CN112513904A - Digital asset transaction control method and device, terminal equipment and storage medium - Google Patents

Digital asset transaction control method and device, terminal equipment and storage medium Download PDF

Info

Publication number
CN112513904A
CN112513904A CN202080002461.6A CN202080002461A CN112513904A CN 112513904 A CN112513904 A CN 112513904A CN 202080002461 A CN202080002461 A CN 202080002461A CN 112513904 A CN112513904 A CN 112513904A
Authority
CN
China
Prior art keywords
information
asset
target user
digital asset
issuer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202080002461.6A
Other languages
Chinese (zh)
Inventor
鲜丹
郭玮
於雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Swiftpass Tech Co ltd
Original Assignee
Swiftpass Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Swiftpass Tech Co ltd filed Critical Swiftpass Tech Co ltd
Publication of CN112513904A publication Critical patent/CN112513904A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

The application is applicable to the technical field of digital assets and provides a digital asset transaction control method, a digital asset transaction control device, terminal equipment and a storage medium. In the embodiment of the application, order information is obtained and sent to the asset issuer corresponding to the order information, so that the asset issuer performs proofreading according to the order information and the preset order information; when the verification is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key; when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer collects digital asset information corresponding to the order information according to the order request; and sending the digital asset information to the target user. Therefore, the problem of high safety risk when the digital assets are transacted is solved.

Description

Digital asset transaction control method and device, terminal equipment and storage medium
Technical Field
The application belongs to the technical field of digital assets, and particularly relates to a digital asset transaction control method, a digital asset transaction control device, terminal equipment and a storage medium.
Background
With the increasing development of the electronization process of currency, transactions conducted by using digital assets are more and more common in people's lives, but with the increasing popularity of transactions conducted by digital assets, the security risk of the transactions is higher and higher in the transactions process, especially in the process that the digital assets are transferred from one user to another user, the security risk is higher when the transactions conducted by the digital assets are conducted due to the fact that multiple users know card numbers and card secrets, and the risk occurrence probability is higher when the number of participants in the transactions conducted by the digital assets is larger.
Disclosure of Invention
The embodiment of the application provides a digital asset transaction control method, a digital asset transaction control device, terminal equipment and a storage medium, and can solve the problem of high security risk when a digital asset is transacted.
In a first aspect, an embodiment of the present application provides a digital asset transaction control method, including:
acquiring order information, and sending the order information to an asset issuer corresponding to the order information so that the asset issuer can perform proofreading according to the order information and preset order information;
when the checking is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key;
when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer can collect digital asset information corresponding to the order information according to the order request;
and acquiring the digital asset information and sending the digital asset information to the target user.
In a second aspect, an embodiment of the present application provides a digital asset transaction control device, including:
the checking module is used for acquiring order information and sending the order information to the asset issuer corresponding to the order information so as to enable the asset issuer to check according to the order information and preset order information;
the setting module is used for sending a preset first dynamic key to a target user corresponding to the order information when the proofreading is passed so that the target user can set an exclusive password according to the first dynamic key;
the request module is used for sending an order request to the asset issuer when the exclusive password is successfully set, so that the asset issuer can collect the digital asset information corresponding to the order information according to the order request;
and the first acquisition module is used for acquiring the digital asset information and sending the digital asset information to the target user.
In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of any one of the above digital asset transaction control methods when executing the computer program.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program, which when executed by a processor implements the steps of any one of the above-mentioned digital asset transaction control methods.
In a fifth aspect, embodiments of the present application provide a computer program product, which, when run on a terminal device, causes the terminal device to execute any one of the digital asset transaction control methods of the first aspect.
In the embodiment of the application, order information is obtained and sent to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information; when the checking is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key; when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer can collect digital asset information corresponding to the order information according to the order request; and acquiring the digital asset information and sending the digital asset information to the target user. The order information of a target user is sent to an asset issuer through terminal equipment, so that the asset issuer can perform proofreading to prevent the order information from not corresponding to the order information before the order information, after the proofreading is passed, the terminal equipment sends a preset first dynamic key to the target user, so that the target user sets an exclusive password by using the first dynamic key, only the target user grasps the password corresponding to the order information, and then the terminal equipment sends digital asset information which is acquired and collected by the asset issuer and corresponds to the order information to the target user, so that the terminal equipment performs integral regulation and control to realize digital asset transaction among different transaction parties, and avoid a plurality of transaction parties grasping the password information corresponding to the digital asset, so that the problem of high safety risk when the digital asset is transacted is solved.
Drawings
FIG. 1 is a first schematic flow chart diagram of a digital asset transaction control method provided by an embodiment of the present application;
FIG. 2 is a second schematic flow chart diagram of a digital asset transaction control method provided by an embodiment of the present application;
FIG. 3 is a diagram of a digital asset transaction process upon hacking as provided by an embodiment of the present application;
FIG. 4 is a diagram of a third party neutral based digital asset transaction process provided by an embodiment of the present application;
FIG. 5 is a third schematic flow chart diagram of a digital asset transaction control method provided by an embodiment of the present application;
FIG. 6 is a fourth flowchart illustrating a digital asset transaction control method according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a digital asset transaction control device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In order to explain the technical solutions provided in the present application, the following detailed description is made with reference to specific drawings and examples.
Fig. 1 is a schematic flow chart of a digital asset transaction control method according to an embodiment of the present application, where an execution subject of the method may be a terminal device, and as shown in fig. 1, the digital asset transaction control method may include the following steps:
step S101, obtaining order information, and sending the order information to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information.
In the embodiment, each trading party in the trading process of the digital assets can be integrally regulated and controlled through the terminal equipment, so that the security risk of the trading of the digital assets is reduced. However, due to some external factors, in the whole digital asset transaction process, a situation that the ordering information generated by the asset issuer according to the received purchase payment of the target user is inconsistent with the order information applied by the target user to the terminal device may occur, so that the terminal device may send the order information to the asset issuer corresponding to the order information after obtaining the order information sent by the target user, thereby facilitating the asset issuer to perform the proofreading according to the order information and the ordering information generated by the purchase payment of the target user before, and sending the proofreading result to the terminal device, so as to facilitate the terminal device to perform further operations. The order information includes ordering purchase information and detailed information about purchase, for example, if the order requested by the current target user is a shopping card, the order information includes the amount of the shopping card and the number of the shopping cards; the asset issuer is a holder of the digital asset, sometimes belongs to a manufacturer, and is responsible for generating and distributing the serial number of the asset and password information corresponding to the serial number, and providing a digital asset basis for modes of verifying, canceling, inquiring and the like of the asset; the target user is a user who needs to apply for the expected digital assets to the asset issuer, and can also serve as the asset issuer after the target user successfully acquires the expected digital assets; the terminal equipment is a control platform for transmitting and trading digital assets, can realize a parking platform for each target user or asset issuer, and can provide a platform for asset transfer operation between the target user and the asset issuer; the above-mentioned digital assets refer to non-monetary assets in the form of electronic data, which are held by an asset issuer for sale or in the process of production in daily activities, and include, but are not limited to, stored value cards, membership cards, coupons, loyalty cards, and the like.
Optionally, as shown in fig. 2, before step S101, the method includes:
step S201, obtaining notification information; and the notification information is information sent by the asset issuer according to the verified ordering information of the target user.
In this embodiment, the transaction of the digital asset involves an actual offline amount of money, for example, the funds for purchasing the digital asset need to be sent to the corresponding asset issuer offline. And the time that the asset issuer actually receives the amount of money may also cause delay due to various factors, and at this time, if the target user sends the order information to the terminal or the device, the target user may not respond to the order information due to not receiving the actual amount of money corresponding to the order information, or send a prompt operation in a preset mode to the target user, so that the target user can find the problem that the target user does not respond to the order information sent by the target user according to the prompt operation. Besides the prompt operation, in order to prevent the non-response situation, after the asset issuer receives the purchase money sent by the target user for the expected order information, whether the purchase money is paid can be verified through electronic receipt, collection bills, transfer records and the like, and whether the demand information of the target user meets the purchase money is verified again, namely whether the demand information can be corresponded, after the order information of the target user is verified, the order information is the purchase money and the demand information of the target user, the asset issuer can generate notification information according to the verified order information, and send the notification information to the terminal equipment, so that the situation that the target user sends the order information without response is avoided. The demand information is what type of digital assets the target user needs, the number of the digital assets, the amount of money corresponding to different numbers and the like; the notification information includes, but is not limited to, the number of cards, the lot number, the amount of money corresponding to each different model of card, and buyer information.
Optionally, the terminal device may obtain funds transaction credentials sent by the target user, such as the electronic receipt, the collection ticket, and the transfer record described above. When disputes occur in the transaction, the responsible party can be quickly determined according to the fund transaction voucher so as to improve the efficiency of transaction accident handling.
And step S202, verifying the asset issuer corresponding to the notification information.
Step S203, when the verification is passed, the notification information is sent to the target user, so that the target user sends corresponding order information according to the notification information.
In this embodiment, since it may happen that the terminal device receives information that is not sent to the asset issuer according to the relevant regulations, and thus an unstable factor occurs in the transaction process, after receiving the notification information, the terminal device needs to verify the asset issuer that sent the notification information to determine whether the asset issuer is legal, and when the verification passes, the terminal device can send the notification information to the corresponding target user, so that the target user is reminded that the purchase money of the target user is received, and when the relevant demand information passes the verification, the terminal device can send order information corresponding to the notification information to the terminal device, so that the distribution platform can perform subsequent response operation according to the order information.
Optionally, before step S202, the method includes:
and acquiring the registration information sent by the asset issuer, and auditing the registration information.
And when the verification is passed, sending preset account information to the asset issuer so that the asset issuer can verify according to the account information.
In this embodiment, in order to avoid illegal transactions caused by applying for digital assets by a user with unknown identity, the terminal device needs to authenticate the identities of both parties of the digital asset transaction, so that a target user or an asset issuer needs to register on the terminal device in advance, and a foundation is laid for subsequent digital asset transactions. Therefore, the terminal device needs to obtain the registration information sent by a certain user, for example, the asset issuer, to audit the registration information according to the registration rule preset by the platform, and when the audit is passed, the preset account information is sent to the asset issuer, so that the asset issuer can change the initial password on the terminal device according to the preset account information, and thus the subsequent asset issuer can independently master the account information, and when the terminal device audits the asset issuer, the terminal device can verify according to the account information to determine whether the current asset issuer is qualified. If the identity registered currently is an enterprise type, the registration information includes, but is not limited to, a tax number, a social unified credit code, a scanning piece, a company mailbox, a mobile phone number, a company introduction and the like; if the identity registered currently is an individual type, the registration information includes, but is not limited to, an identity card, a mobile phone number, a work type and the like; the preset account information includes, but is not limited to, a login account and an initial password.
Optionally, if the registration information sent by the asset issuer is not checked by the terminal device, the terminal device needs to perform a prompt operation in a preset manner, so that the asset issuer performs a corresponding operation according to the prompt operation of the terminal device. For example, when a certain item of registration information sent by an asset issuer in the terminal device is not satisfactory, the terminal device performs a corresponding prompt operation according to the registration information that is not satisfactory, so that the asset issuer changes the corresponding registration information.
And step S102, when the proofreading is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key.
In this embodiment, when there are multiple trading parties in a digital asset trade, the digital asset needs to be transferred among the multiple trading parties, and in this process, both the card number and the card secret corresponding to the digital asset need to be transferred, if there are multiple trading parties, it appears that the multiple trading parties can directly consume the digital asset, and there is no way to enable an end user to perform exclusive protection on the digital asset, so an asset-uniqueness mechanism for the final holder of the digital asset of both trading parties in each trade needs to be established, that is, once the current target user acquires the digital asset, any holder on the digital asset cannot perform any operation on the digital asset. Therefore, when the asset issuer passes the proofreading of the received order information, the asset issuer feeds back to the terminal device a piece of proofreading passing information, which indicates that the terminal device can perform a response operation on the order information sent by the target user, at this time, the terminal device will obtain the current relevant information, generating a first dynamic key according to the related information, and sending the generated first dynamic key to a target user corresponding to the order information, therefore, the target user can check the summary of the asset list to be retrieved under the name of the target user according to the first dynamic secret key, namely the expected demand information and batch number of the target user, at the moment, the target user needs to set an exclusive password according to the first dynamic secret key, therefore, the current target user can conveniently master the digital asset independently, and the holder in front of the digital asset can be prevented from operating the digital asset currently attributed to the target user again. The first dynamic key is a temporary key generated by the terminal equipment in the transaction process and is only known by the holder of the current order information, so that the target user finishes checking the digital asset information corresponding to the order information according to the first dynamic key; the exclusive password is a latest account password which is reset by the target user and is set by the target user, so that order information is exclusively shared.
Optionally, the related information is a time seed, account information of the target user, a random number, a key of the target user, and the like, and the first dynamic key may be generated by using a 3DES algorithm, where the 3DES algorithm has the advantages of small calculation amount, high encryption speed, high encryption efficiency, and the like.
Optionally, in step S102, the target user sets an exclusive password according to the first dynamic key, including: and sending a preset security control to the target user so that the target user can reset the exclusive password on the security control according to the first dynamic key.
In this embodiment, the security of the exclusive secret key is ensured by using a financial-level security encryption scheme, when a target user registers with a terminal device, the specific registration process may be according to the registration process of the asset issuer, after the registration is successful, the terminal device may send a preset security control to the target user, the security control is similar to a bank internet bank security input control, the target user may integrate the security control into a local browser, the security control may have an encrypted public key and a corresponding encryption algorithm, so as to ensure that the public key is not held by an intermediary, the intermediary is also the terminal device, and the establishment of the security control may ensure that only the target user can currently master the exclusive secret key of the digital asset corresponding to the order information. It can be understood that the exclusive password is mainly obtained by the password original text of the target user, the encrypted public key and the random seed generated by the terminal device, and because the terminal device only provides an encryption tool, the encrypted original text is only known by the target user, and the encrypted public key can only exist on the local computer of the target user, the terminal device cannot know the exclusive password of the target user, and further ensures that only the target user can know the exclusive password of the digital asset corresponding to the order information currently.
Optionally, during the transaction of the digital asset, it may happen that the confidential work in the channel transmission process between certain users is unsafe, which may cause eavesdropping and tampering by hackers, so that the security of the transmission of the digital asset during the transaction process needs to be protected. The encrypted file is then transmitted by mail, when the receiver receives the file and the cipher, the file is decrypted, and at the same time, the receiver has the ownership of the digital assets in the file, i.e. the card number and the card cipher, and stores the content in the file, and can continue to transmit the file backwards, and the protocol of the mail transmission is SMTP, if no special encryption measure exists, the transmission is performed by plaintext, and the intermediate process may have the risk of eavesdropping and tampering by hackers. If a hacker steals the document, the encrypted document can be opened through brute force cracking, and then the serial number and the asset password of the digital asset inside are obtained. Even if not intercepted by a hacker, the file is saved to the recipient, i.e., the target user's local computer, because the target user can decrypt the set of assets in the clear, the assets are also at risk of being stolen if the target user's computer is unfortunately hacked. After the hacker takes the card number and the card password, the hacker can also consume the card number and can also forward the card number to other people. Therefore, the terminal equipment can transmit various data in the digital asset transaction process through the HTTPS protocol so as to ensure the safety and reliability of the communication process, and therefore, the terminal equipment cannot be eavesdropped or tampered by people in the data information transmission process. A numeric keypad can also be set, and the numeric keypad with a keyboard hook can intercept the keyboard input content, so that the effect of preventing the keyboard input content from being recorded by other tools is achieved, for example, the local computer Trojan of the target user intercepts the keyboard input of the user. In the whole asset transaction process, the asset issuer and the terminal device do not relate to the transmission and storage of the exclusive password, so that the leakage of the exclusive password is further avoided.
Specifically, as shown in fig. 3, fig. 3 is a diagram of a transaction process of a digital asset in hacking, during the process of transferring the digital asset by the user a and the user B, a card number and a card secret corresponding to the digital asset may be intercepted by a hacker, or the card number and the card secret corresponding to the digital asset may be obtained by the hacker on the local computer of the user a. And after stealing the transmitted compressed document, the hacker cracks violently to obtain the card secret and the card number of the compressed document, and after taking the card secret and the card number, the hacker can consume or forward the card secret and the card number to the user C. The user A, B, C may be a target user in the scheme, or may be an asset issuer when there is a next-level user.
Step S103, when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer can collect the digital asset information corresponding to the order information according to the order request.
And step S104, acquiring the digital asset information and sending the digital asset information to the target user.
In this embodiment, after the target user successfully sets the exclusive password, the terminal device receives the information of successful setting, and sends an order request to the asset issuer, and when the asset issuer receives the order request, the digital asset information that is pre-packaged and corresponds to the current order information is collected and sent to the terminal device, and at this time, the asset issuer cannot perform any operation on the digital asset. And after the terminal equipment acquires the digital asset information sent by the asset issuer, sending the digital asset information to a target user so as to facilitate the target user to operate the digital asset. The digital asset information is detailed information corresponding to the order information, and comprises a card number, an expiration date, a face value, account information of a target user and the like of the card.
Optionally, in order to avoid disputes, due to the fact that the transaction participants are numerous and difficult to backtrack, and it is difficult to locate the final person responsible for the transaction, a third-party neutral institution needs to be established for notarization supervision, and since the notarization of the third-party neutral institution has legal notarization and cannot be tampered, the notarization of the assignment relationship in each transaction process is certified for notarization, so that if asset risk cases similar to asset stealing appear in the following process, relationship responsible parties can be located quickly, and the security in the asset transaction process is guaranteed. Therefore, when the exclusive password is successfully set, the terminal device records the holder of the digital asset corresponding to the current order information in a bulletin board of the notarization party connected with the terminal device in a preset form. The preset form may be that the owner information and the asset issuer information before replacement are recorded in a sort order, and the owner related information includes, but is not limited to, date, batch number, target user account information, and the like, for example, on 8/9 th 2007, target user B purchases a preset number of digital assets from asset issuer a, batch number is 0002, and target user B has set the exclusive password. Has exclusive rights to the asset and is responsible for custody. The third-party neutral authority may be a third-party CA authority.
Specifically, as shown in fig. 4, fig. 4 is a diagram of a transaction process of a digital asset based on a third-party neutral authority, when a user a transmits a card number of the digital asset to a user B through a terminal device, the terminal device sends the transaction relationship of the current digital asset to the third-party neutral authority for notarization, that is, information of a current digital asset holder and information of an asset issuer before replacement. The user A, B may be a target user in the scheme, or may be an asset issuer when there is a next-level user.
Optionally, in each transaction process, an intelligent contract transaction interface may be called, and a specific transfer process is stored in the block chain distributed ledger, so as to perform the notary supervision.
Optionally, before step S104, the method includes:
and acquiring the exclusive password input by the asset issuer, and verifying the exclusive password of the asset issuer.
And when the verification is successful, acquiring the digital asset information sent by the asset issuer.
In this embodiment, to ensure the security of the digital asset, the terminal device needs to determine whether the asset issuer has an operable right for the digital asset, so that it needs to obtain the exclusive password input by the asset issuer, verify the exclusive password of the asset issuer, and when the verification is successful, indicate that the holder of the current digital asset belongs to the asset issuer, and then obtain the operation performed by the asset issuer on the digital asset, that is, obtain the digital asset information corresponding to the order information after the digital asset is sorted, which is sent by the asset issuer, so as to send the digital asset information to the target user.
Optionally, as shown in fig. 5, after step S104, the method includes:
step S501, a binding request is obtained, and the binding request is verified.
Step S502, when the verification is passed, a preset second dynamic secret key is sent to a target user corresponding to the binding request, so that the target user can set a consumption exclusive password according to the second dynamic secret key.
In this embodiment, since the target user who acquires the digital asset may serve as an asset issuer and send the digital asset to the next target user, the exclusive password held by the current target user is only used for operating the batch of digital assets, and if the digital asset is actually consumed, the exclusive password needs to be applied again to ensure the safety of the digital asset. Therefore, when the target user needs to perform the last consumption binding, a binding request can be initiated, the terminal device verifies the binding request after acquiring the request so as to prevent the identity of the target user currently initiating the binding request from being inconsistent, or the currently bound digital assets are bound, namely, the bound digital assets are used by people, when the verification is passed, the current binding card is legal, the terminal device sends the preset second dynamic key to the target user corresponding to the binding request, so that the target user sets a consumption exclusive password according to the second dynamic key, and the operations of card consumption, resetting, query and the like can be performed. The second dynamic key is a key generated by the terminal device when the asset is actually used, and the key is reset by the actual owner of the asset to obtain the consumption exclusive password, for example, the user B may sell the asset to the user C, and the user C sets the consumption exclusive password through the second dynamic key issued by the platform. Once the consumption exclusive password is successfully set, the functions of verification and sale, recharging, query and the like of the assets can be performed. Similar to the card density on the back of the shopping card, the customer obtains the card density after scraping, and can change the card density later and pay by swiping the card in a supermarket.
Optionally, after the target user sets the consumption exclusive password, the terminal device may upload the related information to a bulletin board of the notarization party, and perform bulletin in the above manner.
Optionally, as shown in fig. 6, step S501 includes:
step S601, acquiring the number information in the binding request.
And step S602, determining the current state of the asset corresponding to the number information according to the number information.
And step S603, when the current state of the asset meets the preset condition, the binding request passes the verification.
In this embodiment, the terminal device may obtain the number information in the binding request, and may determine the card number corresponding to the currently bound digital asset according to the number information, so as to query the current status of the current digital asset at the asset issuer, for example, whether the asset is used, whether the current balance is consistent with the expectation, whether the current balance is bound, and the like. And when the current states all accord with the preset states, the digital assets are in accordance with the requirements, the binding operation can be carried out, and the terminal equipment feeds back binding request verification passing information, so that the subsequent steps can be carried out.
Optionally, when the digital asset is verified and sold, the asset state of the asset issuer can be queried to prevent the unsold asset from being verified and sold, so as to reduce the loss of the asset issuer after the password is revealed.
By way of specific example and not limitation, a large merchant super gift card represents the digital asset, company a is a platform specialized in point redemption, namely the target user, and company a plans to purchase 10000 shares of 100-yuan large merchant super gift cards as prizes for point redemption. Moreover, because the company A has cooperative agreement with a plurality of banks and the technology development capability of the company A is not strong, therefore, company a takes the 10000 large merchant super gift cards with 100 yuan by means of buying voucher, that is company a purchases the digital assets meeting the requirements of company a at the asset issuer, after company a sends order information for buying 10000 shares of 100 yuan of a large merchant super gift card to the terminal device, the terminal equipment sends the order information to the property issuer, the property issuer proofreads according to the order information and the order information, when the checking is passed, the terminal device sends a first dynamic key to company A, the company A can check the summary of the asset list to be obtained under the name of the company A according to the first dynamic key and set an exclusive password according to the first dynamic key, when the exclusive password is successfully set, company A can independently master 10000 shares of 100 yuan of large merchant super gift cards.
In the embodiment of the application, order information is obtained and sent to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information; when the checking is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key; when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer can collect digital asset information corresponding to the order information according to the order request; and acquiring the digital asset information and sending the digital asset information to the target user. The order information of a target user is sent to an asset issuer through terminal equipment, so that the asset issuer can perform proofreading to prevent the order information from not corresponding to the order information before the order information, after the proofreading is passed, the terminal equipment sends a preset first dynamic key to the target user, so that the target user sets an exclusive password by using the first dynamic key, only the target user grasps the password corresponding to the order information, and then the terminal equipment sends digital asset information which is acquired and collected by the asset issuer and corresponds to the order information to the target user, so that the terminal equipment performs integral regulation and control to realize digital asset transaction among different transaction parties, and avoid a plurality of transaction parties grasping the password information corresponding to the digital asset, so that the problem of high safety risk when the digital asset is transacted is solved.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 7 is a schematic structural diagram of a digital asset transaction control device according to an embodiment of the present application, corresponding to the digital asset transaction control method described above, and as shown in fig. 7, the digital asset transaction control device may include:
the proofreading module 701 is configured to obtain order information, and send the order information to an asset issuer corresponding to the order information, so that the asset issuer performs proofreading according to the order information and preset order information.
A setting module 702, configured to send a preset first dynamic key to a target user corresponding to the order information when the checking is passed, so that the target user sets an exclusive password according to the first dynamic key.
A requesting module 703, configured to send an order request to the asset issuer when the setting of the exclusive password is successful, so that the asset issuer collects the digital asset information corresponding to the order information according to the order request.
A first obtaining module 704, configured to obtain the digital asset information, and send the digital asset information to the target user.
Optionally, the digital asset transaction control device may further include:
the second acquisition module is used for acquiring the notification information; and the notification information is information sent by the asset issuer according to the verified ordering information of the target user.
And the first verification module is used for verifying the asset issuer corresponding to the notification information.
And the first sending module is used for sending the notification information to the target user when the verification is passed so as to enable the target user to send corresponding order information according to the notification information.
Optionally, the digital asset transaction control device may further include:
and the auditing module is used for acquiring the registration information sent by the asset issuer and auditing the registration information.
And the second verification module is used for sending preset account information to the asset issuer when the verification is passed so as to ensure that the asset issuer performs verification according to the account information.
Optionally, the digital asset transaction control device may further include:
and the third verification module is used for acquiring the exclusive password input by the asset issuer and verifying the exclusive password of the asset issuer.
And the third acquisition module is used for acquiring the digital asset information sent by the asset issuer when the verification is successful.
Optionally, the digital asset transaction control device may further include:
and the fourth verification module is used for acquiring the binding request and verifying the binding request.
And the second sending module is used for sending a preset second dynamic key to a target user corresponding to the binding request when the verification is passed, so that the target user can set a consumption exclusive password according to the second dynamic key.
Optionally, the fourth verification module may include:
and the acquiring unit is used for acquiring the number information in the binding request.
And the determining unit is used for determining the current state of the asset corresponding to the number information according to the number information.
And the verification passing unit is used for passing the verification of the binding request when the current state of the asset meets the preset condition.
Optionally, the setting module 702 may include:
and the setting unit is used for sending a preset security control to the target user so that the target user can set an exclusive password on the security control again according to the first dynamic key.
In the embodiment of the application, order information is obtained and sent to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information; when the checking is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key; when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer can collect digital asset information corresponding to the order information according to the order request; and acquiring the digital asset information and sending the digital asset information to the target user. The order information of a target user is sent to an asset issuer through terminal equipment, so that the asset issuer can perform proofreading to prevent the order information from not corresponding to the order information before the order information, after the proofreading is passed, the terminal equipment sends a preset first dynamic key to the target user, so that the target user sets an exclusive password by using the first dynamic key, only the target user grasps the password corresponding to the order information, and then the terminal equipment sends digital asset information which is acquired and collected by the asset issuer and corresponds to the order information to the target user, so that the terminal equipment performs integral regulation and control to realize digital asset transaction among different transaction parties, and avoid a plurality of transaction parties grasping the password information corresponding to the digital asset, so that the problem of high safety risk when the digital asset is transacted is solved.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the apparatus and the module described above may refer to corresponding processes in the foregoing system embodiments and method embodiments, and are not described herein again.
Fig. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present application. For convenience of explanation, only portions related to the embodiments of the present application are shown.
As shown in fig. 8, the terminal device 8 of this embodiment includes: at least one processor 800 (only one shown in fig. 8), a memory 801 connected to the processor 800, and a computer program 802, such as a digital asset transaction control program, stored in the memory 801 and executable on the at least one processor 800. The processor 800, when executing the computer program 802, implements the steps in the various digital asset transaction control method embodiments described above, such as steps S101-S104 shown in fig. 1. Alternatively, the processor 800, when executing the computer program 802, implements the functions of the modules in the above device embodiments, for example, the functions of the modules 701 to 704 shown in fig. 7.
Illustratively, the computer program 802 may be partitioned into one or more modules that are stored in the memory 801 and executed by the processor 800 to accomplish the present application. The one or more modules may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 802 in the terminal device 8. For example, the computer program 802 may be divided into a checking module 701, a setting module 702, a requesting module 703 and a first obtaining module 704, where the specific functions of the modules are as follows:
the proofreading module 701 is configured to acquire order information and send the order information to an asset issuer corresponding to the order information, so that the asset issuer performs proofreading according to the order information and preset order information;
a setting module 702, configured to send a preset first dynamic key to a target user corresponding to the order information when the checking is passed, so that the target user sets an exclusive password according to the first dynamic key;
a request module 703, configured to send an order request to the asset issuer when the setting of the exclusive password is successful, so that the asset issuer collects digital asset information corresponding to the order information according to the order request;
a first obtaining module 704, configured to obtain the digital asset information, and send the digital asset information to the target user.
The terminal device 8 may include, but is not limited to, a processor 800, a memory 801. Those skilled in the art will appreciate that fig. 8 is merely an example of the terminal device 8, and does not constitute a limitation of the terminal device 8, and may include more or less components than those shown, or combine some of the components, or different components, such as an input-output device, a network access device, a bus, etc.
The Processor 800 may be a Central Processing Unit (CPU), and the Processor 800 may be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 801 may be an internal storage unit of the terminal device 8 in some embodiments, for example, a hard disk or a memory of the terminal device 8. The memory 801 may also be an external storage device of the terminal device 8 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 8. Further, the memory 801 may include both an internal storage unit and an external storage device of the terminal device 8. The memory 801 is used for storing an operating system, an application program, a Boot Loader (Boot Loader), data, and other programs, such as program codes of the computer programs. The memory 801 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above are merely alternative embodiments of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (16)

1. A digital asset transaction control method, comprising:
acquiring order information, and sending the order information to an asset issuer corresponding to the order information so that the asset issuer can perform proofreading according to the order information and preset order information;
when the checking is passed, sending a preset first dynamic key to a target user corresponding to the order information, so that the target user sets an exclusive password according to the first dynamic key;
when the exclusive password is successfully set, sending an order request to the asset issuer so that the asset issuer can collect digital asset information corresponding to the order information according to the order request;
and acquiring the digital asset information and sending the digital asset information to the target user.
2. The digital asset transaction control method of claim 1, prior to obtaining the order information, comprising:
acquiring notification information; the notification information is information sent by the asset issuer according to the verified ordering information of the target user;
verifying the asset issuer corresponding to the notification information;
and when the verification is passed, sending the notification information to the target user so that the target user sends corresponding order information according to the notification information.
3. The digital asset transaction control method of claim 2, wherein prior to authenticating the asset issuer to which the notification information corresponds, comprising:
acquiring registration information sent by the asset issuer, and auditing the registration information;
and when the verification is passed, sending preset account information to the asset issuer so that the asset issuer can verify according to the account information.
4. The digital asset transaction control method of claim 1, prior to obtaining said digital asset information, comprising:
acquiring an exclusive password input by the asset issuer, and verifying the exclusive password of the asset issuer;
and when the verification is successful, acquiring the digital asset information sent by the asset issuer.
5. The digital asset transaction control method of claim 1, after transmitting said digital asset information to said target user, comprising:
acquiring a binding request, and verifying the binding request;
and when the authentication is passed, sending a preset second dynamic key to a target user corresponding to the binding request, so that the target user can set a consumption exclusive password according to the second dynamic key.
6. The digital asset transaction control method of claim 5, wherein said validating said binding request comprises:
acquiring the number information in the binding request;
determining the current state of the asset corresponding to the number information according to the number information;
and when the current state of the asset meets the preset condition, the verification of the binding request is passed.
7. The digital asset transaction control method according to any one of claims 1 to 6, wherein said target user setting an exclusive password according to said first dynamic key comprises:
and sending a preset security control to the target user so that the target user can reset the exclusive password on the security control according to the first dynamic key.
8. A digital asset transaction control device, comprising:
the checking module is used for acquiring order information and sending the order information to the asset issuer corresponding to the order information so as to enable the asset issuer to check according to the order information and preset order information;
the setting module is used for sending a preset first dynamic key to a target user corresponding to the order information when the proofreading is passed so that the target user can set an exclusive password according to the first dynamic key;
the request module is used for sending an order request to the asset issuer when the exclusive password is successfully set, so that the asset issuer can collect the digital asset information corresponding to the order information according to the order request;
and the first acquisition module is used for acquiring the digital asset information and sending the digital asset information to the target user.
9. The digital asset transaction control device of claim 8, comprising:
the second acquisition module is used for acquiring the notification information; the notification information is information sent by the asset issuer according to the verified ordering information of the target user;
the first verification module is used for verifying the asset issuer corresponding to the notification information;
and the first sending module is used for sending the notification information to the target user when the verification is passed so as to enable the target user to send corresponding order information according to the notification information.
10. The digital asset transaction control device of claim 9, comprising:
the auditing module is used for acquiring the registration information sent by the asset issuer and auditing the registration information;
and the second verification module is used for sending preset account information to the asset issuer when the verification is passed so as to ensure that the asset issuer performs verification according to the account information.
11. The digital asset transaction control device of claim 8, comprising:
the third verification module is used for acquiring the exclusive password input by the asset issuer and verifying the exclusive password of the asset issuer;
and the third acquisition module is used for acquiring the digital asset information sent by the asset issuer when the verification is successful.
12. The digital asset transaction control device of claim 8, comprising:
the fourth verification module is used for acquiring the binding request and verifying the binding request;
and the second sending module is used for sending a preset second dynamic key to a target user corresponding to the binding request when the verification is passed, so that the target user can set a consumption exclusive password according to the second dynamic key.
13. The digital asset transaction control device of claim 12, wherein said fourth verification module comprises:
the acquiring unit is used for acquiring the number information in the binding request;
the determining unit is used for determining the current state of the asset corresponding to the number information according to the number information;
and the verification passing unit is used for passing the verification of the binding request when the current state of the asset meets the preset condition.
14. The digital asset transaction control device of any of claims 8 to 13, wherein said setup module comprises:
and the setting unit is used for sending a preset security control to the target user so that the target user can set an exclusive password on the security control again according to the first dynamic key.
15. A terminal device comprising a memory, a processor and a computer program stored in said memory and executable on said processor, characterized in that said processor, when executing said computer program, carries out the steps of a digital asset transaction control method according to any of claims 1 to 7.
16. A computer-readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of a digital asset transaction control method according to any one of claims 1 to 7.
CN202080002461.6A 2020-10-26 2020-10-26 Digital asset transaction control method and device, terminal equipment and storage medium Pending CN112513904A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/123757 WO2022087791A1 (en) 2020-10-26 2020-10-26 Digital asset transaction control method and apparatus, terminal device, and storage medium

Publications (1)

Publication Number Publication Date
CN112513904A true CN112513904A (en) 2021-03-16

Family

ID=74953060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202080002461.6A Pending CN112513904A (en) 2020-10-26 2020-10-26 Digital asset transaction control method and device, terminal equipment and storage medium

Country Status (2)

Country Link
CN (1) CN112513904A (en)
WO (1) WO2022087791A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298659A (en) * 2021-06-22 2021-08-24 上海和数软件有限公司 Block chain-based digital asset transaction method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115471956B (en) * 2022-08-29 2024-04-02 拉扎斯网络科技(上海)有限公司 Information processing method and device, readable storage medium and electronic equipment
CN117252702A (en) * 2023-11-20 2023-12-19 深圳奥联信息安全技术有限公司 Block chain-based data asset transaction method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190026821A1 (en) * 2017-07-21 2019-01-24 International Business Machines Corporation Intermediate blockchain system for managing transactions
CN109299943A (en) * 2018-10-16 2019-02-01 深圳市乘法信息技术有限公司 A kind of method and device of the intellectual property transaction based on block chain
CN109447599A (en) * 2018-09-30 2019-03-08 中链科技有限公司 Digital asset distributing method and system based on block chain
CN110827021A (en) * 2019-10-24 2020-02-21 海南新软软件有限公司 Digital asset extraction monitoring method and device
CN111444209A (en) * 2020-03-25 2020-07-24 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11157898B2 (en) * 2018-03-30 2021-10-26 Health Alliance Management, LLC Systems and methods for peer-to-peer transmission of digital assets

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190026821A1 (en) * 2017-07-21 2019-01-24 International Business Machines Corporation Intermediate blockchain system for managing transactions
CN109447599A (en) * 2018-09-30 2019-03-08 中链科技有限公司 Digital asset distributing method and system based on block chain
CN109299943A (en) * 2018-10-16 2019-02-01 深圳市乘法信息技术有限公司 A kind of method and device of the intellectual property transaction based on block chain
CN110827021A (en) * 2019-10-24 2020-02-21 海南新软软件有限公司 Digital asset extraction monitoring method and device
CN111444209A (en) * 2020-03-25 2020-07-24 腾讯科技(深圳)有限公司 Data processing method, device, equipment and medium based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298659A (en) * 2021-06-22 2021-08-24 上海和数软件有限公司 Block chain-based digital asset transaction method

Also Published As

Publication number Publication date
WO2022087791A1 (en) 2022-05-05

Similar Documents

Publication Publication Date Title
US10579977B1 (en) Method and system for controlling certificate based open payment transactions
JP5721086B2 (en) Management method of electronic money
AU751404B2 (en) Symmetrically-secured electronic communication system
US7865431B2 (en) Private electronic value bank system
US6938019B1 (en) Method and apparatus for making secure electronic payments
TWI587225B (en) Secure payment method, mobile device and secure payment system
US20150339674A1 (en) Generation systems and methods for transaction identifiers having biometric keys associated therewith
CN108476227A (en) System and method for equipment push supply
KR101138283B1 (en) Method and system of mobile payment
US20040070566A1 (en) Card present network transactions
CN112513904A (en) Digital asset transaction control method and device, terminal equipment and storage medium
JP2004506245A (en) Linking the device's public key with information during manufacture
WO2016118087A1 (en) System and method for secure online payment using integrated circuit card
US8886932B2 (en) Message storage and transfer system
US20080133419A1 (en) Secure financial transaction system and method
KR100968941B1 (en) Finance trade system using a otp
KR20010087564A (en) User authentification system and the method using personal mobile device
JP3812419B2 (en) Billing unit device, billing system, authentication billing center device, purchase control terminal device, billing method, billing program, and storage medium storing billing program
CN116802661A (en) Token-based out-of-chain interaction authorization
US11812260B2 (en) Secure offline mobile interactions
KR102278763B1 (en) Account transferring system and method thereof
KR20040055843A (en) System and Method for Payment by Using Authorized Authentication Information
CN115631045A (en) Electronic certificate transaction method, device, computer equipment and storage medium
KR20080003303A (en) System for payment by using authorized authentication information
CA2295603C (en) Symmetrically-secured electronic communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination