CN115525930A - Information transfer method, device and related equipment - Google Patents

Information transfer method, device and related equipment Download PDF

Info

Publication number
CN115525930A
CN115525930A CN202211160584.XA CN202211160584A CN115525930A CN 115525930 A CN115525930 A CN 115525930A CN 202211160584 A CN202211160584 A CN 202211160584A CN 115525930 A CN115525930 A CN 115525930A
Authority
CN
China
Prior art keywords
information
transfer
sending
signature
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211160584.XA
Other languages
Chinese (zh)
Inventor
王耿
顾费勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN202211160584.XA priority Critical patent/CN115525930A/en
Publication of CN115525930A publication Critical patent/CN115525930A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application provides an information transfer method, an information transfer device and related equipment. The method comprises the following steps: responding to the received transfer frequency information signed by the receiving end, and sending an information transfer request and the transfer frequency information to an intelligent contract end; determining whether the signature of the transfer frequency information is the same as that of the receiving end or not according to the intelligent contract end; and responding to the fact that the signature of the transfer frequency information is the same as that of the receiving end, and sending the target information to the receiving end through the intelligent contract end. According to the method and the device, the third party is not introduced through the block chain technology, the information transfer times are reduced, the target information is guaranteed to be transferred among the terminals as few as possible, and the safety of the user information is guaranteed. And the information of the transfer times can be updated after each information transfer, even if the private key of the sending end is stolen, the stealer can not forge the verification information through the information of the transfer times and the signature which are disclosed in the past, and then the information of the stolen end is transferred out, so that the safety of the user information is further ensured.

Description

Information transfer method, device and related equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information transfer method, an information transfer apparatus, and a related device.
Background
In the related technology, after a private key is disclosed, an information transfer process needs to be disassembled, information is transferred to a trusted third party, and then the receiving end extracts the information from the trusted third party after authority identification. Due to the fact that the number of blockchain transactions is increased, the problems that the blockchain calculation pressure is large and the safety of user information is low exist.
Disclosure of Invention
In view of the above, an object of the present application is to provide an information transfer method, an information transfer apparatus, and a related device.
Based on the foregoing object, in a first aspect, the present application provides an information transfer method, applied to a sending end, including:
responding to the received transfer frequency information signed by the receiving end, and sending an information transfer request and the transfer frequency information to an intelligent contract end;
determining whether the signature of the transfer frequency information is the same as the signature of the receiving end or not according to the intelligent contract end;
and responding to the fact that the signature of the transfer frequency information is the same as the signature of the receiving end, and sending target information to the receiving end through the intelligent contract end.
In one possible implementation manner, the sending, in response to receiving the transfer time information signed by the receiving end, the information transfer request and the transfer time information to the intelligent contract end includes:
and in response to receiving the transfer time information signed by the receiving end, encrypting the transfer request and the transfer time information by using a private key of the sending end, and sending the encrypted transfer request and the encrypted transfer time information to the intelligent contract end.
In one possible implementation manner, the sending, by the intelligent contract end, target information to the receiving end in response to determining that the signature of the transfer number information is the same as the signature of the receiving end includes:
and generating the target information in response to the fact that the signature of the transfer time information is the same as the signature of the receiving end, and sending the target information to the receiving end through the intelligent contract end.
In one possible implementation manner, the sending, by the intelligent contract end, target information to the receiving end in response to determining that the signature of the transfer number information is the same as the signature of the receiving end includes:
responding to the received authorization information of the agent terminal, and generating the target information according to the agent terminal;
and operating the agent end to send the target information to the receiving end through the intelligent contract end in response to the fact that the signature of the transfer time information is the same as the signature of the receiving end.
In a possible implementation manner, before sending the information transfer request and the transfer time information to the intelligent contract end in response to receiving the transfer time information signed by the receiving end, the method further includes:
transmitting transfer notification information to the receiving end; wherein the transfer notification message includes: and the identity information of the sending terminal.
In a possible implementation manner, after determining, according to the intelligent contract end, whether the signature of the transfer number information is the same as the signature of the receiving end, the method further includes:
and exiting the intelligent contract end in response to the fact that the signature of the transfer time information is different from the signature of the receiving end.
In a second aspect, the present application provides an information transfer method, applied to a receiving end, including:
sending an information acquisition request to an intelligent contract end to acquire transfer times;
signing the transfer times to determine transfer time information, and sending the transfer time information to a sending end;
and receiving the target information sent by the sending end through the intelligent contract end in response to the fact that the sending end determines that the signature of the transfer time information is the same as the signature of the receiving end according to the intelligent contract end.
In a possible implementation manner, the sending an information obtaining request to an intelligent contract end to obtain the transfer times includes:
in response to receiving transfer notification information sent by the sending end, determining the identity of the sending end according to the transfer notification information; wherein the transfer notification message includes: the identity information of the sending terminal;
and sending the information acquisition request to the intelligent contract end to acquire the transfer times between the receiving end and the sending end.
In a possible implementation manner, the sending the information obtaining request to the intelligent contract end to obtain information of the number of transfers between the receiving end and the sending end includes:
responding to the fact that the identity of the sending end is determined to be the agent end according to the identity information of the sending end, and sending the information acquisition request to the intelligent contract end to acquire the transfer frequency information between the receiving end and the agent end; wherein, the agent end is a terminal authorizing the sending end agent.
In one possible implementation manner, the signing the transfer times to determine the transfer times information includes:
signing the transfer times by using a private key of the receiving terminal to determine the transfer time information; wherein the transition number information corresponds to the transition number.
In a second aspect, the present application provides an information transfer method, applied to an intelligent contract end, including:
in response to receiving an information acquisition request sent by a receiving end, sending the transfer times between the receiving end and the sending end to the receiving end;
responding to the received information transfer request and the transfer frequency information sent by the sending end, and determining whether the signature of the transfer frequency information is the same as that of the receiving end; wherein the transfer times information is determined according to the transfer times;
and responding to the fact that the signature of the transfer time information is the same as that of the receiving end, receiving the target information sent by the sending end, sending the target information to the receiving end, and updating the transfer time information.
In a possible implementation manner, the determining whether the signature of the transfer number information is the same as the signature of the receiving end includes:
determining whether the signature of the transfer time information is in a transfer white list of the sending end;
and responding to the transfer time information, wherein the signature of the transfer time information is in a transfer white list of the sending end, and determining that the signature of the transfer time information is the same as the signature of the receiving end.
In a possible implementation manner, after determining whether the signature of the transfer number information is the same as the signature of the receiving end, the method further includes:
responding to the difference between the signature of the transfer time information and the signature of the receiving end, and sending a transfer termination instruction to the sending end; wherein the terminating branch instruction is used for indicating the sending end to exit the intelligent contract end.
In one possible implementation, the method further includes:
determining whether the number of transfers is 0;
responding to the transfer times being 0, and sending a transfer termination instruction to the sending end; wherein the terminating branch instruction is used for indicating the sending end to exit the intelligent contract end.
In a fourth aspect, the present application provides an information transfer apparatus comprising:
a transmitting end configured to implement the information transfer method according to the first aspect;
a receiving end configured to implement the information transfer method according to the second aspect;
and the intelligent contract end is configured to realize the information transfer method of the third aspect.
In a third aspect, the present application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the information transfer method according to the first aspect, the information transfer method according to the second aspect, or the information transfer method according to the third aspect when executing the program.
In a fourth aspect, the present application provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the information transfer method of the first aspect, or the information transfer method of the second aspect, or the information transfer method of the third aspect.
As can be seen from the above, according to the information transfer method, apparatus, and related device provided by the present application, after receiving the transfer time information signed by the receiving end, the sending end sends the information transfer request and the transfer time information to the intelligent contract end, and determines whether the signature of the transfer time information is the same as the signature of the receiving end through the intelligent contract end, and when it is determined that the signature of the transfer time information is the same as the signature of the receiving end, it is verified that the sending end and the receiving end trust each other, and the target information can be sent to the receiving end through the intelligent contract end. This application guarantees not to introduce the third party through the block chain technique to make information transfer only go on between sending end and receiving terminal, intelligent contract end then is used for verifying whether can carry out information transfer between sending end and the receiving terminal, reduces the information transfer number of times, guarantees that target information shifts between as few terminals as possible, has guaranteed user information's security. Moreover, the signed transfer frequency information is used as the verification information, and the transfer frequency is updated after information transfer is completed every time, so that the signed transfer frequency information generated in every information transfer is different, and even if a private key of a sending end is stolen, a stealer cannot forge the verification information through the previously disclosed transfer frequency information and signature, and then the information of the stolen end is transferred out, and the safety of user information is further ensured.
Drawings
In order to more clearly illustrate the technical solutions in the present application or related technologies, the drawings required for the embodiments or related technologies in the following description are briefly introduced, and it is obvious that the drawings in the following description are only the embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 shows an exemplary flowchart of an information transfer method applied to a sending end according to an embodiment of the present application.
Fig. 2 shows an exemplary flowchart of an information transfer method applied to a receiving end according to an embodiment of the present application.
Fig. 3 illustrates an exemplary flowchart of an information transfer method applied to an intelligent contract end according to an embodiment of the present application.
Fig. 4 shows an exemplary structural diagram of an information transfer device provided in an embodiment of the present application.
Fig. 5 shows an exemplary structural schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings in combination with specific embodiments.
It should be noted that technical terms or scientific terms used in the embodiments of the present application should have a general meaning as understood by those having ordinary skill in the art to which the present application belongs, unless otherwise defined. The use of "first," "second," and similar terms in the embodiments of the present application do not denote any order, quantity, or importance, but rather the terms are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
As described in the background section, in the currently common asset transfer, only the private key of the asset transfer initiator is needed to sign the transaction initiating the transfer, and the signed transaction is sent to the block chain. Once the private key of the asset transfer initiator is leaked, the private key thief can initiate a transfer transaction to any person, so that the rights and interests of the asset transfer initiator are damaged.
However, the inventor finds that in the related art, the scheme for dealing with the private key disclosure basically needs to disassemble the transfer flow, and the assets are transferred to a trusted third party and then are extracted from the trusted third party after the recipient is authenticated by the authority. Although the security is ensured, the original one transaction (also called transaction, which refers to an interaction that changes the state of the blockchain once) is split into two transactions, that is, the number of times of blockchain transactions is increased, which also brings inconvenience to the system conforming to the original flow.
Therefore, according to the information transfer method, the information transfer device and the related equipment provided by the application, after the sending end receives the transfer frequency information signed by the receiving end, the sending end sends the information transfer request and the transfer frequency information to the intelligent contract end, whether the signature of the transfer frequency information is the same as that of the receiving end is determined through the intelligent contract end, when the signature of the transfer frequency information is determined to be the same as that of the receiving end, mutual trust between the sending end and the receiving end is proved, and the target information can be sent to the receiving end through the intelligent contract end. This application guarantees not to introduce the third party through the block chain technique to make the information transfer only go on between sending end and receiving terminal, intelligent contract end then is used for verifying whether can carry out the information transfer between sending end and the receiving terminal, reduces the information transfer number of times, guarantees that target information shifts between as few as possible terminal, has guaranteed user information's security. Moreover, the signed transfer frequency information is used as the verification information, and the transfer frequency is updated after information transfer is completed every time, so that the signed transfer frequency information generated in every information transfer is different, and even if a private key of a sending end is stolen, an eavesdropper cannot forge the verification information through the previously disclosed transfer frequency information and signature, and then the information of the stolen end is transferred out, and the safety of user information is further ensured.
The following describes the information transfer method provided in the embodiments of the present application with specific examples.
Fig. 1 shows an exemplary flowchart of an information transfer method applied to a sending end according to an embodiment of the present application.
Referring to fig. 1, an information transfer method applied to a sending end provided in an embodiment of the present application specifically includes the following steps:
s102: and responding to the received transfer frequency information signed by the receiving end, and sending the information transfer request and the transfer frequency information to the intelligent contract end.
S104: and determining whether the signature of the transfer time information is the same as the signature of the receiving end or not according to the intelligent contract end.
S106: and responding to the fact that the signature of the transfer frequency information is the same as the signature of the receiving end, and sending target information to the receiving end through the intelligent contract end.
Fig. 2 shows an exemplary flowchart of an information transfer method applied to a receiving end according to an embodiment of the present application.
S202: and sending an information acquisition request to the intelligent contract end to acquire the transfer times.
S204: and signing the transfer times to determine transfer time information, and sending the transfer time information to a sending end.
S206: and receiving the target information sent by the sending end through the intelligent contract end in response to the fact that the sending end determines that the signature of the transfer time information is the same as the signature of the receiving end according to the intelligent contract end.
Fig. 3 illustrates an exemplary flowchart of an information transfer method applied to an intelligent contract end according to an embodiment of the present application.
S302: and responding to the received information acquisition request sent by the receiving end, and sending the transfer times between the receiving end and the sending end to the receiving end.
S304: responding to the received information transfer request and the transfer frequency information sent by the sending end, and determining whether the signature of the transfer frequency information is the same as that of the receiving end; wherein the transfer time information is determined according to the transfer times.
S306: and responding to the fact that the signature of the transfer time information is the same as the signature of the receiving end, receiving the target information sent by the sending end, sending the target information to the receiving end, and updating the transfer time information.
In some embodiments, before the sender wants to perform information transfer with the receiver, for example, before the sender wants to transfer digital assets to the receiver, the sender may notify the receiver that information transfer is to be performed, and specifically, the sender may send transfer notification information to the receiver, where the transfer notification information may include sender identity information.
Further, the receiving end may determine the identity of the sending end according to the transfer notification information, for example, may determine that the sending end is Alice. The sending end can not only carry out information transfer with the receiving end by itself, but also can carry out information transfer with the receiving end for the agent end Lily on the premise of having authority, and the agent end can authorize the sending end to carry out information transfer for the agent end Lily. Therefore, the receiving end can determine which terminal the information transfer is with. Taking the example that the sending end Alice and the receiving end perform information transfer, the intelligent contract end can be accessed to read the transfer times between the receiving end and the sending end, that is, the times of information transfer between the receiving end and the sending end, by sending an information acquisition request to the intelligent contract end. In order to indicate the identity of the receiving end and ensure the safety in the information transfer process, the receiving end can use the own account private key to sign the transfer times, so as to determine the transfer time information.
It should be noted that the transfer number information is determined after the transfer number and the private key of the receiving end are signed, that is, the transfer number and/or the private key of the receiving end change, and the transfer number information also changes.
And then, the receiving end can send the signed transfer number information to the sending end, and at the moment, the sending end can encrypt the information transfer request and the transfer number information signed by the receiving end by using an account private key of the sending end to generate a data packet encrypted by the sending end and send the data packet to the intelligent contract end so as to verify the identity legitimacy of the sending end and the receiving end through the intelligent contract end.
In some embodiments, when the intelligent contractual end receives the information transfer request and the transfer number information sent by the sending end, the intelligent contractual end may verify a signature of the transfer number information to determine whether the information transfer between the sending end and the receiving end can be performed.
Specifically, the intelligent contract end can read the transfer times of information stored between the sending end and the receiving end in the intelligent contract, and then can publish the transfer times and related information to each node in the block chain, and calculate the transfer time information by using each node, and then determine whether the signature of the transfer time information sent by the sending end is the same as the signature of the receiving end.
It should be noted that, transfer frequency information, signatures and other fixed information before information transfer is disclosed on the blockchain, and in the related art, when a sending end is attacked by a thief and a private key of the sending end is revealed, the thief may transfer the information of the sending end, thereby causing the disclosure of user information. That is, if the intelligent contract end verifies whether the signature of any one piece of fixed information is the same as the signature of the receiving end, the thief can generate a signature which is the same as the signature of the receiving end by acquiring the fixed information of the receiving end which is disclosed in the past and the signature, and the fixed information does not change, so that the signature of the fixed information cannot be changed, and the signature can be easily acquired by the thief, and further the leakage and loss of user information are caused.
In the application, the receiving end signs the transfer times to determine the transfer time information, and when the receiving end and the sending end perform information transfer once in the past, the transfer times between the sending end and the receiving end recorded in the intelligent contract end is increased by 1, so that the transfer time information changes along with the information transfer between the receiving end and the sending end, that is, a thief can obtain the previous transfer time information, but the transfer times change every time, so the transfer time information is different. And once the intelligent contract end detects that the transfer time information sent by the sending end is different from the calculated transfer time information, determining that the signature of the transfer time information sent by the sending end is different from the signature of the receiving end.
Furthermore, the intelligent contract end can send a transfer termination instruction to the sending end to indicate the sending end to exit the intelligent contract end, and the information transfer operation is not continuously executed, so that the information security of the user is guaranteed.
Still further, if the intelligent contract end determines that the transfer time information sent by the sending end is the same as the calculated transfer time information, the signature of the transfer time information sent by the sending end is the same as the signature of the receiving end, and the sending end can generate target information and send the target information to the receiving end through the intelligent contract end so as to complete information transfer.
In some embodiments, since the agent end of the sending end agent actually performs information transfer with the receiving end, when the sending end receives authorization information of the agent end, target information may be generated according to the agent end, for example, the transferred information is a digital asset, and when the sending end performs information transfer for the agent end, the target information is a digital asset of the agent end. When the signature of the transfer frequency information is determined to be the same as that of the receiving end, the sending end can operate the agent end to send the target information to the receiving end through the intelligent contract end so as to complete information transfer.
In some embodiments, in order to ensure a trust relationship between the sending end and the receiving end, the sending end may be provided with a white list, and the intelligent contract end may determine whether the signature of the transfer time information is in the transfer white list of the sending end, and once the signature is in the transfer white list, determine that the signature of the transfer time information is the same as the signature of the receiving end, and may complete information transfer between the sending end and the receiving end.
In some embodiments, to further ensure information security of the user, the intelligent contract end may determine whether the number of times of transfer between the sending end or the agent end and the receiving end is 0, and when the number of times of transfer between the sending end or the agent end and the receiving end is not 0, prove that the information transfer between the sending end or the agent end and the receiving end is performed for a plurality of times, and if the trust degree between the sending end and the receiving end is higher, once it is determined that the signature of the transfer number information is the same as the signature of the receiving end, the information transfer between the sending end or the agent end and the receiving end may be completed. And if the transfer times between the intelligent contract end and the sending end are 0, the fact that information transfer between the intelligent contract end and the sending end is not carried out is proved, the trust degree between the intelligent contract end and the sending end is difficult to determine, and once any one end in the current information transfer is suspected to be stolen, the intelligent contract end can send a transfer termination instruction to the sending end to indicate the sending end to terminate the information transfer operation and quit the intelligent contract end. And if the user thinks that every end in the current information transfer is not stolen, even if the transfer times between the sending end or the agent end and the receiving end is 0, the information transfer between the sending end or the agent end and the receiving end can be further completed under the condition that the signature of the transfer time information is determined to be the same as the signature of the receiving end.
As can be seen from the above, according to the information transfer method, apparatus, and related device provided by the present application, after receiving the transfer time information signed by the receiving end, the sending end sends the information transfer request and the transfer time information to the intelligent contract end, and determines whether the signature of the transfer time information is the same as the signature of the receiving end through the intelligent contract end, and when it is determined that the signature of the transfer time information is the same as the signature of the receiving end, it is verified that the sending end and the receiving end trust each other, and the target information can be sent to the receiving end through the intelligent contract end. This application guarantees not to introduce the third party through the block chain technique to make information transfer only go on between sending end and receiving terminal, intelligent contract end then is used for verifying whether can carry out information transfer between sending end and the receiving terminal, reduces the information transfer number of times, guarantees that target information shifts between as few terminals as possible, has guaranteed user information's security. Moreover, the signed transfer frequency information is used as the verification information, and the transfer frequency is updated after information transfer is completed every time, so that the signed transfer frequency information generated in every information transfer is different, and even if a private key of a sending end is stolen, a stealer cannot forge the verification information through the previously disclosed transfer frequency information and signature, and then the information of the stolen end is transferred out, and the safety of user information is further ensured.
It should be noted that the method of the embodiment of the present application may be executed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene and completed by the mutual cooperation of a plurality of devices. In such a distributed scenario, one of the multiple devices may only perform one or more steps of the method of the embodiment, and the multiple devices interact with each other to complete the method.
It should be noted that the above describes some embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Fig. 4 shows an exemplary structural diagram of an information transfer device provided in an embodiment of the present application.
Based on the same inventive concept, the application also provides an information transfer device corresponding to the method of any embodiment.
Referring to fig. 4, the information transfer apparatus includes: the system comprises a sending end, a receiving end and an intelligent contract end; wherein the content of the first and second substances,
the sending end is configured to respond to the received transfer frequency information signed by the receiving end and send an information transfer request and the transfer frequency information to the intelligent contract end;
determining whether the signature of the transfer time information is the same as the signature of the receiving end or not according to the intelligent contract end;
in response to the fact that the signature of the transfer frequency information is the same as the signature of the receiving end, target information is sent to the receiving end through the intelligent contract end;
the receiving end is configured to send an information acquisition request to the intelligent contract end to acquire the transfer times;
signing the transfer times to determine transfer time information, and sending the transfer time information to a sending end;
receiving target information sent by the sending end through the intelligent contract end in response to the fact that the sending end determines that the signature of the transfer time information is the same as the signature of the receiving end according to the intelligent contract end;
the intelligent contract end is configured to respond to the information acquisition request sent by the receiving end and send the transfer times between the receiving end and the sending end to the receiving end;
responding to the received information transfer request and the transfer frequency information sent by the sending end, and determining whether the signature of the transfer frequency information is the same as that of the receiving end; wherein the transfer times information is determined according to the transfer times;
and responding to the fact that the signature of the transfer time information is the same as that of the receiving end, receiving the target information sent by the sending end, sending the target information to the receiving end, and updating the transfer time information.
In one possible implementation, the transmitter is further configured to:
and in response to receiving the transfer time information signed by the receiving end, encrypting the transfer request and the transfer time information by using a private key of the sending end, and sending the encrypted transfer request and the encrypted transfer time information to the intelligent contract end.
In one possible implementation, the transmitter is further configured to:
and generating the target information in response to the fact that the signature of the transfer time information is the same as the signature of the receiving end, and sending the target information to the receiving end through the intelligent contract end.
In one possible implementation, the transmitter is further configured to:
responding to the received authorization information of the agent terminal, and generating the target information according to the agent terminal;
and operating the agent end to send the target information to the receiving end through the intelligent contract end in response to the fact that the signature of the transfer time information is the same as the signature of the receiving end.
In one possible implementation, the transmitter is further configured to:
transmitting transfer notification information to the receiving end; wherein the transfer notification message includes: and the identity information of the sending end.
In one possible implementation, the transmitter is further configured to:
and exiting the intelligent contract end in response to the fact that the signature of the transfer time information is different from the signature of the receiving end.
In one possible implementation, the receiving end is further configured to:
in response to receiving transfer notification information sent by the sending end, determining the identity of the sending end according to the transfer notification information; wherein the transfer notification message includes: the identity information of the sending terminal;
and sending the information acquisition request to the intelligent contract end to acquire the transfer times between the receiving end and the sending end.
In one possible implementation, the receiving end is further configured to:
responding to the fact that the identity of the sending end is determined to be the agent end according to the identity information of the sending end, and sending the information acquisition request to the intelligent contract end to acquire the transfer frequency information between the receiving end and the agent end; wherein, the agent end is a terminal authorizing the sending end agent.
In one possible implementation, the receiving end is further configured to:
signing the transfer times by using a private key of the receiving terminal to determine the transfer time information; wherein the transition number information corresponds to the transition number.
In one possible implementation, the intelligent contract end is further configured to:
determining whether the signature of the transfer time information is in a transfer white list of the sending end;
and responding to the transfer time information, wherein the signature of the transfer time information is in a transfer white list of the sending end, and determining that the signature of the transfer time information is the same as the signature of the receiving end.
In one possible implementation, the intelligent contract end is further configured to:
responding to the difference between the signature of the transfer time information and the signature of the receiving end, and sending a transfer termination instruction to the sending end; wherein the terminating branch instruction is used for indicating the sending end to exit the intelligent contract end.
In one possible implementation, the intelligent contract end is further configured to:
determining whether the number of transfers is 0;
responding to the transfer times being 0, and sending a transfer termination instruction to the sending end; wherein the terminating branch instruction is used for indicating the sending end to exit the intelligent contract end.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, the functionality of the various modules may be implemented in the same one or more software and/or hardware implementations as the present application.
The apparatus in the foregoing embodiment is used to implement the information transfer method correspondingly applied to the sending end in any of the foregoing embodiments, or the information transfer method correspondingly applied to the receiving end in any of the foregoing embodiments, and the information transfer method correspondingly applied to the intelligent contract end in any of the foregoing embodiments has the beneficial effects of the corresponding method embodiment, and is not described herein again.
Fig. 5 shows an exemplary structural diagram of an electronic device provided in an embodiment of the present application.
Based on the same inventive concept, corresponding to the method of any of the embodiments, the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor executes the computer program to implement the information transfer method applied to the sending end according to any of the embodiments, or the information transfer method applied to the receiving end according to any of the embodiments, or the information transfer method applied to the intelligent contract end according to any of the embodiments. Fig. 5 is a schematic diagram illustrating a more specific hardware structure of an electronic device according to this embodiment, where the electronic device may include: a processor 510, a memory 520, an input/output interface 530, a communication interface 540, and a bus 550. Wherein processor 510, memory 520, input/output interface 530, and communication interface 540 are communicatively coupled to each other within the device via bus 550.
The processor 510 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present specification.
The Memory 520 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 520 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 520 and called by the processor 510 for execution.
The input/output interface 530 is used for connecting an input/output module to realize information input and output. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. Wherein the input devices may include a keyboard, mouse, touch screen, microphone, various sensors, etc., and the output devices may include a display, speaker, vibrator, indicator light, etc.
The communication interface 540 is used for connecting a communication module (not shown in the figure) to realize communication interaction between the device and other devices. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, bluetooth and the like).
Bus 550 includes a pathway to transfer information between various components of the device, such as processor 510, memory 520, input/output interface 530, and communication interface 540.
It should be noted that although the above-mentioned device only shows the processor 510, the memory 520, the input/output interface 530, the communication interface 540 and the bus 550, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only the components necessary to implement the embodiments of the present disclosure, and need not include all of the components shown in the figures.
The electronic device of the foregoing embodiment is configured to implement the information transfer method correspondingly applied to the sending end in any of the foregoing embodiments, or the information transfer method correspondingly applied to the receiving end in any of the foregoing embodiments, or the information transfer method correspondingly applied to the intelligent contract end in any of the foregoing embodiments, and has the beneficial effects of corresponding method embodiments, which are not described herein again.
Based on the same inventive concept, corresponding to any of the above-mentioned embodiment methods, the present application further provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to execute the information transfer method applied to the sending end as described in any of the above embodiments, or the information transfer method applied to the receiving end as described in any of the above embodiments, or the information transfer method applied to the intelligent contract end as described in any of the above embodiments.
Computer-readable media of the present embodiments, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The computer instructions stored in the storage medium of the foregoing embodiment are used to enable the computer to execute the information transfer method applied to the sending end as described in any of the foregoing embodiments, or the information transfer method applied to the receiving end as described in any of the foregoing embodiments, or the information transfer method applied to the intelligent contract end as described in any of the foregoing embodiments, and have the beneficial effects of corresponding method embodiments, which are not described herein again.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the context of the present application, technical features in the above embodiments or in different embodiments may also be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the present application described above, which are not provided in detail for the sake of brevity.
In addition, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown in the provided figures for simplicity of illustration and discussion, and so as not to obscure the embodiments of the application. Furthermore, devices may be shown in block diagram form in order to avoid obscuring embodiments of the application, and this also takes into account the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform within which the embodiments of the application are to be implemented (i.e., specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the application, it should be apparent to one skilled in the art that the embodiments of the application can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative instead of restrictive.
While the present application has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of these embodiments will be apparent to those of ordinary skill in the art in light of the foregoing description. For example, other memory architectures, such as Dynamic RAM (DRAM), may use the discussed embodiments.
The present embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present application are intended to be included within the scope of the present application.

Claims (17)

1. An information transfer method is applied to a sending end, and the method comprises the following steps:
responding to the received transfer frequency information signed by the receiving end, and sending an information transfer request and the transfer frequency information to an intelligent contract end;
determining whether the signature of the transfer time information is the same as the signature of the receiving end or not according to the intelligent contract end;
and responding to the fact that the signature of the transfer frequency information is the same as the signature of the receiving end, and sending target information to the receiving end through the intelligent contract end.
2. The method of claim 1, wherein the sending an information transfer request and transfer number information to an intelligent contract end in response to receiving the transfer number information signed by a receiving end comprises:
and in response to receiving the transfer time information signed by the receiving end, encrypting the transfer request and the transfer time information by using a private key of the sending end, and sending the encrypted transfer request and the encrypted transfer time information to the intelligent contract end.
3. The method of claim 1, wherein the sending target information to the receiver via the intelligent contract terminal in response to determining that the signature of the transfer number information is the same as the signature of the receiver comprises:
and generating the target information in response to the fact that the signature of the transfer time information is the same as the signature of the receiving end, and sending the target information to the receiving end through the intelligent contract end.
4. The method of claim 1, wherein the sending target information to the receiver via the intelligent contract terminal in response to determining that the signature of the transfer number information is the same as the signature of the receiver comprises:
responding to the received authorization information of the agent terminal, and generating the target information according to the agent terminal;
and operating the agent end to send the target information to the receiving end through the intelligent contract end in response to the fact that the signature of the transfer time information is the same as the signature of the receiving end.
5. The method of claim 1, wherein before sending the information transfer request and the transfer number information to the intelligent contract end in response to receiving the transfer number information signed by the receiving end, further comprising:
transmitting transfer notification information to the receiving end; wherein the transfer notification message includes: and the identity information of the sending end.
6. The method according to claim 1, wherein after determining whether the signature of the transfer number information is the same as the signature of the receiving end according to the intelligent contract end, the method further comprises:
and exiting the intelligent contract end in response to the fact that the signature of the transfer time information is different from the signature of the receiving end.
7. An information transfer method, applied to a receiving end, the method comprising:
sending an information acquisition request to an intelligent contract end to acquire transfer times;
signing the transfer times to determine transfer time information, and sending the transfer time information to a sending end;
and receiving the target information sent by the sending end through the intelligent contract end in response to the fact that the sending end determines that the signature of the transfer time information is the same as the signature of the receiving end according to the intelligent contract end.
8. The method according to claim 7, wherein the sending an information acquisition request to the intelligent contract end to acquire the transfer times comprises:
responding to the received transfer notification information sent by the sending end, and determining the identity of the sending end according to the transfer notification information; wherein the transfer notification message includes: the identity information of the sending terminal;
and sending the information acquisition request to the intelligent contract end to acquire the transfer times between the receiving end and the sending end.
9. The method according to claim 8, wherein the sending the information acquisition request to the intelligent contract end to acquire information on the number of transitions between the receiving end and the sending end comprises:
responding to the fact that the identity of the sending end is determined to be the agent end according to the identity information of the sending end, and sending the information acquisition request to the intelligent contract end to acquire the transfer frequency information between the receiving end and the agent end; the agent end is a terminal authorizing the sending end agent.
10. The method of claim 7, wherein the signing the number of transfers to determine transfer information comprises:
signing the transfer times by using a private key of the receiving terminal to determine the transfer time information; wherein the transition number information corresponds to the transition number.
11. An information transfer method is applied to an intelligent contract end, and the method comprises the following steps:
in response to receiving an information acquisition request sent by a receiving end, sending the transfer times between the receiving end and the sending end to the receiving end;
responding to the received information transfer request and the transfer frequency information sent by the sending end, and determining whether the signature of the transfer frequency information is the same as that of the receiving end; wherein the transfer times information is determined according to the transfer times;
and responding to the fact that the signature of the transfer time information is the same as that of the receiving end, receiving the target information sent by the sending end, sending the target information to the receiving end, and updating the transfer time information.
12. The method according to claim 11, wherein the determining whether the signature of the transition number information is the same as the signature of the receiving end comprises:
determining whether the signature of the transfer time information is in a transfer white list of the sending end;
and responding to the transfer white list of the transmitting end that the signature of the transfer time information is in, and determining that the signature of the transfer time information is the same as the signature of the receiving end.
13. The method according to claim 11, wherein after determining whether the signature of the transition number information is the same as the signature of the receiving end, the method further comprises:
responding to the difference between the signature of the transfer time information and the signature of the receiving end, and sending a transfer termination instruction to the sending end; wherein the terminating branch instruction is used for indicating the sending end to exit the intelligent contract end.
14. The method of claim 11, further comprising:
determining whether the number of transitions is 0;
responding to the transfer times being 0, and sending a transfer termination instruction to the sending end; wherein the terminate branch instruction is to instruct the sender to exit the intelligent contract end.
15. An information transfer apparatus, characterized in that the apparatus comprises:
a transmitting end configured to implement the method of any one of claims 1 to 6;
a receiving end configured to implement the method of any one of claims 7 to 10;
intelligent contract end configured to implement the method of any of claims 11 to 14.
16. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 6, or the method of any one of claims 7 to 10, or the method of any one of claims 11 to 14 when executing the program.
17. A non-transitory computer readable storage medium storing computer instructions for causing a computer to implement the method of any one of claims 1 to 6, or the method of any one of claims 7 to 10, or the method of any one of claims 11 to 14.
CN202211160584.XA 2022-09-22 2022-09-22 Information transfer method, device and related equipment Pending CN115525930A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211160584.XA CN115525930A (en) 2022-09-22 2022-09-22 Information transfer method, device and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211160584.XA CN115525930A (en) 2022-09-22 2022-09-22 Information transfer method, device and related equipment

Publications (1)

Publication Number Publication Date
CN115525930A true CN115525930A (en) 2022-12-27

Family

ID=84699194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211160584.XA Pending CN115525930A (en) 2022-09-22 2022-09-22 Information transfer method, device and related equipment

Country Status (1)

Country Link
CN (1) CN115525930A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116226938A (en) * 2023-05-10 2023-06-06 飞天诚信科技股份有限公司 Method and system for managing transaction through intelligent contract

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116226938A (en) * 2023-05-10 2023-06-06 飞天诚信科技股份有限公司 Method and system for managing transaction through intelligent contract
CN116226938B (en) * 2023-05-10 2023-08-08 飞天诚信科技股份有限公司 Method and system for managing transaction through intelligent contract

Similar Documents

Publication Publication Date Title
CN110336774B (en) Mixed encryption and decryption method, equipment and system
US9386045B2 (en) Device communication based on device trustworthiness
CN112291190B (en) Identity authentication method, terminal and server
CN108965250B (en) Digital certificate installation method and system
KR20140050322A (en) Method and apparatus for providing unique identifier of user device
CN111199037B (en) Login method, system and device
US11424915B2 (en) Terminal registration system and terminal registration method with reduced number of communication operations
CN111339536B (en) Data verification method and device based on secure execution environment
CN111161056A (en) Method, system and equipment for improving transaction security of digital assets
CN112055019A (en) Method for establishing communication channel and user terminal
CN108564363B (en) Transaction processing method, server, client and system
CN114553590A (en) Data transmission method and related equipment
CN115525930A (en) Information transfer method, device and related equipment
CN113282951B (en) Application program security verification method, device and equipment
CN111147471B (en) Terminal network access authentication method, device, system and storage medium
CN116170144B (en) Smart power grid anonymous authentication method, electronic equipment and storage medium
CN112632573A (en) Intelligent contract execution method, device and system, storage medium and electronic equipment
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN115208575A (en) Software security verification method, device and storage medium
CN114595465A (en) Data encryption processing method and device and electronic equipment
CN110659476A (en) Method and apparatus for resetting password
CN111786936A (en) Method and device for authentication
CN111130805A (en) Secure transmission method, electronic device, and computer-readable storage medium
CN105323287B (en) Third-party application program login method and system
CN115333748A (en) Anti-counterfeiting communication method, system, electronic device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination