WO2022087791A1 - 一种数字资产交易控制方法、装置、终端设备及存储介质 - Google Patents

一种数字资产交易控制方法、装置、终端设备及存储介质 Download PDF

Info

Publication number
WO2022087791A1
WO2022087791A1 PCT/CN2020/123757 CN2020123757W WO2022087791A1 WO 2022087791 A1 WO2022087791 A1 WO 2022087791A1 CN 2020123757 W CN2020123757 W CN 2020123757W WO 2022087791 A1 WO2022087791 A1 WO 2022087791A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
asset
target user
digital asset
issuer
Prior art date
Application number
PCT/CN2020/123757
Other languages
English (en)
French (fr)
Inventor
鲜丹
郭玮
於雷
Original Assignee
威富通科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 威富通科技有限公司 filed Critical 威富通科技有限公司
Priority to PCT/CN2020/123757 priority Critical patent/WO2022087791A1/zh
Priority to CN202080002461.6A priority patent/CN112513904B/zh
Publication of WO2022087791A1 publication Critical patent/WO2022087791A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Definitions

  • the present application belongs to the technical field of digital assets, and in particular relates to a digital asset transaction control method, device, terminal device and storage medium.
  • One of the purposes of the embodiments of the present application is to provide a digital asset transaction control method, device, terminal device and storage medium, which aim to solve the problem of high security risks when digital assets are traded.
  • a digital asset transaction control method including:
  • the preset first dynamic key is sent to the target user corresponding to the order information, so that the target user can set an exclusive password according to the first dynamic key;
  • a digital asset transaction control device including:
  • a proofreading module configured to obtain order information, and send the order information to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information;
  • a setting module configured to send the preset first dynamic key to the target user corresponding to the order information when the proofreading is passed, so that the target user can set an exclusive password according to the first dynamic key
  • a request module configured to send an order request to the asset issuer when the exclusive password is successfully set, so that the asset issuer collects digital asset information corresponding to the order information according to the order request;
  • the first acquiring module is configured to acquire the digital asset information and send the digital asset information to the target user.
  • a terminal device including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements any of the above when executing the computer program The steps of the digital asset transaction control method.
  • a computer-readable storage medium where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the steps of any of the above-mentioned digital asset transaction control methods are implemented.
  • a computer program product is provided.
  • the terminal device can execute any one of the digital asset transaction control methods in the first aspect.
  • the beneficial effect of the digital asset transaction control method provided by the embodiment of the present application is that: the order information of the target user is sent to the asset issuer through the terminal device, so that the asset issuer can perform proofreading to prevent the order information from not corresponding to the previous order information.
  • the terminal device sends the preset first dynamic key to the target user, so that the target user can use the first dynamic key to set an exclusive password, so that only the target user has the password corresponding to the order information, and then
  • the terminal device then sends the digital asset information corresponding to the order information collected by the asset issuer to the target user, so as to carry out overall control through the terminal device, realize the digital asset transaction between different transaction parties, and prevent multiple transaction parties from mastering digital assets.
  • the cryptographic information corresponding to the asset is used to solve the problem of high security risk when digital assets are traded.
  • FIG. 1 is a first schematic flow chart of a digital asset transaction control method provided by an embodiment of the present application
  • FIG. 2 is a second schematic flow chart of a digital asset transaction control method provided by an embodiment of the present application.
  • Fig. 3 is the digital asset transaction process diagram during the hacker attack provided by the embodiment of the present application.
  • FIG. 4 is a process diagram of a digital asset transaction based on a third-party neutral institution provided by an embodiment of the present application
  • FIG. 5 is a third schematic flowchart of the digital asset transaction control method provided by the embodiment of the present application.
  • FIG. 6 is a fourth schematic flow chart of the digital asset transaction control method provided by the embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a digital asset transaction control device provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a digital asset transaction control method in an embodiment of the application.
  • the execution body of the method may be a terminal device.
  • the digital asset transaction control method may include the following steps:
  • step S101 order information is acquired, and the order information is sent to an asset issuer corresponding to the order information, so that the asset issuer can verify the order information and preset order information according to the order information.
  • each transaction party in the digital asset transaction process can be regulated as a whole through the terminal device, so as to reduce the security risk when the digital asset is traded.
  • the order information generated by the asset issuer based on the purchase price collected by the target user may not match the order information applied by the target user to the terminal device.
  • the terminal device can, after acquiring the order information sent by the target user, send the order information to the asset issuer corresponding to the order information, so that the asset issuer can make the difference between the previous order information and the purchase price due to the target user according to the above order information.
  • the generated order information is verified, and the verification result is sent to the terminal device, so that the terminal device can perform further operations.
  • the above-mentioned order information includes order purchasing information and detailed information about purchasing. For example, if the order applied by the current target user is a shopping card, the above-mentioned order information includes the amount of the shopping card and the number of shopping cards; the above-mentioned assets
  • the issuer is the holder of the digital asset, and sometimes the manufacturer, responsible for generating and distributing the cryptographic information corresponding to the asset's serial number and serial number, as well as providing the digital asset basis for the write-off, reset, and query of the asset; the above-mentioned
  • the target user is the user who needs to apply to the asset issuer for their expected digital assets.
  • the target user After the target user successfully obtains the expected digital asset, the target user can also act as the asset issuer; the above-mentioned terminal equipment is used to control the transmission and transaction of digital assets Platform, the above-mentioned terminal equipment can realize the entry of each target user or asset issuer on the platform, and can provide a platform for asset transfer operations between target users and asset issuers; the above-mentioned digital assets refer to the form of electronic data.
  • Non-monetary assets held by the asset issuer for sale or in the production process during the activity including but not limited to stored-value cards, membership cards, coupons, loyalty cards, etc.
  • step S101 it includes:
  • Step S201 Obtain notification information; the notification information is information sent by the asset issuer according to the order information of the target user that has passed the verification.
  • the transaction of digital assets involves actual offline transactions, for example, funds for purchasing digital assets need to be sent to the corresponding asset issuer in an offline manner.
  • the time when the asset issuer actually receives the amount may also be delayed due to various factors.
  • the target user sends order information to the terminal or device, the actual amount corresponding to the failure to receive the order information will appear. , resulting in not responding to the order information, or sending a preset prompt operation to the target user, so that the target user can find the problem of not responding to the order information sent by the target user according to the above prompt operation.
  • the asset issuer when the asset issuer receives the purchase payment sent by the target user for the expected order information, it can use electronic receipts, payment receipts, transfer records, etc. method to verify whether the purchase payment has arrived in the account, and verify again whether the demand information of the target user conforms to the purchase payment, that is, whether it can correspond.
  • Demand information the asset issuer can generate notification information according to the verified order information, and send the notification information to the terminal device, thereby avoiding the situation that the target user sends the order information and does not respond.
  • the above-mentioned demand information is what type of digital assets the target user needs, as well as the number of digital assets, the amount corresponding to different numbers, etc.;
  • the above-mentioned notification information includes but is not limited to the number of cards, batch numbers, and different models of cards. The amount corresponding to the card, buyer information, etc.
  • the terminal device may obtain the fund transaction voucher sent by the target user, for example, the above-mentioned electronic receipt, payment receipt, and transfer record.
  • the responsible party can be quickly determined according to the fund transaction certificate to improve the efficiency of transaction accident handling.
  • Step S202 verifying the asset issuer corresponding to the notification information.
  • Step S203 when the verification is passed, send the notification information to the target user, so that the target user sends the corresponding order information according to the notification information.
  • the terminal device may receive information sent to it by the asset issuer that does not comply with relevant regulations, resulting in unstable factors in the transaction process, after receiving the notification information, the terminal device also needs to send the The asset issuer of the notification information performs verification to determine whether the asset issuer is legal, and when the verification is passed, the terminal device can send the notification information to the corresponding target user, so that the target user can remind the target user that the purchase payment has been received. , and the relevant demand information has been verified, and the order information corresponding to the notification information can be sent to the terminal device, so that the distribution platform can perform subsequent response operations according to the order information.
  • step S202 it includes:
  • the preset account information is sent to the asset issuer, so that the asset issuer performs verification according to the account information.
  • the terminal device in order to prevent unidentified users from applying for digital assets and resulting in illegal transactions, the terminal device needs to perform identity authentication on both sides of the digital asset transaction, so the target user or asset issuer needs to register on the terminal device in advance. Lay the foundation for subsequent digital asset transactions. Therefore, the terminal device needs to obtain the registration information sent by one of the users, such as the above-mentioned asset issuer, and review the above-mentioned registration information according to the registration rules preset by the platform. When the verification is passed, the preset account information is sent to the above-mentioned assets.
  • the issuer so that the above-mentioned asset issuer can change the initial password on the terminal device according to the preset account information, so that the above-mentioned asset issuer can independently master the account information, and then when the terminal device audits the above-mentioned asset issuer , and verify according to its account information to determine whether the current asset issuer is qualified.
  • the above registration information includes but is not limited to tax ID, social unified credit code and scanned copy, company email, mobile phone number, company introduction, etc.; if the current registration identity is If it is an individual type, the above registration information includes but is not limited to ID card, mobile phone number, work type, etc.; the above preset account information includes but is not limited to login account and initial password.
  • the terminal device fails to verify the registration information sent by the asset issuer, the terminal device needs to perform a prompt operation in a preset manner, so that the asset issuer can perform corresponding operations according to the prompt operation of the terminal device. For example, when a certain item of registration information sent by the asset issuer in the terminal device does not meet the requirements, the terminal device performs a corresponding prompt operation according to the unqualified registration information, so that the asset issuer changes the corresponding registration information.
  • Step S102 When the proofreading is passed, send the preset first dynamic key to the target user corresponding to the order information, so that the target user can set an exclusive password according to the first dynamic key.
  • the digital asset when there are multiple transaction parties in the digital asset transaction, the digital asset needs to be transferred between the multiple transaction parties, and in this process, the card number and card secret corresponding to the digital asset need to be transferred. If there are multiple transaction parties, the above-mentioned multiple transaction parties can directly consume the digital asset, and there is no way for the end user to exclusively protect the digital asset. Therefore, it is necessary to establish a digital asset for each transaction.
  • the asset exclusivity mechanism of the ultimate holder of the asset that is, once the current target user obtains the digital asset, the previous holder of the digital asset cannot perform any operations on the digital asset.
  • the above-mentioned asset issuance policy passes the proofreading of the received order information, it will feed back a proofreading information to the terminal device, indicating that the terminal device can respond to the order information sent by the target user.
  • the terminal device will obtain Current relevant information, generate the first dynamic key according to the relevant information, and send the generated first dynamic key to the target user corresponding to the above order information, so that the target user can view the information under his name according to the first dynamic key.
  • the summary of the asset list to be claimed that is, the expected demand information and batch number of the target user.
  • the target user needs to set an exclusive password according to the first dynamic key, so that the current target user can master the digital asset independently.
  • the above-mentioned first dynamic key is a temporary key generated by the terminal device during the transaction process, and only the holder of the current order information can know, so that the target user can complete the digital asset corresponding to the order information according to the first dynamic key. Viewing of information; the above exclusive password is reset by the target user and only the latest account password set by the target user is to be used exclusively for the order information.
  • the above-mentioned relevant information is a time seed, the account information of the target user, a random number, the key of the target user, etc., and a 3DES algorithm can be used to generate the above-mentioned first dynamic key. It has the advantages of high speed and high encryption efficiency.
  • the target user sets the exclusive password according to the first dynamic key, including: sending a preset security control to the target user, so that the target user can set the exclusive password according to the first dynamic key. Reset the exclusive password on the security control.
  • the security of the exclusive key is ensured by adopting a financial-level security encryption scheme.
  • the specific registration process can be based on the above-mentioned asset issuer registration process.
  • the terminal device will send the preset security control to the target user.
  • the security control is similar to the security input control of bank online banking.
  • the target user can integrate the security control into the local browser.
  • the security control comes with an encrypted public key and corresponding
  • the encryption algorithm can ensure that the public key is not hijacked by the middleman.
  • the middleman is the above-mentioned terminal device.
  • the exclusive password is mainly obtained from the original password of the target user, the encryption public key, and the random seed generated by the terminal device. Because the terminal device only provides encryption tools, and the encrypted original text can only be known by the target user, the encryption public key can only be known by the target user. The key can only be stored on the target user's local computer, so the terminal device cannot know the target user's exclusive password, which further ensures that currently only the target user can master the exclusive password of the digital asset corresponding to the order information.
  • the offline method is mainly used, that is, the number and asset password corresponding to the digital asset are put into an EXCEL file, and then the file is encrypted, that is, compressed. , and set a new compression password.
  • This encrypted document is then delivered by mail.
  • the recipient receives the file and password, it decrypts the file, and at the same time has the ownership of the digital assets in the file, that is, the card number and card password, and saves the content in the file.
  • the terminal device can transmit various data in the above-mentioned digital asset transaction process through the HTTPS protocol to ensure the safety and reliability of the communication process, so that it cannot be eavesdropped or tampered with during the data information transmission process. It is also possible to set up a numeric keypad with its own keyboard hook to intercept the keyboard input, so as to prevent it from being recorded by other tools. For example, the target user's local computer Trojan intercepts the user's keyboard input. Moreover, in the entire asset transaction process, the asset issuer and the terminal device are not involved in the transmission and storage of the exclusive password, thus further preventing the leakage of the exclusive password.
  • Figure 3 is a diagram of the digital asset transaction process during a hacker attack.
  • the card number and card secret corresponding to the digital asset may be intercepted by hackers.
  • the card number and card secret corresponding to the digital asset may be obtained by hackers on User A's local computer.
  • the hacker steals the above-mentioned compressed file, it performs brute force cracking to obtain the card secret and card number of the compressed file.
  • the above-mentioned users A, B, and C can be target users in this solution, and when there are next-level users, they can also be asset issuers.
  • Step S103 When the exclusive password is successfully set, send an order request to the asset issuer, so that the asset issuer collects digital asset information corresponding to the order information according to the order request.
  • Step S104 Acquire the digital asset information, and send the digital asset information to the target user.
  • the terminal device receives the information that the setting is successful, and will send an order request to the asset issuer.
  • the asset issuer receives the order request, the current order information
  • the corresponding pre-packaged digital asset information is collected and sent to the terminal device.
  • the asset issuer will not be able to perform any operations on the digital asset.
  • the terminal device obtains the digital asset information sent by the asset issuer, it sends the digital asset information to the target user so that the target user can operate the digital asset.
  • the above-mentioned digital asset information is the detailed information corresponding to the order information, including the card number, validity period, face value, and account information of the target user, etc. of the card.
  • the terminal device records the holder of the digital asset corresponding to the current order information on the bulletin board of the connected notary in a preset form.
  • the above preset form may record the information of the holder and the information of the asset issuer before the replacement in a sorted order, and the relevant information of the holder includes but is not limited to the date, batch number, target User account information, etc. For example, on August 9, 2007, target user B purchased a preset number of digital assets from asset issuer A, the batch number is 0002, and target user B has set an exclusive password. There is an exclusive right to the asset and a responsibility to keep it.
  • the above-mentioned third-party neutral institution may be a third-party CA institution.
  • Figure 4 is a diagram of a digital asset transaction process based on a third-party neutral institution.
  • the terminal device When user A transmits the card number of the digital asset to user B through the terminal device, the terminal device will transfer the current digital asset transaction.
  • the relationship is sent to a third-party neutral institution for notarization, that is, the information of the current digital asset holder and the information of the asset issuer before the replacement.
  • the above-mentioned users A and B can be target users in this solution, and when there are next-level users, they can also be asset issuers.
  • the smart contract transaction interface can be called to store the specific transfer process in the blockchain distributed ledger, so as to perform the above notarization supervision.
  • step S104 it includes:
  • the terminal device in order to ensure the security of the digital asset, the terminal device needs to determine whether the above-mentioned asset issuing policy has operational rights to the digital asset, so it needs to obtain the exclusive password entered by the asset issuer, and the asset issuer needs to When the verification is successful, it means that the current holder of the digital asset belongs to the asset issuer, and can obtain the operation of the asset issuance policy on the digital asset, that is, to obtain the digital asset sent by the asset issuer. The digital asset information corresponding to the order information is then sent to the target user.
  • step S104 it includes:
  • Step S501 Obtain a binding request, and verify the binding request.
  • Step S502 When the verification is passed, send a preset second dynamic key to the target user corresponding to the binding request, so that the target user can set an exclusive password for consumption according to the second dynamic key.
  • the target user who acquires digital assets may act as the asset issuer and send it to the next target user
  • the exclusive password held by the current target user is only used to operate the batch of digital assets.
  • the terminal device After the terminal device obtains the request, it verifies the binding request to prevent the identity of the target user who currently initiates the binding request from being inconsistent, or the current binding
  • the specified digital asset has been bound, that is, it has been used by someone. When the verification is passed, it means that the current binding card is valid, and the terminal device sends the preset second dynamic key to the target user corresponding to the binding request.
  • the above-mentioned second dynamic key is a key generated by the terminal device when the asset is actually used, and the key is reset by the real owner of the asset to obtain an exclusive password for consumption.
  • user B can store the asset It is sold to user C, who has set an exclusive password for consumption through the second dynamic key issued by the platform.
  • functions such as write-off, recharge, and inquiry of assets can be performed.
  • the customer can get the card secret after scratching it, and can change the card secret later and make purchases by swiping the card in the supermarket.
  • the terminal device can upload the relevant information to the notary's bulletin board, and make an announcement in the above-mentioned manner.
  • step S501 includes:
  • Step S601 Obtain the serial number information in the binding request.
  • Step S602 Determine the current state of the asset corresponding to the serial number information according to the serial number information.
  • Step S603 when the current state of the asset meets the preset condition, the verification of the binding request is passed.
  • the terminal device can obtain the serial number information in the binding request, and can determine the card number corresponding to the currently bound digital asset according to the serial number information, so that the current state of the current digital asset can be queried at the asset issuer, For example, whether the asset is used, whether the current balance is as expected, whether it has been bound, etc.
  • the terminal device can obtain the serial number information in the binding request, and can determine the card number corresponding to the currently bound digital asset according to the serial number information, so that the current state of the current digital asset can be queried at the asset issuer, For example, whether the asset is used, whether the current balance is as expected, whether it has been bound, etc.
  • the terminal device feedbacks the binding request verification pass information, and the subsequent steps can be performed.
  • the asset status of the asset issuer can be inquired to prevent unsold assets from being written off, thereby reducing the loss after the asset issuer's password is leaked.
  • a large-scale supermarket gift card represents the above-mentioned digital assets.
  • Company A is a platform specializing in point exchange, which is the above-mentioned target user.
  • Company A plans to buy 10,000 100 yuan gift cards from a large-scale supermarket and supermarket. card, as a reward for the redemption of points.
  • Company A has cooperation agreements with several banks, and Company A itself is not capable of technological development, Company A obtains these 10,000 gift cards of a large supermarket of RMB 100 by purchasing vouchers, which is A.
  • the company purchases digital assets that meet its needs from the asset issuer.
  • company A sends the terminal device to purchase 10,000 100 yuan gift cards for a large supermarket the terminal device sends the order information to the asset issuer.
  • the asset issuer checks the order information and the order information. When the check is passed, the terminal device sends the first dynamic key to Company A, and Company A can view the summary of the list of assets to be claimed under its name according to the first dynamic key. And set an exclusive password according to the first dynamic key. When the exclusive password is successfully set, Company A can independently master 10,000 gift cards of a large supermarket with a value of 100 yuan.
  • order information is obtained, and the order information is sent to the asset issuer corresponding to the order information, so that the asset issuer can verify the order information and the preset order information according to the order information; when the verification is passed , send the preset first dynamic key to the target user corresponding to the order information, so that the target user can set an exclusive password according to the first dynamic key; when the exclusive password is successfully set, send the The asset issuer sends an order request, so that the asset issuer collects digital asset information corresponding to the order information according to the order request; acquires the digital asset information, and sends the digital asset information to the target user.
  • the target user's order information is sent to the asset issuer through the terminal device, so that the asset issuer can verify the order information to prevent the order information from being inconsistent with its previous order information.
  • the key is sent to the target user, so that the target user can use the first dynamic key to set an exclusive password, so that only the target user has the password corresponding to the order information, and then the terminal device will obtain the digital data corresponding to the order information collected by the asset issuer.
  • the asset information is sent to the target user, so that the overall control is carried out through the terminal device, and the digital asset transaction between different transaction parties can be realized, so as to prevent multiple transaction parties from mastering the password information corresponding to the digital asset, so as to solve the security risk when the digital asset is traded. big problem.
  • FIG. 7 shows a schematic structural diagram of a digital asset transaction control device in the embodiment of the application.
  • the digital asset transaction control device can be include:
  • the proofreading module 701 is configured to acquire order information, and send the order information to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information.
  • the setting module 702 is configured to send the preset first dynamic key to the target user corresponding to the order information when the proofreading is passed, so that the target user can set an exclusive password according to the first dynamic key.
  • the requesting module 703 is configured to send an order request to the asset issuer when the exclusive password is successfully set, so that the asset issuer collects digital asset information corresponding to the order information according to the order request.
  • the first obtaining module 704 is configured to obtain the digital asset information and send the digital asset information to the target user.
  • the digital asset transaction control device may further include:
  • the second obtaining module is configured to obtain notification information; the notification information is information sent by the asset issuer according to the order information of the target user that has passed the verification.
  • the first verification module is used to verify the asset issuer corresponding to the notification information.
  • the first sending module is configured to send the notification information to the target user when the verification is passed, so that the target user sends the corresponding order information according to the notification information.
  • the digital asset transaction control device may further include:
  • the auditing module is used for obtaining the registration information sent by the asset issuer, and auditing the registration information.
  • the second verification module is configured to send preset account information to the asset issuer when the verification is passed, so that the asset issuer performs verification according to the account information.
  • the digital asset transaction control device may further include:
  • the third verification module is configured to obtain the exclusive password input by the asset issuer, and verify the exclusive password of the asset issuer.
  • the third obtaining module is configured to obtain the digital asset information sent by the asset issuer when the verification is successful.
  • the digital asset transaction control device may further include:
  • the fourth verification module is used for obtaining the binding request and verifying the binding request.
  • the second sending module is configured to send the preset second dynamic key to the target user corresponding to the binding request when the verification is passed, so that the target user can set consumption exclusive according to the second dynamic key password.
  • the fourth verification module may include:
  • an obtaining unit configured to obtain the serial number information in the binding request.
  • a determining unit configured to determine the current state of the asset corresponding to the serial number information according to the serial number information.
  • the verification passing unit is configured to pass the verification of the binding request when the current state of the asset meets the preset condition.
  • the setting module 702 may include:
  • a setting unit configured to send a preset security control to the target user, so that the target user can re-set an exclusive password on the security control according to the first dynamic key.
  • order information is obtained, and the order information is sent to the asset issuer corresponding to the order information, so that the asset issuer can verify the order information and the preset order information according to the order information; when the verification is passed , send the preset first dynamic key to the target user corresponding to the order information, so that the target user can set an exclusive password according to the first dynamic key; when the exclusive password is successfully set, send the The asset issuer sends an order request, so that the asset issuer collects digital asset information corresponding to the order information according to the order request; acquires the digital asset information, and sends the digital asset information to the target user.
  • the target user's order information is sent to the asset issuer through the terminal device, so that the asset issuer can verify the order information to prevent the order information from being inconsistent with its previous order information.
  • the key is sent to the target user, so that the target user can use the first dynamic key to set an exclusive password, so that only the target user has the password corresponding to the order information, and then the terminal device will obtain the digital data corresponding to the order information collected by the asset issuer.
  • the asset information is sent to the target user, so that the overall control is carried out through the terminal device, and the digital asset transaction between different transaction parties is realized, so as to prevent multiple transaction parties from mastering the password information corresponding to the digital asset, so as to solve the security risk when the digital asset is traded. big problem.
  • FIG. 8 is a schematic structural diagram of a terminal device provided by an embodiment of the present application. For the convenience of description, only the parts related to the embodiments of the present application are shown.
  • the terminal device 8 in this embodiment includes: at least one processor 800 (only one is shown in FIG. 8 ), a memory 801 connected to the processor 800 , and a memory 801 stored in the memory 801 and A computer program 802 executable on the at least one processor 800, such as a digital asset transaction control program.
  • the processor 800 executes the computer program 802
  • the steps in each of the foregoing embodiments of the digital asset transaction control method are implemented, for example, steps S101 to S104 shown in FIG. 1 .
  • the processor 800 executes the computer program 802
  • the functions of the modules in the foregoing device embodiments are implemented, for example, the functions of the modules 701 to 704 shown in FIG. 7 .
  • the computer program 802 may be divided into one or more modules, and the one or more modules are stored in the memory 801 and executed by the processor 800 to complete the present application.
  • the one or more modules may be a series of computer program instruction segments capable of performing specific functions, and the instruction segments are used to describe the execution process of the computer program 802 in the terminal device 8 .
  • the computer program 802 can be divided into a proofreading module 701, a setting module 702, a requesting module 703, and a first obtaining module 704.
  • the specific functions of each module are as follows:
  • a proofreading module 701 configured to acquire order information, and send the order information to an asset issuer corresponding to the order information, so that the asset issuer can perform proofreading according to the order information and preset order information;
  • the setting module 702 is configured to send a preset first dynamic key to the target user corresponding to the order information when the proofreading is passed, so that the target user can set an exclusive password according to the first dynamic key;
  • a request module 703, configured to send an order request to the asset issuer when the exclusive password is successfully set, so that the asset issuer collects digital asset information corresponding to the order information according to the order request;
  • the first obtaining module 704 is configured to obtain the digital asset information and send the digital asset information to the target user.
  • the terminal device 8 may include, but is not limited to, a processor 800 and a memory 801 .
  • FIG. 8 is only an example of the terminal device 8, and does not constitute a limitation on the terminal device 8. It may include more or less components than the one shown, or combine some components, or different components , for example, it may also include input and output devices, network access devices, buses, and so on.
  • the so-called processor 800 may be a central processing unit (Central Processing Unit, CPU), and the processor 800 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSP), application specific integrated circuits (Application Specific Integrated Circuits) Integrated Circuit, ASIC), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory 801 may be an internal storage unit of the terminal device 8 in some embodiments, such as a hard disk or a memory of the terminal device 8 . In other embodiments, the memory 801 may also be an external storage device of the terminal device 8, for example, a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, flash memory card (Flash Card), etc. Further, the memory 801 may also include both an internal storage unit of the terminal device 8 and an external storage device.
  • the memory 801 is used to store an operating system, an application program, a boot loader (Boot Loader), data, and other programs, such as program codes of the computer program, and the like. The memory 801 can also be used to temporarily store data that has been output or will be output.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种数字资产交易控制方法、装置、终端设备及存储介质,所述方法包括:获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对(S101);当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码(S102);当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息(S103);获取所述数字资产信息,将所述数字资产信息发送给所述目标用户(S104)。从而解决数字资产进行交易时安全风险较大的问题。

Description

一种数字资产交易控制方法、装置、终端设备及存储介质 技术领域
本申请属于数字资产技术领域,尤其涉及一种数字资产交易控制方法、装置、终端设备及存储介质。
背景技术
随着货币的电子化进程日益发展,利用数字资产进行交易在人们的生活中越来越常见,但是随着数字资产进行交易的越来越普遍,其在交易过程中的安全风险也越来越大,尤其是在数字资产由一个用户向另一个用户传递的过程中,因涉及多方用户知道卡号和卡密,而导致在数字资产进行交易时安全风险较大,而且在数字资产交易过程中的参与方越多,其风险发生概率就会越大。
技术问题
本申请实施例的目的之一在于:提供一种数字资产交易控制方法、装置、终端设备及存储介质,旨在解决数字资产进行交易时安全风险较大的问题。
技术解决方案
为解决上述技术问题,本申请实施例采用的技术方案是:
第一方面,提供了一种数字资产交易控制方法,包括:
获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;
当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;
当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;
获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
第二方面,提供了一种数字资产交易控制装置,包括:
校对模块,用于获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;
设置模块,用于当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;
请求模块,用于当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;
第一获取模块,用于获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
第三方面,提供一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述任一种数字资产交易控制方法的步骤。
第四方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述的计算机程序被处理器执行时实现上述任一种数字资产交易控制方法的步骤。
第五方面,提供了一种计算机程序产品,当计算机程序产品在终端设备上运行时,使得终端设备执行上述第一方面中任一种数字资产交易控制方法。
有益效果
本申请实施例提供的数字资产交易控制方法的有益效果在于:通过终端设备将目标用户的订单信息发送给资产发行方,以使资产发行方进行校对,以防止订单信息与其之前的订购信息不对应,当校对通过后,终端设备再将预设第一动态密钥发送给目标用户,以使目标用户利用第一动态密钥设置独享密码,从而只有目标用户掌握与订单信息对应的密码,之后终端设备再将获取资产发行方收集的对应于订单信息的数字资产信息发送给目标用户,从而通过终端设备进行整体的调控,实现不同交易方之间的数字资产交易,避免多个交易方掌握数字资产对应的密码信息,以解决数字资产进行交易时安全风险较大的问题。
附图说明
图1是本申请实施例提供的数字资产交易控制方法的第一种流程示意图;
图2是本申请实施例提供的数字资产交易控制方法的第二种流程示意图;
图3是本申请实施例提供的黑客攻击时的数字资产交易过程图;
图4是本申请实施例提供的基于第三方中立机构的数字资产交易过程图;
图5是本申请实施例提供的数字资产交易控制方法的第三种流程示意图;
图6是本申请实施例提供的数字资产交易控制方法的第四种流程示意图;
图7是本申请实施例提供的数字资产交易控制装置的结构示意图;
图8是本申请实施例提供的终端设备的结构示意图。
本发明的实施方式
为了说明本申请所提供的技术方案,以下结合具体附图及实施例进行详细说明。
图1所示为本申请实施例中一种数字资产交易控制方法的流程示意图,该方法的执行主体可以是终端设备,如图1所示,所述数字资产交易控制方法可以包括如下步骤:
步骤S101、获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对。
在本实施例中,可通过终端设备来整体调控数字资产交易过程中的各个交易方,以便于降低数字资产进行交易时的安全风险性。但是因某些外界因素,而导致整体数字资产交易过程中可能会出现资产发行方根据所收取的目标用户的采购款,而产生的订购信息与目标用户向终端设备所申请的订单信息不符的情况,故终端设备可在获取目标用户发送的订单信息后,终端设备将该订单信息发送给订单信息中所对应的资产发行方,从而便于资产发行方根据上述订单信息与其之前因目标用户采购款而产生的订购信息进行校对,并将校对结果发送给终端设备,以便于终端设备进行进一步的操作。其中,上述订单信息包括下单采购信息以及关于采购的详细信息,例如,若当前目标用户所申请的订单为购物卡,则上述订单信息包括该购物卡的金额、购物卡的个数;上述资产发行方为数字资产的持有方,有时也属于制造方,负责生成以及分配资产的编号和编号对应的密码信息,以及负责为资产的核销、重置、查询等方式提供数字资产基础;上述目标用户为需向资产发行方申请其预期的数字资产的用户,当目标用户成功获取其预期的数字资产后,目标用户也可以充当资产发行方;上述终端设备为数字资产进行传输和交易的控制平台,上述终端设备可以实现各个目标用户或资产发行方入驻平台,以及可提供目标用户与资产发行方之间的资产转让操作的平台;上述数字资产是指以电子数据的形式存在的,在日常活动中被资产发行方持有以备出售或处于生产过程中的非货币性资产,包括但不限于是储值卡、会员卡、优惠券、积分卡等。
可选的,如图2所示,步骤S101之前,包括:
步骤S201、获取通知信息;所述通知信息为所述资产发行方根据验证通过的所述目标用户的订购信息发送的信息。
在本实施例中,因数字资产进行交易时涉及实际线下金额的交易,例如,采购数字资产的资金需通过线下的方式给对应的资产发行方。而资产发行方实际收到金额的时间也可能会因各项因素,导致出现延迟,这时如果目标用户向终端或设备发送订单信息,就会出现因未收到该订单信息所对应的实际金额,而导致不响应该订单信息,或向目标用户发出预设方式的提示操作,以便于目标用户根据上述提示操作,查找不响应其所发送的订单信息的问题所在。除上述提示操作之外,为防止出现上述不响应情况,当资产发行方收到目标用户针对于其预期的订单信息所发送的采购款后,可通过电子回单、收款票据、转账记录等方式验证采购款是否到账,并再次验证目标用户的需求信息是否符合采购款,也就是是否能够对应上,当目标用户的订购信息验证通过后,该订购信息也就是上述目标用户的采购款以及需求信息,资产发行方可根据验证通过的订购信息生成通知信息,并将该通知信息发送给终端设备,从而避免了目标用户发送订单信息而不响应的情况。其中,上述需求信息为目标用户需要什么类型的数字资产,以及数字资产的个数,不同个数对应的金额等;上述通知信息包括但不限于是卡的个数、批次号、各个不同型号的卡对应的金额、买家信息等。
可选的,终端设备可获取目标用户发送的资金交易凭证,例如,上述电子回单、收款票据、转账记录。当交易出现纠纷时,可根据资金交易凭证快速确定责任方,以提升交易事故处理的效率。
步骤S202、对所述通知信息对应的资产发行方进行验证。
步骤S203、当验证通过时,将所述通知信息发送给所述目标用户,以使所述目标用户根据所述通知信息发送对应的订单信息。
在本实施例中,因可能会出现终端设备接收到不合乎相关规定的资产发行方向其发送的信息,导致交易过程出现不稳定因素,故终端设备接收到该通知信息后,还需对发送该通知信息的资产发行方进行验证,来判断该资产发行方是否合法,而当验证通过时,终端设备即可将通知信息发送给对应的目标用户,从而达到目标用户提醒目标用户采购款已收到,并对相关需求信息已验证通过,可向终端设备发送与通知信息对应的订单信息,以便于分发平台根据订单信息进行后续的响应操作。
可选的,步骤S202之前,包括:
获取所述资产发行方发送的注册信息,对所述注册信息进行审核。
当审核通过时,将预设的账号信息发送给所述资产发行方,以使所述资产发行方根据所述账号信息进行验证。
在本实施例中,为避免不明身份的用户去申请数字资产,而产生违法交易,终端设备需对数字资产交易双方进行身份认证,故目标用户或资产发行方需提前在终端设备上进行注册,为后续数字资产交易奠定基础。因此,终端设备需获取其中某一用户,例如上述资产发行方发送的注册信息,对上述注册信息按照平台预设的注册规则进行审核,当审核通过时,将预设的账号信息发送给上述资产发行方,以便于上述资产发行方根据预设的账号信息在终端设备上更改其中的初始密码,从而达到后续上述资产发行方独自掌握该账号信息,进而在终端设备对上述资产发行方进行审核时,根据其账号信息进行验证,确定当前资产发行方是否合格。其中,若当前进行注册的身份是企业类型的话,则上述注册信息包括但不限于是税号、社会统一信用代码和扫描件、公司邮箱、手机号、公司介绍等;若当前进行注册的身份是个体类型的话,则上述注册信息包括但不限于是身份证、手机号、工作类型等;上述预设的账号信息包括但不限于是登录账号和初始密码。
可选的,若终端设备对资产发行方发送的注册信息审核不通过,则终端设备需以预设方式进行提示操作,以便于资产发行方根据终端设备的提示操作进行对应的操作。例如,当终端设备中的资产发行方发送的某一项注册信息不符合要求时,终端设备根据不符合要求的注册信息进行对应的提示操作,以使资产发行方更改对应的注册信息。
步骤S102、当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码。
在本实施例中,因数字资产交易存在多个交易方时,数字资产需在多个交易方之间进行传递,而在这个过程中数字资产所对应的卡号和卡密均需进行传递,如果存在多个交易方,就会出现上述多个交易方均可以直接消费该数字资产,而没有办法使最终用户对该数字资产进行独享性保护,故需建立对每一次交易中交易双方的数字资产最终持有方的资产独享性机制,也就是当前目标用户一旦获取该数字资产,那么该数字资产上一任持有者就无法对该数字资产进行任何操作。因此,在上述资产发行方针对于接收到的订单信息校对通过时,会反馈给终端设备一个校对通过的信息,说明终端设备可对目标用户发送的订单信息进行响应操作,此时,终端设备将获取当前相关信息,根据相关信息生成第一动态密钥,并将所生成的第一动态密钥发送给上述订单信息所对应的目标用户,从而目标用户可根据第一动态密钥,查看其名下待领取的资产列表的概要,也就是目标用户预期的需求信息以及批次号,此时,目标用户需根据第一动态密钥设置独享密码,从而便于当前目标用户独自掌握该笔数字资产,以防止该数字资产之前的持有者再次操作目前归于目标用户的该笔数字资产。其中,上述第一动态密钥为交易过程中,终端设备生成的临时密钥,只有目前订单信息的持有方可知,从而使目标用户根据该第一动态密钥完成对应于订单信息的数字资产信息的查看;上述独享密码为目标用户重新设置的只有目标用户设置的最新的账号密码,以对订单信息进行独享。
可选的,上述相关信息为时间种子、目标用户的账号信息、随机数、目标用户的密钥等,并可利用3DES算法来生成上述第一动态密钥,该3DES算法具有计算量小、加密速度快、加密效率高等优点。
可选的,步骤S102中所述目标用户根据所述第一动态密钥设置独享密码,包括:将预设安全控件发送给所述目标用户,以使目标用户根据所述第一动态密钥重新在所述安全控件上设置独享密码。
在本实施例中,通过采用金融级别的安全加密方案来保证独享密钥的安全性,当目标用户向终端设备进行注册,该具体注册过程可依据上述资产发行方注册过程,注册成功后,终端设备会将预设安全控件发送给目标用户,该安全控件类似于银行网银安全输入控件,目标用户可将该安全控件集成到本地的浏览器上,该安全控件自带加密的公钥和对应的加密算法,可以保证公钥不被中间人挟持,该中间人也就是上述终端设备,通过该安全控件的设立可以确保当前仅有目标用户可以掌握该订单信息所对应的数字资产的独享密码。可以理解的是,独享密码主要由目标用户的密码原文、加密公钥、终端设备生成的随机种子得到,因终端设备仅提供了加密的工具,而加密的原文仅有目标用户可知,加密公钥也仅能存在目标用户本地电脑上,故终端设备并不能得知目标用户的独享密码,也进一步确保当前仅有目标用户可以掌握该订单信息所对应的数字资产的独享密码。
可选的,因在数字资产交易过程中,有可能会出现某个用户之间的渠道传递过程中保密工作不安全,而导致被黑客所窃听和篡改,故需保护交易过程中数字资产传输的安全性,而当前常见的数字资产转移方案中,主要采用线下的方式,也就是将数字资产所对应的编号与资产密码放到一个EXCEL文件中,然后把这个文件进行加密,也就是进行压缩,并设下新设的压缩密码。然后对这个加密文档通过邮件方式传递,当接收方收到文件和密码后对文件进行解密,同时拥有文件中数字资产的所有权,即卡号和卡密,并对文件中的内容进行保存,其还可继续向后进行传递,而上述邮件传输的协议为SMTP,如无特殊的加密措施,则是通过明文传输的,中间过程可能存在被黑客窃听和篡改的风险。如果黑客窃取到这份文档,可以通过暴力破解来打开加密的文档,进而获取里面的数字资产的编号与资产密码。即使不被黑客拦截,文件保存到接受者,也就是目标用户的本地电脑上,因为目标用户能把这套的资产解密出明文了,如果目标用户的电脑不幸被黑客攻击,则资产同样有被盗取的风险。黑客拿到卡号和卡密后,也能进行消费,还是再转发给其他人。故终端设备可通过HTTPS协议传输上述数字资产交易过程中的各项数据,以确保通信过程安全可靠,从而在数据信息传输过程中不能被人窃听或篡改。还可设立数字小键盘,该数字小键盘自带键盘钩子拦截键盘输入内容,从而达到防止被其它工具记录的效果,例如,目标用户的本地电脑木马拦截用户键盘输入。而且在整个资产交易过程中,资产发行方与终端设备并不涉及传输和保存独享密码,从而进一步杜绝了独享密码的泄露。
具体的,如图3所示,图3为黑客攻击时的数字资产交易过程图,在用户A和用户B传递数字资产的过程中,数字资产所对应的卡号和卡密可能会被黑客拦截,或者在用户A的本地电脑上也可能被黑客获取数字资产对应的卡号和卡密。而当黑客盗取上述传输的压缩文档后,进行暴力破解,从而获取压缩文档的卡密和卡号,当黑客拿到卡密和卡号后,可进行消费,或转发给用户C。其中,上述用户A、B、C在本方案中可以为目标用户,而当有下一级用户时,也可以为资产发行方。
步骤S103、当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息。
步骤S104、获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
在本实施例中,当目标用户设置独享密码成功后,终端设备接收到设置成功的信息,将向资产发行方发出订单请求,当资产发行方接收到该订单请求时,将当前订单信息所对应的预先打包好的数字资产信息进行收集,并发送给终端设备,此时,资产发行方,将不可以对该数字资产进行任何操作。当终端设备获取资产发行方发送的数字资产信息后,就将数字资产信息发送给目标用户,以便于目标用户对该数字资产进行操作。其中,上述数字资产信息为对应于订单信息的详细信息,包括卡的卡号、有效期、面值、目标用户的账号信息等。
可选的,为避免出现纠纷时,因交易参与方的众多,而难以回溯,从而难以定位交易最终责任人,故需设立一个第三方中立机构进行公证监督,因上述第三方中立机构公证具有法律公信力,且不可篡改,从而将每一次交易过程中的转让关系进行公信力证明,以便于后续若出现类似于资产盗取的资产风险性案件时,可迅速定位关系责任方,以保证资产交易过程中的安全性。因此,当上述独享密码设置成功时,终端设备将当前订单信息所对应的数字资产的持有方以预设的形式记录在于其连接的公证方的公告栏。其中,上述预设的形式可以是以一种排序顺序将持有方的信息以及更换前的资产发行方的信息进行记录,持有方的相关信息包括但不限于是日期、批次号、目标用户账号信息等,例如2007年8月9日,目标用户B从资产发行方A处采购预设数量的数字资产,批次号为0002,目标用户B已经设置完成独享密码。对该资产具有独享的权利,也有保管的责任。其中,上述第三方中立机构可以是第三方CA机构。
具体的,如图4所示,图4为基于第三方中立机构的数字资产交易过程图,用户A在将数字资产的卡号通过终端设备传输给用户B时,终端设备将会当前数字资产的交易关系发送给第三方中立机构进行公证,也就是当前数字资产持有方的信息以及更换前的资产发行方的信息。其中,上述用户A、B在本方案中可以为目标用户,而当有下一级用户时,也可以为资产发行方。
可选的,上述每一次交易过程,均可调用智能合约交易接口,将具体转移过程存储至区块链分布式账本中,从而进行上述公证监督。
可选的,步骤S104之前,包括:
获取所述资产发行方输入的独享密码,并对所述资产发行方的独享密码进行验证。
当验证成功时,获取所述资产发行方发送的数字资产信息。
在本实施例中,为保障数字资产的安全性,终端设备需确定上述资产发行方针对于该数字资产是否有可操作权利,故需获取资产发行方输入的独享密码,并对该资产发行方的独享密码进行验证,当验证成功时,说明当前数字资产的持有方属于资产发行方,才可获取资产发行方针对于数字资产进行的操作,也就是获取资产发行方发送的将数字资产整理后的对应于订单信息的数字资产信息,从而将该数字资产信息发送给目标用户。
可选的,如图5所示,步骤S104之后,包括:
步骤S501、获取绑定请求,对所述绑定请求进行验证。
步骤S502、当验证通过时,将预设第二动态密钥发送给所述绑定请求对应的目标用户,以使所述目标用户根据所述第二动态密钥设置消费独享密码。
在本实施例中,因获取数字资产的目标用户有可能会充当资产发行方,发送至下一个目标用户,故当前目标用户所持有的独享密码仅用于操作该批数字资产,若想对数字资产实际进行消费,还需再次申请,以确保数字资产的安全。因此,目标用户需进行最后的消费绑定时,可发起绑定请求,终端设备获取该请求后,对绑定请求进行验证,以防止当前发起绑定请求的目标用户身份不符,又或者当前绑定的数字资产以已经过绑定,也就是已被人使用,当验证通过时,说明当前绑定卡合法,终端设备就将预设第二动态密钥发送给绑定请求对应的目标用户,以便于目标用户根据第二动态密钥设置消费独享密码,从而可以进行卡的消费、重置、查询等操作。其中,上述第二动态密钥为当资产真正被使用时,终端设备所产生的密钥,该密钥由资产的真正所有者进行重新设置,得到消费独享密码,例如,用户B可以把资产售卖给用户C,用户C是通过平台所下发的第二动态密钥设置了消费独享密码。一旦消费独享密码设置成功后,即可进行资产的核销、充值、查询等功能。类似于购物卡背面的卡密,顾客刮开后获取到这个卡密,后面可以更改卡密,并且在超市进行刷卡消费。
可选的,当目标用户设置消费独享密码后,终端设备可将相关信息上传至公证方的公告栏中,以上述方式进行公告。
可选的,如图6所示,步骤S501包括:
步骤S601、获取所述绑定请求中的编号信息。
步骤S602、根据所述编号信息确定所述编号信息对应的资产当前状态。
步骤S603、当所述资产当前状态符合预设条件时,所述绑定请求的验证通过。
在本实施例中,终端设备可获取绑定请求中的编号信息,根据编号信息可确定当前所进行绑定的数字资产对应的卡号,从而可以在资产发行方处查询当前数字资产的当前状态,例如,该资产是否被使用、当前余额是否与预期一致、是否已被绑定等。当上述当前状态都符合预设状态,则说明该数字资产合乎要求,可进行绑定操作,终端设备反馈绑定请求验证通过信息,即可进行后续步骤。
可选的,当上述数字资产核销时,可通过查询资产发行方的资产状态,来防止未售出资产进行核销,从而降低资产发行方密码泄露后的损失。
具体示例而非限定的,将某大型商超礼品卡代表上述数字资产,A公司是一家专门做积分兑换的平台,也就是上述目标用户,A公司计划购买10000份100元的某大型商超礼品卡,作为积分兑换的奖品。而且由于A公司与多家银行有合作协议,并且A公司本身的科技开发能力不强,因此A公司通过购买凭证的方式来拿到这10000张100元的某大型商超礼品卡,也就是A公司通过在资产发行方处购买符合其需求的数字资产,当A公司向终端设备发送购买10000份100元的某大型商超礼品卡的订单信息后,终端设备将订单信息发送给资产发行方,资产发行方根据订单信息与订购信息进行校对,当校对通过时,终端设备发送第一动态密钥给A公司,A公司可根据第一动态密钥查看其名下待领取的资产列表的概要,并根据第一动态密钥设置独享密码,当独享密码设置成功后,A公司就能独自掌握10000份100元的某大型商超礼品卡。
本申请实施例中获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。通过终端设备将目标用户的订单信息发送给资产发行方,以使资产发行方进行校对,以防止订单信息与其之前的订购信息不对应,当校对通过后,终端设备再将预设第一动态密钥发送给目标用户,以使目标用户利用第一动态密钥设置独享密码,从而只有目标用户掌握与订单信息对应的密码,之后终端设备再将获取资产发行方收集的对应于订单信息的数字资产信息发送给目标用户,从而通过终端设备进行整体的调控,实现不同交易方之间的数字资产交易,避免多个交易方掌握数字资产对应的密码信息,以解决数字资产进行交易时安全风险较大的问题。
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
对应于上文所述的一种数字资产交易控制方法,图7所示为本申请实施例中一种数字资产交易控制装置的结构示意图,如图7所示,所述数字资产交易控制装置可以包括:
校对模块701,用于获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对。
设置模块702,用于当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码。
请求模块703,用于当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息。
第一获取模块704,用于获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
可选的,所述数字资产交易控制装置还可以包括:
第二获取模块,用于获取通知信息;所述通知信息为所述资产发行方根据验证通过的所述目标用户的订购信息发送的信息。
第一验证模块,用于对所述通知信息对应的资产发行方进行验证。
第一发送模块,用于当验证通过时,将所述通知信息发送给所述目标用户,以使所述目标用户根据所述通知信息发送对应的订单信息。
可选的,所述数字资产交易控制装置还可以包括:
审核模块,用于获取所述资产发行方发送的注册信息,对所述注册信息进行审核。
第二验证模块,用于当审核通过时,将预设的账号信息发送给所述资产发行方,以使所述资产发行方根据所述账号信息进行验证。
可选的,所述数字资产交易控制装置还可以包括:
第三验证模块,用于获取所述资产发行方输入的独享密码,并对所述资产发行方的独享密码进行验证。
第三获取模块,用于当验证成功时,获取所述资产发行方发送的数字资产信息。
可选的,所述数字资产交易控制装置还可以包括:
第四验证模块,用于获取绑定请求,对所述绑定请求进行验证。
第二发送模块,用于当验证通过时,将预设第二动态密钥发送给所述绑定请求对应的目标用户,以使所述目标用户根据所述第二动态密钥设置消费独享密码。
可选的,所述第四验证模块可以包括:
获取单元,用于获取所述绑定请求中的编号信息。
确定单元,用于根据所述编号信息确定所述编号信息对应的资产当前状态。
验证通过单元,用于当所述资产当前状态符合预设条件时,所述绑定请求的验证通过。
可选的,所述设置模块702可以包括:
设置单元,用于将预设安全控件发送给所述目标用户,以使目标用户根据所述第一动态密钥重新在所述安全控件上设置独享密码。
本申请实施例中获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。通过终端设备将目标用户的订单信息发送给资产发行方,以使资产发行方进行校对,以防止订单信息与其之前的订购信息不对应,当校对通过后,终端设备再将预设第一动态密钥发送给目标用户,以使目标用户利用第一动态密钥设置独享密码,从而只有目标用户掌握与订单信息对应的密码,之后终端设备再将获取资产发行方收集的对应于订单信息的数字资产信息发送给目标用户,从而通过终端设备进行整体的调控,实现不同交易方之间的数字资产交易,避免多个交易方掌握数字资产对应的密码信息,以解决数字资产进行交易时安全风险较大的问题。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的装置和模块的具体工作过程,可以参考前述系统实施例以及方法实施例中的对应过程,在此不再赘述。
图8为本申请实施例提供的终端设备的结构示意图。为了便于说明,仅示出了与本申请实施例相关的部分。
如图8所示,该实施例的终端设备8包括:至少一个处理器800(图8中仅示出一个),与所述处理器800连接的存储器801,以及存储在所述存储器801中并可在所述至少一个处理器800上运行的计算机程序802,例如数字资产交易控制程序。所述处理器800执行所述计算机程序802时实现上述各个数字资产交易控制方法实施例中的步骤,例如图1所示的步骤S101至S104。或者,所述处理器800执行所述计算机程序802时实现上述各装置实施例中各模块的功能,例如图7所示模块701至704的功能。
示例性的,所述计算机程序802可以被分割成一个或多个模块,所述一个或者多个模块被存储在所述存储器801中,并由所述处理器800执行,以完成本申请。所述一个或多个模块可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序802在所述终端设备8中的执行过程。例如,所述计算机程序802可以被分割成校对模块701、设置模块702、请求模块703、第一获取模块704,各模块具体功能如下:
校对模块701,用于获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;
设置模块702,用于当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;
请求模块703,用于当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;
第一获取模块704,用于获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
所述终端设备8可包括,但不仅限于,处理器800、存储器801。本领域技术人员可以理解,图8仅仅是终端设备8的举例,并不构成对终端设备8的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如还可以包括输入输出设备、网络接入设备、总线等。
所称处理器800可以是中央处理单元(Central Processing Unit,CPU),该处理器800还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器801在一些实施例中可以是所述终端设备8的内部存储单元,例如终端设备8的硬盘或内存。所述存储器801在另一些实施例中也可以是所述终端设备8的外部存储设备,例如所述终端设备8上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器801还可以既包括所述终端设备8的内部存储单元也包括外部存储设备。所述存储器801用于存储操作系统、应用程序、引导装载程序(Boot Loader)、数据以及其他程序等,例如所述计算机程序的程序代码等。所述存储器801还可以用于暂时地存储已经输出或者将要输出的数据。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
以上仅为本申请的可选实施例而已,并不用于限制本申请。对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (16)

  1. 一种数字资产交易控制方法,其特征在于,包括:
    获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;
    当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;
    当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;
    获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
  2. 如权利要求1所述的数字资产交易控制方法,其特征在于,在获取订单信息之前,包括:
    获取通知信息;所述通知信息为所述资产发行方根据验证通过的所述目标用户的订购信息发送的信息;
    对所述通知信息对应的资产发行方进行验证;
    当验证通过时,将所述通知信息发送给所述目标用户,以使所述目标用户根据所述通知信息发送对应的订单信息。
  3. 如权利要求2所述的数字资产交易控制方法,其特征在于,在对所述通知信息对应的资产发行方进行验证之前,包括:
    获取所述资产发行方发送的注册信息,对所述注册信息进行审核;
    当审核通过时,将预设的账号信息发送给所述资产发行方,以使所述资产发行方根据所述账号信息进行验证。
  4. 如权利要求1所述的数字资产交易控制方法,其特征在于,在获取所述数字资产信息之前,包括:
    获取所述资产发行方输入的独享密码,并对所述资产发行方的独享密码进行验证;
    当验证成功时,获取所述资产发行方发送的数字资产信息。
  5. 如权利要求1所述的数字资产交易控制方法,其特征在于,在将所述数字资产信息发送给所述目标用户之后,包括:
    获取绑定请求,对所述绑定请求进行验证;
    当验证通过时,将预设第二动态密钥发送给所述绑定请求对应的目标用户,以使所述目标用户根据所述第二动态密钥设置消费独享密码。
  6. 如权利要求5所述的数字资产交易控制方法,其特征在于,所述对所述绑定请求进行验证,包括:
    获取所述绑定请求中的编号信息;
    根据所述编号信息确定所述编号信息对应的资产当前状态;
    当所述资产当前状态符合预设条件时,所述绑定请求的验证通过。
  7. 如权利要求1至6任一项所述的数字资产交易控制方法,其特征在于,所述目标用户根据所述第一动态密钥设置独享密码,包括:
    将预设安全控件发送给所述目标用户,以使目标用户根据所述第一动态密钥重新在所述安全控件上设置独享密码。
  8. 一种数字资产交易控制装置,其特征在于,包括:
    校对模块,用于获取订单信息,将所述订单信息发送给所述订单信息对应的资产发行方,以使所述资产发行方根据所述订单信息与预设订购信息进行校对;
    设置模块,用于当校对通过时,将预设第一动态密钥发送给所述订单信息对应的目标用户,以使所述目标用户根据所述第一动态密钥设置独享密码;
    请求模块,用于当所述独享密码设置成功时,向所述资产发行方发出订单请求,以使所述资产发行方根据所述订单请求收集所述订单信息对应的数字资产信息;
    第一获取模块,用于获取所述数字资产信息,将所述数字资产信息发送给所述目标用户。
  9. 如权利要求8所述的数字资产交易控制装置,其特征在于,包括:
    第二获取模块,用于获取通知信息;所述通知信息为所述资产发行方根据验证通过的所述目标用户的订购信息发送的信息;
    第一验证模块,用于对所述通知信息对应的资产发行方进行验证;
    第一发送模块,用于当验证通过时,将所述通知信息发送给所述目标用户,以使所述目标用户根据所述通知信息发送对应的订单信息。
  10. 如权利要求9所述的数字资产交易控制装置,其特征在于,包括:
    审核模块,用于获取所述资产发行方发送的注册信息,对所述注册信息进行审核;
    第二验证模块,用于当审核通过时,将预设的账号信息发送给所述资产发行方,以使所述资产发行方根据所述账号信息进行验证。
  11. 如权利要求8所述的数字资产交易控制装置,其特征在于,包括:
    第三验证模块,用于获取所述资产发行方输入的独享密码,并对所述资产发行方的独享密码进行验证;
    第三获取模块,用于当验证成功时,获取所述资产发行方发送的数字资产信息。
  12. 如权利要求8所述的数字资产交易控制装置,其特征在于,包括:
    第四验证模块,用于获取绑定请求,对所述绑定请求进行验证;
    第二发送模块,用于当验证通过时,将预设第二动态密钥发送给所述绑定请求对应的目标用户,以使所述目标用户根据所述第二动态密钥设置消费独享密码。
  13. 如权利要求12所述的数字资产交易控制装置,其特征在于,所述第四验证模块包括:
    获取单元,用于获取所述绑定请求中的编号信息;
    确定单元,用于根据所述编号信息确定所述编号信息对应的资产当前状态;
    验证通过单元,用于当所述资产当前状态符合预设条件时,所述绑定请求的验证通过。
  14. 如权利要求8至13任一项所述的数字资产交易控制装置,其特征在于,所述设置模块包括:
    设置单元,用于将预设安全控件发送给所述目标用户,以使目标用户根据所述第一动态密钥重新在所述安全控件上设置独享密码。
  15. 一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求1至7任一项所述的一种数字资产交易控制方法的步骤。
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1至7任一项所述的一种数字资产交易控制方法的步骤。
PCT/CN2020/123757 2020-10-26 2020-10-26 一种数字资产交易控制方法、装置、终端设备及存储介质 WO2022087791A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/123757 WO2022087791A1 (zh) 2020-10-26 2020-10-26 一种数字资产交易控制方法、装置、终端设备及存储介质
CN202080002461.6A CN112513904B (zh) 2020-10-26 2020-10-26 一种数字资产交易控制方法、装置、终端设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/123757 WO2022087791A1 (zh) 2020-10-26 2020-10-26 一种数字资产交易控制方法、装置、终端设备及存储介质

Publications (1)

Publication Number Publication Date
WO2022087791A1 true WO2022087791A1 (zh) 2022-05-05

Family

ID=74953060

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/123757 WO2022087791A1 (zh) 2020-10-26 2020-10-26 一种数字资产交易控制方法、装置、终端设备及存储介质

Country Status (2)

Country Link
CN (1) CN112513904B (zh)
WO (1) WO2022087791A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115471956A (zh) * 2022-08-29 2022-12-13 拉扎斯网络科技(上海)有限公司 一种信息处理方法、装置、可读存储介质和电子设备
CN117252702A (zh) * 2023-11-20 2023-12-19 深圳奥联信息安全技术有限公司 一种基于区块链的数据资产交易方法及系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113298659A (zh) * 2021-06-22 2021-08-24 上海和数软件有限公司 一种基于区块链的数字资产交易方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190026821A1 (en) * 2017-07-21 2019-01-24 International Business Machines Corporation Intermediate blockchain system for managing transactions
CN109299943A (zh) * 2018-10-16 2019-02-01 深圳市乘法信息技术有限公司 一种基于区块链的知识产权交易的方法及装置
US20190303921A1 (en) * 2018-03-30 2019-10-03 Health Alliance Management, LLC Systems and methods for peer-to-peer transmission of digital assets
CN110827021A (zh) * 2019-10-24 2020-02-21 海南新软软件有限公司 数字资产提取监测方法及装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109447599A (zh) * 2018-09-30 2019-03-08 中链科技有限公司 基于区块链的数字资产发行方法及系统
CN111444209B (zh) * 2020-03-25 2022-01-07 腾讯科技(深圳)有限公司 一种基于区块链的数据处理方法、装置、设备及介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190026821A1 (en) * 2017-07-21 2019-01-24 International Business Machines Corporation Intermediate blockchain system for managing transactions
US20190303921A1 (en) * 2018-03-30 2019-10-03 Health Alliance Management, LLC Systems and methods for peer-to-peer transmission of digital assets
CN109299943A (zh) * 2018-10-16 2019-02-01 深圳市乘法信息技术有限公司 一种基于区块链的知识产权交易的方法及装置
CN110827021A (zh) * 2019-10-24 2020-02-21 海南新软软件有限公司 数字资产提取监测方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115471956A (zh) * 2022-08-29 2022-12-13 拉扎斯网络科技(上海)有限公司 一种信息处理方法、装置、可读存储介质和电子设备
CN115471956B (zh) * 2022-08-29 2024-04-02 拉扎斯网络科技(上海)有限公司 一种信息处理方法、装置、可读存储介质和电子设备
CN117252702A (zh) * 2023-11-20 2023-12-19 深圳奥联信息安全技术有限公司 一种基于区块链的数据资产交易方法及系统
CN117252702B (zh) * 2023-11-20 2024-05-10 深圳奥联信息安全技术有限公司 一种基于区块链的数据资产交易方法及系统

Also Published As

Publication number Publication date
CN112513904B (zh) 2024-05-03
CN112513904A (zh) 2021-03-16

Similar Documents

Publication Publication Date Title
US11068883B2 (en) Apparatus and methods for secure element transactions and management of assets
AU751404B2 (en) Symmetrically-secured electronic communication system
US6938019B1 (en) Method and apparatus for making secure electronic payments
JP5721086B2 (ja) 電子マネーの管理方法
US11245513B2 (en) System and method for authorizing transactions in an authorized member network
WO2022087791A1 (zh) 一种数字资产交易控制方法、装置、终端设备及存储介质
CN111417945B (zh) 基于区块链的可信保函
US11373162B2 (en) Systems and methods for displaying payment device specific functions
CN101739624A (zh) 一种可信支付网络系统
US20210209594A1 (en) System and methods for using limit-use encrypted code to transfer values securely among users
CN101138242A (zh) 交互式电视系统
TWI622949B (zh) 具多重密鑰的kyc資料標記之爭議救濟系統及其方法
CN116802661A (zh) 基于令牌的链外交互授权
KR102333811B1 (ko) 블록체인 기반의 카드 결제 처리 시스템 및 방법
US20230283466A1 (en) Content protection system
US11812260B2 (en) Secure offline mobile interactions
CN111915300A (zh) 一种基于区块链完成数字签收的方法、系统及存储介质
AU2018282255A1 (en) System and method for secure transmission of data and data authentication
CA2295603C (en) Symmetrically-secured electronic communication system
JP2002230336A (ja) ネット取引方法、データ処理装置および方法、データ通信システム、コンピュータプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20958956

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20958956

Country of ref document: EP

Kind code of ref document: A1