CN115022864A - Method and device for verifying subscription service - Google Patents

Method and device for verifying subscription service Download PDF

Info

Publication number
CN115022864A
CN115022864A CN202210586804.9A CN202210586804A CN115022864A CN 115022864 A CN115022864 A CN 115022864A CN 202210586804 A CN202210586804 A CN 202210586804A CN 115022864 A CN115022864 A CN 115022864A
Authority
CN
China
Prior art keywords
target
service
node
subscription request
subscription
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210586804.9A
Other languages
Chinese (zh)
Other versions
CN115022864B (en
Inventor
马晓凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210586804.9A priority Critical patent/CN115022864B/en
Publication of CN115022864A publication Critical patent/CN115022864A/en
Application granted granted Critical
Publication of CN115022864B publication Critical patent/CN115022864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method and a device for verifying an order service, belongs to the field of communication, and solves the problem that the validity of a service order request needs to be judged in the related technology. The method comprises the following steps: receiving a target ordering request of a target user for ordering a target service, which is submitted by a third-party platform; and if the target subscription request is not the initial subscription request of the target user stored in the node of the block chain, verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node.

Description

Method and device for verifying subscription service
Technical Field
The application belongs to the field of communication, and particularly relates to a method and a device for verifying an order service.
Background
In the related art, the service subscription process is as follows: (1) a user selects an order service and inputs an order mobile phone number on an order page of a third-party platform, a communication service platform and the like so as to submit an order request to the order platform; (2) after receiving the ordering request, the ordering platform judges the province to which the mobile phone number belongs, and then forwards the ordering request to the company platform of the province to which the mobile phone number belongs; (3) and a third-party platform, a communication service platform, an ordering platform, a provincial company platform and other systems interact layer by layer through interfaces to finish inquiry and ordering operations.
In the service subscription flow, the third-party platform may have problems such as service acceptance failure and system failure, and the subscription interface between the third-party platform and the communication service platform is also prone to have problems, which may easily result in invalidation of the service subscription request.
Therefore, in the related art, in order to ensure normal operation of the service subscription process, it is necessary to determine validity of the service subscription request.
Disclosure of Invention
The embodiment of the application provides a method and a device for verifying an order service, which can solve the problem that the validity of a service order request needs to be judged in the related technology.
In a first aspect, an embodiment of the present application provides a method for verifying a subscription service, where the method includes: receiving a target ordering request of a target user for ordering a target service, which is submitted by a third-party platform; and if the target subscription request is not the initial subscription request of the target user stored in the node of the block chain, verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node.
In a second aspect, an embodiment of the present application provides an apparatus for verifying a subscription service, where the apparatus includes: the receiving module is used for receiving a target ordering request of a target user for ordering the target service, which is submitted by a third-party platform; and the verification module is used for verifying whether the target subscription request is valid or not based on each node of the block chain and the historical subscription request of the target user stored in the node when the target subscription request is not the primary subscription request of the target user stored in the node of the block chain.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, a target ordering request of a target user for ordering a target service, which is submitted by a third-party platform, is received; when the target subscription request is not the initial subscription request of the target user stored in the node of the block chain, verifying whether the target subscription request is valid or not based on each node of the block chain and the historical subscription request of the target user stored in the node, which solves the problem that the validity of the service subscription request needs to be judged in the related art.
Drawings
Fig. 1 is a schematic flowchart of a method for authenticating a subscription service according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another method for authenticating a subscription service according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a structure of a device for authenticating a subscription service according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
A method and an apparatus for verifying subscription service provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Specifically, in the related art, the service subscription process is as follows: (1) a user selects an order service and inputs an order mobile phone number on an order page of a third-party platform, a communication service platform and the like so as to submit an order request to the order platform; (2) after receiving the ordering request, the ordering platform judges the province to which the mobile phone number belongs, and then forwards the ordering request to the company platform of the province to which the mobile phone number belongs; (3) and a third-party platform, a communication service platform, an ordering platform, a provincial company platform and other systems interact layer by layer through interfaces to finish inquiry and ordering operations.
In the service subscription flow, the third-party platform may have problems such as service acceptance failure and system failure, and the subscription interface between the third-party platform and the communication service platform is also prone to have problems, which may easily result in invalidation of the service subscription request.
In view of the above, the present application receives a target ordering request submitted by a third party platform for ordering a target service by a target user; when the target subscription request is not the initial subscription request of the target user stored in the node of the block chain, verifying whether the target subscription request is valid or not based on each node of the block chain and the historical subscription request of the target user stored in the node, which solves the problem that the validity of the service subscription request needs to be judged in the related art.
Fig. 1 illustrates a method for verifying a subscription service according to an embodiment of the present invention, which may be performed by an electronic device, where the electronic device may include: a server and/or a terminal device, wherein the terminal device can be a mobile phone terminal or the like. In other words, the method may be performed by software or hardware installed in the electronic device, the method comprising the steps of:
step 101: and receiving a target ordering request submitted by the third-party platform for ordering the target service by the target user.
Specifically, the third party platform may be any platform that can submit the target order request to the server, for example, a WeChat payment platform, a Payment platform, a UnionPayment Payment platform, and the like.
Optionally, the target service may be a service that the target user needs to subscribe to, for example, the target service may be a call charge payment service, a traffic purchase service, and the like.
Step 102: in case the target subscription request is not an initial subscription request of the target user stored in a node of a blockchain, verifying whether the target subscription request is valid based on each node of the blockchain and a historical subscription request of the target user stored in the node.
Optionally, if the node of the blockchain does not store the historical subscription request of the target user, it may be determined that the target subscription request is the initial subscription request of the target user.
Specifically, each node of the blockchain may include each joining party of the blockchain and a joining platform composed of each joining party.
It is understood that, in the embodiment of the present application, both the third party platform and the service party for providing the target service may be considered as an affiliated party of the blockchain.
In this way, the embodiment receives the target ordering request submitted by the third-party platform for the target user to order the target service; and when the target subscription request is not the initial subscription request of the target user stored in the node of the block chain, verifying whether the target subscription request is valid or not based on each node of the block chain and the historical subscription request of the target user stored in the node, thereby solving the problem that the validity of the service subscription request in the related technology needs to be judged.
In an optional implementation manner, after receiving a target subscription request submitted by a third party platform for a target user to subscribe to a target service, the method further includes:
storing the target subscription request in a node of the blockchain if the target subscription request is a primary subscription request of the target user stored in the node of the blockchain;
storing the target subscription request in a node of a blockchain if the target subscription request is not a primary subscription request of the target user stored in the node of the blockchain and the target subscription request is valid.
It should be noted that the subscription requests stored in the nodes in the blockchain may be synchronized. For example, subscription requests for services submitted by two different third party platforms may be stored in different blockchain nodes, and further, the two different blockchain nodes may synchronize the stored subscription requests.
Therefore, when a fault occurs in the service ordering process, the ordering request data of the service needs to be checked and checked, so that the service ordering data of multiple platforms needs to be checked, the service ordering data is difficult to trace to the source or cannot be traced to the source, and the method can save the tracing step of the service ordering data by storing the relevant data of the service ordering request in the block chain, can accurately find the service ordering data needing to be checked, can greatly improve the tracing time and tracing accuracy of the service ordering data, and greatly saves manpower and material resources.
In an optional implementation manner, the target subscription request includes an identity of the target user and a target subscription time for the target user to subscribe to the target service;
before the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node, further comprising: determining a historical ordering request corresponding to the target user based on the identity of the target user;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises: if the target ordering time is not later than ordering times corresponding to all historical ordering requests corresponding to the target user and stored in the node of the block chain, determining that the target ordering time is invalid; determining that the target subscription request is invalid if it is determined that the target subscription time is invalid.
Optionally, the identity of the target user may be a contact address of the target user.
Therefore, the validity of the ordering time of the target service can be determined, the ordering time of the target service is ensured to have no problem, and the problem of repeated ordering is avoided.
In an optional implementation manner, the target subscription request includes an identifier of a service initiator of the target service, where the service initiator is the third-party platform;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the service initiator is not authenticated by each node of the block chain and/or is not the service initiator disclosed by each node, determining that the identifier of the service initiator is invalid;
and under the condition that the identification of the service initiator is determined to be invalid, determining that the target subscription request is invalid.
It is understood that each node in the blockchain may include each federating party of the blockchain and a federation platform formed by the federating parties, and the service initiator may be a service party authenticated by each federating party and exposed on the federation platform.
Alternatively, the identity of the service originator may be unique.
Specifically, the identifier of the service initiator may be a number, a word, a letter, a character, and the like, and is not limited herein.
Therefore, by verifying the identification of the service initiator, the platform authenticated by each joining party without the block chain can be prevented from submitting the service ordering request, so that the safety of the service ordering process is ensured.
In an optional implementation manner, the target subscription request includes an identity of the target user and a target subscription serial number of the target service;
before the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node, further comprising:
determining a historical ordering request corresponding to the target user based on the identity of the target user;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the target order serial number is repeated with an order serial number corresponding to a historical order request corresponding to the target user and stored in a node of the block chain, determining that the target order serial number is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription serial number is invalid.
Optionally, the identity of the target user may be a contact address of the target user;
in this way, repeated subscriptions to services can be effectively prevented.
In an optional implementation manner, the target subscription request includes a target subscription serial number of the target service;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node comprises:
if the target order serial number does not meet the preset secondary hash rule, determining that the target order serial number is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription serial number is invalid.
The target subscription serial number comprises an identifier of a service initiator, a public key of the service initiator, an identity identifier of the target user, a service identifier of the target service and target subscription time of the target service;
the service initiator is the third-party platform, the service initiator is a service initiator which is approved by each node of the block chain and is disclosed at each node, and a public key of the service initiator is a public key disclosed at each node;
and the secondary hash rule is to perform secondary hash on the target order serial number after performing single hash on the identity identifier of the target user, the service identifier of the target service and the target order time of the target service.
Therefore, by carrying out secondary hash on the target subscription serial number, compared with single hash, the subscription of different services can be effectively distinguished, and the problem that the service is forged can be avoided by adding the public key of the service initiator into the target subscription serial number.
Optionally, the identity of the target user may be a contact address of the target user.
In an optional implementation manner, the target subscription request includes a service identifier of the target service;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the service identifier of the target service is not authenticated by each node of the block chain and/or is not the service identifier disclosed at each node, determining that the service identifier of the target service is invalid;
and under the condition that the service identification is determined to be invalid, determining that the target subscription request is invalid.
Optionally, the service identifier of a certain service may be unique.
Optionally, each node of the block chain may include each joining party of the block chain and an alliance platform formed by each joining party, and further, the service identifier of the target service may be a service identifier authenticated by each joining party of the block chain and disclosed on the alliance platform.
Alternatively, the service identifier of the target service may be a character string, a single character, or the like, and is not limited herein.
Therefore, the service ordered by the user can be ensured to be the service allowed by each joining party through the block chain, and the service ordered by the user in error can be avoided.
In an optional implementation manner, the target subscription request further includes a target subscription time of the target service;
before the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node, the method further comprises:
if the service identification is not encrypted by the private key of the service party, determining that the service identification is invalid;
if the target ordering time is not encrypted by the private key of the business party, determining that the target ordering time is invalid;
and under the condition that the service identifier and/or the target subscription time are/is determined to be invalid, determining that the target subscription request is invalid.
Optionally, the encryption mode of the private key of the service party for the service identifier and the target subscription time may be an RSA (RSA public key encryption algorithm) encryption mode.
It can be understood that the service identifier and the target subscription time may be decrypted by the public key of the service party, and if the service identifier and the target subscription time may be decrypted, it may be determined that the service identifier and the target subscription time are encrypted by the private key of the service party.
Therefore, the service identification is encrypted by the private key of the service party, and other service parties can be prevented from forging the service.
Optionally, specific steps of an embodiment of the present application are described below with reference to fig. 2, where the block chain in this embodiment is a federation chain.
Step 201: and receiving an order request of a user for ordering the service, which is submitted by the third-party platform.
Specifically, the user may input a contact information of the user on a page of the third-party platform, and select a service to be ordered, and the third-party platform may submit an order request to a node of the block chain connected to the third-party platform.
Step 202: and storing the subscription request corresponding to the user into the node of the block chain.
Specifically, if the subscription request is a primary subscription request of a user stored in a node of the blockchain, the subscription request may be stored in the node of the blockchain, and the subscription request may be stored in another node of the blockchain;
if the order request is not the order request stored for the first time in the node of the block chain, verifying the validity of the order request; and if the order request is valid, storing the order request into a node of the block chain, and storing the order request into other nodes of the block chain.
Optionally, the subscription request may include service subscription time, service subscription serial number, service initiator identifier of the service, and service identifier of the service;
it can be understood that the validity of the subscription request is to be judged, and naturally, the subscription time of the service, the subscription serial number of the service, the service initiator identifier of the service, and the validity of the service identifier of the service are to be judged.
Optionally, the subscription information of all the historical services corresponding to the contact information of the user, which is stored in the block chain, may be queried, and if the current service subscription time is later than the historical service subscription time stored in the node of the block chain, the current service subscription time may be considered to be valid;
optionally, each service party of the blockchain needs to be disclosed on the alliance platform of the blockchain and authenticated by each alliance party of the blockchain; optionally, the identifier of the service initiator may be a unique identifier authenticated by the joining party; on this basis, if the identifier of the service initiator meets the above requirements, the identifier of the service initiator can be considered to be valid.
Optionally, if the subscription serial number of the service is repeated with the subscription serial number corresponding to the historical subscription request corresponding to the user stored in the block chain, it may be determined that the subscription serial number is invalid;
optionally, if the subscription serial number of the service does not conform to the secondary hash rule, it may be determined that the subscription serial number is invalid; optionally, the subscription serial number may include a service initiator identifier, a service initiator public key, a contact manner of the user, a service identifier of the service, and subscription time of the service;
specifically, the secondary hash rule may be that after performing a single hash on the contact information of the user, the service identifier of the service, and the service subscription time, performing a secondary hash on the subscription serial number;
optionally, if the service identifier of the service and the service subscription time cannot be subjected to RSA decryption by the public key of the service party, it may be determined that the service identifier of the service and the service subscription time are invalid; on the basis, the effective service identification and the service ordering time of the service can be understood to be RSA encrypted by the private key of the service party;
optionally, the service identifier of the service needs to be disclosed on the alliance platform and authenticated by each alliance party; alternatively, the service identifier of the service may be unique.
Therefore, the validity of the service ordering request is verified, so that the normal operation of the service ordering process can be ensured, and the correctness and the safety of the service ordering can be ensured; by storing the service ordering request into the block chain, the service ordering request can be quickly and accurately found when the service ordering request needs to be traced and checked when a problem occurs in the service ordering process, so that the tracing time and energy can be saved, and the tracing accuracy is improved.
It should be noted that, in the method for verifying an ordered service provided in the embodiment of the present application, the execution subject may be a method for verifying an ordered service, or a control module in the device for verifying an ordered service, which is used for executing a method for verifying an ordered service. In the embodiment of the present application, an example in which a verification apparatus for an subscription service executes a verification method for an subscription service is taken as an example, and a verification apparatus for an subscription service provided in the embodiment of the present application is described.
Fig. 3 is a schematic structural diagram of an authentication apparatus for subscription services according to an embodiment of the present invention. As shown in fig. 3, an authentication apparatus 300 for subscription services includes: a receiving module 310 and a verifying module 320.
A receiving module 310, configured to receive a target subscription request, submitted by a third-party platform, for a target user to subscribe to a target service;
a verifying module 320, configured to, if the target subscription request is not the initial subscription request of the target user stored in a node of a blockchain, verify whether the target subscription request is valid based on each node of the blockchain and a historical subscription request of the target user stored in the node.
In one implementation, the verification module 320 is further configured to: storing the target subscription request in a node of the blockchain if the target subscription request is a primary subscription request of the target user stored in the node of the blockchain;
storing the target subscription request in a node of a blockchain if the target subscription request is not the primary subscription request of the target user stored in the node of the blockchain and the target subscription request is valid.
In one implementation, the target subscription request includes an identity of the target user and a target subscription time for the target user to subscribe to the target service;
the verification module 320 is further configured to: determining a historical ordering request corresponding to the target user based on the identity of the target user;
if the target ordering time is not later than ordering times corresponding to all historical ordering requests corresponding to the target user and stored in the node of the block chain, determining that the target ordering time is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription time is invalid.
In one implementation, the verification module 320 is further configured to: the target ordering request comprises an identifier of a service initiator of the target service, wherein the service initiator is the third-party platform;
if the service initiator is not authenticated by each node of the block chain and/or is not the service initiator disclosed by each node, determining that the identifier of the service initiator is invalid;
and under the condition that the identification of the service initiator is determined to be invalid, determining that the target subscription request is invalid.
In one implementation, the verification module 320 is further configured to: the target ordering request comprises the identity of the target user and the target ordering serial number of the target service;
determining a historical ordering request corresponding to the target user based on the identity of the target user;
if the target order serial number is repeated with an order serial number corresponding to a historical order request corresponding to the target user and stored in a node of the block chain, determining that the target order serial number is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription serial number is invalid.
In one implementation, the verification module 320 is further configured to: the target ordering request comprises a target ordering serial number of the target service;
if the target order serial number does not meet the preset secondary hash rule, determining that the target order serial number is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription serial number is invalid.
The target subscription serial number comprises an identifier of a service initiator, a public key of the service initiator, an identity identifier of the target user, a service identifier of the target service and target subscription time of the target service;
the service initiator is the third-party platform, the service initiator is a service initiator which is approved by each node of the block chain and is disclosed at each node, and a public key of the service initiator is a public key disclosed at each node;
and the secondary hash rule is to perform a secondary hash on the target subscription serial number after performing a single hash on the identity of the target user, the service identity of the target service and the target subscription time of the target service.
In one implementation, the verification module 320 is further configured to: the target ordering request comprises a service identifier of the target service;
if the service identifier of the target service is not authenticated by each node of the block chain and/or is not the service identifier disclosed at each node, determining that the service identifier of the target service is invalid;
and under the condition that the service identification is determined to be invalid, determining that the target subscription request is invalid.
In one implementation, the verification module 320 is further configured to: the target ordering request also comprises target ordering time of the target service;
if the service identification is not encrypted by the private key of the service party, determining that the service identification is invalid;
if the target ordering time is not encrypted by the private key of the business party, determining that the target ordering time is invalid;
and under the condition that the service identifier and/or the target subscription time are/is determined to be invalid, determining that the target subscription request is invalid.
The authentication device for subscription service in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
An authentication device for a subscription service in an embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The verification apparatus for subscription service provided in this embodiment of the present application can implement each process implemented in the method embodiments of fig. 1 and fig. 2, and is not described herein again to avoid repetition.
Optionally, as shown in fig. 4, an electronic device 400 is further provided in this embodiment of the present application, and includes a processor 401, a memory 402, and a program or an instruction stored in the memory 402 and executable on the processor 401, where the program or the instruction is executed by the processor 401 to implement the processes of the foregoing method embodiment, and can achieve the same technical effects, and details are not repeated here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned embodiment of the method for verifying an subscription service, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above embodiment of the method for verifying an order service, and the same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (10)

1. A method for authenticating a subscription service, comprising:
receiving a target ordering request of a target user for ordering a target service, which is submitted by a third-party platform;
and if the target subscription request is not the initial subscription request of the target user stored in the node of the block chain, verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node.
2. The method for authenticating subscription service as claimed in claim 1, wherein after receiving the target subscription request of the target user for subscribing to the target service, which is submitted by the third party platform, the method further comprises:
storing the target subscription request in a node of the blockchain if the target subscription request is a primary subscription request of the target user stored in the node of the blockchain;
storing the target subscription request in a node of a blockchain if the target subscription request is not the primary subscription request of the target user stored in the node of the blockchain and the target subscription request is valid.
3. The method of claim 1, wherein the target subscription request comprises an identity of the target user and a target subscription time for the target user to subscribe to the target service;
before the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node, further comprising:
determining a historical ordering request corresponding to the target user based on the identity of the target user;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the target ordering time is not later than ordering times corresponding to all historical ordering requests corresponding to the target users and stored in the nodes of the block chain, determining that the target ordering time is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription time is invalid.
4. The method of claim 1, wherein the target subscription request includes an identification of a service originator of the target service, wherein the service originator is the third party platform;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the service initiator is not authenticated by each node of the block chain and/or is not the service initiator disclosed by each node, determining that the identifier of the service initiator is invalid;
and under the condition that the identification of the service initiator is determined to be invalid, determining that the target subscription request is invalid.
5. The method of claim 1, wherein the target subscription request comprises an identity of the target user and a target subscription serial number of the target service;
before the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node, further comprising:
determining a historical ordering request corresponding to the target user based on the identity of the target user;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the target order serial number is repeated with an order serial number corresponding to a historical order request corresponding to the target user and stored in a node of the block chain, determining that the target order serial number is invalid;
determining that the target subscription request is invalid if it is determined that the target subscription serial number is invalid.
6. The method of claim 1, wherein the target subscription request comprises a target subscription serial number of the target service;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the target order serial number does not meet the preset secondary hash rule, determining that the target order serial number is invalid;
determining that the target subscription request is invalid if the target subscription serial number is determined to be invalid;
the target subscription serial number comprises an identifier of a service initiator, a public key of the service initiator, an identity identifier of the target user, a service identifier of the target service and target subscription time of the target service;
the service initiator is the third-party platform, the service initiator is a service initiator which is approved by each node of the block chain and is disclosed at each node, and a public key of the service initiator is a public key disclosed at each node;
and the secondary hash rule is to perform a secondary hash on the target subscription serial number after performing a single hash on the identity of the target user, the service identity of the target service and the target subscription time of the target service.
7. The method of claim 1, wherein the target subscription request includes a service identifier of the target service;
the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription requests of the target users stored in the nodes comprises:
if the service identifier of the target service is not authenticated by each node of the block chain and/or is not the service identifier disclosed at each node, determining that the service identifier of the target service is invalid;
and under the condition that the service identification is determined to be invalid, determining that the target subscription request is invalid.
8. The method of validating a subscription service as claimed in claim 7, wherein the target subscription request further includes a target subscription time for the target service;
before the verifying whether the target subscription request is valid based on each node of the block chain and the historical subscription request of the target user stored in the node, further comprising:
if the service identification is not encrypted by the private key of the service party, determining that the service identification is invalid;
if the target ordering time is not encrypted by the private key of the business party, determining that the target ordering time is invalid;
and under the condition that the service identifier and/or the target subscription time are/is determined to be invalid, determining that the target subscription request is invalid.
9. An apparatus for authenticating a subscription service, comprising:
the receiving module is used for receiving a target ordering request of a target user for ordering the target service, which is submitted by a third-party platform;
and the verification module is used for verifying whether the target subscription request is valid or not based on each node of the block chain and the historical subscription request of the target user stored in the node when the target subscription request is not the primary subscription request of the target user stored in the node of the block chain.
10. The apparatus of claim 9, wherein the authentication module is further configured to:
storing the target subscription request in a node of the blockchain if the target subscription request is a primary subscription request of the target user stored in the node of the blockchain;
storing the target subscription request in a node of a blockchain if the target subscription request is not the primary subscription request of the target user stored in the node of the blockchain and the target subscription request is valid.
CN202210586804.9A 2022-05-27 2022-05-27 Verification method and device for subscription service Active CN115022864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210586804.9A CN115022864B (en) 2022-05-27 2022-05-27 Verification method and device for subscription service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210586804.9A CN115022864B (en) 2022-05-27 2022-05-27 Verification method and device for subscription service

Publications (2)

Publication Number Publication Date
CN115022864A true CN115022864A (en) 2022-09-06
CN115022864B CN115022864B (en) 2023-07-21

Family

ID=83070338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210586804.9A Active CN115022864B (en) 2022-05-27 2022-05-27 Verification method and device for subscription service

Country Status (1)

Country Link
CN (1) CN115022864B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101536480A (en) * 2006-11-03 2009-09-16 摩托罗拉公司 Device and/or user authentication for network access
CN108924231A (en) * 2018-07-10 2018-11-30 佛山伊苏巨森科技有限公司 A method of for providing the subscription service based on block chain in customer network
CN108965991A (en) * 2018-07-27 2018-12-07 深圳Tcl新技术有限公司 Verification method and system, terminal device, the storage medium of program ordering state
KR102033042B1 (en) * 2018-05-04 2019-10-16 주식회사 글로스퍼 Login authentication system using block chain, login authentication method and login service application method
US20190332691A1 (en) * 2018-04-30 2019-10-31 Robert Dale Beadles Universal subscription and cryptocurrency payment management platforms and methods of use
CN110717832A (en) * 2019-10-21 2020-01-21 腾讯科技(深圳)有限公司 Clean energy trading method, system, device and storage medium based on block chain
CN110995454A (en) * 2019-11-08 2020-04-10 厦门网宿有限公司 Service verification method and system
CN111163051A (en) * 2019-11-29 2020-05-15 中国联合网络通信集团有限公司 Service ordering method, device and terminal equipment
CN111356102A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Method and equipment for purchasing service based on block chain
CN113159896A (en) * 2021-04-28 2021-07-23 中国工商银行股份有限公司 Online marketing method, device and system for bank financing products
CN113422733A (en) * 2021-08-25 2021-09-21 腾讯科技(深圳)有限公司 Service processing method and device of block chain, computer equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101536480A (en) * 2006-11-03 2009-09-16 摩托罗拉公司 Device and/or user authentication for network access
US20190332691A1 (en) * 2018-04-30 2019-10-31 Robert Dale Beadles Universal subscription and cryptocurrency payment management platforms and methods of use
KR102033042B1 (en) * 2018-05-04 2019-10-16 주식회사 글로스퍼 Login authentication system using block chain, login authentication method and login service application method
CN108924231A (en) * 2018-07-10 2018-11-30 佛山伊苏巨森科技有限公司 A method of for providing the subscription service based on block chain in customer network
CN108965991A (en) * 2018-07-27 2018-12-07 深圳Tcl新技术有限公司 Verification method and system, terminal device, the storage medium of program ordering state
CN111356102A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Method and equipment for purchasing service based on block chain
CN110717832A (en) * 2019-10-21 2020-01-21 腾讯科技(深圳)有限公司 Clean energy trading method, system, device and storage medium based on block chain
CN110995454A (en) * 2019-11-08 2020-04-10 厦门网宿有限公司 Service verification method and system
CN111163051A (en) * 2019-11-29 2020-05-15 中国联合网络通信集团有限公司 Service ordering method, device and terminal equipment
CN113159896A (en) * 2021-04-28 2021-07-23 中国工商银行股份有限公司 Online marketing method, device and system for bank financing products
CN113422733A (en) * 2021-08-25 2021-09-21 腾讯科技(深圳)有限公司 Service processing method and device of block chain, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杜逸聪: "基于区块链的交易方案研究", 《中国优秀硕士学位论文辑》 *

Also Published As

Publication number Publication date
CN115022864B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN110958118B (en) Certificate authentication management method, device, equipment and computer readable storage medium
US20220394026A1 (en) Network identity protection method and device, and electronic equipment and storage medium
US20120030742A1 (en) Methods and apparatus for providing application credentials
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
KR20160006185A (en) Two factor authentication
CN107682336B (en) Geographic position-based identity authentication method and device
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
CN111191212B (en) Block chain-based digital certificate processing method, device, equipment and storage medium
CN110661779B (en) Block chain network-based electronic certificate management method, system, device and medium
CN114444134A (en) Data use authorization method, system and device
CN111783049A (en) User information processing method and system based on block chain
CN114491436A (en) Contract signing method and device, electronic equipment and storage medium
CN115982694A (en) Resource access method, device, equipment and medium
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN112422516B (en) Trusted connection method and device based on power edge calculation and computer equipment
CN106998315B (en) Method, device and system for registration authentication
CN110728504A (en) Data processing method, device and equipment of block chain and readable storage medium
CN110830264A (en) Service data verification method, server, client and readable storage medium
CN112732676B (en) Block chain-based data migration method, device, equipment and storage medium
CN115022864B (en) Verification method and device for subscription service
CN106533685B (en) Identity authentication method, device and system
CN110766407A (en) Transaction verification method, accounting node and medium based on block chain
CN112037062A (en) Transaction consensus method, device, electronic equipment and readable storage medium
CN111324876A (en) Exchange login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant