apparatus according to a first embodiment of the present invention;
FIG. 9 is a functional block diagram of a resource switching apparatus according to a second embodiment of the present invention;
FIG. 10 is a functional block diagram of a resource exchange device according to a third embodiment of the present invention;
fig. 11 is a functional block diagram of a resource switching apparatus according to a fourth embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: when a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier; the decryption is completed through the verification information corresponding to the encrypted identification to obtain the resource exchange information corresponding to the resource exchange request; and after receiving the confirmation exchange instruction of the resource exchange information, finishing the resource exchange of the resource exchange request. The resource exchange process is completed by utilizing the public key and the private key under the network-free environment, so that the resource exchange can be completed without depending on the Internet. The problem that the quick payment cannot be realized due to no network or poor network condition or exhausted network flow in the conventional quick payment process is effectively solved. A resource exchange scheme without a network environment is provided, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.
The problem that the quick payment cannot be realized due to the fact that no network exists or the network is poor in condition or the network flow is used up in the existing quick payment process is solved.
The embodiment of the invention constructs a resource exchange device, and the resource exchange device completes the resource exchange process by utilizing the public key and the private key under the network-free environment, so that the resource exchange can be completed without depending on the Internet. The problem that the quick payment cannot be realized due to no network or poor network condition or exhausted network flow in the conventional quick payment process is effectively solved. A resource exchange scheme without a network environment is provided, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.
The resource exchange device of the present embodiment may be carried on a PC, or may be carried on an electronic terminal such as a mobile phone or a tablet computer, which may use network applications such as resource exchange. The hardware architecture involved in the resource switching apparatus may be as shown in fig. 1.
Fig. 1 shows a hardware architecture involved in a resource switching apparatus according to an embodiment of the present invention. As shown in fig. 1, the hardware related to the resource switching apparatus includes: a processor 301, e.g. a CPU, a network interface 304, a user interface 303, a memory 305, a communication bus 302. The communication bus 302 is used for implementing connection communication between the components in the information push platform. The user interface 303 may include a Display (Display), a Keyboard (Keyboard), a mouse, and the like, and is configured to receive information input by a user and send the received information to the processor 305 for processing. The display screen may be an LCD display screen, an LED display screen, or a touch screen, and is used for displaying data to be displayed by the resource exchanging device, for example, displaying an operation interface such as resource information browsing and resource exchanging. The optional user interface 303 may also include a standard wired interface, a wireless interface. The network interface 304 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). Memory 305 may be a high-speed RAM memory or may be a non-volatile memory, such as a disk memory. The memory 305 may alternatively be a storage device separate from the processor 301 described above. As shown in fig. 1, the memory 305, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a resource exchange program.
Among the hardware related to the resource switching apparatus shown in fig. 1, the network interface 304 is mainly used for connecting to an application platform and performing data communication with the application platform; the user interface 303 is mainly used for connecting a client, performing data communication with the client, and receiving information and instructions input by the client; and the processor 301 may be configured to invoke a resource exchange program stored in the memory 305 and perform the following operations:
when a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier;
the decryption is completed through the verification information corresponding to the encrypted identification to obtain the resource exchange information corresponding to the resource exchange request;
and after receiving the confirmation exchange instruction of the resource exchange information, finishing the resource exchange of the resource exchange request.
Further, in one embodiment, the processor 301 invoking the resource exchange program stored in the memory 305 may perform the following operations:
generating a resource exchange list, and encrypting the resource exchange list through a public key or a private key;
and sending the encrypted resource exchange list to a sending end corresponding to the resource exchange request for the sending end to confirm and store the resource exchange list.
Further, in one embodiment, the processor 301 invoking the resource exchange program stored in the memory 305 may perform the following operations:
and updating the resource exchange information related to the resource exchange to a server corresponding to the corresponding resource provider when any party corresponding to the resource exchange request uses the network.
Further, in one embodiment, the processor 301 invoking the resource exchange program stored in the memory 305 may perform the following operations:
requesting public key and private key information from a server corresponding to a resource provider based on a network environment;
and receiving and storing the public key and the private key information so as to complete the exchange of the resource information through the public key and the private key.
Further, in one embodiment, the processor 301 invoking the resource exchange program stored in the memory 305 may perform the following operations:
acquiring resource transaction limiting information of a switched party corresponding to the resource switching request;
when the resource exchange information is matched with the resource transaction limiting information, prompting that the resource information cannot be exchanged;
and when the resource exchange information is not matched with the resource transaction limiting information, prompting whether to confirm that the resource information exchange is completed or not.
According to the scheme, the resource exchange process is completed by utilizing the public key and the private key under the network-free environment, so that the resource exchange can be completed without depending on the Internet. The problem that the quick payment cannot be realized due to no network or poor network condition or exhausted network flow in the conventional quick payment process is effectively solved. A resource exchange scheme without a network environment is provided, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.
Based on the hardware architecture, the embodiment of the resource exchange method is provided.
As shown in fig. 2, a first embodiment of a resource exchanging method according to the present invention is provided, where the resource exchanging method includes:
step S10, when a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier;
in this embodiment, a network-less environment between two resource exchange terminals is established in advance, for example, a communication connection between the two resource exchange terminals is established in a bluetooth, NFC, or local area network manner, and after the communication connection between the two resource exchange terminals is established, an initiator of the resource exchange terminal sends a resource exchange request to another receiver of resource exchange. The triggering mode of the resource exchange request includes multiple types, for example, 1) triggering through a physical key on the resource exchange terminal; 2) triggering through a preset physical key (for example, a combination of the physical keys, or pressing a certain physical key for a long time, etc.); 3) and triggering when entering a resource exchange interface and establishing a resource exchange object and an order. The triggering manners of the resource exchange requests listed above are merely exemplary, and those skilled in the art may utilize the technical idea of the present invention, and the triggering manners of other resource exchange requests proposed according to their specific requirements are within the protection interval of the present invention, which is not exhaustive herein.
Before resource exchange is carried out, the two resource exchange terminals acquire the public key and the private key in advance so as to facilitate the subsequent resource exchange process. In an embodiment of the present invention, the process of obtaining the public key and the private key includes: requesting public key and private key information from a server corresponding to a resource provider based on a network environment; and receiving and storing the public key and the private key information so as to complete the exchange of the resource information through the public key and the private key. For example, in the CA digital signature scheme, in the presence of a network environment, a resource provider sends a trusted public key and a trusted private key to all resource exchangers, and for example, referring to fig. 3, different trusted public keys are sent to different users through a central server or an internet bank, where user 1 corresponds to trusted public key 1, user 2 corresponds to trusted public key 2, and user 3 corresponds to trusted public key 3. In other embodiments of the present invention, a preset time (for example, one week or one month, etc.) is set, when the preset time is reached, the server where the resource provider is located is actively requested to update the public key and the private key, or when the public key and the private key are updated, the server where the resource provider is located actively issues a public key and private key update instruction, and completes the update of the public key and the private key, and the obtaining process of the public key and the private key must be obtained and updated only after successful login, or is completed by reserving a resource transaction password in advance in the obtaining process, so that the accurate public key and the private key are obtained in time, and the security of the public key and the private key is ensured.
When a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier. Namely, the resource information corresponding to the resource exchange request is obtained through public key encryption or private key encryption.
Step S20, completing decryption through the verification information corresponding to the encrypted identifier to obtain the resource exchange information corresponding to the resource exchange request;
and after the encrypted identifier corresponding to the resource exchange request is obtained, the decryption is completed through the verification information corresponding to the encrypted identifier to obtain the resource exchange information corresponding to the resource exchange request. For example, when the encrypted identifier is a public key encrypted identifier, the decryption operation of the resource information is completed through a private key, and the resource exchange information corresponding to the resource exchange request is obtained; and when the encryption identifier is a private encryption identifier, completing decryption operation of the resource information through a public key to obtain the resource exchange information corresponding to the resource exchange request. The resource exchange information may be an exchange of virtual money, a content of the resource exchange, or the like, such as an exchange of virtual money in WeChat payment or Payment.
Step S30, after receiving the confirmation exchange instruction of the resource exchange information, completing resource exchange of the resource exchange request.
And after the resource exchange information corresponding to the resource exchange request is acquired, prompting whether to confirm that the resource information exchange is completed or not, confirming the resource exchange after receiving a confirmation exchange instruction of the resource exchange, and exchanging the resource to a sender of the resource exchange request so as to complete the resource exchange of the resource exchange request.
In the embodiment, the resource exchange process is completed by utilizing the public key and the private key under the network-free environment, so that the resource exchange can be completed without depending on the internet. The problem that the quick payment cannot be realized due to no network or poor network condition or exhausted network flow in the conventional quick payment process is effectively solved. A resource exchange scheme without a network environment is provided, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.
Further, a second embodiment of the present invention is proposed based on the first embodiment of the resource exchange method described above. As shown in fig. 4, after the step S30, the method may further include:
step S40, generating a resource exchange list, and encrypting the resource exchange list through a public key or a private key;
step S50, sending the encrypted resource exchange list to a sending end corresponding to the resource exchange request, so that the sending end can confirm and store the resource exchange list.
In this embodiment, after the resource exchange is confirmed to be completed, the resource is exchanged to a sender corresponding to the resource exchange request, a resource exchange list is generated, the resource exchange list is encrypted through a public key or a private key, that is, a bill for resource exchange is generated, the bill for resource exchange includes information such as a transaction amount of virtual money, exchange time, a supplier where the exchange is located, and the like, and is encrypted through the public key or the private key, and the encrypted resource exchange list is sent to a sender corresponding to the resource exchange request, so that the sender can confirm and store the resource exchange list. In an embodiment of the present invention, the generated resource exchange list is stored locally (at the resource exchange confirmation end, i.e. at the resource exchange receiving end). In this embodiment, by generating the resource exchange list and sending the resource exchange list to the sender corresponding to the resource exchange request, the sender can clearly know whether the resource exchange request is successfully completed, so as to improve the real-time performance of resource exchange.
Further, a third embodiment of the present invention is proposed based on the second embodiment of the resource exchange method described above. As shown in fig. 5, after the step S30, the method may further include:
step S60, when any party corresponding to the resource exchange request uses the network, the resource exchange information related to the resource exchange is updated to the server corresponding to the corresponding resource provider.
In this embodiment, when any one of the fields of the two resource exchange terminals uses a network, for example, when traffic is sufficient, or when the two resource exchange terminals are connected to a network such as WiFi, the resource exchange information related to the resource exchange is updated to a server corresponding to a corresponding resource provider, for example, the resource exchange list is updated to a server corresponding to a resource provider. After receiving resource exchange information update confirmation completion information fed back by a server, setting an update identifier for the resource exchange information, namely indicating that the resource exchange information has completed update operation.
In an embodiment of the present invention, after completing the exchange of resources without a network environment, after a certain time (1 hour or 2 hours, etc.), determining whether to access the network environment, and after accessing the network environment, updating resource exchange information related to the resource exchange to a server corresponding to a corresponding resource provider; when the network environment is not accessed, prompting to access the network environment, or after a certain time interval, performing a judgment process of whether the network environment is accessed again, and circulating the judgment process until the network environment is accessed to finish the updating of the resource exchange information; or, when accessing the network environment, determining whether there is resource exchange information to be updated, if so, updating the resource exchange information to the server, determining whether there is resource exchange information to be updated according to the time of the resource exchange information updated last time and the storage time of the resource exchange information, or determining whether there is resource exchange information to be updated by the update identifier, if there is resource exchange information without the update identifier, determining that there is resource exchange information to be updated, and if there is no resource exchange information without the update identifier, determining that there is no resource exchange information to be updated.
In the embodiment, after the resource exchange terminal accesses the network environment, the resource exchange information is updated to the server corresponding to the resource provider, so that the resource exchange information is updated in time at the server, the update of the server data is completed, and the accuracy of the server data is ensured.
Further, a fourth embodiment of the present invention is proposed based on the third embodiment of the above-described resource exchange method. As shown in fig. 6, after the step S20, the method may further include:
step S70, acquiring resource transaction limiting information of the exchanged party corresponding to the resource exchange request;
step S80, when the resource exchange information matches the resource trade restriction information, prompting that the exchange of the resource information can not be completed;
and step S90, when the resource exchange information is not matched with the resource transaction limit information, prompting whether to confirm that the resource information exchange is completed.
In this embodiment, resource transaction limitation information, for example, a quota of resource exchange, is set in advance, and when resource exchange is performed, the resource transaction limitation information of the switched party corresponding to the resource exchange request is obtained. When the resource exchange information is matched with the resource transaction limiting information, prompting that the resource information cannot be exchanged; and when the resource exchange information is not matched with the resource transaction limiting information, prompting whether to confirm that the resource information exchange is completed or not. Both parties of the resource exchange can only complete under the exchange limit, i.e. cannot exceed a limited quota. The embodiment ensures the security of resource exchange in the network-free environment by limiting the resource exchange in the network-free environment.
To better describe embodiments of the present invention, the following examples are described:
the key point of the exchange lies in that the resource exchange without a real-time network can be carried out, and after a network environment exists, data is transmitted back to a server irregularly to realize data report and synchronously update account information. The method comprises the steps of performing offline resource exchange under a non-real-time network, using a public key and private key authentication technology, and realizing resource transfer between accounts through authenticated data transmission or opening the use permission of related functions of software. After a period of time, when a network environment is not scheduled, the synchronous updating of the account data information is realized by reporting the account information, and the reporting of the data needs to be completed in a repayment period similar to a credit card system. Referring to fig. 7, the resource exchange process is: under the condition of a non-real-time network environment, a buyer and a seller directly use transmission means such as NFC, Bluetooth and the like to authenticate public keys and private keys of the buyer and the seller, so that data transmission is realized, and the resource exchange between the buyer and the seller is completed.
Correspondingly, a first embodiment of the resource switching apparatus of the present invention is proposed. Referring to fig. 8, the resource exchanging apparatus includes an obtaining module 10, a requesting module 20, a receiving module 30, a decrypting module 40, and an exchanging module 50.
The obtaining module 10 is configured to obtain an encryption identifier corresponding to a resource exchange request when receiving the resource exchange request based on a non-network environment, where the encryption identifier includes a public key encryption identifier and a private key encryption identifier;
in this embodiment, a network-less environment between two resource exchange terminals is established in advance, for example, a communication connection between the two resource exchange terminals is established in a bluetooth, NFC, or local area network manner, and after the communication connection between the two resource exchange terminals is established, an initiator of the resource exchange terminal sends a resource exchange request to another receiver of resource exchange. The triggering mode of the resource exchange request includes multiple types, for example, 1) triggering through a physical key on the resource exchange terminal; 2) triggering through a preset physical key (for example, a combination of the physical keys, or pressing a certain physical key for a long time, etc.); 3) and triggering when entering a resource exchange interface and establishing a resource exchange object and an order. The triggering manners of the resource exchange requests listed above are merely exemplary, and those skilled in the art may utilize the technical idea of the present invention, and the triggering manners of other resource exchange requests proposed according to their specific requirements are within the protection interval of the present invention, which is not exhaustive herein.
Before resource exchange is carried out, the two resource exchange terminals acquire the public key and the private key in advance so as to facilitate the subsequent resource exchange process.
The request module 20 is configured to request public key information and private key information from a server corresponding to a resource provider based on a network environment;
the receiving module 30 is configured to receive and store the public key and the private key information, so as to complete the exchange of the resource information through the public key and the private key. For example, in the CA digital signature scheme, in the presence of a network environment, a resource provider sends a trusted public key and a trusted private key to all resource exchangers, and for example, referring to fig. 3, different trusted public keys are sent to different users through a central server or an internet bank, where user 1 corresponds to trusted public key 1, user 2 corresponds to trusted public key 2, and user 3 corresponds to trusted public key 3. In other embodiments of the present invention, a preset time (for example, one week or one month, etc.) is set, when the preset time is reached, the server where the resource provider is located is actively requested to update the public key and the private key, or when the public key and the private key are updated, the server where the resource provider is located actively issues a public key and private key update instruction, and completes the update of the public key and the private key, and the obtaining process of the public key and the private key must be obtained and updated only after successful login, or is completed by reserving a resource transaction password in advance in the obtaining process, so that the accurate public key and the private key are obtained in time, and the security of the public key and the private key is ensured.
When a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier. Namely, the resource information corresponding to the resource exchange request is obtained through public key encryption or private key encryption.
The decryption module 40 is configured to complete decryption through the verification information corresponding to the encrypted identifier to obtain the resource exchange information corresponding to the resource exchange request;
and after the encrypted identifier corresponding to the resource exchange request is obtained, the decryption is completed through the verification information corresponding to the encrypted identifier to obtain the resource exchange information corresponding to the resource exchange request. For example, when the encrypted identifier is a public key encrypted identifier, the decryption operation of the resource information is completed through a private key, and the resource exchange information corresponding to the resource exchange request is obtained; and when the encryption identifier is a private encryption identifier, completing decryption operation of the resource information through a public key to obtain the resource exchange information corresponding to the resource exchange request. The resource exchange information may be an exchange of virtual money, a content of the resource exchange, or the like, such as an exchange of virtual money in WeChat payment or Payment.
The exchanging module 50 is configured to complete resource exchange of the resource exchange request after receiving the acknowledgement exchange instruction of the resource exchange information.
And after the resource exchange information corresponding to the resource exchange request is acquired, prompting whether to confirm that the resource information exchange is completed or not, confirming the resource exchange after receiving a confirmation exchange instruction of the resource exchange, and exchanging the resource to a sender of the resource exchange request so as to complete the resource exchange of the resource exchange request.
In the embodiment, the resource exchange process is completed by utilizing the public key and the private key under the network-free environment, so that the resource exchange can be completed without depending on the internet. The problem that the quick payment cannot be realized due to no network or poor network condition or exhausted network flow in the conventional quick payment process is effectively solved. A resource exchange scheme without a network environment is provided, so that the resource exchange does not need to depend on a network, and the adaptability of resource exchange use is improved.
Further, based on the first embodiment of the resource exchanging apparatus, a second embodiment of the resource exchanging apparatus of the present invention is provided. As shown in fig. 9, the resource exchanging apparatus further includes: a generation module 60, an encryption module 70 and a transmission module 80,
the generating module 60 is configured to generate a resource exchange list;
the encryption module 70 is configured to encrypt the resource exchange list through a public key or a private key;
the sending module 80 is configured to send the encrypted resource exchange list to a sending end corresponding to the resource exchange request, so that the sending end can confirm and store the resource exchange list.
In this embodiment, after the resource exchange is confirmed to be completed, the resource is exchanged to a sender corresponding to the resource exchange request, a resource exchange list is generated, the resource exchange list is encrypted through a public key or a private key, that is, a bill for resource exchange is generated, the bill for resource exchange includes information such as a transaction amount of virtual money, exchange time, a supplier where the exchange is located, and the like, and is encrypted through the public key or the private key, and the encrypted resource exchange list is sent to a sender corresponding to the resource exchange request, so that the sender can confirm and store the resource exchange list. In an embodiment of the present invention, the generated resource exchange list is stored locally (at the resource exchange confirmation end, i.e. at the resource exchange receiving end). In this embodiment, by generating the resource exchange list and sending the resource exchange list to the sender corresponding to the resource exchange request, the sender can clearly know whether the resource exchange request is successfully completed, so as to improve the real-time performance of resource exchange.
Further, based on the second embodiment of the resource exchanging apparatus, a third embodiment of the resource exchanging apparatus of the present invention is provided. As shown in fig. 10, the resource exchanging apparatus further includes: the updating module (90) is used for updating,
the updating module 90 is configured to update the resource exchange information related to the resource exchange to a server corresponding to a corresponding resource provider when any party corresponding to the resource exchange request uses a network.
In this embodiment, when any one of the fields of the two resource exchange terminals uses a network, for example, when traffic is sufficient, or when the two resource exchange terminals are connected to a network such as WiFi, the resource exchange information related to the resource exchange is updated to a server corresponding to a corresponding resource provider, for example, the resource exchange list is updated to a server corresponding to a resource provider. After receiving resource exchange information update confirmation completion information fed back by a server, setting an update identifier for the resource exchange information, namely indicating that the resource exchange information has completed update operation.
In an embodiment of the present invention, after completing the exchange of resources without a network environment, after a certain time (1 hour or 2 hours, etc.), determining whether to access the network environment, and after accessing the network environment, updating resource exchange information related to the resource exchange to a server corresponding to a corresponding resource provider; when the network environment is not accessed, prompting to access the network environment, or after a certain time interval, performing a judgment process of whether the network environment is accessed again, and circulating the judgment process until the network environment is accessed to finish the updating of the resource exchange information; or, when accessing the network environment, determining whether there is resource exchange information to be updated, if so, updating the resource exchange information to the server, determining whether there is resource exchange information to be updated according to the time of the resource exchange information updated last time and the storage time of the resource exchange information, or determining whether there is resource exchange information to be updated by the update identifier, if there is resource exchange information without the update identifier, determining that there is resource exchange information to be updated, and if there is no resource exchange information without the update identifier, determining that there is no resource exchange information to be updated.
In the embodiment, after the resource exchange terminal accesses the network environment, the resource exchange information is updated to the server corresponding to the resource provider, so that the resource exchange information is updated in time at the server, the update of the server data is completed, and the accuracy of the server data is ensured.
Further, based on the third embodiment of the resource exchanging apparatus, a fourth embodiment of the resource exchanging apparatus of the present invention is proposed. As shown in fig. 11, the resource exchanging apparatus further includes: the prompt module (100) is provided with a prompt module,
the obtaining module 10 is configured to obtain resource transaction limitation information of a switched party corresponding to the resource exchange request;
the prompting module 100 is configured to prompt that the resource information cannot be exchanged when the resource exchange information matches the resource transaction limitation information; and the resource exchange module is also used for prompting whether to confirm the completion of the resource information exchange when the resource exchange information is not matched with the resource transaction limiting information.
In this embodiment, resource transaction limitation information, for example, a quota of resource exchange, is set in advance, and when resource exchange is performed, the resource transaction limitation information of the switched party corresponding to the resource exchange request is obtained. When the resource exchange information is matched with the resource transaction limiting information, prompting that the resource information cannot be exchanged; and when the resource exchange information is not matched with the resource transaction limiting information, prompting whether to confirm that the resource information exchange is completed or not. Both parties of the resource exchange can only complete under the exchange limit, i.e. cannot exceed a limited quota. The embodiment ensures the security of resource exchange in the network-free environment by limiting the resource exchange in the network-free environment.
To better describe embodiments of the present invention, the following examples are described:
the key point of the exchange lies in that the resource exchange without a real-time network can be carried out, and after a network environment exists, data is transmitted back to a server irregularly to realize data report and synchronously update account information. The method comprises the steps of performing offline resource exchange under a non-real-time network, using a public key and private key authentication technology, and realizing resource transfer between accounts through authenticated data transmission or opening the use permission of related functions of software. After a period of time, when a network environment is not scheduled, the synchronous updating of the account data information is realized by reporting the account information, and the reporting of the data needs to be completed in a repayment period similar to a credit card system. Referring to fig. 7, the resource exchange process is: under the condition of a non-real-time network environment, a buyer and a seller directly use transmission means such as NFC, Bluetooth and the like to authenticate public keys and private keys of the buyer and the seller, so that data transmission is realized, and the resource exchange between the buyer and the seller is completed.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.

Claims (9)

1. A method of resource exchange, comprising the steps of:
when a resource exchange request based on a network-free environment is received, acquiring an encryption identifier corresponding to the resource exchange request, wherein the encryption identifier comprises a public key encryption identifier and a private key encryption identifier;
the decryption is completed through the verification information corresponding to the encrypted identification to obtain the resource exchange information corresponding to the resource exchange request;
after receiving the confirmation exchange instruction of the resource exchange information, completing the resource exchange of the resource exchange request;
the public key and the private key are updated by one of the following methods: sending an update request for updating the public key and the private key to a server within preset time, acquiring the updated public key and the updated private key according to the request,
when the public key and the private key are updated, receiving an updating instruction of the public key and the private key initiated by the server to complete the updating of the public key and the private key;
wherein, after the step of completing the resource exchange of the resource exchange request, the method further comprises: generating a resource exchange list, and encrypting the resource exchange list through a public key or a private key; and sending the encrypted resource exchange list to a sending end corresponding to the resource exchange request for the sending end to confirm and store the resource exchange list.
2. The method of claim 1, wherein the step of completing the resource exchange of the resource exchange request is further followed by:
and updating the resource exchange information related to the resource exchange to a server corresponding to the corresponding resource provider when any party corresponding to the resource exchange request uses the network.
3. The method of claim 1, wherein before the step of obtaining the encrypted identifier corresponding to the resource exchange request, the encrypted identifier comprising a public key encrypted identifier and a private key encrypted identifier, the method further comprises:
requesting public key and private key information from a server corresponding to a resource provider based on a network environment;
and receiving and storing the public key and the private key information so as to complete the exchange of the resource information through the public key and the private key.
4. The method according to claim 1, wherein after the step of obtaining the resource exchange information corresponding to the resource exchange request by decrypting the authentication information corresponding to the encrypted identifier is completed, the method further comprises:
acquiring resource transaction limiting information of a switched party corresponding to the resource switching request;
when the resource exchange information is matched with the resource transaction limiting information, prompting that the resource information cannot be exchanged;
and when the resource exchange information is not matched with the resource transaction limiting information, prompting whether to confirm that the resource information exchange is completed or not.
5. A resource exchange apparatus, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring an encrypted identifier corresponding to a resource exchange request when the resource exchange request based on a network-free environment is received, and the encrypted identifier comprises a public key encrypted identifier and a private key encrypted identifier;
the decryption module is used for completing decryption through the verification information corresponding to the encrypted identifier to obtain the resource exchange information corresponding to the resource exchange request;
the exchange module is used for finishing the resource exchange of the resource exchange request after receiving the confirmation exchange instruction of the resource exchange information;
wherein the resource switching apparatus further comprises: the generating module is used for generating a resource exchange list; the encryption module is used for encrypting the resource exchange list through a public key or a private key; the sending module is used for sending the encrypted resource exchange list to a sending end corresponding to the resource exchange request so as to be confirmed and stored by the sending end;
the apparatus is further operable to: requesting a request for updating a public key and a private key to a server within preset time, or receiving an updating instruction of the public key and the private key initiated by the server when the public key and the private key are updated, and completing the updating of the public key and the private key.
6. The resource switching apparatus of claim 5, wherein the resource switching apparatus further comprises:
and the updating module is used for updating the resource exchange information related to the resource exchange to a server corresponding to a corresponding resource provider when any party corresponding to the resource exchange request uses the network.
7. The resource switching apparatus as claimed in claim 5 or 6, wherein said resource switching apparatus further comprises:
the request module is used for requesting public key and private key information from a server corresponding to a resource provider based on a network environment;
and the receiving module is used for receiving and storing the public key and the private key information so as to complete the exchange of the resource information through the public key and the private key.
8. The resource switching apparatus as claimed in claim 5 or 6, wherein said resource switching apparatus further comprises: a prompt module for prompting the user to send a prompt message,
the acquisition module is further configured to acquire resource transaction restriction information of a switched party corresponding to the resource exchange request;
the prompting module is used for prompting that the resource information cannot be exchanged when the resource exchange information is matched with the resource transaction limiting information; and the resource exchange module is also used for prompting whether to confirm the completion of the resource information exchange when the resource exchange information is not matched with the resource transaction limiting information.
9. A storage medium, in which a computer program is stored, wherein the computer program is arranged to perform the method of any of claims 1 to 4 when executed.
CN201510425524.XA 2015-07-17 2015-07-17 Resource exchange method and device Active CN106713218B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510425524.XA CN106713218B (en) 2015-07-17 2015-07-17 Resource exchange method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510425524.XA CN106713218B (en) 2015-07-17 2015-07-17 Resource exchange method and device

Publications (2)

Publication Number Publication Date
CN106713218A CN106713218A (en) 2017-05-24
CN106713218B true CN106713218B (en) 2020-02-07

Family

ID=58900053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510425524.XA Active CN106713218B (en) 2015-07-17 2015-07-17 Resource exchange method and device

Country Status (1)

Country Link
CN (1) CN106713218B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614767B (en) * 2018-11-19 2021-05-25 中国地质大学(武汉) Decentralized O2O resource evidence exchange method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102468960A (en) * 2010-11-16 2012-05-23 卓望数码技术(深圳)有限公司 Off-line mode identity and transaction authentication method and terminal
CN102881092A (en) * 2012-09-13 2013-01-16 守望者科技(北京)有限公司 Bluetooth mobile communication terminal and payment method
CN103077456A (en) * 2012-12-11 2013-05-01 万常诚 Mobile payment method in off-line mode
CN103839340A (en) * 2012-11-27 2014-06-04 中国电信股份有限公司 Method and system for synchronizing electronic purse information and over-the-air earmarking service platform
CN104038924A (en) * 2014-06-05 2014-09-10 腾讯科技(深圳)有限公司 Method and system for achieving resource exchange information processing
CN104050567A (en) * 2014-05-30 2014-09-17 深圳天珑无线科技有限公司 Data interaction method under off-line mode, terminal and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102468960A (en) * 2010-11-16 2012-05-23 卓望数码技术(深圳)有限公司 Off-line mode identity and transaction authentication method and terminal
CN102881092A (en) * 2012-09-13 2013-01-16 守望者科技(北京)有限公司 Bluetooth mobile communication terminal and payment method
CN103839340A (en) * 2012-11-27 2014-06-04 中国电信股份有限公司 Method and system for synchronizing electronic purse information and over-the-air earmarking service platform
CN103077456A (en) * 2012-12-11 2013-05-01 万常诚 Mobile payment method in off-line mode
CN104050567A (en) * 2014-05-30 2014-09-17 深圳天珑无线科技有限公司 Data interaction method under off-line mode, terminal and server
CN104038924A (en) * 2014-06-05 2014-09-10 腾讯科技(深圳)有限公司 Method and system for achieving resource exchange information processing

Also Published As

Publication number Publication date
CN106713218A (en) 2017-05-24

Similar Documents

Publication Publication Date Title
US10594498B2 (en) Method and service-providing server for secure transmission of user-authenticating information
AU2019203267B2 (en) Method and apparatus for facilitating electronic payments using a wearable device
CN110493261B (en) Verification code obtaining method based on block chain, client, server and storage medium
US8719573B2 (en) Secure peer discovery and authentication using a shared secret
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
US11824854B2 (en) Communication system and computer readable storage medium
CN105991287A (en) Signature data generation and fingerprint authentication request method and device
CN111917773A (en) Service data processing method and device and server
CN111628871B (en) Block chain transaction processing method and device, electronic equipment and storage medium
TWI775288B (en) Payment token application method, equipment, system and server
US20230351384A1 (en) Card management method, user terminal, server, system and storage medium
KR20150003297A (en) Method and system using a cyber id to provide secure transactions
KR101754486B1 (en) Method for Providing Mobile Payment Service by Using Account Information
CN114040411A (en) Equipment binding method and device, electronic equipment and storage medium
CN105574720A (en) Secure information processing method and secure information processing apparatus
US20090150979A1 (en) Network system, network method, and terminal and program therefor
CN106713218B (en) Resource exchange method and device
CN110365646B (en) Method and device for associating entity to first server
EP3188104A1 (en) Peer-to-peer transaction authorization
CN106330897A (en) Information storage method and system
JP5276531B2 (en) IC card function use method, IC card function use system, service provider server, and IC card function server
CN113919007A (en) Data signature method and device, electronic equipment and computer readable storage medium
CN116319001A (en) Sensitive certificate management method and device, electronic equipment and storage medium
CN116415946A (en) Payment method, device and system based on hardware wallet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant