CN117391706A - Data transfer method and device, electronic equipment and storage medium - Google Patents

Data transfer method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117391706A
CN117391706A CN202311433265.6A CN202311433265A CN117391706A CN 117391706 A CN117391706 A CN 117391706A CN 202311433265 A CN202311433265 A CN 202311433265A CN 117391706 A CN117391706 A CN 117391706A
Authority
CN
China
Prior art keywords
data
target
transfer
target object
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311433265.6A
Other languages
Chinese (zh)
Inventor
朱煜松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202311433265.6A priority Critical patent/CN117391706A/en
Publication of CN117391706A publication Critical patent/CN117391706A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification discloses a data transfer method, a data transfer device, electronic equipment and a storage medium. The data transfer method comprises the steps of determining a key pair corresponding to target data to be transferred, and inquiring a proof construction rule of the target data at a target object; then constructing a data certificate based on the private key and the certificate construction rule, and generating an assignment signature based on the data certificate; and finally, transmitting the transfer signature to the target object, and acquiring target data from the target object after receiving the verification success information.

Description

Data transfer method and device, electronic equipment and storage medium
Technical Field
The embodiment of the specification belongs to the technical field of data processing, and particularly relates to a data transfer method, a device, electronic equipment and a storage medium.
Background
The user can have some virtual digital rights and interests data which can be transferred through the terminal equipment such as mobile phones, computers and the like, such as shopping card recharging balances, game point tickets, test qualifications and the like. Currently, for these transfer transactions of digital rights data, it is often necessary that the transferee actively initiate the data transfer transaction on the line of the corresponding platform to complete the transfer, and the transferee can only passively wait for the transfer, and the user experience of the transferee is poor during the transfer process.
Disclosure of Invention
The embodiment of the specification provides a data transfer method, a device, an electronic device and a storage medium, and the technical scheme is as follows:
in a first aspect, embodiments of the present disclosure provide a data transfer method, including:
determining a key pair corresponding to target data to be transferred, and inquiring a proof construction rule of the target data at a target object, wherein the key pair comprises a public key and a private key;
constructing a data certificate based on the private key and a certificate construction rule, and generating an assignment signature based on the data certificate;
and sending the transfer signature to the target object, and after receiving verification success information, acquiring the target data from the target object, wherein the transfer signature is used for being verified by the target object based on the public key.
In a second aspect, embodiments of the present disclosure provide a data transfer apparatus, including:
the determining module is used for determining a key pair corresponding to target data to be transferred and inquiring a proof construction rule of the target data at a target object, wherein the key pair comprises a public key and a private key;
a construction module for constructing a data certificate based on the private key and a certificate construction rule, and generating a transfer signature based on the data certificate;
and the transmission module is used for transmitting the transfer signature to the target object, acquiring the target data from the target object after receiving the verification success information, and the transfer signature is used for being verified by the target object based on the public key.
In a third aspect, embodiments of the present disclosure further provide an electronic device, which may include: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the data transfer method steps described above.
In a fourth aspect, embodiments of the present disclosure provide a computer storage medium having stored thereon a plurality of instructions adapted to be loaded by a processor and to perform the above-described data transfer method steps.
The technical scheme provided by some embodiments of the present specification has the following beneficial effects:
in one or more embodiments of the present description, a data certificate may be constructed using a private key signature through a certificate construction rule queried from a key pair obtained from a transferor and a target object, and a transfer signature may be generated therefrom. And verifying the transfer signature in the target object according to the public key to obtain the target data transferred by the transfer party. The whole process can be completed by interaction between the transferee and the target object of the platform, the transferee does not need to actively participate and operate as a third party, and the user experience of the transferee in the transfer flow is good. And the whole interaction process is completely decentralised, and can be applied to a decentralised platform.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present description, the drawings that are required in the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present description, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic system architecture diagram of a data transfer method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a data transfer method according to an embodiment of the present disclosure;
fig. 3 is a schematic view of an application scenario of selecting target data according to an embodiment of the present disclosure;
FIG. 4 is a flow chart of yet another data transfer method provided by embodiments of the present disclosure;
fig. 5 is a schematic view of an application scenario for selecting target parameter data according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a data transfer device according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification.
The terms first, second, third and the like in the description and in the claims and in the above drawings are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
The following description provides examples and does not limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements described without departing from the scope of the disclosure herein. Various examples may omit, replace, or add various procedures or components as appropriate. For example, the described methods may be performed in a different order than described, and various steps may be added, omitted, or combined. Furthermore, features described with respect to some examples may be combined into other examples.
First, portions of the embodiments of the present application will be explained below for easy understanding by those skilled in the art.
Key pair: is the two keys used in a pair of associated encryption algorithms: public and private keys. The public key may be publicly shared to others, while the private key must be kept secret. These two keys are generated by a specific mathematical algorithm. The public key is used to encrypt data or verify digital signatures, while the private key is used to decrypt data or generate digital signatures. By using key pairs, some important encryption and security functions can be implemented, such as encrypted communications, digital signatures, and authentication.
Intelligent contract: a piece of programmatically written code with automatic execution capability, intended to propagate, verify or execute a contractual computer protocol in an informative manner. Smart contracts allow trusted transactions to be made without third parties, which transactions are traceable and irreversible.
Map data structure: map is a common data structure for storing key-value pairs. Map can be used for quickly searching and acquiring corresponding values according to given keys, and corresponding definitions are found by searching entries similar to a dictionary in real life.
Blockchain: a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. It is essentially a de-centralized database, which is a series of data blocks that are generated in association using cryptographic methods, each of which contains information for a batch of transactions, for verifying the validity of its information and generating the next block.
Referring to fig. 1, fig. 1 is a schematic system architecture diagram of a data transfer method according to an embodiment of the present disclosure.
As shown in fig. 1, the system architecture of the data transfer method may include at least a terminal 100, a server 200, and a network.
The terminal 100 includes, but is not limited to, a smart phone, a desktop computer, a tablet computer, a notebook computer, a smart speaker, a digital assistant, a smart wearable device, and other types of electronic devices, and may also be software running on the above electronic devices, such as an application program, and the like. Alternatively, the operating system running on the electronic device may include, but is not limited to, an android system, an IOS system, linux, windows, and the like. Alternatively, the terminal 100 provides the data transfer service to the user, and the terminal 100 may acquire an operation instruction of the application program interface and transmit a transfer signature to the server 200 to acquire the target data.
The server 200 may provide a background service for the terminal 100, verify the transfer signature according to the public key corresponding to the target data according to the transfer signature sent by the terminal 100, and send the target data to the terminal 100 after the verification is successful, or open the authority to obtain the target data to the terminal 100. Specifically, the server 200 may be an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), and basic cloud computing services such as big data and artificial intelligence platforms.
The network is used as a medium for providing a communication link between the terminal 100 and the server 200, between the terminal 100 and the terminal 100, and between the server 200 and the server 200. The network may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
In addition, it should be noted that, fig. 1 is only a system provided by the present disclosure, and in practical application, other systems may also be included, for example, more terminals may be included.
In the embodiment of the present disclosure, the terminal 100 and the server 200 may be directly or indirectly connected through a wired or wireless communication manner, which is not limited herein.
Referring next to fig. 2, fig. 2 is a flowchart illustrating an overall data transfer method according to an embodiment of the present disclosure, where the data transfer method may be used in a terminal.
As shown in fig. 2, the data transfer method may include at least the steps of:
step 201, determining a key pair corresponding to target data to be transferred, and querying a proof construction rule of the target data at a target object.
Wherein the key pair includes a public key and a private key.
Specifically, when the transferor wants to trade and transfer a certain target data, the transferor may create a key pair < pubkey, privkey > in advance, where the key pair includes a public key pubkey and a private key privkey corresponding to the public key, and then lock the public key, the certification construction rule and the target data and upload the same to the target object. After determining the key pair corresponding to the target data, the terminal may query at the target object according to the public key in the key pair to find the target data in the target object, and obtain the proof construction rule required for activating the transfer transaction of the target data, so as to construct the data proof capable of being verified by the target object according to the proof construction rule in the subsequent step. The target data may be asset data such as a recharge telephone charge, a purchase card recharge balance, a game ticket, etc., qualification data such as internal measurement qualification, activation qualification, use qualification, etc., of an application program, or other tradable data. The target object may be an intelligent contract of the transaction platform, the intelligent contract may include a Map data structure, a key value of the Map data structure is a public key, a value is corresponding target data, and the intelligent contract may be a decentralized application DApps of the transaction platform, or may be other realizable technical objects. The transaction platform can be arranged in a blockchain system, any blockchain node in the blockchain system can access the transaction platform and interact, the transaction platform can also be arranged in a centralized server system, the transaction platform can be accessed and interact through the main server of the centralized server system, and the transaction platform can also be arranged in other realizable systems. The proof construction rule may be a construction rule of a specific proof data value, and the data proof generated by signing the specific value by the private key can be verified by the target object.
As an example, the manner in which the terminal determines the key pair may be that when the transferor wants to transfer the target data to the transferee, the transferor sends the key pair to the second terminal used by the transferee through the first terminal used by itself, and the second terminal of the transferee may determine the specific public key and private key in the key pair after receiving the key pair. The transferee may also privately notify the key pair to the transferee, and the transferee outputs and stores the key pair on the second terminal used by itself. Alternatively, the transferor may store the key pair in advance in a designated application, and when the transferor wants to transfer the target data to the transferee, an instruction is sent to the application, and the application sends the key pair to the transferee. Other realizable key pair determination approaches are also possible.
As an example, after obtaining the key pair, the transferee may select the target data of the present transfer transaction by pressing and clicking on the corresponding application program as shown in fig. 3. After receiving a pressing instruction generated when the transferee presses and clicks, the terminal responds to the pressing instruction to select a target object, and further performs communication interaction with the target object so as to inquire the proving construction rule of the target data.
Step 203, constructing a data certificate based on the private key and the certificate construction rule, and generating an assignment signature based on the data certificate.
Specifically, the proof construction rule indicates a construction signature mode of the data value, the terminal constructs a corresponding data value according to the proof construction rule, and signs the data value through the private key to construct and obtain the data proof. After obtaining the data certificate, the terminal may use the data certificate as a component to generate a transfer signature, and in a subsequent step, interact with the target object through the transfer signature to obtain the target data. The data attestation may be generated by the terminal by acquiring corresponding data construction after determining the private key and the attestation construction rule, or may be generated by the terminal by displaying the private key and the attestation construction rule after determining the private key and the attestation construction rule, the transferee inputs the data attestation by itself according to the displayed private key and attestation construction rule, and the terminal constructs the data attestation according to the input instruction of the user, or may be in other realisable attestation construction modes.
As an example, assuming that each target data will display a piece of encoded public_code on the transaction platform, the proof build rule may be "public_code+ac_name", which is the account name that initiated the transfer transaction. For example, public_code of target data disclosed on the transaction platform is 1234, the account name is alice, and the content signed by the private key is "1234+alice". The final constructed data proof may be a byte array.
As yet another example, the transfer signature may have a predetermined fixed signature pattern, such as tx { public, proof }, where public is the public key of the key pair and proof is data. And generating the transfer signature according to the signature mode. In other embodiments, the signature manner of the transfer signature may also be dynamically randomly generated.
Step 205, the transfer signature is sent to the target object, and after verification success information is received, the target data is obtained from the target object.
Wherein the transfer signature is to be verified by the target object based on the public key.
Specifically, after generating the transfer signature, the terminal may send the transfer signature to the target object. Since the target object also stores the public key in the key pair, the target object can verify the transfer signature signed by the private key through the public key. If the public key and the private key can be corresponding, and the format and the content of the transfer signature meet the requirement that the transfer signature corresponds to the target data, the target object considers that the terminal sending the transfer signature can acquire the target data, and therefore the target object can send verification success information to the terminal. After receiving the verification success information, the terminal can obtain target data from the target object, if the target data is asset class data, the terminal can directly obtain corresponding assets, and if the target data is qualification class data, the owner of the qualification class data can be modified into the terminal corresponding to the transferee.
As an optional implementation manner of this specification, after the acquiring the target data from the target object, the method further includes:
sending a control instruction to the target object, wherein the control instruction is used for deleting the public key stored by the target object;
and sending transfer completion information to the transfer object.
Specifically, after the terminal acquires the target data, the remaining additional data information such as the corresponding public key and the like, which is not stored in the target object, can be deleted so as to reduce redundant data. Specifically, the terminal may send a control instruction to the target object, and after receiving the control instruction, the target object may respond to the control instruction and delete the public key corresponding to the target data stored in the terminal. In addition, the terminal may send transfer completion information to the transfer object, that is, the terminal used by the transferor, to inform the transferor that the transfer transaction of the target data is completed.
As an option to the embodiments of the present specification, the method further includes:
and after receiving the verification failure information, displaying the verification failure information, and displaying the data certification and the transfer signature.
Specifically, the user selects wrong target data, or the user writes the wrong private key, or the terminal may have errors in the process of obtaining data information required by data certification, which may cause that the finally generated transaction signature cannot be matched with the public key of the target data, resulting in failure of the verification process in the target object. In this case, the target object may send verification failure information to the terminal, so as to inform the terminal that the verification fails and that the transfer transaction cannot be performed. The terminal may display the verification failure information to inform the transferee of the verification failure, and may display the data certificate generated before and the transfer signature together, so that the transferee manually confirms whether the data generated before has a problem. If the transferee finds a problem, a modification instruction can be generated by a modification operation for the terminal to display the content, so that the terminal modifies the data certification and/or the transfer signature according to the modification instruction, and re-sends the transfer signature to the target object for re-authentication after modification.
In the embodiment of the present specification, the terminal may construct a data certificate using a private key signature through a key pair obtained from the transferor and a certificate construction rule queried at the target object, and generate a transfer signature therefrom. And verifying the transfer signature in the target object according to the public key to obtain the target data transferred by the transfer party. The whole process can be completed by interaction between the transferee and the target object of the platform, the transferee does not need to actively participate and operate as a third party, and the user experience of the transferee in the transfer flow is good. And the whole interaction process is completely decentralised, and can be applied to a decentralised platform.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
As yet another alternative of the embodiments of the present disclosure, referring to fig. 4, fig. 4 shows an overall flowchart of yet another data transfer method provided by the embodiments of the present disclosure, where the data transfer method may be used in a terminal.
As shown in fig. 4, the data transfer method may include at least the steps of:
step 401, determining a key pair corresponding to target data to be transferred, and querying parameter data and proof construction rules of the target data at a target object.
Specifically, in some cases, the target data used by the transferor to transfer the transaction is not a specific data object, but may generally refer to a large class of data, and during the transfer transaction, the transferee needs to determine which specific class of data needs to be picked up by itself, and inform the target object through the certification information and/or the transfer signature, so that the target object can send specific data of a certain class required by the transferee to the terminal of the transferee. Therefore, the transferor may bind the stored content in the target object in advance, and may have parameter data in addition to the public key and the proof construction rule, where the parameter data is used to represent a data major class corresponding to the target data and a specific type of retrievable data under the major class.
As one example, assuming that the target data is a sub-meeting nft asset, and the sub-meeting nft asset has three specific categories, basketball, football, and volleyball, respectively, the parameter data may include basketball, football, and volleyball. The attestation construction rules may also include a filling manner of the parameter data, so that the finally generated attestation information and/or the transfer signature includes a specific parameter data selected by the transferor. Thus, after the subsequent target object is successfully verified, specific target data can be sent to the terminal.
Step 403, displaying the parameter data, and when a selection instruction is detected, determining target parameter data in the parameter data in response to the selection instruction.
Specifically, as shown in fig. 5, the terminal may display each parameter data in the interface, and the user may select a specific one of the target parameter data by clicking the touch screen according to his own requirement. After the user selects the target parameter data, a corresponding selection instruction is generated in the terminal. The terminal responds to the selection instruction after detecting the selection instruction, and further determines target parameter data selected by the user from the parameter data. Depending on the actual specific type of target data and the transfer transaction, only one target parameter data may be selected from the parameter data, or a plurality of target parameter data may be selected simultaneously.
And 405, filling in the proving information based on the proving construction rule, and signing the filled proving information based on the private key to obtain the data proving.
Wherein the certification information includes target parameter data.
Specifically, the terminal may obtain, according to the attestation construction rule, each data required for determining to fill in the attestation information, and fill in and combine each data in sequence according to the attestation construction rule, so as to obtain the attestation information. Meanwhile, the terminal can also carry out the front of the filled proving information through the private key, and finally, the data proving proof is obtained.
As an example, assuming that each destination data will show a piece of encoded public_code on the transaction platform, the proof build rule may be "public_code+ac_name+data", ac_name is the account name that initiates the transfer transaction, and data is the destination parameter data. For example, public_code of target data disclosed on the transaction platform is 1234, account name is alice, target parameter data is abc, and content of private key signature is "1234+alice+abc". The final constructed data proof may be a byte array.
And step 407, filling in the public key, the target parameter data and the data certificate based on a preset transfer signature template to obtain a transfer signature.
Specifically, the target data may be preset with a corresponding assignment signature template, where the assignment signature template may be obtained together with the key pair or may be obtained from the target object. The terminal will fill in the public key, the target parameter data and the data certificate according to the data type and the data sequence specified in the transfer signature template to generate the transferred signature.
As an example, the transfer signature may have a predetermined fixed signature pattern, such as tx { pubkey, data, proof }, where pubkey is the public key of the key pair, data is the target parameter data, proof is the data proof. And generating the transfer signature according to the signature mode.
And 409, sending the transfer signature to the target object, and acquiring the target data from the target object after receiving the verification success information.
Wherein the transfer signature is to be verified by the target object based on the public key.
Specifically, step 409 may refer to step 203, which is not described herein.
In the embodiment of the specification, the terminal can construct rules through the key pair obtained from the transferor and the parameter data and the certification queried at the target object, and display the parameter data to the user to determine the target parameter data selected by the user. Then, the terminal may construct certification information using the certification construction rule and the target parameter data, and construct data certification by private key signature, thereby generating a transfer signature according to a preset transfer signature template. And verifying the transfer signature in the target object according to the public key to obtain the target data transferred by the transfer party. The whole process can be completed by interaction between the transferee and the target object of the platform, the transferee does not need to actively participate and operate as a third party, and the user experience of the transferee in the transfer flow is good. And the transferee can select the target parameter data according to the own demand and generate corresponding data evidence to get the determined target data of a specific type when actually obtaining the target data without limiting the specific type of the target data when transferring the target data, and the transferee has higher flexibility in transferring transaction.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Referring next to fig. 6, fig. 6 is a schematic structural diagram of a data transfer device according to an embodiment of the present disclosure. It should be noted that, the data transfer device shown in fig. 6 is configured to perform the method of the embodiment shown in fig. 2 of the present application, and for convenience of explanation, only a portion relevant to the embodiment of the present application is shown, and specific technical details are not disclosed, referring to the embodiment shown in fig. 2 of the present application.
As shown in fig. 6, the data transfer apparatus may include at least:
a determining module 601, configured to determine a key pair corresponding to target data to be transferred, and query, at a target object, a proof construction rule of the target data, where the key pair includes a public key and a private key;
a construction module 602 for constructing a data certificate based on the private key and a certificate construction rule, and generating a transfer signature based on the data certificate;
and a sending module 603, configured to send the transfer signature to the target object, and after receiving verification success information, obtain the target data from the target object, where the transfer signature is used for being verified by the target object based on the public key.
As an option to the embodiment of the present specification, the determining module 601 is specifically configured to:
inquiring parameter data and proof construction rules of the target data at a target object;
the construction module 602 is specifically configured to:
and constructing a data certificate based on the target parameter data, the private key and the certificate construction rule.
As an option to the embodiment of the present specification, the construction module 602 is specifically further configured to:
and displaying the parameter data, and responding to the selection instruction when the selection instruction is detected, and determining target parameter data in the parameter data.
As an option to the embodiment of the present specification, the construction module 602 is specifically further configured to:
filling in proving information based on proving construction rules, signing the filled proving information based on the private key, and obtaining data proving, wherein the proving information comprises target parameter data.
As an option to the embodiment of the present specification, the construction module 602 is specifically further configured to:
and filling in the public key, the target parameter data and the data certificate based on a preset transfer signature template to obtain a transfer signature.
As an option of the embodiment of the present specification, the sending module 603 is specifically configured to:
sending a control instruction to the target object, wherein the control instruction is used for deleting the public key stored by the target object;
and sending transfer completion information to the transfer object.
As an option of the embodiment of the present specification, the sending module 603 is specifically configured to:
and after receiving the verification failure information, displaying the verification failure information, and displaying the data certification and the transfer signature.
It will be apparent to those skilled in the art that the embodiments of the present application may be implemented in software and/or hardware. "Unit" and "module" in this specification refer to software and/or hardware capable of performing a specific function, either alone or in combination with other components, such as Field programmable gate arrays (Field-Programmable Gate Array, FPGAs), integrated circuits (Integrated Circuit, ICs), etc.
The processing units and/or modules of the embodiments of the present application may be implemented by an analog circuit that implements the functions described in the embodiments of the present application, or may be implemented by software that executes the functions described in the embodiments of the present application.
Referring next to fig. 7, fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
As shown in fig. 7, the electronic device 700 may include: at least one processor 701, at least one network interface 704, a user interface 703, memory 705, and at least one communication bus 702.
Wherein the communication bus 702 may be used to facilitate communications among the various components described above.
The user interface 703 may include keys, and the optional user interface may also include a standard wired interface, a wireless interface, among others.
The network interface 704 may include, but is not limited to, a bluetooth module, an NFC module, a Wi-Fi module, and the like.
Wherein the processor 701 may include one or more processing cores. The processor 701 utilizes various interfaces and lines to connect various portions of the overall electronic device 700, perform various functions of the electronic device 700, and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 705, and invoking data stored in the memory 705. Alternatively, the processor 701 may be implemented in at least one hardware form of DSP, FPGA, PLA. The processor 701 may integrate one or a combination of several of a CPU, GPU, modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 701 and may be implemented by a single chip.
The memory 705 may include RAM or ROM. Optionally, the memory 705 comprises a non-transitory computer readable medium. Memory 705 may be used to store instructions, programs, code, sets of codes, or instruction sets. The memory 705 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, etc.; the storage data area may store data or the like referred to in the above respective method embodiments. The memory 705 may also optionally be at least one storage device located remotely from the processor 701. As shown in fig. 7, an operating system, a network communication module, a user interface module, and program instructions may be included in the memory 705, which is a type of computer storage medium.
In particular, the processor 701 may be configured to invoke a data transfer application stored in the memory 705 and to perform in particular the following operations:
determining a key pair corresponding to target data to be transferred, and inquiring a proof construction rule of the target data at a target object, wherein the key pair comprises a public key and a private key;
constructing a data certificate based on the private key and a certificate construction rule, and generating an assignment signature based on the data certificate;
and sending the transfer signature to the target object, and after receiving verification success information, acquiring the target data from the target object, wherein the transfer signature is used for being verified by the target object based on the public key.
As an option of the embodiment of the present specification, the querying, at the target object, the proof construction rule of the target data includes:
inquiring parameter data and proof construction rules of the target data at a target object;
the constructing a data certificate based on the private key and a certificate construction rule includes:
and constructing a data certificate based on the target parameter data, the private key and the certificate construction rule.
As an option of an embodiment of the present specification, before the building of the data certificate based on the target parameter data, the private key and the certificate building rule, the method further includes:
and displaying the parameter data, and responding to the selection instruction when the selection instruction is detected, and determining target parameter data in the parameter data.
As an option of the embodiment of the present specification, the constructing data certificate based on the target parameter data, the private key, and the certificate construction rule includes:
filling in proving information based on proving construction rules, signing the filled proving information based on the private key, and obtaining data proving, wherein the proving information comprises target parameter data.
As an option of the embodiment of the present specification, the generating an assignment signature based on the data proof includes:
and filling in the public key, the target parameter data and the data certificate based on a preset transfer signature template to obtain a transfer signature.
As an optional implementation manner of this specification, after the acquiring the target data from the target object, the method further includes:
sending a control instruction to the target object, wherein the control instruction is used for deleting the public key stored by the target object;
and sending transfer completion information to the transfer object.
As an option to the embodiments of the present specification, the method further includes:
and after receiving the verification failure information, displaying the verification failure information, and displaying the data certification and the transfer signature.
The present description also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method. The computer readable storage medium may include, among other things, any type of disk including floppy disks, optical disks, DVDs, CD-ROMs, micro-drives, and magneto-optical disks, ROM, RAM, EPROM, EEPROM, DRAM, VRAM, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some service interface, device or unit indirect coupling or communication connection, electrical or otherwise.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be performed by hardware associated with a program that is stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic or optical disk, and the like.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.

Claims (16)

1. A data transfer method comprising:
determining a key pair corresponding to target data to be transferred, and inquiring a proof construction rule of the target data at a target object, wherein the key pair comprises a public key and a private key;
constructing a data certificate based on the private key and a certificate construction rule, and generating an assignment signature based on the data certificate;
and sending the transfer signature to the target object, and after receiving verification success information, acquiring the target data from the target object, wherein the transfer signature is used for being verified by the target object based on the public key.
2. The method of claim 1, the querying the attestation build rule of the target data at a target object, comprising:
inquiring parameter data and proof construction rules of the target data at a target object;
the constructing a data certificate based on the private key and a certificate construction rule includes:
and constructing a data certificate based on the target parameter data, the private key and the certificate construction rule.
3. The method of claim 2, prior to constructing a data attestation based on target parameter data, the private key, and attestation construction rules, further comprising:
and displaying the parameter data, and responding to the selection instruction when the selection instruction is detected, and determining target parameter data in the parameter data.
4. The method of claim 2, the constructing data attestation based on target parameter data, the private key, and attestation construction rules, comprising:
filling in proving information based on proving construction rules, signing the filled proving information based on the private key, and obtaining data proving, wherein the proving information comprises target parameter data.
5. The method of claim 2, the generating a transfer signature based on the data attestation, comprising:
and filling in the public key, the target parameter data and the data certificate based on a preset transfer signature template to obtain a transfer signature.
6. The method of claim 1, further comprising, after the obtaining the target data from the target object:
sending a control instruction to the target object, wherein the control instruction is used for deleting the public key stored by the target object;
and sending transfer completion information to the transfer object.
7. The method of claim 1, the method further comprising:
and after receiving the verification failure information, displaying the verification failure information, and displaying the data certification and the transfer signature.
8. A data transfer apparatus comprising:
the determining module is used for determining a key pair corresponding to target data to be transferred and inquiring a proof construction rule of the target data at a target object, wherein the key pair comprises a public key and a private key;
a construction module for constructing a data certificate based on the private key and a certificate construction rule, and generating a transfer signature based on the data certificate;
and the transmission module is used for transmitting the transfer signature to the target object, acquiring the target data from the target object after receiving the verification success information, and the transfer signature is used for being verified by the target object based on the public key.
9. The apparatus of claim 8, the determining module is specifically configured to:
inquiring parameter data and proof construction rules of the target data at a target object;
the construction module is specifically used for:
and constructing a data certificate based on the target parameter data, the private key and the certificate construction rule.
10. The apparatus of claim 9, the building block being further specifically configured to:
and displaying the parameter data, and responding to the selection instruction when the selection instruction is detected, and determining target parameter data in the parameter data.
11. The apparatus of claim 9, the building block being further specifically configured to:
filling in proving information based on proving construction rules, signing the filled proving information based on the private key, and obtaining data proving, wherein the proving information comprises target parameter data.
12. The apparatus of claim 9, the building block being further specifically configured to:
and filling in the public key, the target parameter data and the data certificate based on a preset transfer signature template to obtain a transfer signature.
13. The apparatus of claim 8, the sending module is specifically configured to:
sending a control instruction to the target object, wherein the control instruction is used for deleting the public key stored by the target object;
and sending transfer completion information to the transfer object.
14. The apparatus of claim 8, the sending module is specifically configured to:
and after receiving the verification failure information, displaying the verification failure information, and displaying the data certification and the transfer signature.
15. An electronic device includes a processor and a memory;
the processor is connected with the memory;
the memory is used for storing executable program codes;
the processor runs a program corresponding to executable program code stored in the memory by reading the executable program code for performing the method according to any one of claims 1-7.
16. A computer readable storage medium having stored thereon a computer program having instructions stored therein, which when run on a computer or processor, cause the computer or processor to perform the steps of the method according to any of claims 1-7.
CN202311433265.6A 2023-10-31 2023-10-31 Data transfer method and device, electronic equipment and storage medium Pending CN117391706A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311433265.6A CN117391706A (en) 2023-10-31 2023-10-31 Data transfer method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311433265.6A CN117391706A (en) 2023-10-31 2023-10-31 Data transfer method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117391706A true CN117391706A (en) 2024-01-12

Family

ID=89466404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311433265.6A Pending CN117391706A (en) 2023-10-31 2023-10-31 Data transfer method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117391706A (en)

Similar Documents

Publication Publication Date Title
CN110163004B (en) Block chain generation method, related equipment and system
US11621855B2 (en) Electronic device and method for managing blockchain address using the same
CN107592964B (en) System, apparatus and method for multi-owner transfer of ownership of a device
CN108898389A (en) Based on the content verification method and device of block chain, electronic equipment
CN109635536B (en) Identity data access control method, device and system
EP3526721A1 (en) Method, device and system for validating sensitive user data transactions within trusted circle
US10270757B2 (en) Managing exchanges of sensitive data
US20180248685A1 (en) Systems, Devices, and Methods for In-Field Authenticating of Autonomous Robots
CN104160653A (en) Multi-factor certificate authority
CN106576043A (en) Virally distributable trusted messaging
CN110601858B (en) Certificate management method and device
US20220239509A1 (en) Method for storing and recovering key for blockchain-based system, and device therefor
CN109635572A (en) A kind of contract signing method, apparatus and terminal device based on block chain
US20210241270A1 (en) System and method of blockchain transaction verification
CN109194651A (en) A kind of identity identifying method, device, equipment and storage medium
CN109922027A (en) A kind of trusted identity authentication method, terminal and storage medium
CN105635168A (en) Off-line transaction device and security key using method thereof
CN113474804A (en) Transaction and account verification method, device and storage medium of digital currency
JP2022539283A (en) A method and system for validating blockchain data stored in a storage format different from the blockchain
CN111464295B (en) Bank card making method and device
CN115362461A (en) Electronic device for transmitting cryptocurrency to a blockchain account and method for operating the electronic device
CN111666590A (en) Distributed file secure transmission method, device and system
CN110602218A (en) Method and related device for assembling cloud service in user-defined manner
CN109547428A (en) It verifies password and accesses method, system and the storage medium of server
CN117391706A (en) Data transfer method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination