CN118278957A - NFT-based multi-account payment management method, device, equipment and storage medium - Google Patents

NFT-based multi-account payment management method, device, equipment and storage medium Download PDF

Info

Publication number
CN118278957A
CN118278957A CN202410687133.4A CN202410687133A CN118278957A CN 118278957 A CN118278957 A CN 118278957A CN 202410687133 A CN202410687133 A CN 202410687133A CN 118278957 A CN118278957 A CN 118278957A
Authority
CN
China
Prior art keywords
data
nft
payment
hash
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410687133.4A
Other languages
Chinese (zh)
Inventor
李家琦
王永峰
白培基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sunson Tech Co ltd
Original Assignee
Shenzhen Sunson Tech Co ltd
Filing date
Publication date
Application filed by Shenzhen Sunson Tech Co ltd filed Critical Shenzhen Sunson Tech Co ltd
Publication of CN118278957A publication Critical patent/CN118278957A/en
Pending legal-status Critical Current

Links

Abstract

The application relates to the technical field of data processing, and discloses a multi-account payment management method, device and equipment based on NFT (network File transfer processing), and a storage medium. The method comprises the following steps: encrypting the identity information of the user to obtain encrypted identity information; carrying out hash processing on the encrypted identity information to obtain an identity hash value; associating the identity hash value with authority data of the user to generate initial NFT data; the intelligent contract is deployed in a preset blockchain platform, and initial NFT data is uplink through the intelligent contract, so that target NFT data of a user is obtained; collecting a payment request initiated by a user, and verifying NFT data of the payment request to obtain a verification result; according to the verification result and the authority data, the payment operation is executed and the payment data is recorded, and the security of multi-account payment management based on the NFT is improved.

Description

NFT-based multi-account payment management method, device, equipment and storage medium
Technical Field
The present application relates to the field of data processing, and in particular, to a multi-account payment management method, device, equipment and storage medium based on NFT.
Background
In current multi-account payment systems, a user is required to manage multiple payment accounts and corresponding security measures, such as passwords and authentication processes. These systems typically rely on a centralized database to store and manage the identity of the user and its account authority information. This approach, while common, relies on traditional security mechanisms and centralized authentication systems, such as two-factor authentication, password protection, etc. However, these systems face a number of challenges, including data security, privacy protection, and complexity of cross-platform operation.
Existing multi-account payment systems often cannot effectively resist security threats such as data tampering, identity theft, and the like. Centralized data management also increases the risk of data leakage, especially when subjected to network attacks. Furthermore, existing systems tend to be inefficient in handling cross-border payments and multi-currency account management, and lack sufficient transparency and traceability, which limits their range of application in the global economy.
Disclosure of Invention
The application provides a multi-account payment management method, device and equipment based on an NFT (network File transfer processing), and a storage medium, which are used for improving the security of multi-account payment management based on the NFT.
In a first aspect, the present application provides an NFT-based multi-account payment management method, including: encrypting the identity information of the user to obtain encrypted identity information;
carrying out hash processing on the encrypted identity information to obtain an identity hash value;
associating the identity hash value with authority data of the user to generate initial NFT data;
deploying an intelligent contract in a preset blockchain platform, and uploading the initial NFT data through the intelligent contract to obtain target NFT data of the user;
Collecting a payment request initiated by the user, and verifying NFT data of the payment request to obtain a verification result;
And executing payment operation according to the verification result and the permission data and recording payment data.
With reference to the first aspect, in a first implementation manner of the first aspect of the present application, the encrypting the identity information provided by the user to obtain encrypted identity information includes:
Extracting information from the identity information to obtain name data, address information and biological identification data;
Carrying out character string formatting processing on the name to obtain standardized name data, and simultaneously carrying out geocoding on the address information to obtain geocoded data;
vector conversion is carried out on the biological identification data to obtain a biological characteristic vector;
Performing data splicing on the standardized name data and the geocode data to obtain an identity information character string;
Encrypting the identity information character string through an AES encryption algorithm to obtain an encrypted character string;
carrying out hash value analysis on the encrypted character string through an SHA-256 algorithm to obtain an initial hash value;
performing the memorial encryption on the biological feature vector through an RSA encryption algorithm to obtain an encrypted feature vector;
carrying out hash processing on the encrypted feature vector to obtain a biological feature hash value;
and combining the initial hash value and the biological characteristic hash value to obtain the encrypted identity information.
With reference to the first aspect, in a second implementation manner of the first aspect of the present application, the hashing the encrypted identity information to obtain an identity hash value includes:
Performing Base64 coding processing on the encrypted identity information to obtain a Base64 coding character string;
partitioning the Base64 coded character string to obtain a data block array;
Performing independent hash processing on each data block in the data block array to obtain a data block hash array;
Sorting the data block hash arrays to obtain sorted hash arrays;
Combining the ordered hash arrays to obtain a long hash character string;
compressing the long hash character string to obtain a compressed hash character string;
Performing entropy analysis on the compressed hash character string to obtain entropy data;
And carrying out threshold judgment processing on the entropy value data to obtain a judgment result, and carrying out secondary hash processing on the compressed hash character string according to the judgment result to obtain the identity hash value.
With reference to the first aspect, in a third implementation manner of the first aspect of the present application, the associating the identity hash value with authority data of the user, generating initial NFT data includes:
Formatting the authority data to obtain standardized authority data;
coding the standardized authority data to obtain authority data JSON objects;
encrypting the authority data JSON object to obtain encrypted authority data;
Performing association processing on the encryption authority data and the identity hash value to obtain an association result;
carrying out serialization processing on the association result to obtain serialized NFT data;
And compressing the serialized NFT data through a GZIP algorithm to obtain the initial NFT data.
With reference to the first aspect, in a fourth implementation manner of the first aspect of the present application, the deploying an intelligent contract in a preset blockchain platform, and uplink the initial NFT data through the intelligent contract, to obtain target NFT data of the user, includes:
compiling preset intelligent contract codes to obtain compiled contract codes;
performing deployment test processing on the compiled contract code to obtain a test result;
Code optimization is carried out on the compiled contract code according to the test result, and a target contract code is obtained;
And deploying an intelligent contract on the blockchain platform through the target contract code, and uplink the initial NFT data through the intelligent contract to obtain target NFT data of the user.
With reference to the first aspect, in a fifth implementation manner of the first aspect of the present application, the collecting a payment request initiated by the user, and verifying NFT data of the payment request to obtain a verification result includes:
Receiving the payment request, and carrying out data extraction on the payment request to obtain NFT extraction data;
decrypting the NFT extracted data to obtain decrypted NFT extracted data;
and carrying out data verification on the decrypted NFT extracted data and the target NFT data to obtain the verification result.
With reference to the first aspect, in a sixth implementation manner of the first aspect of the present application, the executing a payment operation according to the verification result and the permission data and recording payment data includes:
Extracting a payment channel route according to the verification result to obtain payment channel route data;
Encrypting the payment channel routing data to obtain encrypted payment information;
and executing payment operation through the encrypted payment information based on the authority data and recording the payment data.
In a second aspect, the present application provides an NFT-based multi-account payment management apparatus, the NFT-based multi-account payment management apparatus comprising:
the encryption module is used for carrying out encryption processing on the identity information of the user to obtain encrypted identity information;
the processing module is used for carrying out hash processing on the encrypted identity information to obtain an identity hash value;
the association module is used for associating the identity hash value with the authority data of the user and generating initial NFT data;
The deployment module is used for deploying intelligent contracts in a preset blockchain platform and uploading the initial NFT data through the intelligent contracts to obtain target NFT data of the user;
The verification module is used for collecting a payment request initiated by the user, verifying NFT data of the payment request and obtaining a verification result;
and the recording module is used for executing payment operation according to the verification result and the permission data and recording payment data.
A third aspect of the present application provides an NFT-based multi-account payment management device, comprising: a memory and at least one processor, the memory having instructions stored therein; the at least one processor invokes the instructions in the memory to cause the NFT-based multi-account payment management device to perform the NFT-based multi-account payment management method described above.
A fourth aspect of the present application provides a computer-readable storage medium having instructions stored therein that, when executed on a computer, cause the computer to perform the NFT-based multi-account payment management method described above.
According to the technical scheme provided by the application, the characteristics of the NFT for storing the identity and authority data of the user are utilized, so that the security and the non-tamper property of the data can be obviously improved. The uniqueness of NFT and combination with blockchain allows each user's identity information and payment rights to be uniquely tagged and stored on the blockchain, which not only prevents unauthorized access, but also is effective against attempts to tamper or falsify. Secondly, by linking up NFT data, the method of the present application can ensure that all payment activities and rights changes are recorded in a permanent blockchain ledger, which increases the transparency of the overall system so that any transaction can be tracked and validated, thereby enhancing supervision and user trust of the system. In addition, the automation and efficiency of the method are further enhanced by the intelligent contract, verification and payment processing based on preset rules are automatically executed by the intelligent contract, the need of manual intervention is reduced, and the speed and accuracy of transaction processing are improved. Such automated processing also relieves operating pressure in conventional payment systems, which is particularly advantageous when processing large numbers of transactions. Moreover, the present application supports cross-platform and cross-border payments because NFT and blockchain technologies are de-centralized and borderless in nature, which provides greater flexibility and extensibility for global commerce and personal payments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained based on these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of one embodiment of a multi-account payment management method based on NFT in an embodiment of the application;
fig. 2 is a schematic diagram of an embodiment of an NFT-based multi-account payment management device according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a multi-account payment management method, device and equipment based on NFT (network File transfer technology) and a storage medium. The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
For ease of understanding, a specific flow of an embodiment of the present application is described below with reference to fig. 1, where an embodiment of an NFT-based multi-account payment management method in an embodiment of the present application includes:
step S101, encrypting the identity information of the user to obtain encrypted identity information;
it may be understood that the executing body of the present application may be a multi-account payment management device based on NFT, and may also be a terminal or a server, which is not limited herein. The embodiment of the application is described by taking a server as an execution main body as an example.
Specifically, information extraction is performed on the identity information to obtain name data, address information and biometric data. Name data and address information are typically used to verify the basic identity of the user, while biometric data provides a secure means of verification. And carrying out character string formatting processing on the name to ensure that the name data accords with a standard format of subsequent processing, such as converting all letters into capitalization or deleting unnecessary spaces and punctuations, so as to obtain standardized name data. Meanwhile, address information is converted by means of geocoding, which is a process of converting an address into geographic coordinates, so that specific functions based on geographic positions, such as regional limit payment, and the like, are realized in the system. The conversion of biometric data such as fingerprint or facial recognition information into biometric vectors enables efficient use of the biometric data in a digital environment and enhances consistency and security of data processing. And performing data splicing on the standardized name data and the geocode data to obtain a complete identity information character string. And encrypting the identity information character string by an AES encryption algorithm to obtain an encrypted character string. And carrying out hash value analysis on the encrypted character string through an SHA-256 algorithm to obtain an initial hash value. SHA-256 belongs to a family of hash functions used in various security applications, particularly digital signatures and other forms of authentication, to ensure that the integrity of information has not been tampered with. Meanwhile, the biometric vector is encrypted in a memorial manner by an RSA encryption algorithm, which is an asymmetric encryption technique, which ensures that biometric data can be securely transmitted even in a public channel. The encrypted biological characteristic vector is subjected to hash processing to generate a biological characteristic hash value, and the hash value is combined with the initial hash value to finally form encrypted identity information.
Step S102, carrying out hash processing on the encrypted identity information to obtain an identity hash value;
Specifically, the Base64 encoding process is performed on the identity information encrypted by the AES algorithm, the encrypted character string is converted into the Base64 format, and compatibility and transmission readability of the encrypted data in the processing process are ensured. And performing block processing on the Base64 coded character string to obtain a data block array. And independently hashing each data block in the data block array to obtain the data block hash array, and maintaining high efficiency and reaction rate by using a hash algorithm such as SHA-256. The obtained hash values of each data block form a data block hash array, the hash values are subjected to sorting treatment for enhancing the randomness and the safety of the data, and the sorted hash array is a method for rearranging the hash values, so that any possible modes or rules can be further eliminated. And combining the ordered hash arrays to obtain a long hash character string, and integrating the hash information of all the data blocks. In order to optimize storage and further processing, the long hash character strings are compressed, so that the storage space of data is reduced, and the processing speed is increased. And (3) carrying out entropy analysis on the compressed hash character string, wherein the entropy is an important index for measuring the randomness of the data, and the high entropy means that the data has high randomness and unpredictability. And comparing the entropy data with a preset safety threshold value, obtaining a judging result through threshold value judging processing, and if the entropy value does not reach an expected threshold value, indicating that potential safety hazards possibly exist in the data, performing secondary hash processing on the compressed hash character string to obtain an identity hash value.
Step S103, associating the identity hash value with the authority data of the user to generate initial NFT data;
Specifically, the rights data provided by the user is formatted in the form of standardized rights data. The formatting process mainly comprises verifying the integrity of the data, correcting data format errors and converting the data into a unified standard format. And the standardized authority data is encoded to obtain the authority data JSON object, so that the authority data is easy to store and transmit, and meanwhile, the subsequent encryption and processing operations are also convenient. The JSON format is widely used because of its clear structure and easy parsing, ensuring high readability and interoperability of rights data. In order to protect the privacy and safety of data, the authority data JSON object is encrypted, so that the safety of the encrypted data is effectively ensured, and unauthorized access and tampering are prevented. And carrying out association processing on the encryption authority data and the identity hash value to obtain an association result. Binding the identity of the user with the authority of the user, ensuring that each NFT has uniqueness and specific identity-authority corresponding relation, and obtaining a composite structure containing encrypted authority data and an identity hash value. The correlation result is serialized to convert the data structure into a storable or transmittable data format, such as a binary format, so as to optimize the data storage efficiency and facilitate the transmission in the network. The serialized data is compressed by a GZIP algorithm, which is a widely used data compression algorithm, so that the storage space requirement of the data can be remarkably reduced and the transmission efficiency can be improved. Through compression processing, the initial NFT data finally generated occupies small space, and high-efficiency transmission performance is maintained.
Step S104, intelligent contracts are deployed in a preset blockchain platform, and initial NFT data are uplink through the intelligent contracts, so that target NFT data of a user are obtained;
Specifically, compiling processing is performed on preset intelligent contract codes. Compilation is the process of converting the source code of an intelligent contract into low-level code or bytecode that can be executed by a blockchain platform, thereby ensuring that the contract code is properly interpreted and executed on the blockchain. Compiling intelligent contracts typically involves checking for syntax errors, optimizing code execution efficiency, and ensuring code security, thereby avoiding potential vulnerabilities. And performing deployment test processing on the compiled contract code to obtain a test result. The test process is an important link for verifying the execution performance of compiled contract codes in a simulation environment or test network, and an automatic test tool can be used for simulating various transactions and conditions so as to ensure the stability and functional correctness of intelligent contracts before actual deployment. The test results provide important information about contract performance, functionality, and potential problems. And carrying out necessary code optimization on the compiled contract code according to the test result to obtain the target contract code. Optimization may include correcting errors found, improving the execution efficiency of code, or enhancing security measures of contracts. The smart contract is deployed by deploying object contract code on the selected blockchain platform. Deployment is the process of formally writing an intelligent contract to a blockchain, which typically involves interactions with blockchain nodes, sending a contract code to the blockchain network, and verifying and executing by nodes in the network, ultimately storing the contract on the blockchain. After deployment, the initial NFT data is uplink through the intelligent contract, and the related data of the NFT is converted into records on the blockchain through function call of the contract. These data include the user's identity hash value, encrypted rights data, etc., and the chaining process ensures non-tamper-evident and permanent recording of these data. After successful uplink, the generated target NFT data represents the digital representation of the identity and authority of the user on the blockchain, and necessary technical support and data guarantee are provided for multi-account payment management based on the NFT.
Step S105, collecting a payment request initiated by a user, and verifying NFT data of the payment request to obtain a verification result;
Specifically, a payment request initiated by a user is received, and the safety and the integrity of the request data in the transmission process are ensured through a safe network communication protocol. The received payment request contains critical NFT related data that is extracted for subsequent verification steps. The data extraction process mainly analyzes the NFT identifier and related encryption information in the payment request, so that corresponding NFT information can be ensured to be accurately acquired, and the information is the basis for user authentication and authority verification. And decrypting the NFT extracted data. And (3) decrypting by using an encryption algorithm such as AES or RSA so as to ensure the security and the high efficiency of the decryption process, and obtaining decrypted NFT extraction data. The decrypted NFT extraction data contains the user's identity information and rights data, which are key to validating the payment request. The decrypted data is compared to target NFT data pre-stored on the blockchain. Target NFT data represents the formal identity and authorization information of the user and is the benchmark against which to make the comparison. The data verification process checks whether the two are consistent, including comparing user identity, permission level, payment quota, etc. The verification result decides whether to perform the payment operation. If the verification is successful, indicating that the user has enough rights and the identity information is matched, the payment request is approved to be executed; if the verification fails, the system will reject the payment request and possibly record this event as part of a security audit.
And step S106, executing payment operation according to the verification result and the authority data and recording the payment data.
Specifically, a proper payment channel route is extracted according to the verification result. Different payment requests may need to be processed through different payment channels depending on the geographic location of the user, the transaction amount, or security requirements. The payment channel routing data includes the selection of the payment gateway, the priority of the transaction, and possibly the alternate route. The payment channel routing data is encrypted. The payment channel routing data is encrypted using a strong encryption algorithm such as AES or RSA to protect transaction details from being snooped or tampered with by unauthorized third parties. Encrypting the payment information ensures that the payment information cannot be interpreted even if intercepted during transmission in the network, thereby enhancing the security of the payment. And performing a payment operation based on the rights data of the user. Rights data defines the types of transactions, transaction limits, and other relevant security policies that a user may perform. These rights data are well defined and stored encrypted in the NFT, ensuring that only legitimate and rights-compliant payment operations can be performed. A payment request is initiated at a payment gateway or corresponding financial service provider using the encrypted payment information. The request includes all necessary transaction details, such as the amount of money, the account of the payee, the transaction time, etc., which are transmitted and processed in an encrypted state, ensuring confidentiality and security of the transaction. After successful execution of the payment operation, payment data is recorded, providing transparency and traceability of the transaction history. The payment record includes all key details of the transaction, such as transaction amount, time stamp, account information of the participant, and transaction outcome.
In the embodiment of the application, the characteristics of the NFT for storing the identity and the authority data of the user are utilized, so that the security and the non-tamper property of the data can be obviously improved. The uniqueness of NFT and combination with blockchain allows each user's identity information and payment rights to be uniquely tagged and stored on the blockchain, which not only prevents unauthorized access, but also is effective against attempts to tamper or falsify. Secondly, by linking up NFT data, the method of the present application can ensure that all payment activities and rights changes are recorded in a permanent blockchain ledger, which increases the transparency of the overall system so that any transaction can be tracked and validated, thereby enhancing supervision and user trust of the system. In addition, the automation and efficiency of the method are further enhanced by the intelligent contract, verification and payment processing based on preset rules are automatically executed by the intelligent contract, the need of manual intervention is reduced, and the speed and accuracy of transaction processing are improved. Such automated processing also relieves operating pressure in conventional payment systems, which is particularly advantageous when processing large numbers of transactions. Moreover, the present application supports cross-platform and cross-border payments because NFT and blockchain technologies are de-centralized and borderless in nature, which provides greater flexibility and extensibility for global commerce and personal payments.
In a specific embodiment, the process of executing step S101 may specifically include the following steps:
(1) Extracting information from the identity information to obtain name data, address information and biological identification data;
(2) Carrying out character string formatting processing on the name to obtain standardized name data, and simultaneously carrying out geocoding on address information to obtain geocoded data;
(3) Vector conversion is carried out on the biological identification data to obtain a biological characteristic vector;
(4) Performing data splicing on the standardized name data and the geocode data to obtain an identity information character string;
(5) Encrypting the identity information character string through an AES encryption algorithm to obtain an encrypted character string;
(6) Carrying out hash value analysis on the encrypted character string through an SHA-256 algorithm to obtain an initial hash value;
(7) Performing memorial encryption on the biological feature vector through an RSA encryption algorithm to obtain an encrypted feature vector;
(8) Carrying out hash processing on the encrypted feature vector to obtain a biological feature hash value;
(9) And combining the initial hash value and the biological characteristic hash value to obtain the encrypted identity information.
Specifically, the user's basic identity information is collected from user inputs or databases, which includes the user's full name, address, and biometric data such as fingerprint or facial recognition information. And carrying out character string formatting processing on the name. And ensuring consistency of name data in the system, for example, converting all Chinese characters into pinyin, and removing all spaces and special characters to obtain standardized name data. And meanwhile, performing geocoding processing on the address information, and converting the address information in a text form into geographic coordinates. For example, the region name is converted into latitude and longitude coordinates so that the address data can be used in various geographic information systems. The facial recognition data is vector converted and the biometric data is processed into a series of values that effectively represent the biometric characteristics of the user. Through image processing and machine learning algorithms, it is ensured that the converted vector retains sufficient biometric information and is also suitable for subsequent calculation and comparison. The conversion process may involve measuring key points of the face, such as eye distance, nose length, etc., resulting in a vector of dimension n, where n depends on the feature extraction technique employed. And splicing the standardized name data and the geocode data to form an identity information character string. And encrypting the obtained identity information character string by adopting an AES encryption algorithm. The AES encryption algorithm is a widely used symmetric encryption technique, and can effectively ensure confidentiality of information. During encryption, a key is used to convert the string into a piece of random encrypted text, ensuring that only the system or individual holding the correct key can decrypt. The hash value analysis is carried out on the encrypted character string through the SHA-256 algorithm. SHA-256 is a secure hash algorithm that is capable of generating a hash value of a fixed length (256 bits) from a string of arbitrary length. This hash value is unique to the original data and any minor modification to the original data will produce a significant change in the hash value, thereby ensuring the integrity of the data. Meanwhile, the biological feature vector is encrypted through an RSA algorithm. RSA is an asymmetric encryption technique that uses a pair of public and private keys to encrypt and decrypt data that remains secure even when transmitted in public channels. The encrypted vector is also hashed to generate a biometric hash value. And combining the preliminary hash value and the biological characteristic hash value to obtain final encrypted identity information.
In a specific embodiment, the process of executing step S102 may specifically include the following steps:
(1) Performing Base64 coding processing on the encrypted identity information to obtain a Base64 coding character string;
(2) Partitioning the Base64 coded character string to obtain a data block array;
(3) Performing independent hash processing on each data block in the data block array to obtain a data block hash array;
(4) Sorting the data block hash arrays to obtain sorted hash arrays;
(5) Combining the ordered hash arrays to obtain a long hash character string;
(6) Compressing the long hash character string to obtain a compressed hash character string;
(7) Performing entropy analysis on the compressed hash character string to obtain entropy data;
(8) And carrying out threshold judgment on the entropy value data to obtain a judgment result, and carrying out secondary hash processing on the compressed hash character string according to the judgment result to obtain an identity hash value.
Specifically, base64 encoding processing is performed on the encrypted identity information. Base64 coding is a method of representing arbitrary binary data with 64 characters, and is often used to transmit byte streams where binary data is not supported, such as transmitting picture data in a web page. For example, assuming that the encrypted identity information is a string of binary data, after processing by Base64, the data is converted into a series of printable ASCII characters, which allows the encrypted data to be transmitted or stored in a text form securely in the network. And performing blocking processing on the character string after the Base64 coding, and cutting the long character string into a series of smaller data blocks. The blocks can be processed in parallel, so that the processing efficiency is improved. For example, if the Base64 encoded string is 1024 characters long, it can be divided into 16 blocks of 64 characters long. And carrying out independent hash processing on each data block in the data block array to obtain the data block hash array. A unique hash value is generated for each data block using a secure hash algorithm, such as SHA-256. And ordering the data block hash arrays, so that the probability of hash collision is reduced, randomness is increased in the merging process, and the safety is improved. The ordering may be based on a dictionary order of hash values, from minimum to maximum. The ordered hash arrays are combined into a long hash string. By concatenating all ordered hash values, a larger hash string is formed, with the long string aggregating the hash information of all data blocks. And compressing the long hash character string, reducing the storage space requirement of data by using a compression algorithm such as GZIP and the like, and optimizing the transmission efficiency. The entropy of the data is also affected during compression. And carrying out entropy analysis on the compressed hash character string. Entropy is an indicator of the randomness of data, and high entropy means that data is highly unpredictable and safe. The entropy value of the compressed hash string is measured to ensure that the complexity and security of the data meets predetermined criteria. And performing threshold judgment processing based on the measurement result of the entropy value. If the entropy value does not reach the preset safety threshold, the randomness of the data is insufficient, and potential safety hazards may exist. In this case, the compressed hash string is subjected to a secondary hash process, and SHA-256 or other secure hash algorithm is used again to ensure that the resulting identity hash value is sufficiently secure and random.
In a specific embodiment, the process of executing step S103 may specifically include the following steps:
(1) Formatting the authority data to obtain standardized authority data;
(2) Coding the standardized authority data to obtain authority data JSON objects;
(3) Encrypting the authority data JSON object to obtain encrypted authority data;
(4) Carrying out association processing on the encryption authority data and the identity hash value to obtain an association result;
(5) Carrying out serialization processing on the association result to obtain serialized NFT data;
(6) And compressing the serialized NFT data by using a GZIP algorithm to obtain initial NFT data.
Specifically, the authority data is formatted to obtain standardized authority data. The purpose of formatting is to unify the representation of the data, ensuring consistency and predictability in subsequent processing. And carrying out coding processing on the standardized authority data, and converting the standardized authority data into JSON objects. JSON is a lightweight data exchange format that is easy for machines to parse and generate. And (3) encrypting the JSON object of the authority data, protecting the security of the data in the storage and transmission processes, and preventing unauthorized access and tampering. The encryption algorithm employed may be AES, which is a widely used symmetric encryption algorithm. The encrypted authority data becomes a string of ciphertext, and only the system and the user with the corresponding key can decrypt the encrypted authority data, so that the confidentiality of the data is ensured. And carrying out association processing on the encryption authority data and the identity hash value. The identity hash value is a unique identifier obtained by encrypting and hashing the identity information of the user. By combining the identity hash value with the encrypted rights data, a complete user identity and rights data structure is formed. And carrying out serialization processing on the associated results. Serialization refers to the process of converting a data structure or object state into a storable or transmittable form, and commonly used formats include XML, JSON, or binary formats. The data is serialized into a binary stream for transmission over a network and storage over a blockchain. And compressing the serialized NFT data by using a GZIP algorithm. GZIP is a widely used data compression program, which can effectively reduce the volume of files, reduce the storage cost and improve the transmission efficiency. The initial NFT data is obtained after compression, contains all necessary user identity and rights information, and is stored on the blockchain in a highly compressed and secure format.
In a specific embodiment, the process of executing step S104 may specifically include the following steps:
(1) Compiling preset intelligent contract codes to obtain compiled contract codes;
(2) Deploying test processing is carried out on the compiled contract codes, and test results are obtained;
(3) Code optimization is carried out on the compiled contract code according to the test result, and a target contract code is obtained;
(4) And deploying the intelligent contract on the blockchain platform through the target contract code, and uploading the initial NFT data through the intelligent contract to obtain target NFT data of the user.
Specifically, smart contract code is written. It is assumed that the purpose of this contract is to store and verify NFT data for the user on the blockchain, including a hash of the user's identity and associated rights data. During the writing process, the system needs to ensure that the contract logic is accurate, e.g., the contract should contain functions to accept the identity information of the user, verify the information, and issue or update NFT after the verification is passed. After the programming is completed, the intelligent contract codes are compiled, and the source codes written in the high-level language are converted into low-level languages or byte codes executable by the blockchain. These tools provide compilation functionality and generate ABI and bytecode for contracts. After compiling, performing deployment test on the intelligent contract code. Including deploying contracts on a test network to verify its functionality and performance. The test element may reveal any logical errors or security vulnerabilities in the code. For example, by simulating different interaction scenarios, it is checked whether the contract issues NFT as expected, and whether invalid or malicious input data can be handled correctly. The test results will provide important feedback to guide the next code optimization. And optimizing the intelligent contract code according to the test result to improve the efficiency, the safety or the usability of the intelligent contract code. Code optimization may include reducing computing resources required for contract execution (thereby reducing transaction costs), enhancing security measures (e.g., preventing unauthorized access by adding additional entitlement checks), or improving error handling mechanisms. And obtaining the target contract code after optimization. The intelligent contracts are deployed on the blockchain platform by the object contract code. Contracts are deployed to a selected blockchain network (e.g., an ethernet master network). After successful deployment, the smart contract will become part of the blockchain, accepting and processing external calls. The initial NFT data is uploaded to the blockchain through the interface of the intelligent contract, and is processed according to contract logic to finally generate target NFT data representing user rights and identities.
In a specific embodiment, the process of executing step S105 may specifically include the following steps:
(1) Receiving a payment request, and extracting data from the payment request to obtain NFT extraction data;
(2) Decrypting the NFT extracted data to obtain decrypted NFT extracted data;
(3) And carrying out data verification on the decrypted NFT extraction data and the target NFT data to obtain a verification result.
In particular, the payment request is received through a secure communication protocol, such as HTTPS, so as to ensure that data is not intercepted or tampered during transmission. The received payment request contains encrypted NFT data, and the relevant information is extracted from the encrypted data. The encrypted field in the request is parsed to extract encrypted NFT data, which is typically an encrypted string consisting of a digital signature and user specific rights information. Decrypting the NFT extract data enables the system to access and verify the user identity and rights information contained in the data. The decryption process typically requires the use of a special decryption key that is managed by the payment system in a secure environment. For example, if the AES encryption algorithm is used, the data is decrypted with the corresponding AES key. After decryption is successful, plain text format data containing user rights and identity information, such as user ID, purchase rights class and other relevant information, is obtained. And verifying the decrypted NFT data to determine whether the user has the legitimacy and authority of executing the payment request. The decrypted NFT data is compared to target NFT data stored on the blockchain. Target NFT data is predefined, representing the formal identity and authorization information of the user, and is the benchmark against which the comparison is made. Data verification includes checking the match of the user ID, verifying whether the permission level is sufficient to complete the transaction, and checking any possible time stamps or usage restrictions.
In a specific embodiment, the process of executing step S106 may specifically include the following steps:
(1) Extracting a payment channel route according to the verification result to obtain payment channel route data;
(2) Encrypting the payment channel routing data to obtain encrypted payment information;
(3) Based on the rights data, a payment operation is performed by encrypting the payment information and the payment data is recorded.
Specifically, payment channel routing data is extracted based on geographic location, payment speed, and possibly cost optimization. For example, assuming a credit card is selected as the payment means, the system may select a payment gateway with a lower transaction fee and fast processing time. The payment channel routing data includes information such as URL of the payment gateway, required payment protocols, and possible security requirements. These data are extracted from a pre-configured database that sets a variety of payment options according to different markets and user preferences. And encrypting the payment channel routing data to obtain encrypted payment information. The payment information contains sensitive data such as credentials and transaction details of the payment gateway, which may pose a security risk if accessed without authorization. A key is generated using, for example, the AES symmetric encryption algorithm and then used to convert the payment channel information into encrypted form. For example, the payment gateway URL, the user's payment card information, and other relevant details are encrypted. Based on the rights data, a payment operation is performed through the encrypted payment information. The entitlement data determines the type of transactions and the limits that the user is able to conduct, ensuring that each transaction is within its authorized range. The system sends the encrypted payment information to the selected payment gateway, which decrypts the information and processes the transaction request. For example, if the user rights data allows him to make a high volume transaction, the payment gateway will continue to process the request. If his rights are not sufficient, the system will refuse to perform the payment and return an error message. Each payment operation is recorded by the system. The payment data record includes the timestamp of the transaction, the amount, beneficiary information, the status of the transaction, and the payment channel, among others. In the recording process, all sensitive information can be stored safely, and the stored data is protected by using an encryption technology to prevent unauthorized access.
The multi-account payment management method based on NFT in the embodiment of the present application is described above, and the multi-account payment management device based on NFT in the embodiment of the present application is described below, referring to fig. 2, one embodiment of the multi-account payment management device based on NFT in the embodiment of the present application includes:
an encryption module 201, configured to encrypt the identity information of the user to obtain encrypted identity information;
a processing module 202, configured to perform hash processing on the encrypted identity information to obtain an identity hash value;
an association module 203, configured to associate the identity hash value with authority data of the user, and generate initial NFT data;
a deployment module 204, configured to deploy an intelligent contract in a preset blockchain platform, and uplink the initial NFT data through the intelligent contract to obtain target NFT data of the user;
The verification module 205 is configured to collect a payment request initiated by the user, and verify NFT data of the payment request to obtain a verification result;
And the recording module 206 is used for executing payment operation according to the verification result and the authority data and recording payment data.
Through the cooperation of the components, the security and the non-tamper property of the data can be obviously improved by utilizing the characteristics of the NFT for storing the identity and the authority data of the user. The uniqueness of NFT and combination with blockchain allows each user's identity information and payment rights to be uniquely tagged and stored on the blockchain, which not only prevents unauthorized access, but also is effective against attempts to tamper or falsify. Secondly, by linking up NFT data, the method of the present invention can ensure that all payment activities and rights changes are recorded in a permanent blockchain ledger, which increases the transparency of the overall system so that any transaction can be tracked and validated, thereby enhancing supervision and user trust of the system. In addition, the automation and efficiency of the method are further enhanced by the intelligent contract, verification and payment processing based on preset rules are automatically executed by the intelligent contract, the need of manual intervention is reduced, and the speed and accuracy of transaction processing are improved. Such automated processing also relieves operating pressure in conventional payment systems, which is particularly advantageous when processing large numbers of transactions. Moreover, the present invention supports cross-platform and cross-border payments because NFT and blockchain technologies are de-centralized and borderless in nature, which provides greater flexibility and extensibility for global commerce and personal payments.
The present application also provides an NFT-based multi-account payment management apparatus, which includes a memory and a processor, where the memory stores computer readable instructions that, when executed by the processor, cause the processor to perform the steps of the NFT-based multi-account payment management method in the above embodiments.
The present application also provides a computer readable storage medium, which may be a non-volatile computer readable storage medium, and may also be a volatile computer readable storage medium, where instructions are stored in the computer readable storage medium, when the instructions are executed on a computer, cause the computer to perform the steps of the NFT-based multi-account payment management method.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, systems and units may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random acceS memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. The multi-account payment management method based on the NFT is characterized by comprising the following steps of:
Encrypting the identity information of the user to obtain encrypted identity information;
carrying out hash processing on the encrypted identity information to obtain an identity hash value;
associating the identity hash value with authority data of the user to generate initial NFT data;
deploying an intelligent contract in a preset blockchain platform, and uploading the initial NFT data through the intelligent contract to obtain target NFT data of the user;
Collecting a payment request initiated by the user, and verifying NFT data of the payment request to obtain a verification result;
And executing payment operation according to the verification result and the permission data and recording payment data.
2. The NFT-based multi-account payment management method of claim 1, wherein the encrypting the identity information provided by the user to obtain encrypted identity information comprises:
Extracting information from the identity information to obtain name data, address information and biological identification data;
Carrying out character string formatting processing on the name to obtain standardized name data, and simultaneously carrying out geocoding on the address information to obtain geocoded data;
vector conversion is carried out on the biological identification data to obtain a biological characteristic vector;
Performing data splicing on the standardized name data and the geocode data to obtain an identity information character string;
Encrypting the identity information character string through an AES encryption algorithm to obtain an encrypted character string;
carrying out hash value analysis on the encrypted character string through an SHA-256 algorithm to obtain an initial hash value;
performing the memorial encryption on the biological feature vector through an RSA encryption algorithm to obtain an encrypted feature vector;
carrying out hash processing on the encrypted feature vector to obtain a biological feature hash value;
and combining the initial hash value and the biological characteristic hash value to obtain the encrypted identity information.
3. The NFT-based multi-account payment management method of claim 1, wherein the hashing the encrypted identity information to obtain an identity hash value comprises:
Performing Base64 coding processing on the encrypted identity information to obtain a Base64 coding character string;
partitioning the Base64 coded character string to obtain a data block array;
Performing independent hash processing on each data block in the data block array to obtain a data block hash array;
Sorting the data block hash arrays to obtain sorted hash arrays;
Combining the ordered hash arrays to obtain a long hash character string;
compressing the long hash character string to obtain a compressed hash character string;
Performing entropy analysis on the compressed hash character string to obtain entropy data;
And carrying out threshold judgment processing on the entropy value data to obtain a judgment result, and carrying out secondary hash processing on the compressed hash character string according to the judgment result to obtain the identity hash value.
4. The NFT-based multi-account payment management method of claim 1, wherein the associating the identity hash value with the user's rights data generates initial NFT data, comprising:
Formatting the authority data to obtain standardized authority data;
coding the standardized authority data to obtain authority data JSON objects;
encrypting the authority data JSON object to obtain encrypted authority data;
Performing association processing on the encryption authority data and the identity hash value to obtain an association result;
carrying out serialization processing on the association result to obtain serialized NFT data;
And compressing the serialized NFT data through a GZIP algorithm to obtain the initial NFT data.
5. The NFT-based multi-account payment management method of claim 1, wherein the deploying a smart contract in a preset blockchain platform and the initial NFT data is uplink through the smart contract to obtain target NFT data of the user, comprising:
compiling preset intelligent contract codes to obtain compiled contract codes;
performing deployment test processing on the compiled contract code to obtain a test result;
Code optimization is carried out on the compiled contract code according to the test result, and a target contract code is obtained;
And deploying an intelligent contract on the blockchain platform through the target contract code, and uplink the initial NFT data through the intelligent contract to obtain target NFT data of the user.
6. The NFT-based multi-account payment management method of claim 5, wherein the collecting the user-initiated payment request, verifying NFT data for the payment request, and obtaining a verification result, comprises:
Receiving the payment request, and carrying out data extraction on the payment request to obtain NFT extraction data;
decrypting the NFT extracted data to obtain decrypted NFT extracted data;
and carrying out data verification on the decrypted NFT extracted data and the target NFT data to obtain the verification result.
7. The NFT-based multi-account payment management method of claim 6, wherein the performing a payment operation and recording payment data according to the verification result and the rights data comprises:
Extracting a payment channel route according to the verification result to obtain payment channel route data;
Encrypting the payment channel routing data to obtain encrypted payment information;
and executing payment operation through the encrypted payment information based on the authority data and recording the payment data.
8. An NFT-based multi-account payment management device, the NFT-based multi-account payment management device comprising:
the encryption module is used for carrying out encryption processing on the identity information of the user to obtain encrypted identity information;
the processing module is used for carrying out hash processing on the encrypted identity information to obtain an identity hash value;
the association module is used for associating the identity hash value with the authority data of the user and generating initial NFT data;
The deployment module is used for deploying intelligent contracts in a preset blockchain platform and uploading the initial NFT data through the intelligent contracts to obtain target NFT data of the user;
The verification module is used for collecting a payment request initiated by the user, verifying NFT data of the payment request and obtaining a verification result;
and the recording module is used for executing payment operation according to the verification result and the permission data and recording payment data.
9. An NFT-based multi-account payment management device, the NFT-based multi-account payment management device comprising: a memory and at least one processor, the memory having instructions stored therein;
The at least one processor invoking the instructions in the memory to cause the NFT-based multi-account payment management device to perform the NFT-based multi-account payment management method of any of claims 1-7.
10. A computer readable storage medium having instructions stored thereon, which when executed by a processor implement the NFT-based multi-account payment management method of any of claims 1-7.
CN202410687133.4A 2024-05-30 NFT-based multi-account payment management method, device, equipment and storage medium Pending CN118278957A (en)

Publications (1)

Publication Number Publication Date
CN118278957A true CN118278957A (en) 2024-07-02

Family

ID=

Similar Documents

Publication Publication Date Title
US11276058B2 (en) Data protection with translation
US10146957B1 (en) Sensitive data aliasing
EP3474209A1 (en) Storing blockchain private keys in a sim card
US10404471B1 (en) Secure ledger assurance tokenization
US8891768B2 (en) Increasing data security in enterprise applications by obfuscating encryption keys
US7540018B2 (en) Data security for digital data storage
CN112217835B (en) Message data processing method and device, server and terminal equipment
KR102277060B1 (en) System and method for encryption
CN106610995B (en) Method, device and system for creating ciphertext index
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN102916963A (en) Safe data exchange method, device, nodes and safe data exchange system
CN110210270B (en) Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system
US8452965B1 (en) Self-identification of tokens
US20070136589A1 (en) Identification and authentication system and method
CN115427959A (en) Method for directly transmitting electronic coin data sets between a terminal, a payment system, a currency system and a monitoring unit
CN104484628A (en) Multi-application intelligent card with encryption and decryption functions
CN110222809B (en) Information combination and encryption method of two-dimensional code and two-dimensional code encryption machine
CN109299944B (en) Data encryption method, system and terminal in transaction process
CN107423583A (en) A kind of software protecting device remapping method and device
US20190362093A1 (en) Computer-implemented method of transferring a data string from an application to a data protection device
CN112307503A (en) Signature management method and device and electronic equipment
KR102138077B1 (en) System and method for preventing forgery and alteration of documents
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN118278957A (en) NFT-based multi-account payment management method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication