CN111311412A - Decentralized transaction confirmation method and device and server - Google Patents

Decentralized transaction confirmation method and device and server Download PDF

Info

Publication number
CN111311412A
CN111311412A CN202010113885.1A CN202010113885A CN111311412A CN 111311412 A CN111311412 A CN 111311412A CN 202010113885 A CN202010113885 A CN 202010113885A CN 111311412 A CN111311412 A CN 111311412A
Authority
CN
China
Prior art keywords
information
resource transfer
server
transfer information
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010113885.1A
Other languages
Chinese (zh)
Other versions
CN111311412B (en
Inventor
邹泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010113885.1A priority Critical patent/CN111311412B/en
Publication of CN111311412A publication Critical patent/CN111311412A/en
Application granted granted Critical
Publication of CN111311412B publication Critical patent/CN111311412B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The disclosure provides a decentralized transaction confirmation method, a decentralized transaction confirmation device and a server, and belongs to the technical field of internet. The method comprises the following steps: receiving a deployment request of a terminal, wherein the deployment request carries a card identifier of a target card; deploying a transfer confirmation interface for decentralization for the target card based on the deployment request, and acquiring secret key information of the target card through the transfer confirmation interface; responding to a first resource transfer request initiated by the terminal to the first server based on the target card, and receiving first resource transfer information through a transfer confirmation interface, wherein the first resource transfer information is generated by the first server based on the first resource transfer request; the first resource transfer information is asymmetrically encrypted through key information in the transfer confirmation interface to obtain second resource transfer information; and sending the second resource transfer information to the first server. Because the transfer confirmation interface for confirming the transaction is decentralized and adopts asymmetric encryption, the security of the transaction can be improved.

Description

Decentralized transaction confirmation method and device and server
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a decentralized transaction confirmation method, apparatus, and server.
Background
In recent years, internet technology and market have been rapidly developed, and electronic banking including internet banking, mobile banking and internet payment has become a main channel of user transaction. How to guarantee the transaction safety is an important subject which is concerned by transaction institutions and users.
In the related art, a transaction institution provides a user with an electronic scrambler having a binding relationship with a user's card, and when the user initiates resource transfer to the transaction institution through the card, the transaction institution sends resource transfer information to the electronic scrambler bound to the user's card. After the user verifies that the resource transfer information is correct, the user can utilize the password in the electronic password device to confirm the transaction, and then the transaction mechanism carries out resource transfer operation based on the resource transfer information.
The related art has a problem in that since the electronic encryptor is issued by a transaction authority, there is no absolute decentralized trust, resulting in low security of transactions.
Disclosure of Invention
The embodiment of the disclosure provides a decentralized transaction confirmation method, a decentralized transaction confirmation device and a server, which can improve the security of a transaction. The technical scheme is as follows:
in a first aspect, there is provided a decentralized transaction confirmation method, the method comprising:
receiving a deployment request of a terminal, wherein the deployment request carries a card identifier of a target card;
deploying a transfer confirmation interface for decentralization for the target card based on the deployment request, and acquiring key information of the target card through the transfer confirmation interface;
responding to a first resource transfer request initiated by the terminal to a first server based on the target card, and receiving first resource transfer information through the transfer confirmation interface, wherein the first resource transfer information is generated by the first server based on the first resource transfer request;
asymmetrically encrypting the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information;
sending the second resource transfer information to the first server.
In one possible implementation, the deploying, for the target card, a transfer confirmation interface for decentralization based on the deployment request includes:
acquiring a first program code of a public deployment transfer confirmation interface;
and inputting the card identification of the target card as a parameter into the first program code to obtain a second program code, and operating the second program code to obtain the transfer confirmation interface for decentralization.
In another possible implementation manner, the obtaining the first program code of the common deployment transfer confirmation interface includes:
the first program code is obtained from a cloud server, or the first program code is obtained from the first server.
In another possible implementation manner, the asymmetrically encrypting the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information includes:
storing the key information in the transfer confirmation interface, and sending a public key in the key information to the first server through the transfer confirmation interface;
and encrypting the first resource transfer information through a private key in the key information to obtain the second resource transfer information.
In another possible implementation manner, the encrypting the first resource transfer information by using a private key in the key information to obtain the second resource transfer information includes:
sending notification information to the terminal through the transfer confirmation interface, wherein the notification information is used for confirming the first resource transfer information by the terminal;
and in response to the confirmation operation of the terminal, encrypting the first resource transfer information through a private key in the key information to obtain the second resource transfer information.
In another possible implementation manner, before sending notification information to the terminal through the transfer confirmation interface, the method further includes:
acquiring first position information of the first resource transfer request currently sent by the terminal; acquiring second position information of a second resource transfer request initiated by the terminal history, and determining a target position range of the second resource transfer request initiated by the terminal according to the second position information; responding to the first position information not being in the target position range, executing the step of sending notification information to the terminal through the transfer confirmation interface; alternatively, the first and second electrodes may be,
acquiring a first transfer value in the first resource transfer information; acquiring a second resource value of a second resource transfer request initiated by the terminal history, and determining a target resource value range of the second resource transfer request initiated by the terminal according to the second resource value; and responding to the condition that the first resource value is not in the target resource value range, and executing the step of sending notification information to the terminal through the transfer confirmation interface.
In another possible implementation manner, before the encrypting the first resource transfer information by using a private key in the key information to obtain the second resource transfer information, the method further includes:
determining a difference between a time in the first resource transfer information and a current time;
and in response to the difference value being smaller than a first threshold value, executing the step of encrypting the first resource transfer information by a private key in the key information to obtain the second resource transfer information.
In another possible implementation manner, the obtaining, by the transfer confirmation interface, key information of the target card includes:
generating a private key of the target card according to the card identification of the target card through the transfer confirmation interface, and generating a corresponding public key according to the private key;
and taking the private key and the public key as the key information of the target card.
In another possible implementation manner, the method further includes:
storing the second resource transfer information in the transfer confirmation interface;
receiving a verification request of the terminal, wherein the verification request carries a card identifier of the target card;
reading the second resource transfer information from the transfer confirmation interface according to the card identification, and decrypting the second resource transfer information through the public key to obtain fourth resource transfer information;
and sending the fourth resource transfer information to the terminal.
In a second aspect, there is provided another decentralized transaction confirmation method, the method comprising:
receiving a public key of a target card sent by a second server through a decentralized transfer confirmation interface, and storing the public key, wherein the transfer confirmation interface is deployed on the second server and is used for encrypting first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information;
responding to a first resource transfer request initiated by the terminal based on the target card, and generating first resource transfer information;
sending a confirmation request to the second server through the transfer confirmation interface, wherein the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through a private key of the target card to obtain second resource transfer information;
receiving second resource transfer information sent by the second server through the transfer confirmation interface;
decrypting the second resource transfer information through the public key to obtain third resource transfer information;
in response to the third resource transfer information and the first resource transfer information being consistent, storing the second resource transfer information by a target node in a target block chain.
In a possible implementation manner, after the storing the second resource transfer information by the target node in the target block chain, the method further includes:
receiving a verification request of the terminal, wherein the verification request carries a card identifier of the target card;
reading the second resource transfer information from the target node according to the card identification;
and sending the second resource transfer information to the terminal.
In another possible implementation manner, the target node includes: at least one of a federation link node of the first server, a federation link node of the terminal, and a federation link node of a third party.
In a third aspect, there is provided a decentralized transaction confirmation apparatus, the apparatus comprising:
the first receiving module is used for receiving a deployment request of a terminal, wherein the deployment request carries a card identifier of a target card;
the deployment module is used for deploying a transfer confirmation interface for decentralization for the target card based on the deployment request, and acquiring secret key information of the target card through the transfer confirmation interface;
the first receiving module is further configured to receive, in response to the terminal initiating a first resource transfer request to a first server based on the target card, first resource transfer information through the transfer confirmation interface, where the first resource transfer information is generated by the first server based on the first resource transfer request;
the encryption module is used for carrying out asymmetric encryption on the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information;
a first sending module, configured to send the second resource transfer information to the first server.
In a possible implementation manner, the deployment module is further configured to obtain a first program code of a common deployment transfer confirmation interface; and inputting the card identification of the target card as a parameter into the first program code to obtain a second program code, and operating the second program code to obtain the transfer confirmation interface for decentralization.
In another possible implementation manner, the deployment module is further configured to obtain the first program code from a cloud server, or obtain the first program code from the first server.
In another possible implementation manner, the encryption module is further configured to store the key information in the transfer confirmation interface, and encrypt the first resource transfer information by using a private key in the key information to obtain the second resource transfer information;
the first sending module is further configured to send the public key in the key information to the first server through the transfer confirmation interface.
In another possible implementation manner, the first sending module is further configured to send notification information to the terminal through the transfer confirmation interface, where the notification information is used for the terminal to confirm the first resource transfer information;
the encryption module is further configured to encrypt the first resource transfer information through a private key in the key information in response to receiving the confirmation operation of the terminal, so as to obtain the second resource transfer information.
In another possible implementation manner, the first sending module is further configured to obtain first location information of the terminal that currently sends the first resource transfer request; acquiring second position information of a second resource transfer request initiated by the terminal history, and determining a target position range of the second resource transfer request initiated by the terminal according to the second position information; responding to the first position information not being in the target position range, and sending notification information to the terminal through the transfer confirmation interface; or acquiring a first transfer value in the first resource transfer information; acquiring a second resource value of a second resource transfer request initiated by the terminal history, and determining a target resource value range of the second resource transfer request initiated by the terminal according to the second resource value; and responding to the condition that the first resource value is not in the target resource value range, and sending notification information to the terminal through the transfer confirmation interface.
In another possible implementation manner, the encryption module is further configured to determine a difference between the time in the first resource transfer information and the current time; and in response to the difference value being smaller than a first threshold value, encrypting the first resource transfer information through a private key in the key information to obtain the second resource transfer information.
In another possible implementation manner, the deployment module is further configured to generate, through the transfer confirmation interface, a private key of the target card according to the card identifier of the target card, and generate a corresponding public key according to the private key; and taking the private key and the public key as the key information of the target card.
In another possible implementation manner, the encryption module is further configured to store the second resource transfer information in the transfer confirmation interface; receiving a verification request of the terminal, wherein the verification request carries a card identifier of the target card; reading the second resource transfer information from the transfer confirmation interface according to the card identification, and decrypting the second resource transfer information through the public key to obtain fourth resource transfer information;
the first sending module is further configured to send the fourth resource transfer information to the terminal.
In a fourth aspect, there is provided another decentralized transaction confirmation device, said device comprising:
the second receiving module is used for receiving a public key of a target card sent by a second server through a decentralized transfer confirmation interface, storing the public key, wherein the transfer confirmation interface is deployed on the second server and is used for encrypting first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information;
the generating module is used for responding to a first resource transfer request initiated by the terminal based on the target card and generating first resource transfer information;
a second sending module, configured to send a confirmation request to the second server through the transfer confirmation interface, where the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through a private key of the target card to obtain second resource transfer information;
the second receiving module is further configured to receive second resource transfer information sent by the second server through the transfer confirmation interface;
the decryption module is used for decrypting the second resource transfer information through the public key to obtain third resource transfer information;
and the storage module is used for responding to the consistency of the third resource transfer information and the first resource transfer information and storing the second resource transfer information through a target node in a target block chain.
In a possible implementation manner, the second receiving module is further configured to receive a verification request of the terminal, where the verification request carries a card identifier of the target card;
the second sending module is further configured to read the second resource transfer information from the target node according to the card identifier; and sending the second resource transfer information to the terminal.
In another possible implementation manner, the target node includes: at least one of a federation link node of the first server, a federation link node of the terminal, and a federation link node of a third party.
In a fifth aspect, a server is provided, which includes a processor and a memory, where at least one instruction is stored in the memory, and the instruction is loaded by the processor and executed to implement the operations performed in the decentralized transaction confirmation method according to any one of the above possible implementation manners.
In a sixth aspect, a computer-readable storage medium is provided, in which at least one instruction is stored, where the instruction is loaded and executed by a processor to implement the operations performed by a server in the decentralized transaction confirmation method according to any one of the above possible implementation manners.
The technical scheme provided by the embodiment of the disclosure has the following beneficial effects:
in the embodiment of the disclosure, a deployment request of a terminal is received, a transfer confirmation interface for decentralization is deployed for a target card based on the deployment request, and key information of the target card is acquired through the transfer confirmation interface, that is, a dedicated transfer confirmation interface is deployed for a user. By responding to a first resource transfer request initiated by the terminal to the first server based on the target card, receiving first resource transfer information through the transfer confirmation interface, the first resource transfer information is asymmetrically encrypted through the key information in the transfer confirmation interface to obtain second resource transfer information, the second resource transfer information is sent to the first server, i.e. the resource transfer information generated by the first server of the transaction arrangement requires transaction confirmation through a user-specific transfer confirmation interface, because the transfer confirmation interface for confirming the transaction is decentralized and adopts asymmetric encryption, the transaction institution can not obtain the private key in the key information for performing asymmetric encryption, therefore, the transaction mechanism can not forge the resource transfer information, and the user can not repudiate the resource transfer information of the transaction mechanism, thereby improving the security of the transaction.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a schematic illustration of an implementation environment provided by embodiments of the present disclosure;
FIG. 2 is a schematic diagram of a data storage system provided by an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a block chain structure according to an embodiment of the disclosure;
fig. 4 is a schematic diagram of a data block generation process according to an embodiment of the disclosure;
FIG. 5 is a flow chart of a decentralized transaction confirmation method provided by an embodiment of the present disclosure;
FIG. 6 is a flow chart of a decentralized transaction confirmation method provided by an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a data storage process provided by an embodiment of the present disclosure;
FIG. 8 is a flow chart of a decentralized transaction confirmation method provided by an embodiment of the present disclosure;
FIG. 9 is a schematic illustration of a decentralized transaction confirmation process provided by an embodiment of the present disclosure;
FIG. 10 is a block diagram of a decentralized transaction confirmation device according to an embodiment of the present disclosure;
FIG. 11 is a block diagram of a decentralized transaction confirmation device according to an embodiment of the present disclosure;
fig. 12 is a schematic structural diagram of a server according to an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
FIG. 1 is a schematic diagram of an implementation environment provided by embodiments of the present disclosure. Referring to fig. 1, the implementation environment includes a terminal 101, a second server 102, and a first server 103, and the terminal 101, the second server 102, and the first server 103 are connected via a wireless or wired network. The terminal 101 may be a computer, a mobile phone, a tablet computer or other terminals. The terminal 101 may have a first application installed thereon, where the first application may be an application providing cloud services, the second server 102 may be a cloud server, and the second server 102 provides cloud services for the terminal 101 through the first application on the terminal 101. The terminal 101 may have a second application installed thereon, the second application may be bound to a target card, and the terminal 101 may perform resource transfer through the second application based on the target card. Wherein the second application may be a financial application, a shopping application, a social application, etc. When the terminal 101 performs resource transfer based on the target card, the first server 103 generates corresponding resource transfer information, where the first server 103 is a background server providing resource transfer service for the target card, and the target card and the first server 103 have a binding relationship.
It should be noted that the resource transfer information generated by the first server 103 needs to be encrypted, and the encryption process is a process of performing signature authentication on the resource transfer information. To encrypt the resource transfer information, the terminal 101 may send a deployment request to the second server 102 through the first application, where the deployment request carries the card identifier of the target card. After receiving the deployment request, the second server 102 deploys a transfer confirmation interface for decentralization for the target card based on the deployment request, and obtains key information of the target card through the transfer confirmation interface, wherein the key information includes a public key and a private key. After the second server 102 deploys the transfer confirmation interface, when the terminal 101 performs resource transfer through the second application based on the target card, the first server 103 sends the first resource transfer information generated by the first server to the second server 102. After receiving the first resource transfer information, the second server 102 performs asymmetric encryption on the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information. The second resource transfer information is then sent to the first server 103.
It should be noted that, in general, the process of deploying the transfer confirmation interface only needs to be performed once, that is, the resource transfer information generated by the first server 103 may be encrypted by the transfer confirmation interface deployed this time, and the terminal 101 does not need to request to deploy one transfer confirmation interface before resource transfer is performed by the target card each time. The second server 102 deploys a transfer confirmation interface of the target card, when the terminal 101 performs resource transfer based on the target card, the resource transfer information generated by the first server 103 needs to be asymmetrically encrypted through key information in the transfer confirmation interface, and since the first server 103 cannot acquire a private key in the transfer confirmation interface, the first server 103 cannot forge the resource transfer information, and a user corresponding to the terminal 101 cannot repudiate the encrypted resource transfer information, thereby improving the security of the transaction.
Referring to the data storage system shown in fig. 2, the data storage system 200 refers to a system for performing data storage between nodes, the data storage system may include a plurality of nodes 201, and the plurality of nodes 201 may refer to respective clients in the data storage system. In an embodiment of the present disclosure, the plurality of nodes may include the first server, a federation chain node of the terminal, and a federation chain node of the third party. Each node 201 may receive input information during normal operation and maintain stored data within the data storage system based on the received input information. In an embodiment of the present disclosure, the input information may be second resource transfer information. In order to ensure information intercommunication in the data storage system, information connection can exist between each node in the data storage system, and information transmission can be carried out between the nodes through the information connection. For example, when an arbitrary node in the data storage system receives input information, other nodes in the data storage system acquire the input information according to a consensus algorithm, and store the input information as data in stored data, so that the data stored on all nodes in the data storage system are consistent.
Each node in the data storage system has a corresponding node identifier, and each node in the data storage system can store node identifiers of other nodes in the data storage system, so that the generated block can be broadcast to other nodes in the data storage system according to the node identifiers of other nodes. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
TABLE 1
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node N 119.123.789.258
Each node in the data storage system stores one and the same blockchain. The block chain is composed of a plurality of blocks, referring to fig. 3, the block chain is composed of a plurality of blocks, the starting block includes a block header and a block main body, the block header stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
When each block in the block chain is generated, referring to fig. 4, when the node where the block chain is located receives the input information, the input information is verified, after the verification is completed, the input information is stored in the memory pool, and the hash tree for recording the input information is updated; and then, updating the updating time stamp to the time when the input information is received, trying different random numbers, and calculating the characteristic value for multiple times, so that the calculated characteristic value can meet the following formula:
SHA256(SHA256(version+prev_hash+merkle_root+ntime+nbits+x))<TARGET
wherein, SHA256 is a characteristic value algorithm used for calculating a characteristic value; version is version information of the relevant block protocol in the block chain; prev _ hash is a block head characteristic value of a parent block of the current block; merkle _ root is a characteristic value of the input information; ntime is the update time of the update timestamp; nbits is the current difficulty, is a fixed value within a period of time, and is determined again after exceeding a fixed time period; x is a random number; TARGET is a feature threshold, which can be determined from nbits.
Therefore, when the random number meeting the formula is obtained through calculation, the information can be correspondingly stored, and the block head and the block main body are generated to obtain the current block. And then, the node where the block chain is located respectively sends the newly generated blocks to other nodes in the data storage system where the newly generated blocks are located according to the node identifications of the other nodes in the data storage system, the newly generated blocks are verified by the other nodes, and the newly generated blocks are added to the block chain stored by the newly generated blocks after the verification is completed.
Fig. 5 is a flowchart of a decentralized transaction confirmation method according to an embodiment of the present disclosure. This embodiment introduces the procedure in which the second server deploys the transfer validation interface and encrypts the resource transfer information through the transfer validation interface.
It should be noted that in life, a user needs to open an account at various transaction institutions, including a bank card, a credit card, a deposit card, etc. at a bank, and when the user conducts a transaction through the bank card, the credit card, the deposit card, etc., the first server of the transaction institution generates resource transfer information (i.e., transaction information). Generally, at the time of resource transfer information generation, the first server directly stores the resource transfer information, which may cause a pain point problem: the stored resource transfer information often only contains a small amount of information such as money amount, and the additional information such as environment information is relatively small, so that the later review is not facilitated. For example, when a user views a credit card record, the user often makes it unclear what the transaction scene is, and thus suspects whether the transaction institution has an error or not, and even suspects that the transaction institution stores counterfeit resource transfer information. According to the decentralized transaction confirmation method provided by the embodiment of the disclosure, the transfer confirmation interface corresponding to the target card of the user is deployed on the cloud server (i.e., the second server), the resource transfer information of the target card generated by the first server of the transaction mechanism needs to be encrypted (i.e., transaction confirmation) through the transaction confirmation interface, and the private key used for encryption is acquired through the transfer confirmation interface, and the transaction mechanism does not have the private key and cannot acquire the resource transfer information from the transfer confirmation interface, so that the resource transfer information cannot be forged, thereby avoiding that the transaction part is established on the high credit of the mechanism, reducing the credit requirement of the user on the transaction mechanism, improving the security of the transaction, and being beneficial to the development of transaction business of small-sized mechanisms.
Referring to fig. 5, the embodiment includes:
501. and the second server receives a deployment request of the terminal, wherein the deployment request carries the card identification of the target card.
The second server may be a cloud server, and is configured to provide cloud services for the terminal. The deployment request of the terminal is used for requesting the second server to deploy the transfer confirmation interface for the target card.
The target card may be a credit card, debit card, savings card, or the like, of various cards that may be used for payment. The card identifier of the target card may include one or more of a number of the card, an identifier of a transaction institution issuing the card, an identifier of a user to which the card belongs, and the like, and of course, other identifiers may also be included, which is not limited in this disclosure. The target card can be bound with a plurality of second applications in the terminal, and the terminal can perform resource transfer through the second applications based on the target card bound with the second applications.
In one possible implementation manner, a first application may be installed on the terminal, where the first application is an application providing a cloud service, and the cloud service includes deploying various interfaces for implementing specific functions for a user. The second server is a background server corresponding to the first application, and the second server may be any one server in a background server cluster corresponding to the first application. The terminal can acquire the cloud service provided by the second server through the first application.
In the embodiment of the disclosure, the terminal may send a deployment request to the second server through the first application to request the second server to deploy the transfer confirmation interface as the target card, and then the second server receives the deployment request of the terminal through the first application.
The time for the terminal to send the deployment request to the second server may include two times, where the first time is when the terminal sends the deployment request to the second server through the first application when the target card is bound with the second application; the second occasion is that the terminal sends a deployment request to the second server when initiating the first resource transfer request to the first server of the transaction mechanism based on the target card.
It should be noted that the above-mentioned time when the terminal sends the deployment request to the second server is only an exemplary time, and the terminal may also send the deployment request to the second server at other time, which is not limited by the present disclosure.
502. The second server deploys a transfer confirmation interface for the target card based on the deployment request, and key information of the target card is obtained through the transfer confirmation interface.
The key information includes a public key and a private key.
In one possible implementation manner, the step of deploying, by the second server, the transfer confirmation interface for the target card based on the deployment request includes: and the second server acquires a first program code of the public deployment transfer confirmation interface, inputs the card identification of the target card as a parameter into the first program code to obtain a second program code, and operates the second program code to obtain the transfer confirmation interface corresponding to the target card.
Optionally, the second server may obtain the first program code of the common deployment transfer confirmation interface from the first server of the transaction institution, or may obtain the first program code from other cloud servers providing cloud services. Wherein the first program code is provided for a merchant providing a transfer confirmation interface deployment service and published in a cloud server for use by the transaction institution and the user.
It should be noted that, since the second server is a cloud server, that is, the second server may be any one server in a server cluster providing cloud services, the transfer confirmation interfaces deployed for a plurality of target cards corresponding to a plurality of terminals are not necessarily on the same second server. That is, the transfer confirmation interface is a distributed structure, and each target card has a corresponding transfer confirmation interface. The resource transfer information corresponding to the target card generated by the first server of the transaction mechanism needs to be encrypted through the transfer confirmation interface corresponding to the target card. A central certification authority does not exist to encrypt the resource transfer information corresponding to all the target cards, and the transaction safety is effectively improved through a decentralized transaction certification mode.
In a possible implementation manner, the second server may directly obtain the key information according to the card identifier of the target card, and correspondingly, the step of obtaining the key information of the target card by the second server through the transfer confirmation interface includes: the second server generates a private key of the target card according to the card identification of the target card through the transfer confirmation interface, and generates a corresponding public key according to the private key; and taking the private key and the public key as key information of the target card.
In another possible implementation manner, the second server may obtain the key information according to information of the target card input by the user, and accordingly, the step of obtaining the key information of the target card by the second server through the transfer confirmation interface includes: and the second server receives the information of the target card sent by the terminal, generates a private key of the target card according to the information of the target card, and generates a corresponding public key according to the private key. Wherein the information of the target card is input in the terminal by the user. It is to be understood that the information of the target card is used to generate the private key and the public key of the target card, so the information of the target card may be any information, and the disclosure is not limited thereto.
In another possible implementation manner, the step of the second server obtaining the key information of the target card through the transfer confirmation interface includes: and the second server receives the private key of the target card sent by the terminal and generates a corresponding public key according to the private key, wherein the private key of the target card is input into the terminal by the user.
The first server of the transaction institution decrypts and checks the encrypted resource transfer information of the target card generated by the second server. Moreover, the private key, the public key, the transfer confirmation interface and the target card have a one-to-one correspondence relationship, that is, one target card corresponds to one transfer confirmation interface, one private key and one public key.
In a possible implementation manner, the transfer confirmation interface may also correspond to the user identifier, and when one user identifier corresponds to a plurality of target cards, the resource transfer information of the plurality of target cards may be encrypted through the transfer confirmation interface corresponding to the user identifier.
Accordingly, step 501 may be: and the second server receives a deployment request of the terminal, wherein the deployment request carries the user identification and the card identification of the target card corresponding to the user identification. The implementation manner is the same as that of step 501, and is not described herein again.
Accordingly, step 502 may be: and the second server deploys a transfer confirmation interface for the user identifier based on the deployment request, and acquires key information of the user identifier through the transfer confirmation interface, wherein the key information comprises a public key and a private key. The implementation manner is the same as the above steps, and is not described herein again.
503. The second server responds to a first resource transfer request initiated by the terminal to the first server based on the target card, and receives first resource transfer information through the transfer confirmation interface, wherein the first resource transfer information is generated by the first server based on the first resource transfer request.
Wherein the first resource transfer information may include: an order number of the transaction and a time of the transaction. The first resource transfer information further includes at least one of location information of the transaction, amount of the transaction, information of the transaction party. Of course, the transaction information may also include other information, which the present disclosure is not limited to.
The step that the second server responds to the terminal to initiate the first resource transfer request to the first server based on the target card, and the first resource transfer information is received through the transfer confirmation interface comprises the following steps: the method comprises the steps that a first server responds to a first resource transfer request which is sent to the first server by a terminal based on a target card, first resource transfer information is generated, the first server calls a transfer confirmation interface, a second server corresponding to the transfer confirmation interface is determined, the first resource transfer information is sent to the second server, and the second server receives the first resource transfer information.
Taking the example that the terminal performs resource transfer (transfer, payment, etc.) through the second application having the binding relationship with the target card, the steps may include: the terminal sends a first resource transfer request to the first server, wherein the first resource transfer request can carry the card identification of the target card. The first server receives the first resource transfer request, and generates first resource transfer information based on the card identification of the target card. The first server calls a transfer confirmation interface corresponding to the target card identification, determines a second server corresponding to the transfer confirmation interface, and then sends the first resource transfer information to the second server. The second server receives the first resource transfer information.
504. And the second server asymmetrically encrypts the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information.
The asymmetric encryption provides a very safe method for data encryption and decryption, a pair of secret keys, a public key and a private key is used, the private key can be safely kept only by one party and cannot be leaked, and the public key can be sent to any person requesting the private key. Asymmetric encryption uses one of the pair of keys for encryption, while decryption requires the other key.
In this disclosure, the step of the second server asymmetrically encrypting the first resource transfer information by using the key information in the transfer confirmation interface to obtain the second resource transfer information includes: the second server stores the key information in the transfer confirmation interface and sends the public key in the key information to the first server through the transfer confirmation interface; and encrypting the first resource transfer information through a private key in the key information to obtain second resource transfer information.
The second server stores the key information in the transfer confirmation interface in two ways, the first way is that under the condition that the transfer confirmation interface corresponds to the target card, the second server can store the key information and the target card in an associated manner, so that when first resource transfer information corresponding to the target card is subsequently received, the first resource transfer information is asymmetrically encrypted through the key information stored in the associated manner of the target card. For example, the storage may be "private key-public key-card identification of the target card".
The second is that under the condition that the transfer confirmation interface corresponds to the user identifier, the second server may store the key information in association with the user identifier and at least one target card corresponding to the user identifier, taking the case that the user identifier corresponds to two target cards, the storage manner may be "private key-public key-user identifier-card identifier of the target card 1-card identifier of the target card 2". Therefore, when first resource transfer information of at least one target card corresponding to the user identification is subsequently received, the first resource transfer information is encrypted through a private key stored in association with the user identification. By the aid of the associated storage mode, the key information corresponding to the first resource transfer information can be quickly found, convenience and rapidness are achieved, and transaction confirmation efficiency is guaranteed.
It should be noted that the embodiment of the present disclosure provides two transaction confirmation methods, and the first method is that the second server directly encrypts the first resource transfer information through the transfer confirmation interface, i.e. does not notify the user. Under some scenes, for example, under the scene that the transaction amount is small but the transaction frequency is high, the transaction confirmation is directly carried out on the first resource transfer information through the transfer confirmation interface, so that the security of the transaction is ensured on one hand, and the efficiency of the transaction confirmation is greatly improved on the other hand.
The second method is that under the condition that the first resource transfer information meets certain conditions (the transaction amount is larger, and/or the transaction position is not a common position), notification information is sent to a terminal of a user, and after the confirmation operation of the user is received, the step of encrypting the first resource transfer information through a transfer confirmation interface is executed. Due to the fact that the transaction risk is large under the conditions that the transaction amount is large, the transaction position is not very suitable for the position and the like, under the conditions, the resource transfer information is notified to the user, the resource transfer can be guaranteed to be operated by the user through auxiliary judgment of the user, and the transaction safety is greatly improved.
For the second transaction confirmation method, the process may be that the second server sends notification information to the terminal through the transfer confirmation interface, where the notification information is used for the terminal to confirm the first resource transfer information; and the second server responds to the confirmation operation of the received terminal, encrypts the first resource transfer information through a private key in the key information, and obtains second resource transfer information.
It should be noted that, the manner of sending the notification information to the terminal by the second server can be divided into two, and the first method is that the second server directly sends the notification information to the terminal, so that the efficiency of transaction confirmation can be improved. The second method is that the second server sends the notification information according to the situation, for example, the notification information is sent when the transaction location is not a common location, in which case, the manner of sending the notification information can be divided into two types according to whether the common location is preset in the terminal, the first type is that the common location is not preset in the terminal but determined according to the historical transaction location, in which case, the step of the second server sending the notification information to the terminal may include:
the second server acquires first position information of a first resource transfer request currently sent by the terminal; acquiring second position information of a second resource transfer request initiated by the terminal history, and determining a target position range of the second resource transfer request initiated by the terminal according to the second position information by the second server; and the second server responds to the fact that the first position information is not in the target position range, and sends notification information to the terminal through the transfer confirmation interface. Wherein the notification information may include one or more of an order number of the transaction, a time of the transaction, a location of the transaction, an amount of the transaction, and information of a party to the transaction. According to the method and the device, the common transaction position of the terminal is determined according to the historical transaction position, so that the process of presetting the common transaction position in the terminal is saved, and the method and the device are more convenient and intelligent.
For example, the second location information includes "western city region", "xuanwu region" and "chongwen region", and the second server determines, according to the second location information, that the target location range of the second resource transfer request initiated by the terminal is "beijing", and if the first location information is not in beijing, for example, the first location information is "shijiazhuang", the second server executes a step of sending notification information to the terminal through the transfer confirmation interface.
For the case that the common location is preset in the terminal, the step of sending the notification information to the terminal by the second server may include: and the second server acquires first position information of a first resource transfer request currently sent by the terminal, and sends notification information to the terminal through the transfer confirmation interface in response to the fact that the first position information is not within a preset position range. Wherein the preset position range may be set in the second server in advance by the user. The common transaction position is preset in the terminal, so that the method is simple and easy to realize.
Another case where the second server sends the notification information according to circumstances is that the transaction amount is large. In this case, the manner of sending the notification information may be divided into two types according to whether the normal range of the transaction amount is preset in the terminal, the first type is that the normal range of the transaction amount is determined according to the historical transaction amount instead of being preset in the terminal, and in this case, the step of the second server sending the notification information to the terminal includes:
the second server acquires a first transfer value in the first resource transfer information; acquiring a second resource value of a second resource transfer request initiated by the terminal in history, and determining a target resource value range of the second resource transfer request initiated by the terminal by the second server according to the second resource value; and the second server responds to the fact that the first resource value is not in the target resource value range, and sends notification information to the terminal through the transfer confirmation interface. The normal range of the transaction amount of the terminal is determined according to the historical transaction amount, so that the process of presetting the normal range of the transaction amount in the terminal is saved, and the terminal is more convenient and intelligent.
For example, the second resource value includes "100 yuan", "600 yuan" and "450 yuan", and the range of the target resource value of the terminal for initiating the second resource transfer request, which is determined by the second server according to the second resource value, is "1000 yuan or less", when the first resource value is not within 1000 yuan, for example, the first resource value is "2000 yuan", the second server performs a step of transmitting the notification information to the terminal through the transfer confirmation interface.
For the case that the normal range of the transaction amount is preset in the terminal, the process of sending the notification information to the terminal by the second server may be: and the second server acquires a first transfer value in the first resource transfer information, responds to the fact that the first resource value is not in the preset resource value range, and sends notification information to the terminal through the transfer confirmation interface. The preset resource value range may be set in the second server in advance by the user. The normal range of the transaction amount is preset in the terminal, so that the method is simple and easy to realize.
It should be noted that the response condition for sending the notification information to the terminal is only an example, and the response condition may be other conditions, which is not limited in this disclosure.
It should be noted that, no matter whether the second server directly encrypts the first resource transfer information through the transfer confirmation interface or sends the notification information to the terminal, the first resource transfer information is encrypted through the transfer confirmation interface after the confirmation operation of the terminal is received, the second server needs to check the time in the first resource transfer information before encrypting the first resource transfer information through the transfer confirmation interface, and only in the case that the time is short of the current time interval, the first resource transfer information is encrypted through the transfer confirmation interface. The process comprises the following steps: the second server determines a difference value between the time in the first resource transfer information and the current time; and the second server responds to the difference value smaller than the first threshold value, encrypts the first resource transfer information through a private key in the key information, and obtains second resource transfer information.
The first threshold value may be set as needed, for example, may be set to 5 minutes, 10 minutes, 1 hour, and the like.
In the embodiment of the present disclosure, because the first resource transfer information includes time, and before the second server encrypts the first resource transfer information through the private key in the key information, the second server determines a difference between the time in the first resource transfer information and the current time; in response to the difference being smaller than the first threshold, the second server performs the step of encrypting the first resource transfer information by the private key in the key information, so that the transaction mechanism can only perform transaction confirmation within a period of time (the time length is smaller than the first threshold) generated by the resource transfer information, when the transaction mechanism performs transaction confirmation on the resource transfer information far away from the current time, the second server reads the time in the first resource transfer information, and when the transfer confirmation interface determines that the time in the first resource transfer information is too far away from the current time (greater than or equal to the first threshold), the encryption can be rejected. The scheme ensures that the transaction mechanism can not forge historical resource transfer information by using scientific and technological means, improves the security of the transaction on one hand, and has great value for establishing trust between the transaction mechanism and the user on the other hand.
505. The second server sends the second resource transfer information to the first server.
In a possible implementation manner, the second server stores the second resource transfer information before sending the second resource transfer information to the first server, and the second resource transfer information may be stored in the transfer confirmation interface by the second server. Further, the second server may create a transaction information base for storing the encrypted second resource transfer information of the user through the transfer confirmation interface. Correspondingly, the storage manner of the second resource transfer information may be: the second server stores the second resource transfer information in a transaction information repository of the transfer confirmation interface.
Of course, the second server may also perform the step of storing the second resource transfer information after sending, which is not limited by this disclosure.
And after receiving the second resource transfer information, the first server of the transaction mechanism decrypts the second resource transfer information through the public key to obtain third resource transfer information. And the first server considers that the second resource transfer information is confirmed by the transaction of the transfer confirmation interface in response to the third resource transfer information being consistent with the first resource transfer information, and then stores the second resource transfer information.
It should be noted that, after the step, the transfer confirmation interface and the first server store the second resource transfer information, that is, both the user and the transaction institution store the resource transfer information of the user, the subsequent user can query the historical resource transfer information in the transaction institution, and the transaction information archived by the query transfer confirmation interface can be verified for the resource transfer information with disagreement. Wherein the step of querying may comprise: the second server receives a verification request of the terminal, wherein the verification request carries the card identification of the target card; the second server reads the second resource transfer information from the transfer confirmation interface according to the card identification, and decrypts the second resource transfer information through the public key to obtain fourth resource transfer information; the second server sends the fourth resource transfer information to the terminal.
For the user, the method can prevent the transaction mechanism from forging the resource transfer information. For a transaction mechanism, the user can be prevented from denying the resource transfer, and the development of transaction business is enhanced. By the decentralized transaction confirmation method provided by the embodiment, the security of the transaction can be improved, and the trust of both the transaction mechanism and the user can be enhanced generally.
In the embodiment of the disclosure, a deployment request of a terminal is received, a transfer confirmation interface for decentralization is deployed for a target card based on the deployment request, and key information of the target card is acquired through the transfer confirmation interface, that is, a dedicated transfer confirmation interface is deployed for a user. By responding to a first resource transfer request initiated by the terminal to the first server based on the target card, receiving first resource transfer information through the transfer confirmation interface, the first resource transfer information is asymmetrically encrypted through the key information in the transfer confirmation interface to obtain second resource transfer information, the second resource transfer information is sent to the first server, i.e. the resource transfer information generated by the first server of the transaction arrangement requires transaction confirmation through a user-specific transfer confirmation interface, because the transfer confirmation interface for confirming the transaction is decentralized and adopts asymmetric encryption, the transaction institution can not obtain the private key in the key information for performing asymmetric encryption, therefore, the transaction mechanism can not forge the resource transfer information, and the user can not repudiate the resource transfer information of the transaction mechanism, thereby improving the security of the transaction.
Fig. 6 is a flowchart of a decentralized transaction confirmation method according to an embodiment of the present disclosure. Referring to fig. 6, the embodiment includes:
601. the first server receives a public key of a target card sent by a second server through a decentralized transfer confirmation interface, and stores the public key, wherein the transfer confirmation interface is deployed on the second server and is used for encrypting first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information.
It should be noted that, in the case that the transfer confirmation interface corresponds to the target card, the second server sends the public key of the target card to the first server through the transfer confirmation interface, and correspondingly, the first server receives the public key of the target card sent by the second server through the transfer confirmation interface.
In this case, the first server may store the public key and the target card in an associated manner, so that when second resource transfer information corresponding to the target card is subsequently received, the second resource transfer information is decrypted by the public key stored in the associated manner with the target card. For example, the storage may be "public key — card identification of the target card".
Another point to be described is that, in a case that the transfer confirmation interface corresponds to the user identifier, the second server sends the public key of the user identifier and the card identifier of the target card corresponding to the user identifier to the first server through the transfer confirmation interface, and correspondingly, step 601 may be replaced with: the first server receives a public key of a user identifier and a card identifier of a target card corresponding to the user identifier, which are sent by the second server through a transfer confirmation interface, and stores the public key and the card identifier of the target card, wherein the transfer confirmation interface is deployed on the second server and is used for encrypting first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information.
In this case, the second server may store the public key in association with the user identifier and at least one target card corresponding to the user identifier, and taking the case that the user identifier corresponds to two target cards as an example, the storage manner may be "public key-user identifier-card identifier of target card 1-card identifier of target card 2". And when second resource transfer information of at least one target card corresponding to the user identification is subsequently received, the second resource transfer information is decrypted through the public key stored in association with the user identification. Through the associated storage mode, the public key corresponding to the second resource transfer information can be quickly found, the method is convenient and quick, and the efficiency of decrypting and checking the second resource transfer information by the first server is ensured.
602. The first server responds to a first resource transfer request initiated by the terminal based on the target card and generates first resource transfer information.
Wherein the first resource transfer information may include: an order number of the transaction and a time of the transaction. The first resource transfer information further includes at least one of location information of the transaction, amount of the transaction, information of the transaction party. Of course, the transaction information may also include other information, which the present disclosure is not limited to.
The point to be described is that adding the position information of the transaction in the resource transfer information is beneficial to the query and review of the user in the later period, and can help the user to recall the scene of the transaction, and reduce the possibility that the user suspects the resource transfer information due to forgetting the scene of the transaction, thereby being beneficial to the development of transaction business.
The terminal initiates a first resource transfer request based on the target card, and the first resource transfer request comprises shopping, transferring accounts and the like of the terminal through a second application which is installed on the terminal and is bound with the target card.
603. The first server sends a confirmation request to the second server through the transfer confirmation interface, and the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through the private key of the target card to obtain second resource transfer information.
Wherein the confirmation request may include the first resource transfer information.
The step of the first server sending the confirmation request to the second server through the transfer confirmation interface may be: the first server calls the transfer confirmation interface, determines a second server corresponding to the transfer confirmation interface, and sends a confirmation request to the second server.
In a possible implementation manner, the step of sending, by the first server, the confirmation request to the second server through the transfer confirmation interface includes: the first server carries out Hash operation on the first resource transfer information to obtain a first Hash value, and then sends the first resource transfer information and the first Hash value to the second server through the transfer confirmation interface.
And after receiving the first resource transfer information and the first hash value, the second server performs hash operation on the first resource transfer information to obtain a second hash value, compares the first hash value with the second hash value, and encrypts the first resource transfer information through a private key in response to the first hash value being the same as the second hash value. Because the first resource transfer information is possible to make mistakes or even be tampered in the transmission process, the second server can be prevented from encrypting the wrong or tampered first resource transfer information by using the characteristic of hash operation in the mode, and therefore the safety of transaction is improved.
In the embodiment of the present disclosure, the process of encrypting the first resource transfer information by using the private key is a process of performing transaction confirmation on the first resource transfer information. The private key is generated through a transfer confirmation interface deployed on a second server, and the second server is separated from the first server, that is, the private key is only available to the transfer confirmation interface and a user corresponding to the target card, and cannot be obtained by other users and a transaction institution, so that encrypting the resource transfer information corresponding to the target card through the private key is equivalent to confirming the resource transfer information by the user. By utilizing a cryptology mechanism, only the user corresponding to the target card can confirm the resource transfer information of the target card, so that the transaction safety is improved.
604. And the first server receives second resource transfer information sent by the second server through the transfer confirmation interface.
It should be noted that, in the process of generating the second resource transfer information, the second server needs to send notification information to the terminal, and after obtaining the confirmation operation of the terminal, the first resource transfer information may be encrypted to obtain the second resource transfer information, and if the confirmation time is long, the first server may send the first resource transfer information to the second server, and then receive the second resource transfer information corresponding to the first resource transfer information after a long time. The process may include:
after the first server sends the confirmation request to the second server, the first server responds to that the second resource transfer information is not received within the preset time period, and stores first resource transfer information corresponding to the confirmation request. In this way, the first resource transfer information can be prevented from being lost.
605. And the first server decrypts the second resource transfer information through the public key to obtain third resource transfer information.
Before the first server decrypts the second resource transfer information through the public key, the public key corresponding to the second resource transfer information needs to be found. In a possible implementation manner, the first server may determine, through a transfer confirmation interface that sends the second resource transfer information, a card identifier of a target card corresponding to the second resource transfer information, and find, according to the card identifier of the target card, a public key stored in association with the target card, where the public key is the public key corresponding to the second resource transfer information.
606. And the first server responds to the third resource transfer information and the first resource transfer information being consistent, and stores the second resource transfer information through the target node in the target block chain.
Wherein the target node comprises: at least one of the federation chain node of the first server, the federation chain node of the terminal, and the federation chain node of the third party. Of course, the target node may also be other nodes, which the present disclosure does not limit.
Referring to fig. 7, a schematic diagram of a second resource transfer information storage process is shown. The first server, the alliance link node of the terminal, the alliance link node 1 of the third party and the alliance link node 2 of the third party form a data storage system. The data storage system adopts a block chain and alliance chain storage mode, and a transaction mechanism, a third party evidence storage mechanism and even a user can deploy alliance chain evidence storage nodes. After the first server receives the second resource transfer information sent by the second server, the first server conducts transaction archiving on the second resource transfer information, and then the second resource transfer information is respectively broadcasted to the alliance link node of the first server, the alliance link node of the terminal, the alliance link node 1 of the third party and the alliance link node 2 of the third party. After receiving the second resource transfer information, the target nodes store the second resource transfer information. Of course, the data storage system may further generate a data block encapsulating the second resource transfer information in the subsequent step, and store the data block in the block chain of each target node, which is described in detail in the embodiment of fig. 2 and will not be described herein again.
In a possible implementation manner, the step after the storing, by the target node in the target block chain, the second resource transfer information further includes: the first server receives a verification request of the terminal, wherein the verification request carries a card identifier of a target card; the first server reads second resource transfer information from the target node according to the card identification; and the first server sends the second resource transfer information to the terminal.
It should be noted that, in the application scenario of this step, when the user corresponding to the target card views the second resource transfer information archived by the transfer confirmation interface through the terminal, or when the transaction institution views the second resource transfer information corresponding to the target card, if the resource transfer information is suspicious, the user can check by viewing the second resource transfer information stored in the target block chain in this step. Because the second resource transfer information in the target block chain cannot be changed, the transaction mechanism cannot forge the resource transfer information from the perspective of the user, and the user can be prevented from repudiating the resource transfer information from the perspective of the transaction mechanism, so that the security of the transaction can be improved, and the development of transaction business of a small-sized transaction mechanism is facilitated.
Fig. 8 is a flowchart of a decentralized transaction confirmation method according to an embodiment of the present disclosure. Referring to fig. 8, the embodiment includes:
801. and the terminal sends a deployment request to the second server, wherein the deployment request carries the card identification of the target card.
The implementation of this step is described in step 501, and is not described here.
802. The second server receives a deployment request of the terminal.
The implementation of this step is described in step 501, and is not described here.
803. The second server deploys a transfer confirmation interface for the target card based on the deployment request, and obtains secret key information of the target card through the transfer confirmation interface, wherein the secret key information comprises a public key and a private key.
The implementation of this step is described in step 502, and will not be described herein.
804. The second server stores the private key in the transfer confirmation interface, and sends the public key to the first server through the transfer confirmation interface.
The implementation of this step is described in step 504, and is not described here.
805. And the first server receives the public key of the target card sent by the second server through the transfer confirmation interface and stores the public key.
The implementation of this step is described in step 601, and is not described herein again.
806. The terminal initiates a first resource transfer request to the first server based on the target card.
The implementation of this step is described in step 602, and is not described herein.
807. The first server responds to a first resource transfer request initiated by the terminal based on the target card and generates first resource transfer information.
The implementation of this step is described in step 602, and is not described herein.
808. The first server sends a confirmation request to the second server through the transfer confirmation interface, the confirmation request comprises first resource transfer information, and the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through a private key of the target card to obtain second resource transfer information.
The implementation of this step is already described in step 603, and is not described here again.
809. And the second server receives the confirmation request, and encrypts the first resource transfer information through a private key in the key information to obtain second resource transfer information.
The implementation of this step is described in step 504, and is not described here.
810. The second server sends the second resource transfer information to the first server.
The implementation of this step is described in step 505 and will not be described herein.
811. And the first server receives second resource transfer information sent by the second server through the transfer confirmation interface.
The implementation of this step is described in step 604 and will not be described herein.
812. And the first server decrypts the second resource transfer information through the public key to obtain third resource transfer information.
The implementation of this step is described in step 605, and is not described here.
813. And the first server responds to the third resource transfer information and the first resource transfer information being consistent, and stores the second resource transfer information through the target node in the target block chain.
The implementation of this step is described in step 606 and will not be described herein.
In summary, referring to fig. 9, a schematic diagram of a transaction confirmation process is shown. And the first server of the transaction mechanism sends the generated first resource transfer information including transaction time, order number, transaction amount, transaction position and the like to the second server. The second server informs the user of the first resource transfer information (transaction reminder) through the transfer confirmation interface, after receiving the confirmation operation of the user, the second server confirms the transaction through the transfer confirmation interface to obtain the second resource transfer information, and then the transaction mechanism and the user store the second resource transfer information after the transaction confirmation (transaction archiving).
In the embodiment of the disclosure, a deployment request of a terminal is received, a transfer confirmation interface for decentralization is deployed for a target card based on the deployment request, and key information of the target card is acquired through the transfer confirmation interface, that is, a dedicated transfer confirmation interface is deployed for a user. By responding to a first resource transfer request initiated by the terminal to the first server based on the target card, receiving first resource transfer information through the transfer confirmation interface, the first resource transfer information is asymmetrically encrypted through the key information in the transfer confirmation interface to obtain second resource transfer information, the second resource transfer information is sent to the first server, i.e. the resource transfer information generated by the first server of the transaction arrangement requires transaction confirmation through a user-specific transfer confirmation interface, because the transfer confirmation interface for confirming the transaction is decentralized and adopts asymmetric encryption, the transaction institution can not obtain the private key in the key information for performing asymmetric encryption, therefore, the transaction mechanism can not forge the resource transfer information, and the user can not repudiate the resource transfer information of the transaction mechanism, thereby improving the security of the transaction.
Fig. 10 is a block diagram of a decentralized transaction confirmation device according to an embodiment of the present disclosure. Referring to fig. 10, the apparatus includes:
a first receiving module 1001, configured to receive a deployment request of a terminal, where the deployment request carries a card identifier of a target card;
the deployment module 1002 is configured to deploy a transfer confirmation interface for decentralization for a target card based on a deployment request, and obtain key information of the target card through the transfer confirmation interface;
the first receiving module 1001 is further configured to receive, in response to the terminal initiating a first resource transfer request to the first server based on the target card, first resource transfer information through the transfer confirmation interface, where the first resource transfer information is generated by the first server based on the first resource transfer request;
the encryption module 1003 is configured to perform asymmetric encryption on the first resource transfer information through key information in the transfer confirmation interface to obtain second resource transfer information;
a first sending module 1004, configured to send the second resource transfer information to the first server.
In a possible implementation manner, the deployment module 1002 is further configured to obtain a first program code of a common deployment transfer confirmation interface; and inputting the card identification of the target card as a parameter into the first program code to obtain a second program code, and operating the second program code to obtain a transfer confirmation interface for decentralization.
In another possible implementation manner, the deployment module 1002 is further configured to obtain the first program code from a cloud server, or obtain the first program code from the first server.
In another possible implementation manner, the encryption module 1003 is further configured to store the key information in the transfer confirmation interface, and encrypt the first resource transfer information by using a private key in the key information to obtain second resource transfer information;
the first sending module 1004 is further configured to send the public key in the key information to the first server through the transfer confirmation interface.
In another possible implementation manner, the first sending module 1004 is further configured to send notification information to the terminal through the transfer confirmation interface, where the notification information is used for the terminal to confirm the first resource transfer information;
the encrypting module 1003 is further configured to encrypt the first resource transfer information through a private key in the key information in response to receiving the confirmation operation of the terminal, so as to obtain second resource transfer information.
In another possible implementation manner, the first sending module 1004 is further configured to obtain first location information of a first resource transfer request currently sent by the terminal; acquiring second position information of a second resource transfer request initiated by the terminal history, and determining a target position range of the second resource transfer request initiated by the terminal according to the second position information; responding to the first position information not being in the target position range, and sending notification information to the terminal through a transfer confirmation interface; or acquiring a first transfer value in the first resource transfer information; acquiring a second resource value of a second resource transfer request initiated by the terminal history, and determining a target resource value range of the second resource transfer request initiated by the terminal according to the second resource value; and responding to the condition that the first resource value is not in the target resource value range, and sending notification information to the terminal through the transfer confirmation interface.
In another possible implementation manner, the encryption module 1003 is further configured to determine a difference between the time in the first resource transfer information and the current time; and in response to the difference value being smaller than the first threshold value, encrypting the first resource transfer information through a private key in the key information to obtain second resource transfer information.
In another possible implementation manner, the deployment module 1002 is further configured to generate, through the transfer confirmation interface, a private key of the target card according to the card identifier of the target card, and generate a corresponding public key according to the private key; and taking the private key and the public key as key information of the target card.
In another possible implementation manner, the encryption module 1003 is further configured to store the second resource transfer information in the transfer confirmation interface; receiving a verification request of a terminal, wherein the verification request carries a card identifier of a target card; reading second resource transfer information from the transfer confirmation interface according to the card identification, and decrypting the second resource transfer information through a public key to obtain fourth resource transfer information;
the first sending module 1004 is further configured to send the fourth resource transfer information to the terminal.
In the embodiment of the disclosure, a deployment request of a terminal is received, a transfer confirmation interface for decentralization is deployed for a target card based on the deployment request, and key information of the target card is acquired through the transfer confirmation interface, that is, a dedicated transfer confirmation interface is deployed for a user. By responding to a first resource transfer request initiated by the terminal to the first server based on the target card, receiving first resource transfer information through the transfer confirmation interface, the first resource transfer information is asymmetrically encrypted through the key information in the transfer confirmation interface to obtain second resource transfer information, the second resource transfer information is sent to the first server, i.e. the resource transfer information generated by the first server of the transaction arrangement requires transaction confirmation through a user-specific transfer confirmation interface, because the transfer confirmation interface for confirming the transaction is decentralized and adopts asymmetric encryption, the transaction institution can not obtain the private key in the key information for performing asymmetric encryption, therefore, the transaction mechanism can not forge the resource transfer information, and the user can not repudiate the resource transfer information of the transaction mechanism, thereby improving the security of the transaction.
Fig. 11 is a block diagram of a decentralized transaction confirmation device according to an embodiment of the present disclosure. Referring to fig. 11, the apparatus includes:
a second receiving module 1101, configured to receive a public key of a target card sent by a second server through a decentralized transfer confirmation interface, store the public key, where the transfer confirmation interface is deployed on the second server and is used to encrypt first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information;
a generating module 1102, configured to generate first resource transfer information in response to a first resource transfer request initiated by a terminal based on a target card;
a second sending module 1103, configured to send a confirmation request to the second server through the transfer confirmation interface, where the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through a private key of the target card, so as to obtain second resource transfer information;
a second receiving module 1101, configured to receive second resource transfer information sent by the second server through the transfer confirmation interface;
the decryption module 1104 is configured to decrypt the second resource transfer information through the public key to obtain third resource transfer information;
a storing module 1105, configured to, in response to that the third resource transfer information is consistent with the first resource transfer information, store the second resource transfer information through the target node in the target block chain.
In a possible implementation manner, the second receiving module 1101 is further configured to receive a verification request of the terminal, where the verification request carries a card identifier of the target card;
the second sending module 1103 is further configured to read, according to the card identifier, second resource transfer information from the target node; and sending the second resource transfer information to the terminal.
In another possible implementation, the target node includes: at least one of the federation chain node of the first server, the federation chain node of the terminal, and the federation chain node of the third party.
In the embodiment of the disclosure, a deployment request of a terminal is received, a transfer confirmation interface for decentralization is deployed for a target card based on the deployment request, and key information of the target card is acquired through the transfer confirmation interface, that is, a dedicated transfer confirmation interface is deployed for a user. By responding to a first resource transfer request initiated by the terminal to the first server based on the target card, receiving first resource transfer information through the transfer confirmation interface, the first resource transfer information is asymmetrically encrypted through the key information in the transfer confirmation interface to obtain second resource transfer information, the second resource transfer information is sent to the first server, i.e. the resource transfer information generated by the first server of the transaction arrangement requires transaction confirmation through a user-specific transfer confirmation interface, because the transfer confirmation interface for confirming the transaction is decentralized and adopts asymmetric encryption, the transaction institution can not obtain the private key in the key information for performing asymmetric encryption, therefore, the transaction mechanism can not forge the resource transfer information, and the user can not repudiate the resource transfer information of the transaction mechanism, thereby improving the security of the transaction.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
It should be noted that: the decentralized transaction confirmation device provided in the above embodiment is only illustrated by dividing the functional modules when performing information processing, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the functions described above. In addition, the decentralized transaction confirmation device and the decentralized transaction confirmation method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 12 is a schematic structural diagram of a server 1200 according to an embodiment of the present disclosure, where the server 1200 may generate a relatively large difference due to a difference in configuration or performance, and may include one or more processors (CPUs) 1201 and one or more memories 1202, where the memory 1202 stores at least one instruction, and the at least one instruction is loaded and executed by the processors 1201 to implement the methods provided by the foregoing method embodiments. Of course, the server may also have components such as a wired or wireless network interface, a keyboard, and an input/output interface, so as to perform input/output, and the server may also include other components for implementing the functions of the device, which are not described herein again.
In an exemplary embodiment, a computer-readable storage medium, such as a memory, including instructions executable by a processor in a terminal to perform a decentralized transaction confirmation method in the embodiments described below, is also provided. For example, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is intended to be exemplary only and not to limit the present disclosure, and any modification, equivalent replacement, or improvement made without departing from the spirit and scope of the present disclosure is to be considered as the same as the present disclosure.

Claims (13)

1. A decentralized transaction confirmation method, said method comprising:
receiving a deployment request of a terminal, wherein the deployment request carries a card identifier of a target card;
deploying a transfer confirmation interface for decentralization for the target card based on the deployment request, and acquiring key information of the target card through the transfer confirmation interface;
responding to a first resource transfer request initiated by the terminal to a first server based on the target card, and receiving first resource transfer information through the transfer confirmation interface, wherein the first resource transfer information is generated by the first server based on the first resource transfer request;
asymmetrically encrypting the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information;
sending the second resource transfer information to the first server.
2. The method of claim 1, wherein deploying a transfer validation interface for decentralization for the target card based on the deployment request comprises:
acquiring a first program code of a public deployment transfer confirmation interface;
and inputting the card identification of the target card as a parameter into the first program code to obtain a second program code, and operating the second program code to obtain the transfer confirmation interface for decentralization.
3. The method of claim 2, wherein obtaining the first program code of the common deployment transfer confirmation interface comprises:
the first program code is obtained from a cloud server, or the first program code is obtained from the first server.
4. The method of claim 1, wherein the asymmetrically encrypting the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information comprises:
storing the key information in the transfer confirmation interface, and sending a public key in the key information to the first server through the transfer confirmation interface;
and encrypting the first resource transfer information through a private key in the key information to obtain the second resource transfer information.
5. The method according to claim 4, wherein the encrypting the first resource transfer information by a private key in the key information to obtain the second resource transfer information comprises:
sending notification information to the terminal through the transfer confirmation interface, wherein the notification information is used for confirming the first resource transfer information by the terminal;
and in response to the confirmation operation of the terminal, encrypting the first resource transfer information through a private key in the key information to obtain the second resource transfer information.
6. The method of claim 5, wherein before sending the notification information to the terminal through the transfer confirmation interface, the method further comprises:
acquiring first position information of the first resource transfer request currently sent by the terminal; acquiring second position information of a second resource transfer request initiated by the terminal history, and determining a target position range of the second resource transfer request initiated by the terminal according to the second position information; responding to the first position information not being in the target position range, executing the step of sending notification information to the terminal through the transfer confirmation interface; alternatively, the first and second electrodes may be,
acquiring a first transfer value in the first resource transfer information; acquiring a second resource value of a second resource transfer request initiated by the terminal history, and determining a target resource value range of the second resource transfer request initiated by the terminal according to the second resource value; and responding to the condition that the first resource value is not in the target resource value range, and executing the step of sending notification information to the terminal through the transfer confirmation interface.
7. The method according to claim 4, wherein before the encrypting the first resource transfer information by a private key in the key information to obtain the second resource transfer information, the method further comprises:
determining a difference between a time in the first resource transfer information and a current time;
and in response to the difference value being smaller than a first threshold value, executing the step of encrypting the first resource transfer information by a private key in the key information to obtain the second resource transfer information.
8. The method of claim 4, wherein the obtaining key information of the target card through the transfer validation interface comprises:
generating a private key of the target card according to the card identification of the target card through the transfer confirmation interface, and generating a corresponding public key according to the private key;
and taking the private key and the public key as the key information of the target card.
9. The method of claim 4, further comprising:
storing the second resource transfer information in the transfer confirmation interface;
receiving a verification request of the terminal, wherein the verification request carries a card identifier of the target card;
reading the second resource transfer information from the transfer confirmation interface according to the card identification, and decrypting the second resource transfer information through the public key to obtain fourth resource transfer information;
and sending the fourth resource transfer information to the terminal.
10. A decentralized transaction confirmation method, said method comprising:
receiving a public key of a target card sent by a second server through a decentralized transfer confirmation interface, and storing the public key, wherein the transfer confirmation interface is deployed on the second server and is used for encrypting first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information;
responding to a first resource transfer request initiated by the terminal based on the target card, and generating first resource transfer information;
sending a confirmation request to the second server through the transfer confirmation interface, wherein the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through a private key of the target card to obtain second resource transfer information;
receiving second resource transfer information sent by the second server through the transfer confirmation interface;
decrypting the second resource transfer information through the public key to obtain third resource transfer information;
in response to the third resource transfer information and the first resource transfer information being consistent, storing the second resource transfer information by a target node in a target block chain.
11. A decentralized transaction confirmation apparatus, said apparatus comprising:
the first receiving module is used for receiving a deployment request of a terminal, wherein the deployment request carries a card identifier of a target card;
the deployment module is used for deploying a transfer confirmation interface for decentralization for the target card based on the deployment request, and acquiring secret key information of the target card through the transfer confirmation interface;
the first receiving module is further configured to receive, in response to the terminal initiating a first resource transfer request to the first server based on the target card, first resource transfer information through the transfer confirmation interface, where the first resource transfer information is generated by the first server based on the first resource transfer request;
the encryption module is used for carrying out asymmetric encryption on the first resource transfer information through the key information in the transfer confirmation interface to obtain second resource transfer information;
a first sending module, configured to send the second resource transfer information to the first server.
12. A decentralized transaction confirmation apparatus, said apparatus comprising:
the second receiving module is used for receiving a public key of a target card sent by a second server through a decentralized transfer confirmation interface, storing the public key, wherein the transfer confirmation interface is deployed on the second server and is used for encrypting first resource transfer information of a resource transfer request initiated based on the target card to obtain second resource transfer information;
the generating module is used for responding to a first resource transfer request initiated by the terminal based on the target card and generating first resource transfer information;
a second sending module, configured to send a confirmation request to the second server through the transfer confirmation interface, where the confirmation request is used for the transfer confirmation interface to encrypt the first resource transfer information through a private key of the target card to obtain second resource transfer information;
the second receiving module is further configured to receive second resource transfer information sent by the second server through the transfer confirmation interface;
the decryption module is used for decrypting the second resource transfer information through the public key to obtain third resource transfer information;
and the storage module is used for responding to the consistency of the third resource transfer information and the first resource transfer information and storing the second resource transfer information through a target node in a target block chain.
13. A server, comprising a processor and a memory, wherein at least one instruction is stored in the memory, and wherein the instruction is loaded and executed by the processor to perform the operations performed by the decentralized transaction confirmation method according to any one of claims 1 to 10.
CN202010113885.1A 2020-02-24 2020-02-24 Decentralized transaction confirmation method and device and server Active CN111311412B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010113885.1A CN111311412B (en) 2020-02-24 2020-02-24 Decentralized transaction confirmation method and device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010113885.1A CN111311412B (en) 2020-02-24 2020-02-24 Decentralized transaction confirmation method and device and server

Publications (2)

Publication Number Publication Date
CN111311412A true CN111311412A (en) 2020-06-19
CN111311412B CN111311412B (en) 2023-03-10

Family

ID=71160312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010113885.1A Active CN111311412B (en) 2020-02-24 2020-02-24 Decentralized transaction confirmation method and device and server

Country Status (1)

Country Link
CN (1) CN111311412B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114022150A (en) * 2022-01-07 2022-02-08 北京笔新互联网科技有限公司 Resource transfer method, device, electronic equipment and storage medium

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102054258A (en) * 2010-12-16 2011-05-11 中国建设银行股份有限公司 Electronic bank safety certificating method and system based on mobile equipment
CN103955643A (en) * 2014-05-20 2014-07-30 北京握奇智能科技有限公司 Method and device for judging and prompting e-bank (electronic bank) transaction safety
CN104240387A (en) * 2013-06-21 2014-12-24 北京数码视讯科技股份有限公司 Method and system for processing bank card transaction
US20150073983A1 (en) * 2012-05-29 2015-03-12 Protean Payment, Inc. Virtual wallet
CN105976232A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset transaction method and device
CN106408302A (en) * 2016-08-31 2017-02-15 尹子栋 Mobile user-oriented safe payment method and system
CN108596619A (en) * 2018-04-26 2018-09-28 深圳怡化电脑股份有限公司 For the method for commerce of block catenary system, device, Centroid and system
WO2018234882A1 (en) * 2017-05-16 2018-12-27 Angus Bernhardt Pohl A system and method for conducting a transaction
CN109102299A (en) * 2018-08-01 2018-12-28 腾讯科技(深圳)有限公司 Resource transfers data managing method, device and storage medium
CN109245893A (en) * 2017-07-10 2019-01-18 浙江华信区块链科技服务有限公司 A kind of identity building and endorsement method for substituting U-shield
CN109412798A (en) * 2018-12-06 2019-03-01 中链科技有限公司 Private key generation, data interactive method and its system of block chain
CN109903041A (en) * 2018-11-30 2019-06-18 阿里巴巴集团控股有限公司 The method and system of block cochain for the transaction of block chain
CN109919611A (en) * 2019-01-15 2019-06-21 如般量子科技有限公司 Anti- quantum calculation block chain method of commerce and system based on symmetric key pool server
CN110111102A (en) * 2019-03-29 2019-08-09 广东岭南通股份有限公司 A kind of virtual traffic card system and distribution method of commerce based on block chain technology
CN110335040A (en) * 2019-05-28 2019-10-15 平安科技(深圳)有限公司 Resource transfers method, apparatus, electronic equipment and storage medium
CN110431541A (en) * 2017-07-27 2019-11-08 大羚羊区块链金融科技股份有限公司 The electronic trading system and electronic trade method recorded using block chain stored transaction
CN110458542A (en) * 2019-08-02 2019-11-15 中国工商银行股份有限公司 Offline electronic payment system and method based on block chain
CN110619525A (en) * 2019-09-06 2019-12-27 杭州宇链科技有限公司 Block chain-based value card system
CN110719172A (en) * 2018-07-13 2020-01-21 北京京东尚科信息技术有限公司 Signature method, signature system and related equipment in block chain system
CN110766406A (en) * 2019-09-30 2020-02-07 腾讯科技(深圳)有限公司 Resource transfer method, resource transfer device, storage medium, and electronic apparatus

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102054258A (en) * 2010-12-16 2011-05-11 中国建设银行股份有限公司 Electronic bank safety certificating method and system based on mobile equipment
US20150073983A1 (en) * 2012-05-29 2015-03-12 Protean Payment, Inc. Virtual wallet
CN104240387A (en) * 2013-06-21 2014-12-24 北京数码视讯科技股份有限公司 Method and system for processing bank card transaction
CN103955643A (en) * 2014-05-20 2014-07-30 北京握奇智能科技有限公司 Method and device for judging and prompting e-bank (electronic bank) transaction safety
CN105976232A (en) * 2016-06-24 2016-09-28 深圳前海微众银行股份有限公司 Asset transaction method and device
CN106408302A (en) * 2016-08-31 2017-02-15 尹子栋 Mobile user-oriented safe payment method and system
WO2018234882A1 (en) * 2017-05-16 2018-12-27 Angus Bernhardt Pohl A system and method for conducting a transaction
CN109245893A (en) * 2017-07-10 2019-01-18 浙江华信区块链科技服务有限公司 A kind of identity building and endorsement method for substituting U-shield
CN110431541A (en) * 2017-07-27 2019-11-08 大羚羊区块链金融科技股份有限公司 The electronic trading system and electronic trade method recorded using block chain stored transaction
CN108596619A (en) * 2018-04-26 2018-09-28 深圳怡化电脑股份有限公司 For the method for commerce of block catenary system, device, Centroid and system
CN110719172A (en) * 2018-07-13 2020-01-21 北京京东尚科信息技术有限公司 Signature method, signature system and related equipment in block chain system
CN109102299A (en) * 2018-08-01 2018-12-28 腾讯科技(深圳)有限公司 Resource transfers data managing method, device and storage medium
US20210049596A1 (en) * 2018-08-01 2021-02-18 Tencent Technology (Shenzhen) Company Limited Resource transfer data management method and apparatus, and storage medium
CN109903041A (en) * 2018-11-30 2019-06-18 阿里巴巴集团控股有限公司 The method and system of block cochain for the transaction of block chain
CN109412798A (en) * 2018-12-06 2019-03-01 中链科技有限公司 Private key generation, data interactive method and its system of block chain
CN109919611A (en) * 2019-01-15 2019-06-21 如般量子科技有限公司 Anti- quantum calculation block chain method of commerce and system based on symmetric key pool server
CN110111102A (en) * 2019-03-29 2019-08-09 广东岭南通股份有限公司 A kind of virtual traffic card system and distribution method of commerce based on block chain technology
CN110335040A (en) * 2019-05-28 2019-10-15 平安科技(深圳)有限公司 Resource transfers method, apparatus, electronic equipment and storage medium
CN110458542A (en) * 2019-08-02 2019-11-15 中国工商银行股份有限公司 Offline electronic payment system and method based on block chain
CN110619525A (en) * 2019-09-06 2019-12-27 杭州宇链科技有限公司 Block chain-based value card system
CN110766406A (en) * 2019-09-30 2020-02-07 腾讯科技(深圳)有限公司 Resource transfer method, resource transfer device, storage medium, and electronic apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张中霞 等: "区块链钱包方案研究综述" *
杨洪路 等: "基于区块链的ETC管理系统设计与实现" *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114022150A (en) * 2022-01-07 2022-02-08 北京笔新互联网科技有限公司 Resource transfer method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111311412B (en) 2023-03-10

Similar Documents

Publication Publication Date Title
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
EP3610606B1 (en) Managing sensitive data elements in a blockchain network
KR102194077B1 (en) Distributed Key Management for Trusted Execution Environment
EP3673617B1 (en) Retrieving public data for blockchain networks using trusted execution environments
CN110708170B (en) Data processing method and device and computer readable storage medium
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
TWI722116B (en) Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
CN110868301B (en) Identity authentication system and method based on state cryptographic algorithm
CN111431713B (en) Private key storage method and device and related equipment
CN104618116B (en) A kind of cooperative digital signature system and its method
US20200412554A1 (en) Id as service based on blockchain
CN108769010B (en) Method and device for node invited registration
CN112766962A (en) Method for receiving and sending certificate, transaction system, storage medium and electronic device
CN108833431B (en) Password resetting method, device, equipment and storage medium
KR101974062B1 (en) Electronic Signature Method Based on Cloud HSM
CN113255014B (en) Data processing method based on block chain and related equipment
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN111062059B (en) Method and device for service processing
US20210397678A1 (en) Right-holder terminal, user terminal, right-holder program, user program, content usage system, and content usage method
CN111311412B (en) Decentralized transaction confirmation method and device and server
WO2023174350A1 (en) Identity authentication method, apparatus and device, and storage medium
CN111553686A (en) Data processing method and device, computer equipment and storage medium
CN115801287A (en) Signature authentication method and device
CN114358932A (en) Authentication processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024746

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant