CN113807959A - Method and terminal for preventing digital assets from being repeatedly transferred in close range - Google Patents
Method and terminal for preventing digital assets from being repeatedly transferred in close range Download PDFInfo
- Publication number
- CN113807959A CN113807959A CN202110114768.1A CN202110114768A CN113807959A CN 113807959 A CN113807959 A CN 113807959A CN 202110114768 A CN202110114768 A CN 202110114768A CN 113807959 A CN113807959 A CN 113807959A
- Authority
- CN
- China
- Prior art keywords
- transfer
- identification information
- information
- terminal
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 129
- 238000012546 transfer Methods 0.000 claims abstract description 1038
- 238000012795 verification Methods 0.000 claims abstract description 242
- 238000004891 communication Methods 0.000 claims abstract description 65
- 230000003252 repetitive effect Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 2
- 230000002452 interceptive effect Effects 0.000 abstract description 5
- 230000007704 transition Effects 0.000 description 34
- 230000008569 process Effects 0.000 description 29
- 230000005012 migration Effects 0.000 description 10
- 238000013508 migration Methods 0.000 description 10
- 238000004422 calculation algorithm Methods 0.000 description 9
- 230000001965 increasing effect Effects 0.000 description 9
- 238000004364 calculation method Methods 0.000 description 8
- 230000009977 dual effect Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a method and a terminal for preventing short-distance repeated transfer of digital assets. The method comprises the following steps: the transfer end obtains the transfer amount and the receiving end identification information; generating transfer identification information with uniqueness; transmitting transaction information to a receiving end through near field communication, wherein the transaction information comprises transfer end identification information, the transfer identification information, the receiving end identification information and the transfer amount; and the receiving end verifies the transaction information and determines whether the transaction information is legal or not according to the verification result. The method can not only avoid the transfer terminal from repeatedly transferring the same transaction information to the receiving terminal in a short distance, but also reduce the interactive data and the short-distance communication frequency between the transfer terminal and the receiving terminal as much as possible.
Description
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of digital assets, in particular to a method and a terminal for preventing short-distance repeated transfer of digital assets.
[ background of the invention ]
Digital assets refer to assets that exist in the form of electronic data, such as virtual assets, digital currency, electronic currency, and the like. In the application process of the digital assets, the short-distance transfer of the digital assets can be involved, and the transfer end transfers the digital assets to be transferred to the receiving end through short-distance communication, so that the receiving end can obtain the digital assets to be transferred.
When the transfer terminal and the receiving terminal are in an offline state such as poor network condition or no need of a network, the short-distance transfer of the digital assets is called as offline transfer, and particularly with the rapid advance of digital asset services in the fields of finance, payment and the like, even if the network payment services (such as payment treasure, WeChat payment or bank payment services and the like) are in the offline state, the situation that the transfer terminal and the receiving terminal are in the offline state inevitably exists, so that the short-distance transfer of the digital assets is required to be implemented.
However, when digital assets are transferred in close proximity, there may be a problem of "duplicate payment", also known as "double-flower" or "duplicate transfer", where the same piece of digital asset is reused due to malicious or inappropriate operations, due to the reproducibility of the data.
Therefore, how to effectively prevent the problem of repeated transfer when the digital assets are transferred in a close range becomes a technical problem to be solved.
It is important to note that the above background information is only used to enhance an understanding of the background of the present invention and, thus, may include prior art information that does not constitute a part of the present disclosure as known to one of ordinary skill in the art.
[ summary of the invention ]
The main objective of the present invention is to provide a method and a terminal for preventing a digital asset from being repeatedly transferred in a close range, so as to solve one or more technical problems caused by the limitations and disadvantages of the related art at least to a certain extent, including the following technical solutions:
in a first aspect, a method for preventing a digital asset from being repeatedly transferred in a close range is provided, and the method is applied to a transfer terminal and comprises the following steps:
acquiring a transfer request, wherein the transfer request comprises a transfer amount and receiving end identification information;
generating transfer identification information with uniqueness;
transmitting transaction information to a receiving end through near field communication so that the receiving end verifies the transaction information and determines whether the transaction information is legal or not according to a verification result, wherein the transaction information comprises transfer end identification information, the transfer identification information, the receiving end identification information and the transfer amount, and the transfer end identification information is the identification information of the transfer end.
Preferably, the obtaining the transfer request includes:
acquiring the transfer request through near field communication; or,
obtaining the transfer request through user input; or,
the transfer request is obtained through a combination of close range communication and user input.
Preferably, the acquiring the transfer request through the combination of the close range communication and the user input includes:
and scanning and analyzing the graphic code to acquire the identification information of the receiving end, and acquiring the transfer amount through user input.
Preferably, the generating the transfer identification information with uniqueness further comprises:
when the transfer amount is not larger than the currently available asset balance of the transfer terminal, subtracting the transfer amount from the currently available asset balance of the transfer terminal, and executing the step of generating transfer identification information with uniqueness.
Preferably, the generating of the transfer identification information having uniqueness includes:
generating the transfer identification information in an increasing order; or,
generating the transfer identification information according to the current system time, and generating the accuracy that the interval is greater than or equal to the current system time; or,
the transition identification information is generated based on random information, and the random information is different from the previously generated transition identification information.
Preferably, the transaction information further includes:
a transaction time, or/and an expiration time.
Preferably, the transaction time includes:
generating the transaction time according to the current system time of the transfer terminal; or,
the transfer request also comprises the transaction time, and the transaction time is obtained from the transfer request.
Preferably, the expiration time includes:
generating the expiration time according to the current system time of the transfer terminal and a preset time length; or,
the transfer request further includes the expiration time, and the expiration time is acquired from the transfer request.
Preferably, the transmitting the transaction information to the receiving end through the short-range communication further includes:
carrying out digital signature on information to be signed to generate a signature value, wherein the information to be signed comprises the transfer identification information, the receiving end identification information and the transfer amount;
and transmitting the signature value to the receiving end so that the receiving end performs digital signature verification on the signature value.
Preferably, the method further comprises:
storing the transaction information;
when a request for transferring the transaction information again is received, the transaction information is obtained again from the stored transaction information, and the obtained transaction information is transmitted to the receiving end through near field communication, so that the receiving end verifies the obtained transaction information again, and whether the obtained transaction information is legal or not is determined according to the verification result.
Preferably, the retrieving the transaction information from the stored transaction information includes:
only one transaction information is stored, and the transaction information is obtained as the transaction information; or,
storing a plurality of items of transaction information in sequence, and acquiring one item of transaction information which is stored recently as the transaction information; or,
storing a plurality of transaction information, and acquiring the transaction information from the transaction information according to the selection operation of a user; or,
the method comprises the steps that a plurality of items of transaction information are stored, the retransfer request further comprises transfer identification information or/and a transfer amount or/and receiving end identification information, and the transaction information is matched and obtained from the transaction information according to the transfer identification information or/and the transfer amount or/and the receiving end identification information.
Preferably, the transmitting the retrieved transaction information to the receiving end through short-range communication further includes: and re-acquiring the signature value of the information to be signed, and transmitting the re-acquired signature value, wherein the information to be signed comprises the transfer identification information, the receiving end identification information and the transfer amount.
Preferably, the retrieving the signature value of the transaction information includes:
carrying out digital signature on the information to be signed again to generate a signature value; or,
and when the transaction information is stored, establishing an incidence relation between the transaction information and the signature value of the information to be signed, and when the transaction information is acquired again, acquiring the signature value according to the incidence relation.
Preferably, the near field communication includes a communication mode of bluetooth, infrared ray, NFC, WIFI, sound wave, BLE or graphic code.
Preferably, the transfer terminal identification information includes:
the terminal equipment identification, the chip card identification, the mobile phone number, the account number, the digital certificate, the public key, the address generated based on the public key or other information which can be used for uniquely identifying the transfer terminal.
Preferably, the receiving end identification information includes:
the receiving end comprises a terminal equipment identifier, a chip card identifier, a mobile phone number, an account number, a digital certificate, a public key, an address generated based on the public key or other information which can be used for uniquely identifying the receiving end.
In a second aspect, a method for preventing a short-distance repeated transfer of a digital asset is provided, which is applied to a security module, and comprises the following steps:
receiving a transfer instruction sent by the transfer end, wherein the transfer instruction comprises a transfer amount and receiving end identification information;
generating transaction information, wherein the transaction information comprises transfer end identification information, transfer identification information, receiving end identification information and a transfer amount, the transfer identification information is generated by the security module or sent by the transfer end, the transfer identification information has uniqueness, and the transfer end identification information is the only identification information of the security module or the transfer end identification information is sent by the transfer end;
and returning the transaction information to the transfer terminal so that the transfer terminal transmits the transaction information to a receiving terminal through near field communication, thereby enabling the receiving terminal to verify the transaction information and determining whether the transaction information is legal or not according to the verification result.
Preferably, the security module includes: secure element SE, embedded secure element eSE, trusted execution environment TEE, subscriber identity module SIM, embedded subscriber identity module eSIM, host card emulation HCE or USB key.
Preferably, the generating transaction information further comprises:
when the transfer amount is not greater than a currently available asset balance, subtracting the transfer amount from the currently available asset balance, and performing the generating transaction information.
Preferably, the transaction information further includes:
the transfer instruction further comprises transaction time, and the transaction information further comprises the transaction time; and/or the first and/or second light sources,
the transfer instruction further comprises an expiration time, and the transaction information further comprises the expiration time.
Preferably, the returning the transaction information to the transfer terminal further includes:
carrying out digital signature on information to be signed to generate a signature value, wherein the information to be signed comprises the transfer identification information, the receiving end identification information and the transfer amount;
and returning the signature value to the transfer terminal, so that the transfer terminal also transmits the signature value to the receiving terminal when transmitting the transaction information to the receiving terminal through near field communication, and the receiving terminal performs digital signature verification on the transaction information according to the signature value.
Preferably, the method further comprises:
storing the transaction information;
and when a retransfer instruction for the transaction information is received, acquiring the transaction information from the stored transaction information again, and returning the acquired transaction information to the transfer terminal.
Preferably, the returning the transaction information obtained again to the transfer terminal further includes: and re-acquiring the signature value of the information to be signed, and returning the re-acquired signature value, wherein the information to be signed comprises the transfer identification information, the receiving end identification information and the transfer amount.
Preferably, the retrieving the signature value of the transaction information includes:
digitally signing the information to be signed to generate a signature value; or,
and when the transaction information is stored, establishing an incidence relation between the transaction information and the signature value of the information to be signed, and when the transaction information is acquired again, acquiring the signature value according to the incidence relation.
In a third aspect, a method for preventing a short-distance repeated transfer of a digital asset is provided, which is applied to a receiving end, and the method comprises the following steps:
receiving transaction information transmitted by a transfer terminal through near field communication, wherein the transaction information comprises transfer terminal identification information, transfer identification information, receiving terminal identification information and a transfer amount;
verifying the transaction information, and if the verification modes are implemented to ensure that the verification is passed, determining that the transaction information is legal;
the verifying the transaction information comprises:
the verification method comprises the steps that whether the receiving end identification information belongs to the receiving end is verified according to terminal identification information preset by the receiving end, and if yes, verification is determined to be passed;
and a second verification mode, verifying whether the transaction information is received or not according to the currently stored transfer verification information, if not, determining that the transaction information is passed, and storing the transfer verification information, wherein the transfer verification information is determined according to the transfer terminal identification information and the transfer identification information.
Preferably, the near field communication includes a communication mode of bluetooth, infrared ray, NFC, WIFI, sound wave, BLE or graphic code.
Preferably, the verifying whether the receiving end identification information belongs to the receiving end according to the terminal identification information preset by the receiving end includes:
the preset terminal identification information is one piece of terminal identification information, the preset terminal identification information is compared with the receiving end identification information, and if the preset terminal identification information is consistent with the receiving end identification information, verification is determined to be passed; or,
the preset terminal identification information comprises a plurality of terminal identification information, the plurality of terminal identification information and the receiving terminal identification information are respectively compared, and if any one of the terminal identification information is consistent with the receiving terminal identification information, the verification is determined to be passed.
Preferably, the second verification method further includes:
in a first embodiment, the transferring verification information is generated by combining the transferring terminal identification information and the transferring identification information, and the verifying whether the transaction information is received according to the currently stored transferring verification information includes: judging whether the transfer verification information exists in the currently stored transfer verification information or not, and if not, determining that the verification is passed; or,
in a second implementation manner, the transferring verification information is a corresponding relationship between the transferring end identification information and the transferring identification information, and the verifying whether the transaction information is received according to the currently stored transferring verification information includes: judging whether the corresponding relation between the transfer terminal identification information and the transfer identification information exists in the currently stored transfer verification information, and if not, determining that the verification is passed; or,
in a third embodiment, the transfer identification information is transfer identification information with an incremental property, the transfer verification information is a correspondence between the transfer end identification information and the transfer identification information, and the verifying whether the transaction information is received according to the currently stored transfer verification information includes: and acquiring corresponding transfer identification information according to the transfer terminal identification information, and determining that the verification is passed if the corresponding transfer identification information is not acquired or if the transfer identification information is greater than the corresponding transfer identification information.
Preferably, in the first embodiment, the generating the transfer verification information according to the combination of the transfer terminal identification information and the transfer identification information includes:
combining information including the transfer terminal identification information and the transfer identification information as the transfer verification information; or,
and combining information including the transfer terminal identification information and the transfer identification information and performing hash calculation to generate a hash value as the transfer verification information.
Preferably, in the second embodiment, the determining whether the correspondence relationship between the transfer terminal identification information and the transfer identification information exists in the currently stored transfer verification information includes:
acquiring corresponding transfer identification information from the currently stored transfer verification information according to the transfer terminal identification information, and determining that the verification is passed if the corresponding transfer identification information is not acquired or if the corresponding transfer identification information is acquired but the transfer identification information does not exist in the corresponding transfer identification information; or,
and acquiring corresponding transfer terminal identification information from the currently stored transfer verification information according to the transfer identification information, and if the corresponding transfer terminal identification information is not acquired, or if the corresponding transfer terminal identification information is acquired but the transfer terminal identification information does not exist in the corresponding transfer terminal identification information, determining that the verification is passed.
Preferably, the third embodiment further comprises:
the transfer identification information corresponding to the transfer terminal identification information only allows to establish one corresponding transfer identification information, and the storing of the transfer verification information comprises replacing the transfer identification information corresponding to the transfer terminal identification information with the transfer identification information; or,
the transfer identification information corresponding to the transfer end identification information allows one or more corresponding transfer identification information to be established, when the transfer identification information corresponding to the transfer end identification information includes a plurality of corresponding transfer identification information, the transfer identification information larger than the corresponding transfer identification information is the transfer identification information larger than the largest transfer identification information in the plurality of corresponding transfer identification information, and the stored transfer verification information includes the correspondence between the newly added transfer end identification information and the transfer identification information.
Preferably, when the transfer identification information corresponding to the transfer terminal identification information includes a plurality of corresponding transfer identification information, the method further includes:
when the transfer identification information is not larger than the maximum transfer identification information and the transfer identification information is not included in the corresponding transfer identification information, the verification is determined to be passed, and the corresponding relationship between the transfer terminal identification information and the transfer identification information is newly added.
Preferably, when the transition identification information is not greater than the maximum transition identification information, the method further includes, when a difference between the transition identification information and the maximum transition identification information is smaller than a preset value:
and for the transfer identification information which is not more than the maximum transfer identification information in the plurality of corresponding transfer identification information, when the difference value between a certain corresponding transfer identification information and the maximum transfer identification information is not less than the preset value, discarding the certain corresponding transfer identification information.
Preferably, the verifying the transaction information further comprises:
the receiving end determines a time period according to the transaction time or/and the expiration time and a preset time length, judges whether the current system time of the receiving end is in the time period, and if so, determines that the verification is passed; and/or the first and/or second light sources,
and in a fourth verification mode, the receiving of the transaction information transmitted by the transfer end through near field communication further comprises receiving a signature value transmitted by the transfer end, the signature value is generated by the transfer end performing digital signature on the information to be signed, the information to be signed comprises the transfer identification information, the receiving end identification information and the transfer amount, and the digital signature verification is performed on the signature value.
Preferably, in the third verification manner, the determining, by the receiving end, a time period according to the transaction time or/and the expiration time and a preset time duration includes:
in a first implementation mode, if the transaction information further includes transaction time, determining that the time period is a time period within the preset time length after the transaction time; or,
in a second embodiment, if the transaction information further includes transaction time, the preset time duration is divided into a first preset time duration and a second preset time duration, and the time duration is determined to be the time duration between the transaction time minus the first preset time duration and the transaction time plus the second preset time duration; or,
in a third implementation mode, if the transaction information further includes transaction time, the preset time is divided into a third preset time and a fourth preset time, and the time period is determined to be the time period between the transaction time plus the third preset time and plus the fourth preset time; or,
in a fourth embodiment, if the transaction information further includes an expiration time, the time period is a time period within the preset time period before the expiration time; or,
in an embodiment five, if the transaction information further includes a transaction time and an expiration time, and if a time duration between the transaction time and the expiration time is less than the preset time duration, the time duration is a time duration between the transaction time and the expiration time.
Preferably, if the third verification method is implemented, the method further includes:
and after the transfer verification information is stored, when the current system time of the receiving end reaches the time after the time period, discarding the transfer verification information from the currently stored transfer verification information.
Preferably, in the fourth verification method, the verifying the digital signature of the signature value includes:
and if the signature value is generated by the transfer terminal by digitally signing the information to be signed by using an asymmetric encryption algorithm, acquiring a public key of the transfer terminal, generating the information to be verified in the same way as the transfer terminal generates the information to be signed, and verifying the signature value according to the public key and the information to be verified.
Preferably, the obtaining the public key of the transfer terminal includes:
the transfer terminal carries out digital signature on the information to be signed based on a private key generated by an IBC system, wherein the public key is the identification information of the transfer terminal; or,
the transfer terminal carries out digital signature on the information to be signed based on a private key generated by a PKI system, and obtains the public key from a digital certificate transmitted by the transfer terminal.
Preferably, the determining that the transaction information is legal further includes:
adding the transfer amount to the asset balance currently available to the receiving end.
Preferably, the transfer terminal identification information includes:
the terminal equipment identification, the chip card identification, the mobile phone number, the account number, the digital certificate, the public key, the address generated based on the public key or other information which can be used for uniquely identifying the transfer terminal.
Preferably, if a signature value generated by digitally signing the information to be signed by using an asymmetric encryption algorithm by the transfer terminal is received, the transfer terminal identification information includes:
when the transfer terminal carries out digital signature on the information to be signed based on a private key generated by an IBC system, the transfer terminal identification information comprises a public key of the transfer terminal; or,
when the transfer terminal carries out digital signature on the information to be signed based on a private key generated by a PKI system, the identification information of the transfer terminal comprises a unique label value in a digital certificate of the transfer terminal.
Preferably, the tag value includes:
a serial number, a subject unique identifier, or/and a value of a public key.
Preferably, the receiving end identification information includes:
the receiving end comprises a terminal equipment identifier, a chip card identifier, a mobile phone number, an account number, a digital certificate, a public key, an address generated based on the public key or other information which can be used for uniquely identifying the receiving end.
In a fourth aspect, a transfer-side device includes a processor and a memory, the processor is configured to execute a program stored in the memory, and the program executes to perform the method according to the first aspect.
A security module comprising a processor, which when executed by the processor causes the method of the second aspect to be performed.
A chip comprising a processor for calling and running a computer program from a memory to cause a device in which the chip is installed to perform a method as described in the first aspect above, or to cause a device in which the chip is installed to perform a method as described in the third aspect above.
A sink device comprising a processor and a memory, the processor being configured to execute a program stored in the memory, the program executing the method according to the third aspect.
A storage medium having stored therein a program for implementing the method of the first aspect as described above, or a program for implementing the method of the second aspect as described above, or a program for implementing the method of the third aspect as described above.
In summary, the technical effects brought by the technical solution provided by the present invention at least include: compared with a delayed repeated payment checking mode, the method can prevent the transfer terminal from repeatedly transferring the same transaction information to the receiving terminal in a short distance in advance, and reduces the interactive data and the short-distance communication times of the transfer terminal and the receiving terminal as much as possible.
[ description of the drawings ]
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic block diagram of an implementation environment in accordance with the present invention;
FIG. 2 is a schematic flow chart of a first embodiment of a method for preventing close-range repeated transfers of digital assets;
FIG. 3 is a schematic flow chart of an embodiment two of a method for preventing close-range repeated transfers of digital assets;
FIG. 4 is a schematic flow chart diagram of a third embodiment of a method for preventing close-range duplicate transfers of digital assets;
FIG. 5 is a schematic diagram of a transfer port according to the present invention;
fig. 6 is a flow chart of a fourth embodiment of a method for preventing close-range repeated transfers of digital assets.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Description of an embodiment
Referring to fig. 1, a schematic diagram of an implementation environment according to the present invention is shown. The implementation environment includes a transfer end and a receiving end, wherein:
transferring the terminal: the transfer terminal is used for transferring the digital assets to the receiving terminal, and the transfer terminal may be a software program, or a device implemented by a combination of software and hardware, for example, the transfer terminal may be a user terminal device such as a smart phone, a smart television, a tablet computer, a notebook computer, or the like, or a wearable terminal device such as a smart watch, a smart bracelet, or the like, or a device with a near field communication function such as bluetooth or NFC.
Receiving end: the receiving end is used for receiving the digital assets transferred by the transfer end, and the receiving end can be a software program or a device realized by combining software and hardware, for example, the receiving end can be a terminal device such as a smart phone, a point of sale (POS) terminal, a scanning gun, a code reader and the like, can also be a terminal device such as a smart television, a tablet computer, a notebook computer, a smart watch, a smart bracelet and the like, and can also be a device with a short-distance communication function such as Bluetooth or NFC.
Information transfer between the transfer terminal and the receiving terminal is realized through near field communication, including but not limited to near field communication through bluetooth, infrared ray, NFC, WIFI, sound wave, BLE (bluetooth low energy), or graphic code. For example, the transfer terminal and the receiving terminal establish a bluetooth channel through bluetooth pairing to realize near field communication; for another example, the transfer terminal and the receiving terminal are induced by the NFC antenna to implement near field communication; for example, one of the transfer terminal or the receiving terminal encodes the information to be transmitted to generate a graphic code, and the other terminal scans and analyzes the graphic code to obtain the information to be transmitted, so as to implement the short-distance communication between the transfer terminal and the receiving terminal through the graphic code, which may be a two-dimensional code or a bar code, or other graphics capable of obtaining the information thereof through scanning and decoding.
The process of transferring a digital asset in close proximity, sometimes also understood as a payment or transaction process for a digital asset, requires the transfer end and the receiving end to cooperate to complete the process. For convenience of description, each embodiment of the present invention is described by taking only one transfer end and one receiving end as an example, but in an actual implementation environment, a plurality of or even a large number of transfer ends and receiving ends may be included, and for one terminal device, the terminal device may be used as only a transfer end or a receiving end, or may be used as both a transfer end and a receiving end.
It should be noted that, as will be understood by those skilled in the art, the implementation environment structure shown in fig. 1 and the embodiments of the present invention may enable near field communication and digital asset transfer even when the transfer end and the receiving end are in a dual offline state, but the transfer end and the receiving end are not limited to be in a dual offline state. It is understood that the dual offline state referred to herein refers to an application scenario where neither the transfer end nor the receiving end can perform real-time communication with the digital asset server (e.g., a registration center, a payment center, etc. of the digital asset), that is, both the transfer end and the receiving end are offline with respect to the digital asset server, for example, when the transfer end and the receiving end are in an environment with poor network conditions or no network is needed, the transfer end and the receiving end are in a dual offline state due to being unable to perform real-time communication with the digital asset server.
It should be noted that the implementation environment configuration shown in fig. 1 is not limited to the implementation environment, and may include more or less components than those shown, or some components may be combined, or a different arrangement of components may be used, as will be appreciated by those skilled in the art. The implementation environment configuration shown in fig. 1 is only for enhancing understanding of the present technology and thus may include prior art information that does not constitute a known art to those of ordinary skill in the art.
Second, embodiment one of a method for preventing digital assets from transferring repeatedly in close range
Referring to fig. 2, a flow chart of a first embodiment of a method for preventing a short-distance repetitive transfer of a digital asset according to the present invention is shown. This embodiment is exemplified by applying the method to the transfer end in the implementation environment shown in fig. 1, where the method may include:
And 202, generating unique transfer identification information.
In the implementation process, the transfer terminal transmits the transaction information to the receiving terminal through the short-distance communication, and the transaction information comprises the transfer terminal identification information, the transfer identification information, the receiving terminal identification information and the transfer amount, so that the receiving terminal can determine whether the transaction information is legal or not according to the verification of the transaction information, the transfer terminal can be prevented from repeatedly transferring the same transaction information to the receiving terminal in a short distance in advance, and the interactive data and the short-distance communication times of the transfer terminal and the receiving terminal are reduced as much as possible.
Third, a method embodiment for preventing digital assets from short-distance repeated transfer
Referring to fig. 3, a flowchart of a second embodiment of a method for preventing a short-distance repetitive transfer of a digital asset according to the present invention is shown. This embodiment is exemplified by applying the method to the receiving end in the implementation environment shown in fig. 1, where the method may include:
And 302, verifying the transaction information, and if the verification modes are all verified to be passed, determining that the transaction information is legal.
The verifying the transaction information verification comprises:
the verification method comprises the steps that whether the receiving end identification information belongs to the receiving end is verified according to terminal identification information preset by the receiving end, and if yes, verification is determined to be passed;
and a second verification mode, verifying whether the transaction information is received or not according to the currently stored transfer verification information, if not, determining that the transaction information is passed, and storing the transfer verification information, wherein the transfer verification information is determined according to the transfer terminal identification information and the transfer identification information.
In the implementation process, the receiving end comprises the transfer end identification information, the transfer identification information, the receiving end identification information and the transfer amount in the transaction information received by the near field communication, and determines whether the transaction information is legal or not according to the verification of the transaction information.
Fourth, a method embodiment for preventing digital assets from short-distance repeated transfer
Referring to fig. 4, a flow chart of a third embodiment of a method for preventing a short-distance repetitive transfer of a digital asset according to the present invention is shown. The embodiment is an embodiment formed by combining the first embodiment and the second embodiment of the method for preventing the digital assets from being repeatedly transferred in a short distance. This embodiment is illustrated by applying the method to the implementation environment shown in fig. 1, where the method may include:
step 401, the transfer terminal obtains a transfer request, wherein the transfer request comprises a transfer amount and receiving terminal identification information.
The transfer terminal obtains a transfer request, wherein the transfer request comprises a transfer amount and receiving terminal identification information. The receiving end identification information refers to identification information for identifying a receiving end, such as a terminal device identifier, a chip card identifier, a mobile phone number, an account number, a digital certificate, a public key, an address generated based on the public key, or other information that can be used for uniquely identifying the receiving end.
The transfer request may be a request transmitted by the receiving end to the transfer end through the near field communication, for example, the receiving end transmits the transfer request to the transfer end through the NFC, and the transfer end receives and acquires the transfer request; for another example, the receiving end generates a graphic code including the transfer request, and the transfer end obtains the transfer request by scanning and analyzing the graphic code.
The transfer request may also be a request input by the user to the transfer end, for example, the user of the transfer end inputs the transfer amount and the receiving end identification information on the operation interface of the transfer end, so that the transfer end obtains the transfer request through the input.
The transfer request may also be a request formed by combining near field communication transmission and user input through the receiving end, for example, the receiving end generates a graphic code including receiving end identification information, the transfer end obtains the receiving end identification information by scanning and analyzing the graphic code, and triggers and displays an operation interface at the transfer end, and a user of the transfer end inputs a transfer amount on the operation interface of the transfer end, so that the transfer end obtains the transfer request including the transfer amount and the receiving end identification information.
It can be understood that, when the transfer end obtains the transfer request by scanning and analyzing the graphic code, the graphic code may be generated on the interface of the receiving end for the transfer end to scan, the graphic code may be printed and posted for the transfer end to scan, and the graphic code may be synchronously displayed by the electronic display device for the transfer end to scan.
In order to avoid the situation that the transferred digital asset exceeds the limit, optionally, the currently available asset balance is pre-saved at the transfer end, when the transfer amount is not greater than the currently available asset balance at the transfer end, the transfer end subtracts the transfer amount from the currently available asset balance at the transfer end, and performs step 402 and subsequent steps, otherwise, does not perform step 402 and subsequent steps. For example, the balance of the digital assets currently available to the transfer terminal is 100, which means that there are currently 100 units of digital assets available, and assuming that the transfer amount is 20, the transfer terminal subtracts 20 from the balance of the digital assets currently available to the transfer terminal, i.e. the balance of the digital assets currently available to the transfer terminal is changed to 80, and performs step 402 and the subsequent steps.
And step 402, the transfer terminal generates transfer identification information with uniqueness.
The main function of the transfer terminal for generating the transfer identification information is to enable the receiving terminal to uniquely identify the transfer. The transfer identification information generated by the transfer terminal may be generated randomly or according to a certain rule.
The transfer identification information generated by the transfer terminal has uniqueness, that is, at least the transfer identification information generated by the transfer terminal has uniqueness. For example, the transfer identification information may be transfer identification information of an incremental nature, for example, the transfer terminal may generate the transfer identification information in an order of increasing, so that it is ensured that the generated transfer identification information is larger than the previously generated transfer identification information, and the transfer identification information is unique locally at the transfer terminal; for another example, the transfer terminal generates the transfer identification information according to the current system time of the transfer terminal, the time is accurate to the second level, and the transfer identification information generated this time and the transfer identification information generated last time are ensured to be generated at least more than 1 second apart, so that the generated transfer identification information can be ensured to be larger than the previously generated transfer identification information, and the transfer identification information has uniqueness locally at the transfer terminal. For another example, the migration identification information may be migration identification information of random nature, for example, the migration terminal stores previous migration identification information, generates random information, compares the random information with the previously stored migration identification information, if the comparison result shows that the same information exists, regenerates random information and performs the comparison again until the comparison does not have the same information, determines that the random information is the migration identification information generated this time, and stores the random information, that is, the stored migration identification information further includes the random information, so that the same information as the random information is not generated when the migration identification information is generated next time, thus ensuring that the generated migration identification information has uniqueness in the local of the migration terminal.
It can be understood that the transition identification information with the incremental property described in the embodiment of the present invention means that the transition identification information generated later is larger than the transition identification information generated earlier, and in the actual implementation process, the transition identification information may be increased according to a certain order or rule, or may not be increased according to a certain order or rule.
It can be understood that, the above-mentioned generating the transfer identification information according to the current system time of the transfer end may be that the current system time of the transfer end is used as the transfer identification information, or the current system time of the transfer end is converted into a numerical value as the transfer identification information.
And 403, the transfer terminal transmits transaction information to the receiving terminal through near field communication, wherein the transaction information comprises transfer terminal identification information, the transfer identification information, the receiving terminal identification information and the transfer amount.
The transfer terminal transmits transaction information to the receiving terminal through near field communication, wherein the transaction information comprises transfer terminal identification information, the transfer identification information, the receiving terminal identification information and the transfer amount.
The identification information of the transfer terminal (i.e. the transfer terminal identification information) refers to identification information for identifying the transfer terminal, such as a terminal device identifier, a chip card identifier, a mobile phone number, an account number, a digital certificate, a public key, an address generated based on the public key, or other information that can be used for uniquely identifying the transfer terminal. The transfer terminal includes the identification information of the transfer terminal (i.e. the transfer terminal identification information) in the transaction information, and since the transfer terminal identification information has uniqueness in all transfer terminals and the transfer identification information has uniqueness in the transfer identification information generated by the transfer terminal, the receiving terminal can uniquely determine the transaction information according to the transfer terminal identification information and the transfer identification information.
Optionally, the transaction information may further include transaction time, where the transaction time refers to time of the current transfer. Specifically, the transfer terminal may generate the transaction time according to the current system time of the transfer terminal, for example, taking the current system time of the transfer terminal as the transaction time; or in step 401, if the transfer request is transmitted by the receiving end, the receiving end may generate the transaction time according to the current system time of the receiving end, and further include the transaction time in the transfer request, so that the transfer end receives and acquires the transaction time.
Optionally, the transaction information may further include an expiration time, where the expiration time refers to a time when the current transfer expires. Specifically, the expiration time may be generated according to the current system time and a preset time, or may be generated by the transfer terminal according to the current system time and the preset time of the transfer terminal, for example, the expiration time is generated by adding the preset time to the current system time of the transfer terminal; the receiving end may also generate the system time according to the current system time and a preset time length of the receiving end, for example, the receiving end adds the preset time length to the current system time of the receiving end to generate the expiration time, and further includes the expiration time in the transfer request, so that the transfer end receives and acquires the expiration time.
It is understood that if the transaction time or/and the expiration time are generated at the transfer end, they can also be used as the transfer identification information generated in step 402 by implementing a way of ensuring that they are unique locally at the transfer end (e.g., accurate to the order of seconds, and can only be generated at least 1 second apart).
As described in the description of the implementation environment, the transfer terminal may transmit the transaction information to the receiving terminal through a near field communication manner such as bluetooth, infrared ray, NFC, WIFI, sound wave, BLE (bluetooth low energy), or graphic code.
It should be noted that, even if the transfer request acquired by the transfer peer in step 401 is transmitted by the receiving peer through the near field communication, the near field communication method used in this step is not necessarily the same as the near field communication method in step 401. For example, in step 401, the transfer terminal obtains the transfer request by scanning and parsing a graphic code, and in this step, the transfer terminal may transmit the transaction information to the receiving terminal by using a graphic code, or may transmit the transaction information to the receiving terminal by using another near field communication method such as NFC.
Further, in order to prevent the transaction information from being tampered, the transfer terminal may also digitally sign the key information to generate a signature value, and when the transfer terminal transfers the transaction information to the receiving terminal, the transfer terminal also transfers the signature value.
Specifically, the transfer terminal performs digital signature on information to be signed to generate a signature value, where the information to be signed includes the receiving terminal identification information, the transfer identification information, and the transfer amount.
It is to be understood that the information to be signed refers to information at least including the receiving end identification information, the transfer identification information and the transfer amount, and therefore, may or may not include the transfer end identification information, the transaction time, the expiration time or/and other information, and a preferred embodiment is to include the transfer end identification information, the transaction time or/and the expiration time.
Correspondingly, the receiving end receives the transaction information transmitted by the transfer end, and further, the receiving end also receives the signature value transmitted by the transfer end.
And 404, the receiving end verifies the transaction information and determines whether the transaction information is legal or not according to the verification result.
After receiving the transaction information transmitted by the transfer end, the receiving end verifies the transaction information, and the method specifically includes:
and a first verification mode, verifying whether the receiving end identification information belongs to the receiving end according to the terminal identification information preset by the receiving end, and if so, determining that the verification is passed.
Specifically, the receiving end compares preset terminal identification information with the receiving end identification information, if the preset terminal identification information and the receiving end identification information are consistent, the transaction information is the transaction information transferred to the receiving end but not the transaction information transferred to other receiving ends, and the verification is determined to be passed; otherwise, the transaction information is not transferred to the receiving end, and the verification is determined to be failed.
It can be understood that, in the actual implementation process, the terminal identification information preset by the receiving end may not be limited to one, but may also include a plurality of terminal identification information, so that the receiving end may compare the plurality of terminal identification information with the receiving end identification information, and if any one terminal identification information is consistent with the receiving end identification information, it is determined that the verification is passed; further, the receiving end may determine the corresponding type of the terminal identification information, and then determine the terminal identification information that is consistent with the type of the receiving end identification information from the plurality of pieces of terminal identification information, and compare the terminal identification information and the receiving end identification information.
And a second verification mode, verifying whether the transaction information is received or not according to the currently stored transfer verification information, if not, determining that the transaction information is passed, and storing the transfer verification information, wherein the transfer verification information is determined according to the transfer terminal identification information and the transfer identification information.
The receiving end verifies whether the transaction information is received or not according to the currently stored transfer verification information, specifically, the transfer end identification information and the transfer identification information are verified according to the currently stored transfer verification information so as to judge whether the transaction information is received or not, if the transaction information is not received, the transaction information is a new transfer, the verification is determined to be passed, and the transfer verification information is stored, so that the currently stored transfer verification information also comprises the transfer verification information, and the transfer verification information is determined according to the transfer end identification information and the transfer identification information; otherwise, if the transaction information is judged to be received, the transaction information is a repeated transfer, and the verification is determined not to be passed.
It can be understood that the currently stored transfer verification information refers to transfer verification information that has been currently stored, after the transfer verification information is stored, the currently stored transfer verification information further includes the transfer verification information, and when transaction information including the transfer terminal identification information and the transfer identification information is received again, and the transfer terminal identification information and the transfer identification information are verified according to the currently stored transfer verification information, it can be determined that the transaction information has been received, so that the verification is determined not to be passed.
Specifically, the second verification method may include various embodiments, and at least may include:
in a first embodiment, the transferring verification information is generated by combining the transferring terminal identification information and the transferring identification information, and the verifying whether the transaction information is received according to the currently stored transferring verification information includes: and judging whether the transfer verification information exists in the currently stored transfer verification information or not, and if not, determining that the verification is passed.
The transfer verification information is information generated by combining the transfer terminal identification information and the transfer identification information, so that verifying whether the transaction information is received according to the currently stored transfer verification information comprises: judging whether the transfer verification information exists in the currently stored transfer verification information, if not, indicating that the transaction information is not received before, namely indicating that the transaction information is a new transfer, determining that the verification is passed, and storing the transfer verification information, otherwise, determining that the verification is not passed.
The embodiment that the receiving end generates the transfer verification information according to the combination of the transfer end identification information and the transfer identification information ensures that the transfer end identification information and the transfer identification information have a unique corresponding relationship with the determined transfer verification information, and ensures that the same transfer verification information is determined for the same transfer end identification information and the same transfer identification information every time. In this way, it is possible to determine that the transfer verification information exists in the currently stored transfer verification information when the transaction information including the transfer terminal identification information and the transfer identification information is received again after the transfer verification information is stored.
Generating the transfer verification information according to the transfer terminal identification information and the transfer identification information, which may include multiple ways:
for example, the receiving end combines information including the transfer end identification information and the transfer identification information as the transfer verification information. For example, the receiving end combines the transfer end identification information and the transfer identification information as the transfer verification information; for another example, the receiving end combines the transfer end identification information, the transfer identification information and other character strings to generate the transfer verification information, and further, because the transaction information includes the transfer end identification information and the transfer identification information, the transaction information can also be used as the transfer verification information.
For another example, since the hash value generated using the hash algorithm has a characteristic of uniqueness, the receiving end combines information including the transfer end identification information and the transfer identification information and hashes the resulting hash value as the transfer verification information. For example, the receiving end combines the transfer end identification information and the transfer identification information, and performs hash calculation on the information generated by the combination, and uses the generated hash value as the transfer verification information; for another example, the receiving end combines the transfer end identification information, the transfer identification information, and other character strings, and performs hash calculation on the information generated by the combination, and uses the generated hash value as the transfer verification information, further, because the transaction information includes the transfer end identification information and the transfer identification information, hash calculation may be performed on the transaction information, and the hash value generated by the hash calculation may be used as the transfer verification information, and further, if the signature value generated by the transfer end in the above step 404 is received, and the information to be signed also includes the transfer end identification information, then the signature value or the information digest in the signature value may be used as the transfer verification information.
It will be appreciated that, in order to ensure that the same transfer authentication information is generated for each time the same transfer end identification information and transfer identification information, the receiving end should generate the transfer authentication information from the information combination of the transfer end identification information and the transfer identification information in the same manner, for example, if the receiving end combines the transfer end identification information, the transfer identification information and other character strings to generate the transfer verification information, when the receiving end again generates transfer authentication information based on the combination of the transfer end identification information and the transfer identification information, the receiving end needs to combine the re-received transfer end identification information, transfer identification information and the same character string as the other character string in the same way to generate transfer verification information, thereby enabling the same transfer verification information to be generated according to the same transfer terminal identification information and the same transfer identification information; for another example, if a hash algorithm is used in generating the transfer verification information, when the transfer verification information is generated again, hash calculation is performed using the same hash algorithm, so that the same hash value can be generated based on the same information, thereby ensuring that the same transfer verification information is generated.
In a second implementation manner, the transferring verification information is a corresponding relationship between the transferring end identification information and the transferring identification information, and the verifying whether the transaction information is received according to the currently stored transferring verification information includes: and judging whether the corresponding relation between the transfer terminal identification information and the transfer identification information exists in the currently stored transfer verification information, and if not, determining that the verification is passed.
The currently stored transfer verification information refers to a correspondence between already stored transfer end identification information and transfer identification information, and the transfer verification information refers to a correspondence between the transfer end identification information and the transfer identification information, so it can be understood that the verifying whether the transaction information is received according to the currently stored transfer verification information includes: judging whether the corresponding relation between the transfer terminal identification information and the transfer identification information exists in the currently stored transfer verification information, if not, indicating that the transaction information is not received before, namely, indicating that the transaction information is transferred newly, determining that the verification is passed, and storing the transfer verification information (namely, storing the corresponding relation between the transfer terminal identification information and the transfer identification information), otherwise, determining that the verification is not passed.
It can be understood that storing the transfer verification information means newly establishing and storing a corresponding relationship between the transfer terminal identification information and the transfer identification information, and does not replace or cover the stored corresponding relationship between other transfer terminal identification information and the transfer identification information. After the transfer verification information is stored, the corresponding relationship between the transfer terminal identification information and the transfer identification information is also included in the currently stored transfer verification information, so that when the transaction information including the transfer terminal identification information and the transfer identification information is received again, the corresponding relationship between the transfer terminal identification information and the transfer identification information in the currently stored transfer verification information can be judged.
For example, the receiving end acquires corresponding transfer identification information from currently stored transfer verification information according to the transfer end identification information, if the corresponding transfer identification information is not acquired, or if the corresponding transfer identification information is acquired, but if the transfer identification information does not exist in the corresponding transfer identification information, it indicates that the corresponding relationship between the transfer end identification information and the transfer identification information does not exist in the currently stored transfer verification information, it indicates that the transaction information is a new transfer, and determines that the verification is passed, and newly establishes and stores the corresponding relationship between the transfer end identification information and the transfer identification information, and if the transfer identification information exists in the corresponding transfer identification information, it determines that the verification is not passed.
For another example, the receiving end obtains corresponding transfer end identification information from currently stored transfer verification information according to the transfer identification information, if the corresponding transfer end identification information is not obtained, or if the corresponding transfer end identification information is obtained, but if the transfer end identification information does not exist in the corresponding transfer end identification information, it indicates that the corresponding relationship between the transfer end identification information and the transfer identification information does not exist in the currently stored transfer verification information, it indicates that the transaction information is a new transfer, verification is determined to pass, and the corresponding relationship between the transfer end identification information and the transfer identification information is newly established and stored, if the transfer end identification information exists in the corresponding transfer end identification information, verification is determined not to pass.
It can be understood that, when determining whether the transfer identification information exists in the corresponding transfer identification information, if the corresponding transfer identification information only has one transfer identification information, the corresponding transfer identification information is only required to be compared with the transfer identification information, if the transfer identification information and the transfer identification information are not consistent, the corresponding transfer identification information is not present, otherwise, if the transfer identification information and the transfer identification information are consistent, the corresponding transfer identification information is present; if the corresponding transfer identification information includes a plurality of transfer identification information, the plurality of transfer identification information and the transfer identification information can be compared respectively, if no transfer identification information is consistent with the transfer identification information, the corresponding transfer identification information does not contain the transfer identification information, otherwise, if any transfer identification information is consistent with the transfer identification information, the corresponding transfer identification information contains the transfer identification information. The above-mentioned determination method for determining whether the transfer end identification information exists in the corresponding transfer end identification information is similar to this, and is not repeated.
In practical implementation of the second implementation manner, the transfer end identification information or/and the transfer identification information may also be replaced by information having a one-to-one correspondence relationship, for example, because a hash value generated by using a hash algorithm has a characteristic of uniqueness, the transfer end identification information or/and the transfer identification information may be respectively generated into corresponding hash values for replacement, which is not described herein again.
It can be understood that, in the actual implementation process, the above-mentioned storing of the transfer verification information may also be implemented by storing the transaction information, because the transaction information includes the transfer terminal identification information and the transfer identification information, the transaction information is stored, that is, the corresponding relationship between the transfer terminal identification information and the transfer identification information is stored.
In a third embodiment, the transfer identification information is transfer identification information with an incremental property, the transfer verification information is a correspondence between the transfer end identification information and the transfer identification information, and the verifying whether the transaction information is received according to the currently stored transfer verification information includes: and acquiring corresponding transfer identification information according to the transfer terminal identification information, and determining that the verification is passed if the corresponding transfer identification information is not acquired or if the transfer identification information is greater than the corresponding transfer identification information.
The transition identification information with the incremental property means that the newly generated transition identification information is larger than the transition identification information generated last time, and corresponding description and examples are performed in step 402, which is not described herein again. It is to be understood that, if the generation of the transition identification information in the above step 402 is to use the current system time of the transition terminal as the transition identification information, the newly generated transition identification information being larger than the last generated transition identification information may also be understood as performing a time comparison, and the later time being larger than the previous time.
The currently stored transfer verification information refers to the correspondence between the already stored transfer terminal identification information and the transfer identification information, and the transfer verification information refers to the correspondence between the transfer terminal identification information and the transfer identification information.
The receiving end acquires corresponding transfer identification information from currently stored transfer verification information according to the transfer end identification information, if the corresponding transfer identification information is not acquired, or if the corresponding transfer identification information is acquired, but if the transfer identification information is larger than the corresponding transfer identification information, the transaction information is a new transfer, the verification is determined to be passed, and the corresponding relation between the transfer end identification information and the transfer identification information is established; otherwise, if the corresponding transfer identification information is acquired, but if the transfer identification information is not larger than the corresponding transfer identification information, the transaction information is a repeated transfer, and the verification is determined not to be passed.
It can be understood that, in the third embodiment, whether the transaction information belongs to a new transfer is verified according to the corresponding relationship between the transfer end identification information and the transfer identification information, and if the corresponding transfer identification information is not acquired according to the transfer end identification information, it can be stated that the transaction information has not been received before, that is, it can be stated that the transaction information is a new transfer, and it is determined that the verification is passed; and because the transfer identification information is the transfer identification information with the incremental property, the transfer identification information in the transaction information newly transmitted by the same transfer terminal is larger than the transfer identification information in the transaction information transmitted before the transfer terminal, if the transfer identification information is larger than the transfer identification information, the verification is determined to be passed, and if the transfer identification information is not larger than the transfer identification information, the verification is determined not to be passed.
It can be understood that, in the actual implementation process of the third embodiment, storing the transfer verification information refers to establishing and storing a corresponding relationship between the transfer terminal identification information and the transfer identification information, and each transfer terminal identification information may only allow one corresponding transfer identification information to be established, or each transfer terminal identification information may allow one or more corresponding transfer identification information to be established. Therefore, when each piece of transfer terminal identification information is implemented to only allow one piece of corresponding transfer identification information to be established, that is, the transfer identification information corresponding to the transfer terminal identification information is implemented to only allow one piece of corresponding transfer identification information to be established, the establishing and storing of the corresponding relationship between the transfer terminal identification information and the transfer identification information is to replace the transfer identification information corresponding to the transfer terminal identification information with the transfer identification information; when implementing each transfer terminal identification information allows establishing one or more corresponding transfer identification information, i.e. the transfer identification information corresponding to the transfer terminal identification information allows to establish one or more corresponding transfer identification information, the establishing and storing of the corresponding relationship between the transfer terminal identification information and the transfer identification information is to newly establish and store the transfer terminal identification information and the transfer identification information without replacing or covering the corresponding relationship between other stored transfer terminal identification information and transfer identification information, wherein, when the transfer identification information corresponding to the transfer terminal identification information comprises a plurality of corresponding transfer identification information, it is to be understood that the transition identification information being larger than the corresponding transition identification information means that the transition identification information is larger than the largest transition identification information among the plurality of corresponding transition identification information.
Further, as described above, when implementing each transfer end identification information allows establishing one or more corresponding transfer identification information, wherein when the transfer identification information corresponding to the transfer end identification information includes a plurality of corresponding transfer identification information, it may be further implemented that, when the transfer identification information is not greater than the largest transfer identification information (hereinafter referred to as the largest transfer identification information) among the plurality of corresponding transfer identification information and the transfer identification information is not included in the plurality of corresponding transfer identification information, it is determined that the authentication is passed, and the correspondence relationship between the transfer end identification information and the transfer identification information is newly established and stored. The main effect of this implementation is that, when the transfer identification information is not greater than the maximum transfer identification information and the transfer identification information is not included in the plurality of corresponding transfer identification information, it indicates that the transaction information is a new transfer and the verification is passed, otherwise, if the transfer identification information is included in the plurality of corresponding transfer identification information, it indicates that the transaction information is a repeated transfer and the verification is not passed. It is to be understood that if the transition identification information is equal to the maximum transition identification information, it indicates that the transition identification information is not greater than the maximum transition identification information and that the transition identification information is included in the plurality of corresponding transition identification information, and therefore, it is determined that the authentication is not passed.
Further, when the transfer identification information is not greater than the maximum transfer identification information, that is, when the transfer identification information is compared with the maximum transfer identification information, the method further includes comparing a difference between the transfer identification information and the maximum transfer identification information, and when the difference between the transfer identification information and the maximum transfer identification information is less than a preset value and the transfer identification information is not included in the corresponding transfer identification information, the verification is determined to be passed; meanwhile, for the transfer identification information which is not more than the maximum transfer identification information in the plurality of corresponding transfer identification information, when the difference value between a certain corresponding transfer identification information and the maximum transfer identification information is not less than the preset value, the certain corresponding transfer identification information is discarded. It is to be understood that discarding the certain corresponding transition identification information means deleting the correspondence between the transition end identification information and the certain transition identification information, or setting the correspondence between the transition end identification information and the certain transition identification information to a state of being unusable. The main effect of this implementation is that, for the transfer identification information that has been established and stored and has a difference value with the maximum transfer identification information not less than the preset value, even if the transfer identification information is discarded, when the transaction information including the transfer identification information is received again, since the difference value between the transfer identification information and the maximum transfer identification information is not less than the preset value, it is determined that the verification is not passed, and thus, if the receiving end performs a plurality of digital asset transfers, that is, if the receiving end receives a large amount of transaction information, the receiving end can discard the corresponding transfer identification information in time through this embodiment, thereby avoiding that the transfer end identification information and the transfer identification information that are currently established and stored are continuously increased, and not affecting the result of determining whether the transaction information is legal.
It can be understood that, if the step 402 generates the transfer identification information by taking the current system time of the transfer end as the transfer identification information, the difference obtained by comparing the transfer identification information with the maximum transfer identification information may be a time interval, and the preset value may be a preset time duration.
When the first verification mode and the second verification mode are implemented, the transaction information is determined to be legal only if the two verification modes are verified to be passed, otherwise, if any verification mode is that the verification is not passed, the transaction information is determined to be illegal.
Optionally, as in step 403, if the transaction information further includes a transaction time or/and an expiration time, the receiving end may further verify the transaction information according to the transaction time or/and the expiration time, which may specifically include:
and the receiving end determines a time period according to the transaction time or/and the expiration time and a preset time length, judges whether the current system time of the receiving end is in the time period, and if so, determines that the verification is passed.
If the transaction information transmitted from the transfer terminal to the receiving terminal in step 403 further includes a transaction time or/and an expiration time, the receiving terminal obtains the transaction time or/and the expiration time, and determines a time period according to the transaction time or/and the expiration time and a preset time period; and the receiving end acquires the current system time of the receiving end, and then judges whether the current system time is in the time period, if so, the verification is determined to be passed, otherwise, the verification is determined not to be passed. For example, if the time period is a time period between the time "2020-08-1008: 00: 00" and the time "2020-08-1108: 00: 00", the verification is determined to be passed if the current system time of the receiving end is a time between the time "2020-08-1008: 00: 00" and the time "2020-08-1108: 00: 00", and the verification is not determined to be passed if not. It is to be understood that the time period between time "2020-08-1008: 00: 00" and time "2020-08-1108: 00: 00" is merely an example, and the time interval of the time period determined in actual implementation may be greater or less than the time period.
Further, if the third verification method is implemented, the second verification method determines that the verification is passed, and after the transfer verification information is stored, the receiving end may discard the transfer verification information from the currently stored transfer verification information when the current system time of the receiving end reaches the time after the time period. It is to be understood that discarding the transfer verification information refers to making verification comparison of the transfer verification information in the currently stored transfer verification information, for example, deleting the transfer verification information, or setting the transfer verification information to a non-reusable state, and it is to be understood that if the transfer verification information is a correspondence between the transfer end identification information and the transfer identification information, deleting the transfer verification information refers to deleting the correspondence, and setting the transfer verification information to a non-reusable state refers to setting the correspondence to a non-reusable state. The main effect of the implementation is that if the receiving end receives the transaction information again and repeatedly, if the current system time is in the time period, the transfer verification information is not discarded at this time, so that the transfer verification information stored at present is judged to include the transfer verification information through the second verification mode, and the verification is determined not to pass; if the current system time is after the time period and the transfer verification information is discarded, the verification is determined not to pass through the third verification mode, even if the verification is determined to pass through the second verification mode, the transaction information is determined to be illegal because the verification is determined not to pass through any verification mode in the embodiment, and therefore the transaction information is still determined to be illegal; therefore, if the receiving end carries out digital asset transfer for a plurality of times, namely if the receiving end receives a large amount of transaction information, the receiving end can discard the corresponding transfer verification information in time through the implementation mode, the transfer verification information stored currently is prevented from being continuously increased, and the result of determining whether the transaction information is legal or not is not influenced.
It is understood that a time period comprises a start time and an end time, and that a time after said time period is also understood to be a time after the end time of said time period. Taking the above example as an example, time "2020-08-1008: 00: 00" is the starting time of the time period, time "2020-08-1108: 00: 00" is the ending time of the time period, and time after the time period is time after time "2020-08-1108: 00: 00".
The receiving end determines the time period according to the transaction time or/and the expiration time and the preset time, which may include various embodiments, for example:
in a first embodiment, if the transaction information further includes a transaction time, it is determined that the time period is a time period within the preset time length after the transaction time.
The time period is a time period within the preset time period after the transaction time, and may also be understood as a time period after the transaction time and before the transaction time plus the preset time period. For example, taking the trading time as "2020-08-1008: 00: 00" and the preset time duration as 24 hours as examples, the time obtained by adding the trading time and the preset time duration is "2020-08-1108: 00: 00", and the time period is a time period between the time "2020-08-1008: 00: 00" and the time "2020-08-1108: 00: 00".
In a second embodiment, if the transaction information further includes a transaction time, the preset time duration is divided into a first preset time duration and a second preset time duration, and the time duration is determined as a time duration between the transaction time minus the first preset time duration and the transaction time plus the second preset time duration.
And determining the time period as the time period between the transaction time minus the first preset time period and the transaction time plus the second preset time period. Specifically, the time obtained by subtracting the first preset time length from the transaction time is used as the starting time, the time obtained by adding the second preset time length to the transaction time is used as the ending time, the time period is a time period between the starting time and the ending time, for example, the transaction time is "2020-08-1020: 00: 00", the first preset time period is 12 hours, the second preset time period is 12 hours, the time obtained by subtracting the first preset time length from the transaction time is '2020-08-1008: 00: 00', the time obtained by adding the trade time and the second preset time length is '2020-08-1108: 00: 00', the time period is a time period between the time of 2020-08-1008: 00:00 and the time of 2020-08-1108: 00: 00.
In a third embodiment, if the transaction information further includes transaction time, the preset time duration is divided into a third preset time duration and a fourth preset time duration, and the time duration is determined to be the time duration between the transaction time plus the third preset time duration and plus the fourth preset time duration.
And determining the time period as the time period between the transaction time plus the third preset time period and the transaction time plus the third preset time period plus the fourth preset time period. Specifically, the transaction time plus the third preset time length is taken as the starting time, the transaction time plus the third preset time length plus the fourth preset time length is taken as the ending time, the time period is a time period between the starting time and the ending time, for example, the trading time is "2020-08-1007: 00: 00", the third preset time period is 1 hour, the fourth preset time period is 23 hours, the time of the trade time plus the third preset time period is '2020-08-1008: 00: 00', the time obtained by adding the third preset time length to the transaction time and adding the fourth preset time length is '2020-08-1108: 00: 00', the time period is a time period between the time of 2020-08-1008: 00:00 and the time of 2020-08-1108: 00: 00.
In a fourth embodiment, if the transaction information further includes an expiration time, the time period is a time period within the preset time period before the expiration time.
A time period within the preset time period before the expiration time may also be understood as a time period before the expiration time and after the time of the expiration time minus the preset time period. For example, taking the expiration time as "2020-08-1108: 00: 00" and the preset time duration as 24 hours as an example, the time obtained by subtracting the preset time duration from the expiration time is "2020-08-1008: 00: 00", and the time period is a time period between the time "2020-08-1008: 00: 00" and the time "2020-08-1108: 00: 00".
In an embodiment five, if the transaction information further includes a transaction time and an expiration time, and if a time duration between the transaction time and the expiration time is less than the preset time duration, the time duration is a time duration between the transaction time and the expiration time.
And the receiving end judges whether the time length between the transaction time and the expiration time is less than the preset time length, if so, the time period is determined to be the time period between the transaction time and the expiration time, otherwise, the transaction time and the expiration time are illegal, and the subsequent steps are not executed. The main effect of this implementation is to limit the duration between the transaction time and the expiration time to be less than the preset duration in order to avoid an excessively long duration between the transaction time and the expiration time.
The time period is a time period between the trade time and the expiration time, which may also be understood as a time period after the trade time and before the expiration time. For example, taking the trade time of "2020-08-1008: 00: 00" and the expiration time of "2020-08-1108: 00: 00" as examples, the time period is a time period between time "2020-08-1008: 00: 00" and time "2020-08-1108: 00: 00".
It can be understood that the current system time described in each embodiment of the present invention refers to the system time in which the device is located when the corresponding step is executed, and may also be understood that the actually obtained current system time is the system time in which the device is located when the current system time is executed, and because there may be differences in the order and the time point of each step in the actual execution, and there may be errors or errors in the system clock of each device, there may also be differences in the current system time obtained in the actual execution of different devices and different steps.
Further, the receiving end may also verify the transaction information through the signature value, which specifically includes:
if the receiving end receives the transaction information transmitted by the transfer end in the step 403 and further receives a signature value of the information to be signed transmitted by the transfer end, and the information to be signed includes the transfer identification information, the receiving end identification information and the transfer amount, the receiving end performs digital signature verification on the signature value.
As described in step 404, the transfer end may also digitally sign the information to be signed to generate a signature value. Digital signatures refer to data appended to a data unit or a cryptographic transformation performed on a data unit that allows an authenticator (e.g., a receiving end) of the data unit to verify the source and integrity of the data unit and to protect the data unit from counterfeiting or repudiation.
In one implementation mode of digital signature, a transfer terminal performs hash calculation on information to be signed by using a hash algorithm to obtain a hash value (namely an information digest), and the transfer terminal is based on an asymmetric encryption algorithm and encrypts the hash value by using a private key of the transfer terminal to obtain an encryption result (namely a signature value); when the receiving end receives the signature value, the step of the receiving end performing digital signature verification on the signature value comprises the following steps:
the receiving end generates information to be verified in the same generation mode as the transfer end generates the information to be signed, so that the generated information to be verified is the same as the information to be signed generated by the transfer end. It can be understood that the generated information to be verified at least includes the receiving end identification information, the transfer identification information and the transfer amount, and if the information to be signed generated by the transfer end further includes the transfer end identification information, the transaction time, the expiration time or/and other information, the generated information to be verified also includes the transfer end identification information, the transaction time, the expiration time or/and the same other information, so that the generated information to be verified is the same as the information to be signed generated by the transfer end;
the receiving end obtains the public key of the transfer end, the receiving end decrypts the signature value by using the public key to obtain a decryption result (namely an information abstract), the receiving end uses the same hash algorithm to perform hash calculation on the information to be verified to obtain a hash value (namely a verification value), whether the decryption result (namely the information abstract) is the same as the verification value or not is compared, if yes, the digital signature is determined to pass the verification, and if not, the verification is determined not to pass the verification.
The receiving end may obtain the public key of the transfer end in various ways, for example, when the transfer end performs digital signature on the information to be signed Based on a private key generated by an IBC (Identity-Based cryptography), and the receiving end uses the transfer end identification information as the public key of the transfer end; for another example, when the transfer terminal digitally signs the information to be signed based on a private Key generated by a pki (public Key infrastructure) system, the transfer terminal may further transmit the digital certificate of the transfer terminal when transmitting the transaction information to the receiving terminal, so that the receiving terminal obtains the public Key of the transfer terminal from the digital certificate, and it can be understood that, in the actual application process, a preset root certificate should be used to verify whether the digital certificate of the transfer terminal is legal or not.
It can be understood that the receiving end may also use a unique tag value, such as a serial number (serial number), a subject (subject), a subject unique identifier (subject unique id), or a public key, in the digital certificate of the forwarding end to identify the forwarding end, that is, the unique tag value is used as the forwarding end identification information, so that the forwarding end identification information is the unique tag value in the digital certificate.
It can be understood that when the above-mentioned multiple verification modes are implemented simultaneously, the transaction information is determined to be legal only if each verification mode determines that the verification is passed, otherwise, if any verification mode is that the verification is not passed, the transaction information is determined to be illegal.
It can be understood that, in the actual implementation process, not only may the above verification method be used to verify whether the transaction information is legal, but also other methods may be used to further determine or verify whether the transaction information is legal, for example, whether the data format of the transaction information is valid, whether the transfer amount reaches the preset amount, and the like.
If the transaction information is determined to be legitimate, the transfer of the digital asset may be approved. In an actual implementation process, the receiving end may further add the transfer amount to the asset balance currently available to the receiving end, that is, change the transfer amount to a digital asset that the receiving end may use for transfer, payment, and the like currently, for example, assuming that the asset balance currently available to the receiving end is 100 and the transfer amount is 20, the receiving end adds the transfer amount to the balance of the digital asset currently available to the receiving end, thereby changing the balance of the digital asset currently available to the receiving end to 120.
Step 405, optionally, the transfer terminal stores the transaction information, and when a request for re-transferring the transaction information is received, the transfer terminal re-acquires the transaction information from the stored transaction information and transmits the re-acquired transaction information to the receiving terminal through short-range communication.
In the implementation process of the above-mentioned close-range transfer of the digital assets, in the actual implementation process, due to various reasons, situations in the aspects of close-range transfer interruption of the digital assets may occur, and thus the transfer end has transmitted the transaction information, but the receiving end does not receive and acquire the transaction information. For example, when the transfer end transfers the digital assets to the receiving end in a short distance, the receiving end fails (e.g., crashes) to cause that the transaction information is not received and acquired; for another example, when the transfer end performs a close-range transfer of the digital asset to the receiving end, the transfer end generates a graphic code, but the receiving end does not scan the graphic code to acquire transaction information. To solve the problem, the embodiment of the present invention may further implement: the transfer terminal stores the transaction information, and when the transfer terminal receives a retransfer request for the transaction information, the transfer terminal acquires the transaction information from the stored transaction information again and transmits the acquired transaction information to the receiving terminal through near field communication.
Specifically, the transfer end stores the transaction information, and in an actual implementation process, the transfer end may store transaction information including the transfer end identification information, the transfer identification information, the receiving end identification information, and the transfer amount as a group, so that the group of information is obtained when the transaction information is obtained again, that is, the transaction information is obtained; the transfer terminal may also store information including the transfer identification information, the receiving terminal identification information, and the transfer amount as a set of information, so that the set of information is acquired when the transaction information is acquired again, and the information is combined with the identification information of the transfer terminal to generate the transaction information; the transfer terminal can also establish and store the association relationship among the transfer identification information, the receiving terminal identification information and the transfer amount, so that when the transaction information is acquired again, the transaction information including the transfer identification information, the receiving terminal identification information and the transfer amount can be acquired simultaneously according to the association relationship, and the transaction information is generated by combining the information and the identification information of the transfer terminal. It can be understood that, when the transaction information further includes a transaction time or/and an expiration time, the transaction information further includes storing the transaction time or/and the expiration time, and detailed description is omitted.
When the condition that the close-range transfer of the digital assets is interrupted exists, a re-transfer request can be sent to the transfer terminal, and when the transfer terminal receives the re-transfer request of the transaction information, the transfer terminal re-acquires the transaction information from the stored transaction information and transmits the re-acquired transaction information to the receiving terminal through close-range communication. The receiving end can verify the transaction information, so that for the transaction information transmitted again, if the receiving end already receives the transaction information, the verification mode II can determine that the verification fails when the transaction information is verified again, thereby determining that the transaction information is illegal and avoiding the repeated transfer of digital assets.
There are various ways to trigger the transfer terminal to receive a request for re-transfer of the transaction information. For example, a user at the transfer end triggers the re-transfer request on an operation interface at the transfer end, and the transfer end receives the re-transfer request; for another example, the receiving end sends the re-transfer request to the transferring end, and the transferring end receives the re-transfer request.
The method for retrieving the transaction information from the stored transaction information by the transfer terminal may include various embodiments, and at least may include:
in the first embodiment, the transfer terminal only stores one transaction message, and the transfer terminal acquires the transaction message as the transaction message.
And the transfer terminal only stores one transaction message, and then the transfer terminal acquires the transaction message as the transaction message.
It can be understood that, since the transfer terminal only stores one item of transaction information, when the transfer terminal stores the transaction information, the previously stored transaction information is deleted or overwritten; after the transaction information is stored, when other transaction information is stored again, the transaction information is deleted or covered.
In the second implementation mode, the transfer terminal stores a plurality of items of transaction information in sequence, and the transfer terminal acquires one item of transaction information which is stored recently as the transaction information.
The transfer terminal stores a plurality of transaction information, stores the transaction information according to the sequence, and when the transfer terminal stores the transaction information, the transaction information belongs to the transaction information which is stored recently by the transfer terminal, and the transfer terminal acquires the transaction information which is stored recently as the transaction information.
It is understood that when other transaction information is stored again after the transaction information is stored, the transaction information does not belong to one transaction information that is stored recently by the transfer terminal.
In the third embodiment, the transfer terminal stores a plurality of transaction information, and acquires the transaction information from the transaction information according to the selection operation of the user.
The transfer terminal stores a plurality of items of transaction information, and when a user of the transfer terminal inquires the stored transaction information on an operation interface of the transfer terminal, the stored transaction information is displayed on the operation interface of the transfer terminal, for example, the storage time, the transfer amount, the receiving terminal (according to the receiving terminal identification information display in the transaction information) and the like of each item of transaction information are displayed; and the user of the transfer terminal selects the corresponding transaction information and triggers a re-transfer request, and then the transfer terminal acquires the selected transaction information.
In a fourth embodiment, the transfer end stores multiple transaction information, the retransfer request further includes transfer identification information or/and a transfer amount or/and receiving end identification information, and the transfer end matches and acquires the transaction information from the multiple transaction information according to the transfer amount or/and the receiving end identification information.
The transfer terminal stores a plurality of items of transaction information, the retransfer request further comprises transfer identification information or/and a transfer amount or/and receiving terminal identification information, for example, the receiving terminal sends a retransfer request comprising the transfer identification information or/and the transfer amount or/and the receiving terminal identification information to the transfer terminal; because each item of transaction information stored by the transfer terminal comprises information such as receiving terminal identification information, transfer amount and the like, the transfer terminal matches and acquires the transaction information from the transaction information according to the transfer identification information or/and the transfer amount or/and the receiving terminal identification information.
Correspondingly, after the transfer terminal transmits the transaction information to the receiving terminal through the short-distance communication again, the receiving terminal verifies the transaction information and determines whether the transaction information is legal or not according to the verification result. For a specific implementation, refer to the first verification method, the second verification method, and the third verification method in step 404, which are not described herein again.
Further, when the transfer terminal transmits the reacquired transaction information to the receiving terminal through the near field communication, the transfer terminal may also reacquire a signature value of the information to be signed, and the receiving terminal performs digital signature verification according to the signature value. The signature value may be a signature value generated by the transfer terminal performing digital signature again on the information to be signed, that is, the transfer terminal determines the information to be signed according to the transaction information obtained again, and performs digital signature to generate the signature value, the specific generation manner is the same as the generation manner in the step 403, and when the transfer terminal transmits the transaction information obtained again to the receiving terminal, the transfer terminal also transmits the signature value; the signature value may be the signature value generated in step 403, that is, when the transfer side stores the transaction information, the signature value generated in step 403 is also stored at the same time, an association relationship between the transaction information and the signature value generated in step 403 is established (the transaction information and the signature value generated in step 403 may be stored as a set), and when the transfer side reacquires the transaction information, the signature value generated in step 403 is acquired at the same time according to the association relationship, that is, the signature value is acquired.
Correspondingly, after the receiving end receives the reacquired signature value transmitted by the transfer end, the receiving end verifies the reacquired transaction information according to the reacquired signature value. For a specific implementation, reference may be made to the verification method four described above, which is not described herein again.
It should be noted that, when the transfer terminal transmits the transaction information obtained again to the receiving terminal through the short-range communication, the short-range communication method of the transfer terminal does not have to be the same as the short-range communication method in step 401 (if related) or step 403, and the embodiment of the present invention is not limited thereto.
It is to be understood that the storage in the embodiment of the present invention may be a volatile storage or a nonvolatile storage, and the embodiment of the present invention is not limited thereto.
It should be noted that, the above implementation process may be implemented when the transfer end and the receiving end are in a dual offline state, but it is not limited that the transfer end and the receiving end must be in a dual offline state, for example, in an actual implementation process, when the transfer end or/and the receiving end are connected to a network and can communicate with a digital asset service end (e.g., a registration center, a payment center, etc. of a digital asset), whether the transaction information is legal may be further verified through the network, and corresponding operations are executed according to the further verification result, for example, the receiving end sends the transaction information to the digital asset service end through the network, the digital asset service end verifies the transaction information, and if the verification is passed, the digital asset service end performs digital asset transfer or digital asset payment, etc. according to the transaction information; for another example, the receiving end sends the transaction information to the digital asset service end through the network for further verification, and the receiving end determines to increase the transfer amount to the asset balance currently available at the receiving end according to the further verification result fed back by the digital asset service end.
According to the implementation process, the embodiment of the invention has the main advantages that on the first hand, the transfer end can be prevented from repeatedly transferring the same transaction information to the receiving end in a short distance in advance; in the second aspect, the number of times of interactive data and short-distance communication between the transfer terminal and the receiving terminal is reduced as much as possible, for example, taking the example that the transfer terminal scans and parses the posted graphic code to obtain a transfer request in step 401, and then the transfer terminal and the receiving terminal only need to perform short-distance communication once in step 403; for another example, even if the transaction time or/and the expiration time included in the transaction information in step 403 is obtained from the transfer request, by the method provided in the embodiment of the present invention, the interactive data and the number of short-distance communications between the transfer end and the receiving end can be reduced as much as possible, for example, if the preset duration is set to be a longer duration (e.g., 60 days), the receiving end only needs to print and post the graphic code once, and thus the graphic code does not need to be printed and posted again for a long time (e.g., 60 days); in the third aspect, further, for the situation that the digital asset is transferred in a short distance and interrupted, the transfer terminal can also transfer the same transaction information to the receiving terminal again, and no repeated transfer is generated.
Fifth, embodiment four of a method for preventing digital assets from transferring repeatedly in close range
For the transfer end in the first and third embodiments, if malicious tampering can be performed on the key information or implementation process in the transfer end, it may result in reuse of the digital asset, for example, increasing the digital asset by directly tampering the currently available asset balance; as another example, reuse and transfer of the same digital asset may be achieved by maliciously modifying the above-described embodiment three steps 403 to pass different transaction information on the same digital asset multiple times.
Accordingly, it is necessary to provide corresponding security measures to ensure that critical information and processes are not tampered with and destroyed. Please refer to fig. 5, which shows an implementation structure diagram of a transfer end provided by the present invention, where a security module is connected in the transfer end, where the key information is stored securely by the security module, and the key implementation process is executed by the security module, and the security module may be implemented by software, hardware, or a combination of the two, for example, the security module may be a secure element SE (secure element), an Embedded secure element eSE (Embedded-SE), a trusted Execution environment tee (trusted Execution environment), a subscriber Identity module SIM (subscriber Identity module), an Embedded subscriber Identity module eSIM (Embedded-SIM), a host Card emulation hce (host Card emulation), a USB key, or a chip Card in other software and hardware forms.
Referring to fig. 6, a flowchart of a fourth embodiment of a method for preventing a digital asset from being repeatedly transferred in a close range according to the present invention is shown, where the present embodiment is illustrated by applying the method to the security module shown in fig. 5, and the method may include:
As described in step 401 of the above embodiment, the transfer end obtains a transfer request, where the transfer request includes a transfer amount and receiving end identification information. And the transfer terminal generates a transfer instruction according to the transfer request, wherein the transfer instruction comprises the transfer amount and the receiving terminal identification information.
And the transfer end sends the transfer instruction to the security module through a communication interface between the transfer end and the security module. Generally, the transfer end may send the transfer instruction to the security module through an APDU instruction (Application Protocol Data Unit), and of course, the transfer instruction may also be sent in other manners according to a communication interface Protocol between the transfer end and the security module, which is not limited in this embodiment.
Correspondingly, the safety module receives the transfer instruction sent by the transfer end.
When the transfer amount is not greater than the currently available asset balance, subtracting the transfer amount from the currently available asset balance and performing step 603 and subsequent steps, otherwise, not performing step 603 and subsequent steps.
The method comprises the steps that a currently available asset balance is stored in a security module, and the security module implements corresponding storage area protection on the currently available asset balance, specifically, the security module performs security protection on writing of the currently available asset balance, especially performs security protection on increasing the currently available asset balance (which can also be understood as performing security protection on recharging), for example, the security module only receives writing of a special device (such as a front-end processor) of a digital asset service end on increasing the currently available asset balance, or the security module only adds the to-be-increased transfer amount to the currently available asset balance after receiving an affirmative feedback and a digital signature of the to-be-increased transfer amount of the digital asset service end forwarded by a transfer end.
In practical implementation, the security module should also perform security restrictions on the reading of the currently available asset balance, for example, only the transfer terminal should be allowed to read the currently available asset balance through the communication interface.
The safety module generates transaction information, wherein the transaction information comprises transfer end identification information, transfer identification information, receiving end identification information and the transfer amount.
The transfer terminal identification information may be unique identification information of the security module, such as a chip card identifier; for example, the transfer instruction sent in step 601 further includes the transfer end identification information, and the security module receives and acquires the transfer end identification information. See also the description of step 403 in the above example.
The transfer identification information is used to uniquely identify the present transfer. The transfer identification information may be generated by the security module; the transfer identification information may also be generated by the transfer terminal, for example, the transfer instruction sent in step 601 further includes the transfer identification information, and the security module receives and acquires the transfer identification information. See also the description of step 402 of the above embodiment.
Optionally, the transfer instruction further includes a transaction time, and the transaction information generated by the security module further includes the transaction time. As described in step 403 of the foregoing embodiment, if the transfer end uses the current system time of the transfer end as the transaction time, or the transfer end obtains the transaction time from the transfer request transmitted by the receiving end, the transfer end further includes the transaction time in the transfer instruction sent in step 601, and the security module receives and obtains the transaction time, and further includes the transaction time in the generated transaction information.
Optionally, if the transfer instruction further includes an expiration time, the transaction information generated by the security module further includes the expiration time. As described in step 403 of the foregoing embodiment, if the transfer end generates the expiration time by adding a preset duration to the current system time of the transfer end, or the transfer end acquires the expiration time from the transfer request transmitted by the receiving end, the transfer end further includes the expiration time in the transfer instruction sent in step 601, and the security module receives and acquires the expiration time, and further includes the expiration time in the generated transaction information.
Further, the security module performs digital signature on the information to be signed to generate a signature value, wherein the information to be signed includes the transfer identification information, the receiving end identification information and the transfer amount. It will be appreciated that the digitally signed private key is stored in a secure area of the security module and cannot be read again after the private key has been written to the secure area of the security module.
And step 604, returning the transaction information to the transfer terminal, so that the transfer terminal transmits the transaction information to a receiving terminal through near field communication, and the receiving terminal verifies the transaction information and determines whether the transaction information is legal or not according to a verification result.
And in response to the transfer instruction, the security module returns the transaction information to the transfer terminal.
After the transfer terminal receives the transaction information returned by the security module, the transfer terminal transmits the transaction information to the receiving terminal through near field communication, so that the receiving terminal verifies the transaction information and determines whether the transaction information is legal or not according to a verification result. The specific implementation process can also be seen in the implementation manners in the three steps 404 and 405 of the above example.
Further, as mentioned in step 603, the security module further performs digital signature on the information to be signed to generate a signature value, and then returns the signature value to the transfer end when the security module returns the transaction information to the transfer end, so that the transfer end also transmits the signature value to the receiving end when transmitting the transaction information to the receiving end through near field communication, thereby enabling the receiving end to perform digital signature verification on the signature value.
Further, the safety module also stores the transaction information, and when the safety module receives a retransfer instruction of the transfer end to the transaction information, the safety module acquires the transaction information from the stored transaction information again; and as a response to the re-transfer instruction, the security module returns the re-acquired transaction information to the transfer end, so that the transfer end transmits the re-acquired transaction information to the receiving end, the receiving end verifies the re-acquired transaction information, and determines whether the transaction information is legal or not according to a verification result.
Further, when the security module returns the transaction information obtained again to the transfer terminal, the security module may further include a signature value of the information to be signed, where the information to be signed includes the transfer identification information, the receiving terminal identification information, and the transfer amount, and the signature value may be a signature value obtained by the security module obtaining the information to be signed again and performing digital signature; the signature value may be the signature value generated in step 603, that is, when the security module stores the transaction information, the signature value generated in step 603 is also stored at the same time, and an association relationship between the transaction information and the signature value generated in step 603 is established (the transaction information and the signature value generated in step 603 may be stored as a set), and when the security module reacquires the transaction information, the signature value generated in step 603 is acquired at the same time according to the association relationship, that is, the signature value of the transaction information is acquired.
As can be seen from the foregoing implementation processes, the main advantages of the embodiments of the present invention are that the critical information in the first and third embodiments of the method for preventing the digital asset from being repeatedly transferred in a short distance, which is applied to the transfer end, is securely stored by the security module, and the critical implementation process is performed by the security module, so that the transfer end not only has the effects described in the first and third embodiments of the method for preventing the digital asset from being repeatedly transferred in a short distance, but also can ensure that the critical information and the critical process are not tampered and damaged.
It should be noted that, in this document, the terms "comprises," "comprising," "includes," "passing," "sending," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system.
The terms "first," "second," "third," and the like (if any) are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein.
The numbers of the above embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The method, transfer end, receiving end and security module of the present invention can be implemented in many ways. For example, the method, the transferring terminal, the receiving terminal and the security module of the present invention may be implemented by software, hardware, firmware or any combination of software, hardware, firmware. The above-described order for the steps of the method is for illustrative purposes only, and the steps of the method of the present invention are not limited to the order specifically described above unless specifically indicated otherwise. Furthermore, in some embodiments, the present invention may also be embodied as a program recorded in a recording medium, the program including machine-readable instructions for implementing a method according to the present invention. Thus, the present invention also covers a recording medium storing a program for executing the method according to the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A method for preventing repeated close-range transfer of digital assets, applied to a transfer end, the method comprising:
acquiring a transfer request, wherein the transfer request comprises a transfer amount and receiving end identification information;
generating transfer identification information with uniqueness;
transmitting transaction information to a receiving end through near field communication so that the receiving end verifies the transaction information and determines whether the transaction information is legal or not according to a verification result, wherein the transaction information comprises transfer end identification information, the transfer identification information, the receiving end identification information and the transfer amount, and the transfer end identification information is the identification information of the transfer end.
2. The method of claim 1, further comprising:
storing the transaction information;
when a request for transferring the transaction information again is received, the transaction information is obtained again from the stored transaction information, and the obtained transaction information is transmitted to the receiving end through near field communication, so that the receiving end verifies the obtained transaction information again, and whether the obtained transaction information is legal or not is determined according to the verification result.
3. A method for preventing close range repetitive transfer of digital assets, applied to a security module, the method comprising:
receiving a transfer instruction sent by the transfer end, wherein the transfer instruction comprises a transfer amount and receiving end identification information;
generating transaction information, wherein the transaction information comprises transfer end identification information, transfer identification information, receiving end identification information and a transfer amount, the transfer identification information is generated by the security module or sent by the transfer end, the transfer identification information has uniqueness, and the transfer end identification information is the only identification information of the security module or the transfer end identification information is sent by the transfer end;
and returning the transaction information to the transfer terminal so that the transfer terminal transmits the transaction information to a receiving terminal through near field communication, thereby enabling the receiving terminal to verify the transaction information and determining whether the transaction information is legal or not according to the verification result.
4. A method for preventing close-range repetitive transfer of digital assets, applied to a receiving end, the method comprising:
receiving transaction information transmitted by a transfer terminal through near field communication, wherein the transaction information comprises transfer terminal identification information, transfer identification information, receiving terminal identification information and a transfer amount;
verifying the transaction information, and if the verification modes are implemented to ensure that the verification is passed, determining that the transaction information is legal;
the verifying the transaction information comprises:
the verification method comprises the steps that whether the receiving end identification information belongs to the receiving end is verified according to terminal identification information preset by the receiving end, and if yes, verification is determined to be passed;
and a second verification mode, verifying whether the transaction information is received or not according to the currently stored transfer verification information, if not, determining that the transaction information is passed, and storing the transfer verification information, wherein the transfer verification information is determined according to the transfer terminal identification information and the transfer identification information.
5. The method of claim 4, wherein the verifying the transaction information further comprises:
the receiving end determines a time period according to the transaction time or/and the expiration time and a preset time length, judges whether the current system time of the receiving end is in the time period, and if so, determines that the verification is passed; and/or the first and/or second light sources,
and in a fourth verification mode, the receiving of the transaction information transmitted by the transfer end through near field communication further comprises receiving a signature value transmitted by the transfer end, the signature value is generated by the transfer end performing digital signature on the information to be signed, the information to be signed comprises the transfer identification information, the receiving end identification information and the transfer amount, and the digital signature verification is performed on the signature value.
6. A transfer side device comprising a processor, a memory, the processor being configured to execute a program stored in the memory, the program when executed performing a method according to any one of claims 1 to 2.
7. A security module, characterized in that the security module comprises a processor, which when program instructions are executed by the processor causes the method according to claim 3 to be performed.
8. A chip, comprising: a processor for calling and running a computer program from a memory, causing a device on which the chip is installed to perform the method of any of claims 1 to 2, or causing a device on which the chip is installed to perform the method of any of claims 4 to 5.
9. A sink device, characterized in that the sink device comprises a processor and a memory, the processor is configured to execute a program stored in the memory, and the program executes to perform the method according to any one of claims 4 to 5.
10. A storage medium, characterized in that the storage medium has stored therein a program for implementing a method comprising any one of claims 1 to 2, or a program for implementing a method comprising claim 3, or a program for implementing a method comprising any one of claims 4 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110114768.1A CN113807959A (en) | 2021-01-28 | 2021-01-28 | Method and terminal for preventing digital assets from being repeatedly transferred in close range |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110114768.1A CN113807959A (en) | 2021-01-28 | 2021-01-28 | Method and terminal for preventing digital assets from being repeatedly transferred in close range |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113807959A true CN113807959A (en) | 2021-12-17 |
Family
ID=78892816
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110114768.1A Pending CN113807959A (en) | 2021-01-28 | 2021-01-28 | Method and terminal for preventing digital assets from being repeatedly transferred in close range |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113807959A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1391684A (en) * | 1999-12-23 | 2003-01-15 | 瑞士电信流动电话公司 | Method and system for payment transaction |
CN104200362A (en) * | 2014-09-12 | 2014-12-10 | 上海闪购信息技术有限公司 | Payment processing method based on NFC smart card and mobile internet terminal |
CN105205664A (en) * | 2015-09-25 | 2015-12-30 | 中城智慧科技有限公司 | Novel offline payment method |
CN107944857A (en) * | 2017-10-31 | 2018-04-20 | 阿里巴巴集团控股有限公司 | A kind of method and device of paying riding fee |
CN108647969A (en) * | 2018-05-16 | 2018-10-12 | 深圳市网心科技有限公司 | A kind of method, apparatus, system and the storage medium of access block chain |
CN109493016A (en) * | 2018-10-24 | 2019-03-19 | 中国工商银行股份有限公司 | Offline electronic payment method, terminal based on digital cash and act on behalf of dispensing device |
CN109636383A (en) * | 2018-12-19 | 2019-04-16 | 中移电子商务有限公司 | A kind of digital asset off-network method of commerce, system, a kind of off line wallet and terminal |
CN110163598A (en) * | 2019-05-24 | 2019-08-23 | 广东飞企互联科技股份有限公司 | Mobile offline electronic payment method and mobile offline electronic payment system |
CN110175838A (en) * | 2019-05-24 | 2019-08-27 | 广东飞企互联科技股份有限公司 | Offline barcode scanning method of payment and offline barcode scanning payment mechanism |
CN110348853A (en) * | 2019-07-15 | 2019-10-18 | 中城智慧科技有限公司 | A kind of block chain off-line trading method and system based on ID authentication |
CN111062717A (en) * | 2019-12-11 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Data transfer processing method and device and computer readable storage medium |
CN111144862A (en) * | 2019-12-31 | 2020-05-12 | 深圳四方精创资讯股份有限公司 | Method, device, equipment and storage medium for realizing digital currency double-off-line payment |
CN111935684A (en) * | 2020-07-17 | 2020-11-13 | 深圳一卡通新技术有限公司 | Bluetooth payment system and method |
-
2021
- 2021-01-28 CN CN202110114768.1A patent/CN113807959A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1391684A (en) * | 1999-12-23 | 2003-01-15 | 瑞士电信流动电话公司 | Method and system for payment transaction |
CN104200362A (en) * | 2014-09-12 | 2014-12-10 | 上海闪购信息技术有限公司 | Payment processing method based on NFC smart card and mobile internet terminal |
CN105205664A (en) * | 2015-09-25 | 2015-12-30 | 中城智慧科技有限公司 | Novel offline payment method |
CN107944857A (en) * | 2017-10-31 | 2018-04-20 | 阿里巴巴集团控股有限公司 | A kind of method and device of paying riding fee |
CN108647969A (en) * | 2018-05-16 | 2018-10-12 | 深圳市网心科技有限公司 | A kind of method, apparatus, system and the storage medium of access block chain |
CN109493016A (en) * | 2018-10-24 | 2019-03-19 | 中国工商银行股份有限公司 | Offline electronic payment method, terminal based on digital cash and act on behalf of dispensing device |
CN109636383A (en) * | 2018-12-19 | 2019-04-16 | 中移电子商务有限公司 | A kind of digital asset off-network method of commerce, system, a kind of off line wallet and terminal |
CN110163598A (en) * | 2019-05-24 | 2019-08-23 | 广东飞企互联科技股份有限公司 | Mobile offline electronic payment method and mobile offline electronic payment system |
CN110175838A (en) * | 2019-05-24 | 2019-08-27 | 广东飞企互联科技股份有限公司 | Offline barcode scanning method of payment and offline barcode scanning payment mechanism |
CN110348853A (en) * | 2019-07-15 | 2019-10-18 | 中城智慧科技有限公司 | A kind of block chain off-line trading method and system based on ID authentication |
CN111062717A (en) * | 2019-12-11 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Data transfer processing method and device and computer readable storage medium |
CN111144862A (en) * | 2019-12-31 | 2020-05-12 | 深圳四方精创资讯股份有限公司 | Method, device, equipment and storage medium for realizing digital currency double-off-line payment |
CN111935684A (en) * | 2020-07-17 | 2020-11-13 | 深圳一卡通新技术有限公司 | Bluetooth payment system and method |
Non-Patent Citations (1)
Title |
---|
陈善学: "一种适合 3G 移动的微支付方案", 《电信科学》, vol. 27, no. 3, 15 March 2011 (2011-03-15), pages 60 - 64 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11877213B2 (en) | Methods and systems for asset obfuscation | |
CN112805967B (en) | System and method for password authentication of contactless card | |
US20240095713A1 (en) | Method, client device and pos terminal for offline transaction | |
KR101451214B1 (en) | Payment method, server performing the same, storage media storing the same and system performing the same | |
US20190165947A1 (en) | Signatures for near field communications | |
US9705681B2 (en) | System and method for encryption | |
CN112789643A (en) | System and method for password authentication of contactless cards | |
CN112602104A (en) | System and method for password authentication of contactless cards | |
EP2372592B1 (en) | integrated circuit and system for installing computer code thereon | |
CN113168631A (en) | System and method for password authentication of contactless cards | |
CN109376824A (en) | Dynamic Two-dimensional code generating method and system | |
CN103281187A (en) | Security authentication method, equipment and system | |
US20210092151A1 (en) | Systems and methods for signaling an attack on contactless cards | |
CN111062059B (en) | Method and device for service processing | |
EP3358515A1 (en) | Method for cryptographically signing a transaction | |
CN113807959A (en) | Method and terminal for preventing digital assets from being repeatedly transferred in close range | |
CN113807958A (en) | Method and terminal for preventing digital assets from being repeatedly transferred in close range | |
CN104424453A (en) | System and method for verifying non-contact inductive label | |
CN113763162A (en) | Method and terminal for solving short-distance transfer interruption of digital assets | |
CN113763161A (en) | Method and terminal for solving short-distance transfer interruption of digital assets | |
CN111489211A (en) | Billing processing method, billing processing device and billing processing medium | |
JP2009027461A (en) | Information verification method, information verification apparatus and information verification system | |
CN115187244A (en) | Revocation method and equipment for digital asset transfer | |
CN115495760A (en) | Transaction method, device, equipment and storage medium for encrypting block chain intelligent contract | |
CN113781025A (en) | Method, server and system for preventing repeated transfer under double offline payment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |