WO2023066197A1 - 一种数字货币交易异常的验证方法和装置 - Google Patents

一种数字货币交易异常的验证方法和装置 Download PDF

Info

Publication number
WO2023066197A1
WO2023066197A1 PCT/CN2022/125670 CN2022125670W WO2023066197A1 WO 2023066197 A1 WO2023066197 A1 WO 2023066197A1 CN 2022125670 W CN2022125670 W CN 2022125670W WO 2023066197 A1 WO2023066197 A1 WO 2023066197A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital currency
double
information
background system
verification
Prior art date
Application number
PCT/CN2022/125670
Other languages
English (en)
French (fr)
Inventor
穆长春
狄刚
赵新宇
崔沛东
于鹏
闫建丽
Original Assignee
中国人民银行数字货币研究所
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国人民银行数字货币研究所 filed Critical 中国人民银行数字货币研究所
Publication of WO2023066197A1 publication Critical patent/WO2023066197A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/381Currency conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the present disclosure relates to the field of computer technology, and in particular to a method and device for verifying abnormal digital currency transactions.
  • the embodiments of the present disclosure provide a method and device for verifying abnormal digital currency transactions.
  • a method for verifying an abnormal digital currency transaction is provided.
  • a verification method for abnormal digital currency transactions comprising: a first terminal application receiving digital currency transaction information sent by a second terminal application; the first terminal application executes the corresponding Abnormality judgment operation to determine that there is an abnormality in the digital currency transaction, wherein the background system of the first operating organization is the background system of the operating organization of the first terminal application, and the abnormality judgment operation is one of the following two operations: The operation of searching for the double-spend information corresponding to the digital currency transaction information in the spend information list, and the operation of sending the digital currency transaction information to the background system of the first operating institution for verification.
  • the first terminal application performs a corresponding abnormality judgment operation according to the network connection status with the background system of the first operating organization to determine that there is an abnormality in the digital currency transaction, including: the first A terminal application searches for the double-spend information corresponding to the digital currency transaction information in the local double-spend information list without establishing a network connection with the background system of the first operating organization. Double-spending information, it is determined that there is an abnormality in the digital currency transaction.
  • the double-spend information in the local double-spend information list is pre-synchronized by the background system of the first operator to the first terminal application.
  • the first terminal application obtains the local double-spending information list synchronously from the background system of the first operating institution when networking or performing online services.
  • the local double-spending information list is stored in a local security chip of the first terminal application.
  • the first terminal application performs a corresponding abnormality judgment operation according to the network connection status with the background system of the first operating organization to determine that there is an abnormality in the digital currency transaction, including: the first When a terminal application establishes a network connection with the background system of the first operating institution, it searches the local double-spend information list for the double-spend information corresponding to the digital currency transaction information, or stores the digital currency transaction information Send to the background system of the first operating agency for verification; if the double-spending information corresponding to the digital currency transaction information is found in the local double-spending information list, or the verification result returned by the background system of the first operating agency If the verification fails, it is determined that there is an abnormality in the digital currency transaction.
  • the first terminal application when the first terminal application establishes a network connection with the backstage system of the first operating institution, it will give priority to sending the digital currency transaction information to the first operating institution's background system.
  • the organization's background system performs verification operations.
  • the first terminal application when it is determined that the digital currency transaction is abnormal, sends a locking request to the background system of the first operating agency, so that the first operating agency
  • the background system of the institution sends the lock request to the background system of the second operating institution, through which the background system of the second operating institution locks the second terminal application and/or the digital currency string of this transaction, and the second The second operating institution background system is the operating institution background of the second terminal application.
  • the first terminal when the digital currency transaction information is sent to the background system of the first operating institution for verification, and it is determined that the digital currency transaction is abnormal, the first terminal The application updates the local double-spend information list according to the digital currency transaction information.
  • the double-spend information includes one or more of user wallet information, digital currency information, and digital currency version information
  • the digital currency information includes digital currency expressions and/or or serial number
  • a method for verifying an abnormal digital currency transaction is provided.
  • a verification method for digital currency transaction exceptions comprising: a first operating institution background system receiving digital currency transaction information sent by a first terminal application, the first operating institution background system being the operating institution background of the first terminal application, The digital currency transaction information is sent by the second terminal application to the first terminal application; the background system of the first operating organization uses the double-spending information list to verify the digital currency transaction information, if the double-spend If the verification fails, a verification result indicating that the digital currency transaction is abnormal is returned to the first terminal application.
  • the background system of the first operating institution uses the double-spend information list to verify the double-spending of the digital currency transaction information, including: the background system of the first operating institution stores double-spending Find the double-spend information corresponding to the digital currency transaction information in the spend information list, and if the double-spend information corresponding to the digital currency transaction information is found, the double-spend verification fails.
  • the double-spend information in the stored double-spend information list includes first double-spend information and second double-spend information
  • the first double-spend information is the The background system of the institution is based on the version information of the digital currency issued by itself, the user wallet information corresponding to the issued digital currency, and the abnormality of one or more information in the digital currency information.
  • the second double-spend information is the The background system of the first operating institution is obtained synchronously from the background systems of other operating institutions through interconnection.
  • the background system of the first operating institution uses the double-spending information list to perform double-spend verification on the digital currency transaction information, including: the background system of the first operating institution converts the digital currency The currency transaction information is sent to the first verification platform, and the first verification platform searches for the double-spend information corresponding to the digital currency transaction information in its own double-spend information list.
  • it further includes: if the double-spending verification is passed, the background system of the first operating institution sends the digital currency transaction information to the background of the digital currency issuing institution for this transaction System; the background system of the issuing agency performs information verification on one or more of the user wallet information, digital currency information, and digital currency version information contained in the digital currency transaction information, if the information verification If it fails, return a verification result indicating that the digital currency transaction is abnormal to the first terminal application.
  • the background system of the first operating institution when there is an abnormality in the digital currency transaction, sends a locking request to the background system of the second operating institution, and through the background system of the second operating institution The system locks the second terminal application and/or the digital currency string of this transaction, and the second operating institution background system is the operating institution background of the second terminal application.
  • the locking request is generated by the background system of the first operating institution, or sent to the background system of the first operating institution by the first terminal application.
  • a verification method for digital currency transaction exceptions is provided.
  • a method for verifying an abnormal digital currency transaction comprising: when the second terminal application sends a current digital currency transaction transaction to the first terminal application when the background system of the second operating institution establishes a network connection Before the information is sent, the background system of the second operating institution initiates double-spend verification of the digital currency transaction information of the current transaction, wherein the background system of the second operating institution is the background system of the operating institution of the second terminal application; If the double-spending verification fails, the background system of the second operating institution determines that the current transaction is abnormal, and terminates the current transaction.
  • a verification method for digital currency transaction exceptions is provided.
  • a method for verifying abnormal digital currency transactions comprising: establishing a network connection between a background system of a second operating organization and a second terminal application; Currency transaction information undergoes double-spend verification, and the sent digital currency transaction information is sent by the second terminal application to other terminal applications; the background system of the second operating organization fails the double-spend verification , locking the second terminal application, where the offline state of the second terminal application is a state in which the second terminal application has not established a network connection with the background system of the second operating institution.
  • a device for verifying abnormal digital currency transactions is provided.
  • a verification device for abnormal digital currency transactions located in the first terminal application, the device includes: a communication module, used to receive digital currency transaction information sent by the second terminal application; The network connection status of the background system, execute the corresponding abnormal judgment operation to determine that there is an abnormality in the digital currency transaction, wherein, the background system of the first operating organization is the background system of the operating organization of the first terminal application, and the abnormal judgment operation is One of the following two operations: the operation of searching for the double-spend information corresponding to the digital currency transaction information in the local double-spend information list, and the operation of sending the digital currency transaction information to the background system of the first operating agency for verification .
  • a device for verifying abnormal digital currency transactions is provided.
  • a verification device for abnormal digital currency transactions located in the background system of a first operating organization, the device includes: a transaction information receiving module for receiving digital currency transaction information sent by a first terminal application, and the background system of the first operating organization The system is the background of the operating organization of the first terminal application, and the digital currency transaction information is sent to the first terminal application by the second terminal application; the transaction exception verification module is used to check the digital currency transaction information using the double spend information list.
  • the currency transaction information undergoes double-spend verification, and if the double-spend verification fails, a verification result indicating that the digital currency transaction is abnormal is returned to the first terminal application.
  • a device for verifying abnormal digital currency transactions is provided.
  • a verification device for abnormal digital currency transactions located in the background system of a second operating institution, the device includes: a double-spend verification module, used to establish a network connection between the background system of the second operating institution and the second terminal application, Before the second terminal application sends the digital currency transaction information of the current transaction to the first terminal application, it initiates a double-spend verification of the digital currency transaction information of the current transaction, wherein the background system of the second operating institution is the The backstage of the operating institution applied by the second terminal; the transaction abnormal termination module, used for the background system of the second operating institution to determine that there is an abnormality in the current transaction and terminate the current transaction if the double-spend verification fails. trade.
  • a device for verifying abnormal digital currency transactions is provided.
  • a verification device for abnormal digital currency transactions located in the background system of a second operating organization, the device includes: a network connection establishment module, used to establish a network connection with a second terminal application; a double-spending information verification module, used to verify all The digital currency transaction information sent by the second terminal application in the offline state is used for double-spend verification, and the digital currency transaction information sent is sent by the second terminal application to other terminal applications; the second terminal application
  • the offline state is a state in which the second terminal application has not established a network connection with the background system of the second operating organization; an application locking module is configured to lock the second terminal application locking.
  • an electronic device is provided.
  • An electronic device comprising: one or more processors; a memory for storing one or more programs, when the one or more programs are executed by the one or more processors, the one or more A plurality of processors implement the method for verifying abnormal digital currency transactions provided by the embodiments of the present disclosure.
  • a computer-readable medium is provided.
  • a computer-readable medium on which a computer program is stored, and when the program is executed by a processor, the method for verifying abnormal digital currency transactions provided by an embodiment of the present disclosure is implemented.
  • FIG. 1 is a schematic diagram of main steps of a method for verifying an abnormal digital currency transaction according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of main steps of a method for verifying an abnormal digital currency transaction according to another embodiment of the present disclosure
  • Fig. 3 is a schematic diagram of main steps of a method for verifying an abnormal digital currency transaction according to yet another embodiment of the present disclosure
  • Fig. 4 is a schematic diagram of main steps of a method for verifying an abnormal digital currency transaction according to yet another embodiment of the present disclosure
  • Fig. 5 is a schematic diagram of a verification process of an abnormal payment transaction according to an embodiment of the present disclosure
  • Fig. 6 is a schematic diagram of cross-organization maintenance of a double-spending information list according to an embodiment of the present disclosure
  • Fig. 7 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to an embodiment of the present disclosure
  • Fig. 8 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to another embodiment of the present disclosure.
  • Fig. 9 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to yet another embodiment of the present disclosure.
  • Fig. 10 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to yet another embodiment of the present disclosure.
  • FIG. 11 is an exemplary system architecture diagram to which embodiments of the present disclosure can be applied.
  • Fig. 12 is a schematic structural diagram of a computer system suitable for implementing a terminal device or a server according to an embodiment of the present disclosure.
  • Fig. 1 is a schematic diagram of main steps of a method for verifying abnormal digital currency transactions according to an embodiment of the present disclosure. As shown in FIG. 1 , the following steps S101 to S102 are included.
  • Step S101 the first terminal application receives the digital currency transaction information sent by the second terminal application;
  • Step S102 The first terminal application executes the corresponding abnormal judgment operation according to the network connection status with the background system of the first operating organization to determine that there is an abnormality in the digital currency transaction, wherein the abnormal judgment operation is one of the following two operations: locally The operation of finding the double-spend information corresponding to the digital currency transaction information in the double-spend information list, and the operation of sending the digital currency transaction information to the background system of the first operating institution for verification.
  • the first terminal application is divided into two types according to the network connection status with the background system of the first operating institution: the first terminal application has not established a network connection with the background system of the first operating institution, and has established a network connection with the background system of the first operating institution.
  • the first terminal application performs a corresponding abnormal judgment operation according to the network connection status with the background system of the first operating institution to determine that there is an abnormality in the digital currency transaction, which may specifically include: When the background system of an operating organization establishes a network connection, search for the double-spend information corresponding to the digital currency transaction information in the local double-spend information list. If the double-spend information corresponding to the digital currency transaction information is found, it is determined that there is an abnormality in the digital currency transaction. .
  • the background system of the first operating organization is the background system of the operating organization applied by the first terminal.
  • the double-spending information in the local double-spending information list is pre-synchronized to the first terminal application by the background system of the first operating organization.
  • the first terminal application synchronously obtains a local double-spending information list from the back-end system of the first operating organization when connecting to the Internet or performing online services. For example, when the first terminal application is online, the background system of the first operating organization sends double-spending information to the first terminal application, which can be updated together with recharge, cash withdrawal, synchronization and other processes.
  • the double-spending information list of the background system of the first operating organization may be synchronized from the systems of other operating organizations.
  • each operating organization may jointly maintain the double-spending information so as to realize cross-operating organization double-spending information verification.
  • the local double-spend information list is stored in a local security chip of the first terminal application. By storing the double-spend information in the terminal-side security chip, it can ensure that the first terminal application can verify the double-spend information when it is offline. Offline means that the first terminal application has not established a network connection with the background system of the first operating institution.
  • the first terminal application performs a corresponding abnormal judgment operation according to the network connection status with the background system of the first operating organization to determine that there is an abnormality in the digital currency transaction, which may specifically include: the first terminal application is connected to the second When the background system of an operating agency establishes a network connection, it searches for the double-spending information corresponding to the digital currency transaction information in the local double-spending information list, or sends the digital currency transaction information to the background system of the first operating agency for verification; If the double-spend information corresponding to the digital currency transaction information is found in the double-spend information list, it is determined that there is an abnormality in the digital currency transaction.
  • the returned verification result is that the verification fails, it is determined that there is an exception in the digital currency transaction, and if the returned verification result is that the verification is passed, then there is no exception.
  • the first terminal application when the first terminal application establishes a network connection with the background system of the first operating institution, it can be set to give priority to the operation of sending digital currency transaction information to the background system of the first operating institution for verification.
  • the first terminal application When it is determined that there is an abnormality in the digital currency transaction, the first terminal application sends a locking request to the background system of the first operating organization, so that the background system of the first operating organization sends the locking request to the background system of the second operating organization.
  • the institutional background system locks the second terminal application and/or the digital currency string of this transaction, and the second operating institution background system is the operating institution background of the second terminal application.
  • the first terminal application updates the local double-spending information list according to the digital currency transaction information.
  • the double-spend information includes one or more of user wallet information, digital currency information, and digital currency version information, and the digital currency information includes digital currency expressions and/or serial numbers.
  • the embodiment of the present disclosure can realize the verification (or verification) of the counterparty in the transaction process, wherein, when the terminal application is offline, the verification is performed according to the local double-spend information, and when the terminal application is online, the local double-spend information verification or Send it to the background of the operating organization for verification to prevent repeated spending of illegal or abnormal wallets or double spending of digital currency.
  • illegal or abnormal wallets can be locked to prohibit the counterparty from continuing to trade, reducing the risk of double spending of digital currency.
  • the embodiments of the present disclosure can perform double-spend verification through multiple dimensions.
  • double-spend information can include user wallet information such as wallet ID, user public key, etc.
  • the terminal application can report the exception to the background of the operating organization and update the local double-spending information list to reduce storage pressure.
  • Fig. 2 is a schematic diagram of main steps of a method for verifying an abnormal digital currency transaction according to another embodiment of the present disclosure. As shown in FIG. 2 , the following steps S201 to S202 are included.
  • Step S201 the background system of the first operating institution receives the digital currency transaction information sent by the first terminal application
  • the background system of the first operating institution is the background system of the operating institution of the first terminal application, and the digital currency transaction information is sent to the first terminal application by the second terminal application.
  • Step S202 The background system of the first operating institution uses the double-spending information list to verify the digital currency transaction information for double spending, and if the double-spending verification fails, returns a verification result indicating that the digital currency transaction is abnormal to the first terminal application.
  • the background system of the first operating institution uses the double-spend information list to verify the double-spending information of the digital currency transaction, which specifically includes: the background system of the first operating institution searches the stored double-spending information list for the corresponding digital currency transaction information; double-spend information, if the double-spend information corresponding to the digital currency transaction information is found, the double-spend verification fails.
  • the double-spend information in the stored double-spend information list includes the first double-spend information and the second double-spend information.
  • the corresponding user wallet information and digital currency information are generated due to abnormality of one or more information, and the second double-spend information is obtained synchronously from the back-end systems of other operating institutions by the back-end system of the first operating institution through interconnection.
  • the background system of the first operating institution uses the double-spending information list to verify the digital currency transaction information, which specifically includes: the background system of the first operating institution sends the digital currency transaction information to the first verification platform, and the second The first verification platform searches for the double-spend information corresponding to the digital currency transaction information in its own double-spend information list.
  • the first verification platform is the back-end system of other operating agencies except the back-end system of the first operating agency or shared by each operating agency. Double-spend information sharing platform; if the double-spend information corresponding to the digital currency transaction information is found, the double-spend verification fails.
  • the double-spend verification fails, thereby determining that there is an abnormality in the digital currency transaction, and if the corresponding double-spend information is not found, then the double-spend verification passes, thereby determining that the transaction is invalid. abnormal.
  • it further includes: if the double-spend verification is passed, the background system of the first operating organization sends the digital currency transaction information to the background system of the digital currency issuing institution for this transaction; The background system of the issuing agency performs information verification on one or more of the user wallet information, digital currency information, and digital currency version information contained in the digital currency transaction information. If the information verification fails, the first terminal application Returns a verification result indicating that there is an anomaly in the digital currency transaction. That is, the transaction is determined to be normal only when both the double-spend verification and the information verification pass, and if either of the double-spend verification and the information verification fails, it will be determined that there is an abnormality in the digital currency transaction.
  • the digital currency issuing agency maintains the specific transaction information of the digital currency, and other operating agencies send the relevant transaction information of the currency string to the issuing agency through the interconnection platform, and the issuing agency judges the double-spending situation of the currency string.
  • the background system of the first operating organization sends a lock request to the background system of the second operating organization, and the second terminal application and/or the digital currency string of this transaction are processed by the background system of the second operating organization.
  • the background system of the second operating organization is the background system of the operating organization of the second terminal application.
  • the locking request is generated by the background system of the first operating institution, or sent to the background system of the first operating institution by the first terminal application.
  • the embodiment of the present disclosure realizes that during the transaction, both parties to the transaction perform legality verification. If the user or the digital currency is found to be double-spending, the transaction will be rejected, and the application will be uploaded to the background or locked, and can be used by the first terminal application or The backstage system of the first operating agency initiates a lock, which effectively reduces the risk of repeated double spending and ensures the security of digital currency transactions.
  • Fig. 3 is a schematic diagram of main steps of a method for verifying abnormal digital currency transactions according to yet another embodiment of the present disclosure. As shown in FIG. 3 , the following steps S301 to S302 are included.
  • Step S301 When the background system of the second operating institution establishes a network connection with the second terminal application, before the second terminal application sends the digital currency transaction information of the current transaction to the first terminal application, the background system of the second operating institution initiates a Double-spend verification of digital currency transaction information for current transactions;
  • the background system of the second operating organization is the background system of the operating organization applied by the second terminal.
  • Step S302 The background system of the second operating institution determines that the current transaction is abnormal if the double-spend verification fails, and terminates the current transaction.
  • the background system of the second operating institution initiates the double-spend verification of the digital currency transaction information of the current transaction, which specifically includes: the background system of the second operating institution uses the double-spend information list of the second verification platform to verify the current transaction
  • the digital currency transaction information is verified for double spending
  • the second verification platform is the background system of other operating organizations other than the background system of the second operating organization or the double-spending information sharing platform shared by each operating organization; in the double-spending information list, there are current
  • the double-spend verification fails. If the corresponding double-spend information exists, the double-spend verification is passed.
  • the background system of the second operating institution initiates double-spend verification of the digital currency transaction information of the current transaction, which specifically includes: the background system of the second operating institution sends the digital currency transaction information of the current transaction to the digital currency transaction information of the current transaction.
  • the background system of the currency issuing institution the background system of the issuing institution will verify the information of one or more of the user's wallet information, digital currency information, and digital currency version information contained in the digital currency transaction information of the current transaction. If the verification fails, the double-spend verification fails. If the information verification is passed, it means that the double-spending verification has also passed.
  • the two situations of the above-mentioned embodiments can be combined, that is, the double-spend verification of the digital currency transaction information of the current transaction can be performed first through the double-spend information list of the second verification platform, that is, the double-spend information There is double-spending information corresponding to the digital currency transaction information of the current transaction in the list. If the corresponding double-spending information is found, it is directly determined that the transaction is abnormal. If the corresponding double-spending information is not found, the current transaction’s digital currency is further The currency transaction information is sent to the background system of the digital currency issuer of the current transaction, and the background system of the issuer performs the above-mentioned information verification.
  • the transaction is confirmed only when the corresponding double-spend information is not found and the information verification passes. If there is no abnormality, if the corresponding double-spending information is found or the information verification fails, it is determined that there is an abnormality in the transaction, that is, it is determined that there is a double-spending situation.
  • the background system of the second operating institution terminates the current transaction by locking the second terminal application and/or the digital currency string of the current transaction.
  • the transaction will be rejected, and the background system will be uploaded or its application will be locked, and the lock can be initiated by the background system of the second operating organization, effectively reducing the risk of repeated double-spending Risk, to ensure the security of digital currency transactions.
  • Fig. 4 is a schematic diagram of main steps of a method for verifying abnormal digital currency transactions according to yet another embodiment of the present disclosure. As shown in FIG. 4 , the following steps S401 to S403 are included.
  • Step S401 the background system of the second operating organization establishes a network connection with the second terminal application
  • Step S402 The background system of the second operating organization performs double-spending verification on the digital currency transaction information sent by the second terminal application in the offline state, and the issued digital currency transaction information is sent by the second terminal application to other terminal applications;
  • Step S403 The background system of the second operating organization locks the second terminal application if the double-spending verification fails, and the offline state of the second terminal application is a state in which the second terminal application has not established a network connection with the background system of the second operating organization .
  • the backstage system of the second operating institution performs double-spending verification on the digital currency transaction information sent by the second terminal application in the offline state, which may specifically include:
  • the back-end system of the second operating agency performs double-spend verification on the issued digital currency transaction information through the double-spending information list of the third verification platform.
  • the third verification platform is the back-end system of other operating agencies except the back-end system of the second operating agency.
  • a double-spend information sharing platform shared by various operating agencies; if there is double-spend information corresponding to the issued digital currency transaction information in the double-spend information list, the double-spend verification fails, and if there is no corresponding double-spend information, the double-spending verification is passed.
  • This embodiment is applicable to when the second terminal application establishes a network connection with the background system of the second operating institution due to various services (such as recharging, new transactions, etc.) after the second terminal application completes transactions with other terminal applications offline
  • the background system of the second operating organization can actively perform double-spending verification on the digital currency transaction information sent by the second terminal application in the offline state, and Actively initiate the locking of the second terminal application, effectively reducing the risk of repeated double spending and ensuring the security of digital currency transactions.
  • Fig. 5 is a schematic diagram of an abnormal verification process of a payment transaction according to an embodiment of the present disclosure.
  • the process includes: generation and management of double-spend information; storage and acquisition of double-spend information; transaction on the terminal side; transaction Information verification, wherein, if the terminal application is online (that is, the terminal application has established a network connection with the background of its operating organization), it can be verified locally on the terminal or through the terminal network; if the terminal application is offline (that is, it has not established a network connection with the background of its operating organization) ), the verification is performed locally on the terminal; if the verification is passed, the transaction is continued; if the verification fails, the transaction is rejected, wherein, after the local verification of the terminal fails and the transaction is rejected, the terminal application can report abnormal information to the background of the operating institution; After verifying and rejecting the transaction through the terminal network, the backstage of the operating agency can record the transaction exception and lock the application.
  • the generation and management of double-spend information can generate a list of double-spend information through the system version information of the digital currency issued by itself, the discovery of program bugs (defects), abnormal user wallets, etc. (Cross-operating agencies)
  • each operating agency sends the transaction information and digital currency information to the issuing agency through interconnection (the issuing agency refers to the operating agency responsible for issuing digital currency, or the background system of the issuing agency), and the transaction information It may include one or more of user wallet information, digital currency information, and digital currency version information, and the digital currency information may include digital currency expressions and/or serial numbers.
  • the issuing agency judges according to the information of each transaction node.
  • a node If a node is found to be oversubscribed, it can list the node user or digital currency information as double-spend information, and synchronize it to the double-spend information management module.
  • the double-spend information management module is double-spend information sharing. platform, where the double-spend information is synchronized from the back-end systems of various operating agencies.
  • Each operating institution can jointly maintain the double-spending information of users or digital currency in a centralized or blockchain manner.
  • Figure 6 uses three Institutions are taken as an example, and the number of institutions does not limit the protection scope of the embodiments of the present disclosure.
  • the issuing (or operating) institution that issues the digital currency maintains the amount of the digital currency.
  • the double spending owner will be updated to the double spending information list (pool).
  • Each operating agency has its own agency background management module.
  • the agency background management module is used by the operating agency to synchronize the double-spending information of other operating agencies, add, delete or update the double-spending information of the operating agency, and can be regularly or in agreement Synchronize the double-spending information of this operating agency to other operating agencies under certain conditions.
  • each operating organization will update the double-spend information to the double-spend information management module simultaneously.
  • the double-spend information list can be updated to reduce storage pressure.
  • the background system of the operating agency can also obtain the latest double-spending information and synchronize it to the corresponding terminal application (for example, the background system of the first operating agency synchronizes the list of double-spending information to the first terminal application), as well as the currency string transaction information issued by the operating agency.
  • Conduct management checks When the wallet user (that is, the terminal application) is online, the background of the operating organization will push the current double-spend information list to the wallet user.
  • the double-spend information list can include such as wallet ID, public key information, digital currency, currency identification, version information, etc. .
  • both parties to the transaction will verify the double-spending information list, and if the user or the digital currency is found to be double-spending, the transaction will be rejected.
  • the payee When the payee is online, it can verify through the background of the operating organization, and lock the double-spending wallet application through instructions, so that it cannot continue subsequent transactions, effectively reducing the risk of repeated double-spending, and ensuring the security of digital currency transactions.
  • end users can synchronize double-spend information in the following situations: first, when the end user is connected to the Internet; second, when the end user performs online services, such as opening, recharging, cash withdrawal, synchronization, Operations such as logout and query; thirdly, the double-spending information is synchronized by the transaction counterparty, which refers to another terminal application that conducts transactions with the current terminal application.
  • End users can store double-spending information in the local security chip of the terminal application, and locally storing double-spending information is helpful for double-spending verification during offline transactions.
  • Double-spend verification specifically, both parties to the transaction (ie, the first terminal application and the second terminal application) verify the double-spend information of the counterparty during the transaction process.
  • the verification method can be verified by local double-spend information, or by
  • the communication module sends the transaction information (that is, the digital currency transaction information) to the background system of the corresponding operating institution for verification, and the backstage of the operating institution returns the verification result.
  • the double-spending information may include the following information: digital currency version information, which is used to indicate the digital currency version or wallet application version; user information, including but not limited to wallet ID (identification), user public key, user certificate, wallet Token (token ), etc.; digital currency information, including but not limited to digital currency expressions, serial numbers, digital currency logos, etc.
  • Application locking in particular, when the verification fails, the terminal application can report the exception to the backend of the terminal application's operating organization when the user is connected to the Internet, and the operating organization's background will generate an application locking instruction, and the wallet application of the counterparty (that is, the terminal application) to perform a locking operation, prohibiting it from continuing to conduct transactions, and at the same time updating the local double-spending information to reduce storage pressure.
  • the embodiments of the present disclosure are not affected by terminal forms and communication methods, and can be widely applied to hardware wallets of various terminal forms, including but not limited to IC cards, mobile terminals, acceptance terminals, Internet of Things terminals, etc., and communication methods include but not limited to NFC ( Near Field Communication), Bluetooth, WIFI, UWB (Ultra Wideband), QR Code, etc.
  • NFC Near Field Communication
  • Bluetooth Wireless Fidelity
  • WIFI Wireless Fidelity
  • UWB Ultra Wideband
  • QR Code etc.
  • the payer's terminal application can be a second terminal application
  • the backstage of the payer’s operating organization can be the second operating organization’s backstage system
  • Fig. 7 is a schematic diagram of main modules of a device for verifying abnormal digital currency transactions according to an embodiment of the present disclosure.
  • an abnormal digital currency transaction verification device 700 according to an embodiment of the present disclosure is located in the first terminal application.
  • the digital currency transaction abnormal verification device 700 mainly includes a communication module 701 and a verification module 702 .
  • a communication module 701, configured to receive digital currency transaction information sent by the second terminal application
  • the verification module 702 is configured to perform a corresponding abnormal judgment operation according to the network connection status with the background system of the first operating organization, so as to determine that there is an abnormality in the digital currency transaction, wherein the background system of the first operating organization is the operating organization of the first terminal application
  • the abnormal judgment operation is one of the following two operations: the operation of finding the double-spend information corresponding to the digital currency transaction information in the local double-spend information list, and the operation of sending the digital currency transaction information to the background system of the first operating agency for verification .
  • the verification module 702 can be specifically configured to search the local double-spend information list for double-spend information corresponding to the digital currency transaction information when the first terminal application has not established a network connection with the background system of the first operating institution , if the double-spending information corresponding to the digital currency transaction information is found, it is determined that there is an abnormality in the digital currency transaction.
  • the double-spending information in the local double-spending information list is pre-synchronized to the first terminal application by the background system of the first operating institution.
  • the communication module 701 is responsible for establishing a communication connection between the first terminal application and the background system of the first operating organization.
  • the communication module 701 can obtain the local double-spending information list synchronously from the background system of the first operating organization when the first terminal application is connected to the Internet or when performing online business. .
  • the device 700 for verifying abnormal digital currency transactions further includes a security chip storage module, configured to store the local double-spending information list in the local security chip of the first terminal application.
  • the security chip storage module is responsible for locally storing double-spending information for local verification in subsequent offline transactions.
  • the verification module 702 is specifically configured to: find the double-spending information corresponding to the digital currency transaction information in the local double-spending information list when the first terminal application establishes a network connection with the background system of the first operating institution , or send the digital currency transaction information to the back-end system of the first operating agency for verification; if the double-spend information corresponding to the digital currency transaction information is found in the local double-spend information list, or the verification result returned by the back-end system of the first operating agency is If the verification fails, it is determined that there is an abnormality in the digital currency transaction.
  • the verification module 702 preferentially executes the operation of sending digital currency transaction information to the background system of the first operating institution for verification when the first terminal application establishes a network connection with the background system of the first operating institution.
  • the communication module 701 is also used for: when it is determined that there is an abnormality in the digital currency transaction, send a lock request to the background system of the first operating institution, so that the background system of the first operating institution sends the lock request to the background system of the second operating institution, through The background system of the second operating institution locks the second terminal application and/or the digital currency string of this transaction, and the background system of the second operating institution is the background system of the operating institution of the second terminal application.
  • the security chip storage module is also used to: update the local double-spending information list according to the digital currency transaction information .
  • the double-spend information includes one or more of user wallet information, digital currency information, and digital currency version information, and the digital currency information includes digital currency expressions and/or serial numbers.
  • Fig. 8 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to another embodiment of the present disclosure.
  • the digital currency transaction exception verification device 800 is located in the background system of the first operating organization.
  • the digital currency transaction exception verification device 800 mainly includes: a transaction information receiving module 801 and a transaction exception verification module 802 .
  • the transaction information receiving module 801 is used to receive the digital currency transaction information sent by the first terminal application.
  • the background system of the first operating organization is the background system of the operating organization of the first terminal application.
  • the digital currency transaction information is sent to the first terminal by the second terminal application Applied;
  • the transaction exception verification module 802 is configured to use the double-spend information list to perform double-spend verification on the digital currency transaction information, and if the double-spend verification fails, return a verification result indicating that the digital currency transaction is abnormal to the first terminal application.
  • the transaction exception verification module 802 is specifically configured to: search for the double-spend information corresponding to the digital currency transaction information in the stored double-spend information list, and if the double-spend information corresponding to the digital currency transaction information is found, the double-spend Authentication failed.
  • the double-spend information in the stored double-spend information list includes the first double-spend information and the second double-spend information.
  • the corresponding user wallet information and digital currency information are generated due to abnormality of one or more information, and the second double-spend information is obtained synchronously from the back-end systems of other operating institutions by the back-end system of the first operating institution through interconnection.
  • the transaction exception verification module 802 is specifically configured to: send the digital currency transaction information to the first verification platform, and the first verification platform searches for the double-spend corresponding to the digital currency transaction information in its own double-spend information list.
  • the first verification platform is the background system of other operating agencies other than the background system of the first operating agency or the double-spend information sharing platform shared by each operating agency; if the double-spend information corresponding to the digital currency transaction information is found, the double-spend Flower verification failed.
  • the transaction exception verification module 802 is also specifically configured to: if the double-spending verification is passed, then send the digital currency transaction information to the background system of the issuing agency of the digital currency in this transaction; One or more of the user wallet information, digital currency information, and digital currency version information contained in the transaction information are verified. If the information verification fails, the first terminal application is returned to indicate that there is an abnormality in the digital currency transaction. verification results.
  • the transaction exception verification module 802 is also used for: in the case of an abnormality in the digital currency transaction, send a lock request to the background system of the second operating organization, and use the background system of the second operating organization to apply the second terminal application and/or the digital currency of this transaction.
  • the currency string is locked, and the background system of the second operating institution is the background of the operating institution of the second terminal application.
  • the locking request may be generated by the background system of the first operating institution, or sent to the background system of the first operating institution by the first terminal application.
  • Fig. 9 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to yet another embodiment of the present disclosure.
  • the digital currency transaction abnormality verification device 900 is located in the background system of the second operating organization.
  • the digital currency transaction abnormality verification device 900 mainly includes: a double-spend verification module 901 and a transaction abnormal termination module 902 .
  • the double-spend verification module 901 is configured to initiate a verification of the current digital currency transaction information before the second terminal application sends the digital currency transaction information of the current transaction to the first terminal application when the background system of the second operating institution establishes a network connection with the second terminal application. Double-spending verification of digital currency transaction information for transactions, wherein the background system of the second operating organization is the background system of the operating organization of the second terminal application;
  • the transaction abnormal termination module 902 is used for the background system of the second operating institution to determine that the current transaction is abnormal and terminate the current transaction when the double-spend verification fails.
  • the double-spend verification module 901 is specifically configured to: perform double-spend verification on the digital currency transaction information of the current transaction through the double-spend information list of the second verification platform.
  • the background system of other operating agencies outside the system or the double-spend information sharing platform shared by each operating agency if there is double-spend information corresponding to the digital currency transaction information of the current transaction in the double-spend information list, the double-spend verification fails . If no double-spend information is found, the double-spend verification is passed, and it is determined that the current transaction is normal, and the subsequent operation of the transaction is continued.
  • the double-spend verification module 901 is specifically configured to: send the digital currency transaction information of the current transaction to the background system of the issuing institution of the digital currency of the current transaction, and the background system of the issuing institution will exchange the digital currency transaction information of the current transaction One or more of the information contained in the user's wallet information, digital currency information, and digital currency version information is verified. If the information verification fails, the double-spending verification fails. If the information verification is passed, the double-spend verification is passed, and it is determined that the current transaction is normal, and the subsequent operation of the transaction is continued.
  • the functions of the double-spend verification module 901 of the above two embodiments can be combined, that is, the double-spend verification module 901 can first pass the double-spend information list of the second verification platform to verify the digital currency transaction of the current transaction. The information is verified for double spending. If the double spending verification is passed, the digital currency transaction information of the current transaction will be further sent to the background system of the digital currency issuing agency for further information verification. If the information verification is also passed, then Indicates that there is no abnormality in the current transaction, and the follow-up operation of the transaction will continue. And if one of the double-flower verification and information verification fails, it means that there is an abnormality in the current transaction, thereby terminating the current transaction.
  • the transaction abnormal termination module 902 is specifically configured to terminate the current transaction by locking the second terminal application and/or the digital currency string of the current transaction.
  • Fig. 10 is a schematic diagram of main modules of a verification device for abnormal digital currency transactions according to yet another embodiment of the present disclosure.
  • a verification device 1000 for abnormal digital currency transactions according to yet another embodiment of the present disclosure is located in the background system of the second operating organization.
  • the verification device 1000 for abnormal digital currency transactions mainly includes: a network connection establishment module 1001 , double spend information Verification module 1002, application locking module 1003.
  • the double-spend information verification module 1002 is configured to perform double-spend verification on the digital currency transaction information sent by the second terminal application in an offline state, and the sent digital currency transaction information is sent by the second terminal application to other terminal applications;
  • the offline state of the second terminal application is a state in which the second terminal application has not established a network connection with the background system of the second operating institution;
  • An application locking module 1003, configured to lock the application of the second terminal when the double-spend verification fails.
  • the double-spend information verification module 1002 can specifically be used to: perform double-spend verification on the issued digital currency transaction information through the double-spend information list of the third verification platform.
  • Fig. 11 shows an exemplary system architecture 1100 to which the method for verifying an abnormal digital currency transaction or the device for verifying an abnormal digital currency transaction according to an embodiment of the present disclosure can be applied.
  • a system architecture 1100 may include terminal devices 1101 , 1102 , and 1103 , a network 1104 and a server 1105 .
  • the network 1104 is used to provide a communication link medium between the terminal devices 1101 , 1102 , 1103 and the server 1105 .
  • Network 1104 may include various connection types, such as wires, wireless communication links, or fiber optic cables, among others.
  • terminal devices 1101, 1102, 1103 Users can use terminal devices 1101, 1102, 1103 to interact with server 1105 through network 1104 to receive or send messages and the like.
  • Various communication client applications can be installed on the terminal devices 1101, 1102, 1103, such as shopping applications, web browser applications, search applications, instant messaging tools, email clients, social platform software, etc. (just examples).
  • the terminal devices 1101, 1102, and 1103 may be various electronic devices with display screens and supporting web browsing, including but not limited to smart phones, tablet computers, laptop computers, desktop computers, and the like.
  • the server 1105 may be a server that provides various services, such as a background management server that supports shopping websites browsed by users using the terminal devices 1101 , 1102 , and 1103 (just an example).
  • the background management server can analyze and process the received transaction information and other data, and feed back the processing result (such as the transaction result—just an example) to the terminal device.
  • the method for verifying abnormal digital currency transactions provided by the embodiments of the present disclosure is generally executed by the server 1105 or terminal devices 1101, 1102, and 1103.
  • the verification device for abnormal digital currency transactions is generally set on the server 1105 or terminal devices 1101, 1102, 1103.
  • terminal devices, networks and servers in Fig. 11 are only illustrative. According to the implementation needs, there can be any number of terminal devices, networks and servers.
  • FIG. 12 shows a schematic structural diagram of a computer system 1200 suitable for implementing a terminal device or a server according to an embodiment of the present disclosure.
  • the terminal device or server shown in FIG. 12 is only an example, and should not limit the functions and scope of use of the embodiments of the present disclosure.
  • a computer system 1200 includes a central processing unit (CPU) 1201, which can operate according to a program stored in a read-only memory (ROM) 1202 or a program loaded from a storage section 1208 into a random access memory (RAM) 1203 Instead, various appropriate actions and processes are performed.
  • ROM read-only memory
  • RAM random access memory
  • various programs and data required for the operation of the system 1200 are also stored.
  • the CPU 1201, ROM 1202, and RAM 1203 are connected to each other through a bus 1204.
  • An input/output (I/O) interface 1205 is also connected to the bus 1204 .
  • the following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, etc.; an output section 1207 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker; a storage section 1208 including a hard disk, etc. and a communication section 1209 including a network interface card such as a LAN card, a modem, or the like.
  • the communication section 1209 performs communication processing via a network such as the Internet.
  • a drive 1210 is also connected to the I/O interface 1205 as needed.
  • a removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is mounted on the drive 1210 as necessary so that a computer program read therefrom is installed into the storage section 1208 as necessary.
  • embodiments of the present disclosure include a computer program product, which includes a computer program carried on a computer-readable medium, where the computer program includes program codes for executing the methods shown in the flowcharts.
  • the computer program may be downloaded and installed from a network via communication portion 1209 and/or installed from removable media 1211 .
  • this computer program is executed by a central processing unit (CPU) 1201, the above-described functions defined in the system of the present disclosure are performed.
  • CPU central processing unit
  • the computer-readable medium shown in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium or any combination of the above two.
  • a computer readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to, electrical connections with one or more wires, portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, carrying computer-readable program code therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can send, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • each block in a flowchart or block diagram may represent a module, program segment, or portion of code that includes one or more logical functions for implementing specified executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block in the block diagrams or flowchart illustrations, and combinations of blocks in the block diagrams or flowchart illustrations can be implemented by a dedicated hardware-based system that performs the specified function or operation, or can be implemented by a A combination of dedicated hardware and computer instructions.
  • the modules involved in the embodiments described in the present disclosure may be implemented by software or by hardware.
  • the described modules may also be set in a processor, for example, it may be described as: a processor includes a communication module and a verification module. Wherein, the names of these modules do not constitute a limitation to the module itself under certain circumstances, for example, the communication module may also be described as "a module for receiving digital currency transaction information sent by the second terminal application".
  • the present disclosure also provides a computer-readable medium, which may be included in the device described in the above embodiments, or may exist independently without being assembled into the device.
  • the above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by one device, the device includes: the first terminal application receives the digital currency transaction information sent by the second terminal application; The first terminal application executes the corresponding abnormal judgment operation according to the network connection status with the background system of the first operating organization to determine that there is an abnormality in the digital currency transaction, wherein the background system of the first operating organization is the first terminal application In the backstage of the operating institution, the abnormal judgment operation is one of the following two operations: the operation of searching the double-spend information corresponding to the digital currency transaction information in the local double-spend information list, and sending the digital currency transaction information to the The verification operation is performed by the background system of the first operating organization.
  • the device is made to include: the background system of the first operating institution receives the digital currency transaction information sent by the first terminal application, the background system of the first operating institution is the background system of the operating institution of the first terminal application, and the digital currency transaction The information is sent by the second terminal application to the first terminal application; the background system of the first operating organization uses the double-spend information list to perform double-spend verification on the digital currency transaction information, if the double-spend verification fails, Then return a verification result indicating that the digital currency transaction is abnormal to the first terminal application.
  • make the device include: when the background system of the second operating institution establishes a network connection with the second terminal application, before the second terminal application sends the digital currency transaction information of the current transaction to the first terminal application, the The background system of the second operating organization initiates double-spend verification of the digital currency transaction information of the current transaction, wherein the background system of the second operating organization is the background system of the operating organization of the second terminal application; the second operating organization If the double-spend verification fails, the background system determines that the current transaction is abnormal, and terminates the current transaction.
  • make the device include: the background system of the second operating organization establishes a network connection with the second terminal application; the background system of the second operating organization double-checks the digital currency transaction information sent by the second terminal application offline flower verification, the digital currency transaction information that has been sent is sent by the second terminal application to other terminal applications; the background system of the second operating organization will send the second The second terminal application is locked, and the offline state of the second terminal application is a state in which the second terminal application has not established a network connection with the background system of the second operating institution.
  • the first terminal application receives the digital currency transaction information sent by the second terminal application, and performs the corresponding abnormal judgment operation according to the network connection status of the background system of the first operating organization to determine the existence of the digital currency transaction.
  • the abnormal judgment operation is one of the following two operations: the operation of finding the double-spend information corresponding to the digital currency transaction information in the local double-spend information list, and the operation of sending the digital currency transaction information to the background system of the first operating agency for verification .
  • the first terminal application searches the local double-spend information list for the double-spend information corresponding to the digital currency transaction information without establishing a network connection with the back-end system of the first operating institution, and if the double-spend information corresponding to the digital currency transaction information is found , it is determined that there is an abnormality in the digital currency transaction. It can reduce the risk of digital currency double spending and ensure the security of digital currency transactions.
  • the first terminal application can also search for the double-spend information corresponding to the digital currency transaction information in the local double-spend information list, or send the digital currency
  • the transaction information is sent to the background system of the first operating organization for verification, supporting double-spend information verification in offline scenarios, online scenarios, and cross-institution scenarios, and verifying double-spend information includes verifying user wallet information, digital currency information, and digital currency version information
  • One or more types of information in can realize risk control in different dimensions.

Abstract

本申请公开了数字货币交易异常的验证方法和装置,涉及计算机技术领域。该方法的一具体实施方式包括:第一终端应用接收第二终端应用发送的数字货币交易信息;根据与第一运营机构后台系统的网络连接状态执行对应的异常判断操作,以确定数字货币交易存在异常,异常判断操作为以下两种操作之一:在本地双花信息列表中查找数字货币交易信息对应的双花信息的操作、将数字货币交易信息发送到第一运营机构后台系统进行验证的操作。

Description

一种数字货币交易异常的验证方法和装置
相关申请的交叉引用
本申请要求享有2021年10月19日提交的发明名称为“一种数字货币交易异常的验证方法和装置”的中国专利申请No.202111213485.9的优先权,在此全文引用上述中国专利申请公开的内容以作为本申请的一部分或全部。
技术领域
本公开涉及计算机技术领域,尤其涉及一种数字货币交易异常的验证方法和装置。
背景技术
在现有钱包交易中,收款双方会进行身份验证以及数字货币验证,但缺少进行数字货币双花验证的有效方法,特别是当收款方不联网时,虽可验证对方身份及数字货币真伪,无法进行该数字货币的双花判断(双花即被重复使用),在跨机构离线交易过程中,更是存在较大的双花的风险。
在实现本公开过程中,发明人发现现有技术中至少存在如下问题:
数字货币双花风险高,且无法有效抑制双花,无法保证数字货币的交易安全。
发明内容
有鉴于此,本公开实施例提供一种数字货币交易异常的验证方法和装置。
根据本公开实施例的一个方面,提供了一种数字货币交易异常的验证方法。
一种数字货币交易异常的验证方法,包括:第一终端应用接收第二终端应用发送的数字货币交易信息;所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述异常判断操作为以下两种操作之一:在本地双花信息列表中查找所述数字货币交易信息对应的双花信息的操作、将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。
根据本公开的一个或多个实施例,所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,包括:所述第一终端应用在未与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找所述数字货币交易信息对应的双花信息,如果查找到所述数字货币交易信息对应的双花信息,则确定数字货币交易存在异常。
根据本公开的一个或多个实施例,所述本地双花信息列表中的双花信息是所述第一运营机构后台系统预先同步至所述第一终端应用的。
根据本公开的一个或多个实施例,所述第一终端应用在联网时或进行联机业务时,从所述第一运营机构后台系统同步得到所述本地双花信息列表。
根据本公开的一个或多个实施例,所述本地双花信息列表存储在所述第一终端应用本地的安全芯片中。
根据本公开的一个或多个实施例,所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确 定数字货币交易存在异常,包括:所述第一终端应用在与所述第一运营机构后台系统建立网络连接的情况下,在所述本地双花信息列表中查找所述数字货币交易信息对应的双花信息,或者将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证;如果在所述本地双花信息列表中查找到所述数字货币交易信息对应的双花信息,或者所述第一运营机构后台系统返回的验证结果为所述验证不通过,则确定所述数字货币交易存在异常。
根据本公开的一个或多个实施例,所述第一终端应用在与所述第一运营机构后台系统建立网络连接的情况下,优先执行将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。
根据本公开的一个或多个实施例,在确定所述数字货币交易存在异常的情况下,所述第一终端应用向所述第一运营机构后台系统发送锁定请求,以由所述第一运营机构后台系统将所述锁定请求发送至第二运营机构后台系统,通过所述第二运营机构后台系统对所述第二终端应用和/或本次交易的数字货币币串进行锁定,所述第二运营机构后台系统为所述第二终端应用的运营机构后台。
根据本公开的一个或多个实施例,在将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证,并确定所述数字货币交易存在异常的情况下,所述第一终端应用根据所述数字货币交易信息更新所述本地双花信息列表。
根据本公开的一个或多个实施例,所述双花信息包括用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息,所述数字货币信息包括数字货币表达式和/或冠字号。
根据本公开实施例的另一方面,提供了一种数字货币交易异常的验证方法。
一种数字货币交易异常的验证方法,包括:第一运营机构后台系统接收第一终端应用发送的数字货币交易信息,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述数字货币交易信息是第二终端应用发送到所述第一终端应用的;所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,如果所述双花验证不通过,则向所述第一终端应用返回指示数字货币交易存在异常的验证结果。
根据本公开的一个或多个实施例,所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,包括:所述第一运营机构后台系统在已存双花信息列表中查找所述数字货币交易信息对应的双花信息,如果查找到所述数字货币交易信息对应的双花信息,则所述双花验证不通过。
根据本公开的一个或多个实施例,所述已存双花信息列表中的双花信息包括第一双花信息和第二双花信息,所述第一双花信息是所述第一运营机构后台系统基于自身签发的数字货币的版本信息、所签发数字货币对应的用户钱包信息和数字货币信息中的一种或多种信息的异常而生成的,所述第二双花信息是所述第一运营机构后台系统通过互联互通从其他运营机构后台系统同步得到的。
根据本公开的一个或多个实施例,所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,包括:所述第一运营机构后台系统将所述数字货币交易信息发送至第一验证平台,由所述第一验证平台在自有的双花信息列表中查找所述数字货币交易信息对应的双花信息,所述第一验证平台为除所述第一运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;如果查找到所述数字货币交易信息对应的双花信息,则所述双花验证不通过。
根据本公开的一个或多个实施例,还包括:如果所述双花验证通过,则所述第一运营机构后台系统将所述数字货币交易信息发送至本次交易的数字货币的签发机构后台系统;由所述签发机构后台系统对所述数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,如果所述信息校验不通过,则向所述第一终端应用返回指示所述数字货币交易存在异常的验证结果。
根据本公开的一个或多个实施例,在所述数字货币交易存在异常的情况下,所述第一运营机构后台系统向第二运营机构后台系统发送锁定请求,通过所述第二运营机构后台系统对所述第二终端应用和/或本次交易的数字货币币串进行锁定,所述第二运营机构后台系统为所述第二终端应用的运营机构后台。
根据本公开的一个或多个实施例,所述锁定请求是所述第一运营机构后台系统生成的,或由所述第一终端应用发送到所述第一运营机构后台系统的。
根据本公开实施例的又一方面,提供了一种数字货币交易异常的验证方法。
一种数字货币交易异常的验证方法,包括:在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当所述第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,所述第二运营机构后台系统发起对所述当前交易的数字货币交易信息的双花验证,其中,所述第二运营机构后台系统为所述第二终端应用的运营机构后台;所述第二运营机构后台系统在所述双花验证不通过的情况下,确定所述当前交易存在异常,并终止所述当前交易。
根据本公开实施例的又一方面,提供了一种数字货币交易异常的验证方法。
一种数字货币交易异常的验证方法,包括:第二运营机构后台系统与第二终端应用建立网络连接;所述第二运营机构后台系统对所述第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,所述已发出的数字货币交易信息是所述第二终端应用发送到其他终端应用的;所述第二运营机构后台系统在所述双花验证不通过的情况下,将所述第二终端应用锁定,所述第二终端应用离线状态为所述第二终端应用与所述第二运营机构后台系统未建立网络连接的状态。
根据本公开实施例的又一方面,提供了一种数字货币交易异常的验证装置。
一种数字货币交易异常的验证装置,位于第一终端应用中,所述装置包括:通信模块,用于接收第二终端应用发送的数字货币交易信息;验证模块,用于根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述异常判断操作为以下两种操作之一:在本地双花信息列表中查找所述数字货币交易信息对应的双花信息的操作、将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。
根据本公开实施例的又一方面,提供了一种数字货币交易异常的验证装置。
一种数字货币交易异常的验证装置,位于第一运营机构后台系统中,所述装置包括:交易信息接收模块,用于接收第一终端应用发送的数字货币交易信息,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述数字货币交易信息是第二终端应用发送到所 述第一终端应用的;交易异常验证模块,用于利用双花信息列表对所述数字货币交易信息进行双花验证,如果所述双花验证不通过,则向所述第一终端应用返回指示数字货币交易存在异常的验证结果。
根据本公开实施例的又一方面,提供了一种数字货币交易异常的验证装置。
一种数字货币交易异常的验证装置,位于第二运营机构后台系统中,所述装置包括:双花验证模块,用于在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当所述第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,发起对所述当前交易的数字货币交易信息的双花验证,其中,所述第二运营机构后台系统为所述第二终端应用的运营机构后台;交易异常终止模块,用于所述第二运营机构后台系统在所述双花验证不通过的情况下,确定所述当前交易存在异常,并终止所述当前交易。
根据本公开实施例的又一方面,提供了一种数字货币交易异常的验证装置。
一种数字货币交易异常的验证装置,位于第二运营机构后台系统中,所述装置包括:网络连接建立模块,用于与第二终端应用建立网络连接;双花信息验证模块,用于对所述第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,所述已发出的数字货币交易信息是所述第二终端应用发送到其他终端应用的;所述第二终端应用离线状态为所述第二终端应用与所述第二运营机构后台系统未建立网络连接的状态;应用锁定模块,用于在所述双花验证不通过的情况下,将所述第二终端应用锁定。
根据本公开实施例的又一方面,提供了一种电子设备。
一种电子设备,包括:一个或多个处理器;存储器,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现本公开实施例所提供的数字货币交易异常的验证方法。
根据本公开实施例的又一方面,提供了一种计算机可读介质。
一种计算机可读介质,其上存储有计算机程序,所述程序被处理器执行时实现本公开实施例所提供的数字货币交易异常的验证方法。
上述的非惯用的可选方式所具有的进一步效果将在下文中结合具体实施方式加以说明。
附图说明
附图用于更好地理解本公开,不构成对本公开的不当限定。其中:
图1是根据本公开一个实施例的数字货币交易异常的验证方法的主要步骤示意图;
图2是根据本公开另一个实施例的数字货币交易异常的验证方法的主要步骤示意图;
图3是根据本公开又一个实施例的数字货币交易异常的验证方法的主要步骤示意图;
图4是根据本公开又一个实施例的数字货币交易异常的验证方法的主要步骤示意图;
图5是根据本公开一个实施例的支付交易异常的验证流程示意图;
图6是根据本公开一个实施例的跨机构维护双花信息列表的示意图;
图7是根据本公开一个实施例的数字货币交易异常的验证装置的主要模块示意图;
图8是根据本公开另一个实施例的数字货币交易异常的验证装置的主要模块示意图;
图9是根据本公开又一个实施例的数字货币交易异常的验证装置的主要模块示意图;
图10是根据本公开又一个实施例的数字货币交易异常的验证装置的主要模块示意图;
图11是本公开实施例可以应用于其中的示例性系统架构图;
图12是适于用来实现本公开实施例的终端设备或服务器的计算机系统的结构示意图。
具体实施方式
以下结合附图对本公开的示范性实施例做出说明,其中包括本公开实施例的各种细节以助于理解,应当将它们认为仅仅是示范性的。因此,本领域普通技术人员应当认识到,可以对这里描述的实施例做出各种改变和修改,而不会背离本公开的范围和精神。同样,为了清楚和简明,以下的描述中省略了对公知功能和结构的描述。
图1是根据本公开一个实施例的数字货币交易异常的验证方法的主要步骤示意图。如图1所示,包括如下的步骤S101至步骤S102。
步骤S101:第一终端应用接收第二终端应用发送的数字货币交易信息;
步骤S102:第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,异常判断操作为以下两种操作之一:在本地双花信息列表中查找数字货币交易信息对应的双花信息的操作、将数字货币交易信息发送到第一运营机构后台系统进行验证的操作。
第一终端应用根据与第一运营机构后台系统的网络连接状态分为:第一终端应用根据与第一运营机构后台系统未建立网络连接,以及,建立网络连接。
在一个实施例中,第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,具体可以包括:第一终端应用在未与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找数字货币交易信息对应的双花信息,如果查找到数字货币交易信息对应的双花信息,则确定数字货币交易存在异常。
其中,第一运营机构后台系统为第一终端应用的运营机构后台。
本地双花信息列表中的双花信息是第一运营机构后台系统预先同步至第一终端应用的。
第一终端应用在联网时或进行联机业务时,从第一运营机构后台系统同步得到本地双花信息列表。例如,第一终端应用联机时,第一运营机构后台系统向第一终端应用下发双花信息,具体可在进行充值、提现、同步等流程时一并下发更新。
第一运营机构后台系统的双花信息列表可以是从其他运营机构系统同步过来的,本公开实施例可以由各个运营机构共同维护双花信息,以便实现跨运营机构双花信息核验。
本地双花信息列表存储在第一终端应用本地的安全芯片中。通过端侧安全芯片内存储双花信息,可以保证第一终端应用离线时能够进行双花信息的验证,离线是指第一终端应用未与第一运营机构后台系统建立网络连接。
在另一个实施例中,第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,具体可以包括:第一终端应用在与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找数字货币交易信息 对应的双花信息,或者将数字货币交易信息发送到第一运营机构后台系统进行验证;如果在本地双花信息列表中查找到数字货币交易信息对应的双花信息,则确定数字货币交易存在异常,如果没查找到该对应的双花信息,则不存在异常;或者,如果第一运营机构后台系统返回的验证结果为验证不通过,则确定数字货币交易存在异常,如果返回的验证结果为验证通过,则不存在异常。
在一个实施例中,第一终端应用在与第一运营机构后台系统建立网络连接的情况下,可设置优先执行将数字货币交易信息发送到第一运营机构后台系统进行验证的操作。
在确定数字货币交易存在异常的情况下,第一终端应用向第一运营机构后台系统发送锁定请求,以由第一运营机构后台系统将锁定请求发送至第二运营机构后台系统,通过第二运营机构后台系统对第二终端应用和/或本次交易的数字货币币串进行锁定,第二运营机构后台系统为第二终端应用的运营机构后台。
在将数字货币交易信息发送到第一运营机构后台系统进行验证,并确定数字货币交易存在异常的情况下,第一终端应用根据数字货币交易信息更新本地双花信息列表。
双花信息包括用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息,数字货币信息包括数字货币表达式和/或冠字号。
本公开实施例可实现在交易过程中对交易对手方进行核验(或称验证),其中,当终端应用离线时根据本地双花信息进行核验,当终端应用在线时可采用本地双花信息核验或发送至运营机构后台进行核验,防止违法或异常钱包的重复花费或数字货币的重复花费,此外,可对违法或异常钱包进行锁定,禁止交易对手方继续交易,降低数字货币双花风险。并且,本公开实施例可通过多个维度进行双花验证, 例如,双花信息可包含用户钱包信息例如钱包ID、用户公钥等,以对用户进行判断;也可包含数字货币信息例如整个表达式或冠字号,以对数字货币进行判断;也可包含版本信息,对数字货币或钱包应用版本进行判断,达到从不同维度进行风险控制。同时终端应用可将异常上报运营机构后台,并更新本地双花信息列表,以减少存储压力。
图2是根据本公开另一个实施例的数字货币交易异常的验证方法的主要步骤示意图。如图2所示,包括如下的步骤S201至步骤S202。
步骤S201:第一运营机构后台系统接收第一终端应用发送的数字货币交易信息;
其中,第一运营机构后台系统为第一终端应用的运营机构后台,数字货币交易信息是第二终端应用发送到第一终端应用的。
步骤S202:第一运营机构后台系统利用双花信息列表对数字货币交易信息进行双花验证,如果双花验证不通过,则向第一终端应用返回指示数字货币交易存在异常的验证结果。
在一个实施例中,第一运营机构后台系统利用双花信息列表对数字货币交易信息进行双花验证,具体包括:第一运营机构后台系统在已存双花信息列表中查找数字货币交易信息对应的双花信息,如果查找到数字货币交易信息对应的双花信息,则双花验证不通过。
已存双花信息列表中的双花信息包括第一双花信息和第二双花信息,第一双花信息是第一运营机构后台系统基于自身签发的数字货币的版本信息、所签发数字货币对应的用户钱包信息和数字货币信息中的一种或多种信息的异常而生成的,第二双花信息是第一运营机构后台系统通过互联互通从其他运营机构后台系统同步得到的。
在一个实施例中,第一运营机构后台系统利用双花信息列表对数 字货币交易信息进行双花验证,具体包括:第一运营机构后台系统将数字货币交易信息发送至第一验证平台,由第一验证平台在自有的双花信息列表中查找数字货币交易信息对应的双花信息,第一验证平台为除第一运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;如果查找到数字货币交易信息对应的双花信息,则双花验证不通过。
根据上述实施例,如果查找到对应的双花信息,则双花验证不通过,从而确定数字货币交易存在异常,而如果未查找到对应的双花信息,则双花验证通过,从而确定交易无异常。
在另一个实施例中,在上述实施例基础上,进一步包括:如果双花验证通过,则第一运营机构后台系统将数字货币交易信息发送至本次交易的数字货币的签发机构后台系统;由签发机构后台系统对数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,如果信息校验不通过,则向第一终端应用返回指示数字货币交易存在异常的验证结果。即,在双花验证和信息校验都通过的情况下,才确定交易无异常,而双花验证和信息校验中任一者不通过,都会确定数字货币交易存在异常。
本公开实施例由数字货币签发机构维护该数字货币的具体交易信息,其他各运营机构通过互联互通平台发送该币串的相关交易信息至签发机构,签发机构判断该币串的双花情况。
在数字货币交易存在异常的情况下,第一运营机构后台系统向第二运营机构后台系统发送锁定请求,通过第二运营机构后台系统对第二终端应用和/或本次交易的数字货币币串进行锁定,第二运营机构后台系统为第二终端应用的运营机构后台。
锁定请求是第一运营机构后台系统生成的,或由第一终端应用发 送到第一运营机构后台系统的。
本公开实施例实现在交易过程中,交易双方进行合法性校验,如果发现该用户或该数字货币双花,将拒绝交易,并上传后台或对其应用进行锁定,并且可由第一终端应用或第一运营机构后台系统发起锁定,有效降低了重复双花的风险,保证数字货币的交易安全。
图3是根据本公开又一个实施例的数字货币交易异常的验证方法的主要步骤示意图。如图3所示,包括如下的步骤S301至步骤S302。
步骤S301:在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,第二运营机构后台系统发起对当前交易的数字货币交易信息的双花验证;
其中,第二运营机构后台系统为第二终端应用的运营机构后台。
步骤S302:第二运营机构后台系统在双花验证不通过的情况下,确定当前交易存在异常,并终止当前交易。
在一个实施例中,第二运营机构后台系统发起对当前交易的数字货币交易信息的双花验证,具体包括:第二运营机构后台系统通过第二验证平台的双花信息列表,对当前交易的数字货币交易信息进行双花验证,第二验证平台为除第二运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;在双花信息列表中存在当前交易的数字货币交易信息对应的双花信息的情况下,双花验证不通过。如果存在该对应的双花信息,则双花验证通过。
在另一个实施例中,第二运营机构后台系统发起对当前交易的数字货币交易信息的双花验证,具体包括:第二运营机构后台系统将当前交易的数字货币交易信息发送至当前交易的数字货币的签发机构后 台系统,由签发机构后台系统对当前交易的数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,在信息校验不通过的情况下,双花验证不通过。如果信息校验通过,则表示双花验证也通过。
在有一个实施例中,可以将上述实施例的两种情况结合,即可以先通过第二验证平台的双花信息列表,对当前交易的数字货币交易信息进行双花验证,即在双花信息列表中存在当前交易的数字货币交易信息对应的双花信息,如果查找到对应的双花信息,则直接确定交易存在异常,如果未查找到该对应的双花信息,则进一步将当前交易的数字货币交易信息发送至当前交易的数字货币的签发机构后台系统,由签发机构后台系统进行上述的信息校验,在未查找到该对应的双花信息且信息校验通过的情况下,才确定交易无异常,而查找到该对应的双花信息或信息校验不通过,都确定交易存在异常,即确定存在双花的情况。
第二运营机构后台系统通过将第二终端应用和/或当前交易的数字货币币串进行锁定,来终止当前交易。
本公开实施例在交易过程中,如果发现用户或数字货币双花,将拒绝交易,并上传后台或对其应用进行锁定,并且可由第二运营机构后台系统发起锁定,有效降低了重复双花的风险,保证数字货币的交易安全。
图4是根据本公开又一个实施例的数字货币交易异常的验证方法的主要步骤示意图。如图4所示,包括如下的步骤S401至步骤S403。
步骤S401:第二运营机构后台系统与第二终端应用建立网络连接;
步骤S402:第二运营机构后台系统对第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,已发出的数字货币交易信 息是第二终端应用发送到其他终端应用的;
步骤S403:第二运营机构后台系统在双花验证不通过的情况下,将第二终端应用锁定,第二终端应用离线状态为第二终端应用与第二运营机构后台系统未建立网络连接的状态。
第二运营机构后台系统对第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,具体可以包括:
第二运营机构后台系统通过第三验证平台的双花信息列表,对已发出的数字货币交易信息进行双花验证,第三验证平台为除第二运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;在双花信息列表中存在已发出的数字货币交易信息对应的双花信息的情况下,双花验证不通过,若不存在该对应的双花信息,则双花验证通过。
本实施例适用于在第二终端应用与其他终端应用在离线情况下完成交易之后,当第二终端应用因各类业务(例如充值、新的交易等)与第二运营机构后台系统建立网络连接的场景,实现第二运营机构后台系统与第二终端应用建立网络连接后,第二运营机构后台系统可以主动对第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,并主动发起锁定第二终端应用,有效降低了重复双花的风险,保证数字货币的交易安全。
图5是根据本公开一个实施例的支付交易异常的验证流程示意图,如图5所示,流程包括:双花信息的生成与管理;双花信息的存储与获取;终端侧进行交易;进行交易信息验证,其中,如果终端应用在线(即终端应用与其运营机构后台建立了网络连接),可在终端本地进行验证或通过终端联网进行验证,如果终端应用离线(即与其运营机构后台未建立网络连接),则在终端本地进行验证;如果验证通过,则继续交易;如果验证不通过,则拒绝交易,其中,在终端本地验证不通过并拒绝交易后,终端应用可向运营机构后台上报异常信息;在 通过终端联网进行验证并拒绝交易后,运营机构后台可记录交易异常并将应用锁定。
下面具体对本公开实施例所涉及的双花信息生成与管理、双花信息存储及获取、双花验证、终端应用锁定分别做详细介绍。
双花信息的生成与管理,具体地,运营机构后台可通过自身签发的数字货币的系统版本信息、发现程序BUG(缺陷)、用户钱包异常等行为进行双花信息列表的生成,在进行跨机构(跨运营机构)交易信息收集时,各个运营机构将交易信息与数字货币信息通过互联互通发送至签发机构(签发机构是指负责签发数字货币的运营机构,或称签发机构后台系统),交易信息可包括用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息,数字货币信息可包括数字货币表达式和/或冠字号。签发机构根据各个交易节点信息进行判断,如果发现某节点超额,可将该节点用户或数字货币信息列为双花信息,并同步至双花信息管理模块,双花信息管理模块即双花信息共享平台,其中的双花信息是从各个运营机构后台系统同步过来的。各个运营机构可以采用中心化或区块链的方式共同维护用户或数字货币的双花信息,本公开一个实施例的跨机构维护双花信息列表的示意图如图6所示,图6以三个机构为例,机构的数量不构成对本公开实施例保护范围的限定。由签发数字货币的发行(或称运营)机构维护该数字货币的额度,如果发现该数字货币发生双花,则将双花所有者更新至双花信息列表(池)。各运营机构有各自的机构后台管理模块,机构后台管理模块用于运营机构同步其他各运营机构的双花信息,新增、删减或更新本运营机构的双花信息,并可定期或在约定条件下将本运营机构的双花信息同步至其他各个运营机构。当钱包或数字货币状态正常或注销后,各个运营机构同步更新双花信息至双花信息管理模块。当用户或数字货币注销、双花应用锁定时,可更新双花信息列表,以减少存储压力。运营机构后台系统还可获取最新的双花信息并同步至相应的终端应用(例如第一运营机构后台系统将双花信息列表同步给第 一终端应用),以及对本运营机构签发的币串交易信息进行管理核验。当钱包用户(即终端应用)在线时,运营机构后台将向钱包用户推送当前的双花信息列表,该双花信息列表可包含如钱包ID、公钥信息、数字货币、货币标识、版本信息等。使得在后续交易过程中,交易双方进行双花信息列表校验,如果发现该用户或该数字货币双花,将拒绝交易。当收款方在线时,可通过运营机构后台校验,并通过指令对双花钱包应用进行锁定,使其无法继续后续交易,有效降低了重复双花的风险,保证数字货币的交易安全。
双花信息的存储及获取,具体地,终端用户可在以下情况进行双花信息的同步:一是终端用户联网时;二是终端用户进行联机业务时,例如开立、充值、提现、同步、注销、查询等操作;三是由交易对手方同步双花信息,交易对手方是指与当前终端应用进行交易的另一终端应用。终端用户可在终端应用本地的安全芯片内存储双花信息,本地存储双花信息有助于离线交易时的双花验证。
双花的验证,具体地,交易双方(即第一终端应用与第二终端应用)在交易过程中,对交易对手方进行双花信息验证,验证方式可以通过本地双花信息验证,也可通过通信模块将交易信息(即数字货币交易信息)发送至相应的运营机构后台系统进行验证,由运营机构后台返回验证结果。双花信息可包含以下信息:数字货币版本信息,其用于表示数字货币版本或钱包应用版本;用户信息,包括但不限于钱包ID(标识)、用户公钥、用户证书、钱包Token(令牌)等;数字货币信息,包括但不限于数字货币表达式、冠字号、数字货币标识等。如果验证通过,则交易继续,如验证失败,终止本次交易,并将交易对手方信息上报至本终端应用对应的运营机构后台系统。
应用锁定,特别地,当验证失败时,在用户联网的情况下终端应用可将异常上报至终端应用的运营机构后台,由运营机构后台生成应用锁定指令,对交易对手方的钱包应用(即终端应用)进行锁定操作, 禁止其继续进行交易,同时更新本地双花信息,以减少存储压力。
本公开实施例不受终端形态及通讯方式影响,可广泛应用于各个终端形态的硬件钱包,包括但不限于IC卡、手机终端、受理终端、物联网终端等,通讯方式包括但不限于NFC(近场通信)、蓝牙、WIFI、UWB(超宽带)、二维码等方式。可实现在交易过程中对问题钱包或数字货币进行拒收及上报管理,并进行应用锁定(例如通过付款方的运营机构后台来锁定付款方的终端应用,付款方的终端应用可以是第二终端应用,付款方的运营机构后台相应可以是第二运营机构后台系统),极大提升了交易过程中的安全性,有效避免了恶意用户、程序BUG(缺陷)等系统性风险,保障数字货币的平稳运行,有助于数字货币硬件钱包的推广上线。
图7是根据本公开一个实施例的数字货币交易异常的验证装置的主要模块示意图。如图7所示,本公开一个实施例的数字货币交易异常的验证装置700位于第一终端应用中,数字货币交易异常的验证装置700主要包括通信模块701、验证模块702。
通信模块701,用于接收第二终端应用发送的数字货币交易信息;
验证模块702,用于根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,第一运营机构后台系统为第一终端应用的运营机构后台,异常判断操作为以下两种操作之一:在本地双花信息列表中查找数字货币交易信息对应的双花信息的操作、将数字货币交易信息发送到第一运营机构后台系统进行验证的操作。
在一个实施例中,验证模块702具体可以用于在第一终端应用未与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找数字货币交易信息对应的双花信息,如果查找到数字货币交易信息对应的双花信息,则确定数字货币交易存在异常。
本地双花信息列表中的双花信息是第一运营机构后台系统预先同步至第一终端应用的。
通信模块701负责第一终端应用与第一运营机构后台系统建立通信连接,通信模块701可以在第一终端应用联网时或进行联机业务时,从第一运营机构后台系统同步得到本地双花信息列表。
数字货币交易异常的验证装置700还包括安全芯片存储模块,用于将本地双花信息列表存储在第一终端应用本地的安全芯片中。
安全芯片存储模块负责本地存储双花信息,以便后续进行离线交易时进行本地验证。
在另一个实施例中,验证模块702具体用于:在第一终端应用与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找数字货币交易信息对应的双花信息,或者将数字货币交易信息发送到第一运营机构后台系统进行验证;如果在本地双花信息列表中查找到数字货币交易信息对应的双花信息,或者第一运营机构后台系统返回的验证结果为验证不通过,则确定数字货币交易存在异常。
在一个实施例中,验证模块702在第一终端应用与第一运营机构后台系统建立网络连接的情况下,优先执行将数字货币交易信息发送到第一运营机构后台系统进行验证的操作。
通信模块701还用于:在确定数字货币交易存在异常的情况下,向第一运营机构后台系统发送锁定请求,以由第一运营机构后台系统将锁定请求发送至第二运营机构后台系统,通过第二运营机构后台系统对第二终端应用和/或本次交易的数字货币币串进行锁定,第二运营机构后台系统为第二终端应用的运营机构后台。
在验证模块702将数字货币交易信息发送到第一运营机构后台系统进行验证,并确定数字货币交易存在异常的情况下,安全芯片存储模块还用于:根据数字货币交易信息更新本地双花信息列表。
双花信息包括用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息,数字货币信息包括数字货币表达式和/或冠字号。
图8是根据本公开另一个实施例的数字货币交易异常的验证装置的主要模块示意图。本公开另一个实施例的数字货币交易异常的验证装置800位于第一运营机构后台系统中,数字货币交易异常的验证装置800主要包括:交易信息接收模块801、交易异常验证模块802。
交易信息接收模块801,用于接收第一终端应用发送的数字货币交易信息,第一运营机构后台系统为第一终端应用的运营机构后台,数字货币交易信息是第二终端应用发送到第一终端应用的;
交易异常验证模块802,用于利用双花信息列表对数字货币交易信息进行双花验证,如果双花验证不通过,则向第一终端应用返回指示数字货币交易存在异常的验证结果。
在一个实施例中,交易异常验证模块802具体用于:在已存双花信息列表中查找数字货币交易信息对应的双花信息,如果查找到数字货币交易信息对应的双花信息,则双花验证不通过。
已存双花信息列表中的双花信息包括第一双花信息和第二双花信息,第一双花信息是第一运营机构后台系统基于自身签发的数字货币的版本信息、所签发数字货币对应的用户钱包信息和数字货币信息中的一种或多种信息的异常而生成的,第二双花信息是第一运营机构后台系统通过互联互通从其他运营机构后台系统同步得到的。
在一个实施例中,交易异常验证模块802具体用于:将数字货币交易信息发送至第一验证平台,由第一验证平台在自有的双花信息列表中查找数字货币交易信息对应的双花信息,第一验证平台为除第一运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;如果查找到数字货币交易信息对应的双花信息,则双花验证不通过。
在一个实施例中,交易异常验证模块802具体还用于:如果双花验证通过,则将数字货币交易信息发送至本次交易的数字货币的签发机构后台系统;由签发机构后台系统对数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,如果信息校验不通过,则向第一终端应用返回指示数字货币交易存在异常的验证结果。
交易异常验证模块802还用于:在数字货币交易存在异常的情况下,向第二运营机构后台系统发送锁定请求,通过第二运营机构后台系统对第二终端应用和/或本次交易的数字货币币串进行锁定,第二运营机构后台系统为第二终端应用的运营机构后台。
锁定请求可以是第一运营机构后台系统生成的,或由第一终端应用发送到第一运营机构后台系统的。
图9是根据本公开又一个实施例的数字货币交易异常的验证装置的主要模块示意图。本公开又一个实施例的数字货币交易异常的验证装置900位于第二运营机构后台系统中,数字货币交易异常的验证装置900主要包括:双花验证模块901、交易异常终止模块902。
双花验证模块901,用于在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,发起对当前交易的数字货币交易信息的 双花验证,其中,第二运营机构后台系统为第二终端应用的运营机构后台;
交易异常终止模块902,用于第二运营机构后台系统在双花验证不通过的情况下,确定当前交易存在异常,并终止当前交易。
在一个实施例中,双花验证模块901具体用于:通过第二验证平台的双花信息列表,对当前交易的数字货币交易信息进行双花验证,第二验证平台为除第二运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;在双花信息列表中存在当前交易的数字货币交易信息对应的双花信息的情况下,双花验证不通过。若未查找到双花信息,则双花验证通过,确定当前交易无异常,继续交易的后续操作。
在一个实施例中,双花验证模块901具体用于:将当前交易的数字货币交易信息发送至当前交易的数字货币的签发机构后台系统,由签发机构后台系统对当前交易的数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,在信息校验不通过的情况下,双花验证不通过。若信息校验通过,则双花验证通过,确定当前交易无异常,继续交易的后续操作。
在一个实施例中,可以通过对上述两个实施例的双花验证模块901的功能结合,即双花验证模块901可以先通过第二验证平台的双花信息列表,对当前交易的数字货币交易信息进行双花验证,如果该双花验证通过,再进一步将当前交易的数字货币交易信息发送至当前交易的数字货币的签发机构后台系统进行进一步的信息校验,若信息校验也通过,则表示当前交易不存在异常,继续交易的后续操作。而若双花验证、信息校验二者中有一个不通过,则表示当前交易存在异常,从而终止当前交易。
交易异常终止模块902具体用于通过将第二终端应用和/或当前交 易的数字货币币串进行锁定,来终止当前交易。
图10是根据本公开又一个实施例的数字货币交易异常的验证装置的主要模块示意图。如图10所示,本公开又一个实施例的数字货币交易异常的验证装置1000位于第二运营机构后台系统中,数字货币交易异常的验证装置1000主要包括:网络连接建立模块1001、双花信息验证模块1002、应用锁定模块1003。
网络连接建立模块1001,用于与第二终端应用建立网络连接;
双花信息验证模块1002,用于对第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,已发出的数字货币交易信息是第二终端应用发送到其他终端应用的;第二终端应用离线状态为第二终端应用与第二运营机构后台系统未建立网络连接的状态;
应用锁定模块1003,用于在双花验证不通过的情况下,将第二终端应用锁定。
双花信息验证模块1002具体可以用于:通过第三验证平台的双花信息列表,对已发出的数字货币交易信息进行双花验证,第三验证平台为除第二运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;在双花信息列表中存在已发出的数字货币交易信息对应的双花信息的情况下,双花验证不通过。
另外,在本公开实施例中数字货币交易异常的验证装置的具体实施内容,在上面数字货币交易异常的验证方法中已经详细说明了,故在此重复内容不再说明。
图11示出了可以应用本公开实施例的数字货币交易异常的验证方法或数字货币交易异常的验证装置的示例性系统架构1100。
如图11所示,系统架构1100可以包括终端设备1101、1102、1103, 网络1104和服务器1105。网络1104用以在终端设备1101、1102、1103和服务器1105之间提供通信链路的介质。网络1104可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
用户可以使用终端设备1101、1102、1103通过网络1104与服务器1105交互,以接收或发送消息等。终端设备1101、1102、1103上可以安装有各种通讯客户端应用,例如购物类应用、网页浏览器应用、搜索类应用、即时通信工具、邮箱客户端、社交平台软件等(仅为示例)。
终端设备1101、1102、1103可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、膝上型便携计算机和台式计算机等等。
服务器1105可以是提供各种服务的服务器,例如对用户利用终端设备1101、1102、1103所浏览的购物类网站提供支持的后台管理服务器(仅为示例)。后台管理服务器可以对接收到的交易信息等数据进行分析等处理,并将处理结果(例如交易结果--仅为示例)反馈给终端设备。
需要说明的是,本公开实施例所提供的数字货币交易异常的验证方法一般由服务器1105或终端设备1101、1102、1103执行,相应地,数字货币交易异常的验证装置一般设置于服务器1105或终端设备1101、1102、1103中。
应该理解,图11中的终端设备、网络和服务器的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。
下面参考图12,其示出了适于用来实现本公开实施例的终端设备或服务器的计算机系统1200的结构示意图。图12示出的终端设备或 服务器仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。
如图12所示,计算机系统1200包括中央处理单元(CPU)1201,其可以根据存储在只读存储器(ROM)1202中的程序或者从存储部分1208加载到随机访问存储器(RAM)1203中的程序而执行各种适当的动作和处理。在RAM 1203中,还存储有系统1200操作所需的各种程序和数据。CPU 1201、ROM 1202以及RAM 1203通过总线1204彼此相连。输入/输出(I/O)接口1205也连接至总线1204。
以下部件连接至I/O接口1205:包括键盘、鼠标等的输入部分1206;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1207;包括硬盘等的存储部分1208;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分1209。通信部分1209经由诸如因特网的网络执行通信处理。驱动器1210也根据需要连接至I/O接口1205。可拆卸介质1211,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1210上,以便于从其上读出的计算机程序根据需要被安装入存储部分1208。
特别地,根据本公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分1209从网络上被下载和安装,和/或从可拆卸介质1211被安装。在该计算机程序被中央处理单元(CPU)1201执行时,执行本公开的系统中限定的上述功能。
需要说明的是,本公开所示的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红 外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、RF等等,或者上述的任意合适的组合。
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本公开实施例中所涉及到的模块可以通过软件的方式实 现,也可以通过硬件的方式来实现。所描述的模块也可以设置在处理器中,例如,可以描述为:一种处理器包括通信模块、验证模块。其中,这些模块的名称在某种情况下并不构成对该模块本身的限定,例如,通信模块还可以被描述为“用于接收第二终端应用发送的数字货币交易信息的模块”。
作为另一方面,本公开还提供了一种计算机可读介质,该计算机可读介质可以是上述实施例中描述的设备中所包含的;也可以是单独存在,而未装配入该设备中。上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被一个该设备执行时,使得该设备包括:第一终端应用接收第二终端应用发送的数字货币交易信息;所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述异常判断操作为以下两种操作之一:在本地双花信息列表中查找所述数字货币交易信息对应的双花信息的操作、将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。或者,使得该设备包括:第一运营机构后台系统接收第一终端应用发送的数字货币交易信息,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述数字货币交易信息是第二终端应用发送到所述第一终端应用的;所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,如果所述双花验证不通过,则向所述第一终端应用返回指示数字货币交易存在异常的验证结果。或者,使得该设备包括:在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当所述第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,所述第二运营机构后台系统发起对所述当前交易的数字货币交易信息的双花验证,其中,所述第二运营机构后台系统为所述第二终端应用的运营机构后台;所述第二运营机构后台系统在所述双花验证不通过的情况下,确定所述当前交易存在异常,并终止所述当前交易。或者,使得该设备包括:第二运营机构后台系统与第二终端应用建立 网络连接;所述第二运营机构后台系统对所述第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,所述已发出的数字货币交易信息是所述第二终端应用发送到其他终端应用的;所述第二运营机构后台系统在所述双花验证不通过的情况下,将所述第二终端应用锁定,所述第二终端应用离线状态为所述第二终端应用与所述第二运营机构后台系统未建立网络连接的状态。
根据本公开实施例的技术方案,第一终端应用接收第二终端应用发送的数字货币交易信息,根据与第一运营机构后台系统的网络连接状态执行对应的异常判断操作,以确定数字货币交易存在异常,异常判断操作为以下两种操作之一:在本地双花信息列表中查找数字货币交易信息对应的双花信息的操作、将数字货币交易信息发送到第一运营机构后台系统进行验证的操作。第一终端应用在未与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找数字货币交易信息对应的双花信息,如果查找到数字货币交易信息对应的双花信息,则确定数字货币交易存在异常。能够降低数字货币双花风险,保证数字货币的交易安全。本公开一个实施例的第一终端应用还可在与第一运营机构后台系统建立网络连接的情况下,通过在本地双花信息列表中查找数字货币交易信息对应的双花信息,或者将数字货币交易信息发送到第一运营机构后台系统来进行验证,支持离线场景、在线场景、跨机构场景等的双花信息验证,且验证双花信息包括验证用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息,可实现不同维度的风险控制。
上述具体实施方式,并不构成对本公开保护范围的限制。本领域技术人员应该明白的是,取决于设计要求和其他因素,可以发生各种各样的修改、组合、子组合和替代。任何在本公开的精神和原则之内所作的修改、等同替换和改进等,均应包含在本公开保护范围之内。

Claims (29)

  1. 一种数字货币交易异常的验证方法,包括:
    第一终端应用接收第二终端应用发送的数字货币交易信息;
    所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述异常判断操作为以下两种操作之一:在本地双花信息列表中查找所述数字货币交易信息对应的双花信息的操作、将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。
  2. 根据权利要求1所述的方法,其中,所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,包括:
    所述第一终端应用在未与第一运营机构后台系统建立网络连接的情况下,在本地双花信息列表中查找所述数字货币交易信息对应的双花信息,如果查找到所述数字货币交易信息对应的双花信息,则确定数字货币交易存在异常。
  3. 根据权利要求2所述的方法,其中,所述本地双花信息列表中的双花信息是所述第一运营机构后台系统预先同步至所述第一终端应用的。
  4. 根据权利要求3所述的方法,其中,所述第一终端应用在联网时或进行联机业务时,从所述第一运营机构后台系统同步得到所述本地双花信息列表。
  5. 根据权利要求3或4所述的方法,其中,所述本地双花信息列表存储在所述第一终端应用本地的安全芯片中。
  6. 根据权利要求1所述的方法,其中,所述第一终端应用根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,包括:
    所述第一终端应用在与所述第一运营机构后台系统建立网络连接的情况下,在所述本地双花信息列表中查找所述数字货币交易信息对应的双花信息,或者将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证;如果在所述本地双花信息列表中查找到所述数字货币交易信息对应的双花信息,或者所述第一运营机构后台系统返回的验证结果为所述验证不通过,则确定所述数字货币交易存在异常。
  7. 根据权利要求6所述的方法,其中,所述第一终端应用在与所述第一运营机构后台系统建立网络连接的情况下,优先执行将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。
  8. 根据权利要求6所述的方法,其中,在确定所述数字货币交易存在异常的情况下,所述第一终端应用向所述第一运营机构后台系统发送锁定请求,以由所述第一运营机构后台系统将所述锁定请求发送至第二运营机构后台系统,通过所述第二运营机构后台系统对所述第二终端应用和/或本次交易的数字货币币串进行锁定,所述第二运营机构后台系统为所述第二终端应用的运营机构后台。
  9. 根据权利要求6所述的方法,其中,在将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证,并确定所述数字货币交易存在异常的情况下,所述第一终端应用根据所述数字货币交易信息更新所述本地双花信息列表。
  10. 根据权利要求1所述的方法,其中,所述双花信息包括用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息,所述数字货币信息包括数字货币表达式和/或冠字号。
  11. 一种数字货币交易异常的验证方法,包括:
    第一运营机构后台系统接收第一终端应用发送的数字货币交易信息,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述数字货币交易信息是第二终端应用发送到所述第一终端应用的;
    所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,如果所述双花验证不通过,则向所述第一终端应用返回指示数字货币交易存在异常的验证结果。
  12. 根据权利要求11所述的方法,其中,所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,包括:
    所述第一运营机构后台系统在已存双花信息列表中查找所述数字货币交易信息对应的双花信息,如果查找到所述数字货币交易信息对应的双花信息,则所述双花验证不通过。
  13. 根据权利要求12所述的方法,其中,所述已存双花信息列表中的双花信息包括第一双花信息和第二双花信息,所述第一双花信息是所述第一运营机构后台系统基于自身签发的数字货币的版本信息、所签发数字货币对应的用户钱包信息和数字货币信息中的一种或多种信息的异常而生成的,所述第二双花信息是所述第一运营机构后台系统通过互联互通从其他运营机构后台系统同步得到的。
  14. 根据权利要求11所述的方法,其中,所述第一运营机构后台系统利用双花信息列表对所述数字货币交易信息进行双花验证,包括:
    所述第一运营机构后台系统将所述数字货币交易信息发送至第一验证平台,由所述第一验证平台在自有的双花信息列表中查找所述数字货币交易信息对应的双花信息,所述第一验证平台为除所述第一运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;如果查找到所述数字货币交易信息对应的双花信息,则所述双花验证不通过。
  15. 根据权利要求11所述的方法,进一步包括:
    如果所述双花验证通过,则所述第一运营机构后台系统将所述数字货币交易信息发送至本次交易的数字货币的签发机构后台系统;由所述签发机构后台系统对所述数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,如果所述信息校验不通过,则向所述第一终端应用返回指示所述数字货币交易存在异常的验证结果。
  16. 根据权利要求11或15所述的方法,其中,在所述数字货币交易存在异常的情况下,所述第一运营机构后台系统向第二运营机构后台系统发送锁定请求,通过所述第二运营机构后台系统对所述第二终端应用和/或本次交易的数字货币币串进行锁定,所述第二运营机构后台系统为所述第二终端应用的运营机构后台。
  17. 根据权利要求16所述的方法,其中,所述锁定请求是所述第一运营机构后台系统生成的,或由所述第一终端应用发送到所述第一运营机构后台系统的。
  18. 一种数字货币交易异常的验证方法,包括:
    在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当所述第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,所述第二运营机构后台系统发起对所述当前交易的数字货币交易信息的双花验证,其中,所述第二运营机构后台系统为所述第二终端应用的运营机构后台;
    所述第二运营机构后台系统在所述双花验证不通过的情况下,确定所述当前交易存在异常,并终止所述当前交易。
  19. 根据权利要求18所述的方法,其中,所述第二运营机构后台系统发起对所述当前交易的数字货币交易信息的双花验证,包括:
    所述第二运营机构后台系统通过第二验证平台的双花信息列表,对所述当前交易的数字货币交易信息进行双花验证,所述第二验证平台为除所述第二运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;在所述双花信息列表中存在所述当前交易的数字货币交易信息对应的双花信息的情况下,所述双花验证不通过。
  20. 根据权利要求18所述的方法,其中,所述第二运营机构后台系统发起对所述当前交易的数字货币交易信息的双花验证,包括:
    所述第二运营机构后台系统将所述当前交易的数字货币交易信息发送至所述当前交易的数字货币的签发机构后台系统,由所述签发机构后台系统对所述当前交易的数字货币交易信息所含的用户钱包信息、数字货币信息、数字货币版本信息中的一种或多种信息进行信息校验,在所述信息校验不通过的情况下,所述双花验证不通过。
  21. 根据权利要求18所述的方法,其中,所述第二运营机构后台系统通过将所述第二终端应用和/或当前交易的数字货币币串进行锁定,来终止所述当前交易。
  22. 一种数字货币交易异常的验证方法,包括:
    第二运营机构后台系统与第二终端应用建立网络连接;
    所述第二运营机构后台系统对所述第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,所述已发出的数字货币交易信息是所述第二终端应用发送到其他终端应用的;
    所述第二运营机构后台系统在所述双花验证不通过的情况下,将所述第二终端应用锁定,所述第二终端应用离线状态为所述第二终端应用与所述第二运营机构后台系统未建立网络连接的状态。
  23. 根据权利要求22所述的方法,其中,所述第二运营机构后台系统对所述第二终端应用在离线状态下已发出的数字货币交易信息进 行双花验证,包括:
    所述第二运营机构后台系统通过第三验证平台的双花信息列表,对所述已发出的数字货币交易信息进行双花验证,所述第三验证平台为除所述第二运营机构后台系统之外的其他运营机构后台系统或由各运营机构共享的双花信息共享平台;在所述双花信息列表中存在所述已发出的数字货币交易信息对应的双花信息的情况下,所述双花验证不通过。
  24. 一种数字货币交易异常的验证装置,位于第一终端应用中,所述装置包括:
    通信模块,用于接收第二终端应用发送的数字货币交易信息;
    验证模块,用于根据与第一运营机构后台系统的网络连接状态,执行对应的异常判断操作,以确定数字货币交易存在异常,其中,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述异常判断操作为以下两种操作之一:在本地双花信息列表中查找所述数字货币交易信息对应的双花信息的操作、将所述数字货币交易信息发送到所述第一运营机构后台系统进行验证的操作。
  25. 一种数字货币交易异常的验证装置,位于第一运营机构后台系统中,所述装置包括:
    交易信息接收模块,用于接收第一终端应用发送的数字货币交易信息,所述第一运营机构后台系统为所述第一终端应用的运营机构后台,所述数字货币交易信息是第二终端应用发送到所述第一终端应用的;
    交易异常验证模块,用于利用双花信息列表对所述数字货币交易信息进行双花验证,如果所述双花验证不通过,则向所述第一终端应用返回指示数字货币交易存在异常的验证结果。
  26. 一种数字货币交易异常的验证装置,位于第二运营机构后台系统中,所述装置包括:
    双花验证模块,用于在第二运营机构后台系统与第二终端应用建立网络连接的情况下,当所述第二终端应用向第一终端应用发送当前交易的数字货币交易信息之前,发起对所述当前交易的数字货币交易信息的双花验证,其中,所述第二运营机构后台系统为所述第二终端应用的运营机构后台;
    交易异常终止模块,用于所述第二运营机构后台系统在所述双花验证不通过的情况下,确定所述当前交易存在异常,并终止所述当前交易。
  27. 一种数字货币交易异常的验证装置,位于第二运营机构后台系统中,所述装置包括:
    网络连接建立模块,用于与第二终端应用建立网络连接;
    双花信息验证模块,用于对所述第二终端应用在离线状态下已发出的数字货币交易信息进行双花验证,所述已发出的数字货币交易信息是所述第二终端应用发送到其他终端应用的;所述第二终端应用离线状态为所述第二终端应用与所述第二运营机构后台系统未建立网络连接的状态;
    应用锁定模块,用于在所述双花验证不通过的情况下,将所述第二终端应用锁定。
  28. 一种电子设备,包括:
    一个或多个处理器;
    存储器,用于存储一个或多个程序,
    当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求1-23中任一所述的方法。
  29. 一种计算机可读介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-23中任一所述的方法。
PCT/CN2022/125670 2021-10-19 2022-10-17 一种数字货币交易异常的验证方法和装置 WO2023066197A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111213485.9A CN114186999A (zh) 2021-10-19 2021-10-19 一种数字货币交易异常的验证方法和装置
CN202111213485.9 2021-10-19

Publications (1)

Publication Number Publication Date
WO2023066197A1 true WO2023066197A1 (zh) 2023-04-27

Family

ID=80539526

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/125670 WO2023066197A1 (zh) 2021-10-19 2022-10-17 一种数字货币交易异常的验证方法和装置

Country Status (2)

Country Link
CN (1) CN114186999A (zh)
WO (1) WO2023066197A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114186999A (zh) * 2021-10-19 2022-03-15 中国人民银行数字货币研究所 一种数字货币交易异常的验证方法和装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908932A (zh) * 2017-12-10 2018-04-13 宛海加 一种基于l算法的数字货币防伪及验证方法、系统和设备
KR20200037490A (ko) * 2018-10-01 2020-04-09 윤태경 디지털통화를 이용한 운용방법 및 운영시스템
CN111144862A (zh) * 2019-12-31 2020-05-12 深圳四方精创资讯股份有限公司 数字货币双离线支付的实现方法、装置、设备、存储介质
CN111275411A (zh) * 2018-12-05 2020-06-12 中国电信股份有限公司 数字货币钱包离线交易方法和系统、用户身份识别卡
CN111709739A (zh) * 2020-05-18 2020-09-25 杜晓楠 区块链系统中排除双花的方法、计算机可读存储介质和区块链系统
CN114186999A (zh) * 2021-10-19 2022-03-15 中国人民银行数字货币研究所 一种数字货币交易异常的验证方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908932A (zh) * 2017-12-10 2018-04-13 宛海加 一种基于l算法的数字货币防伪及验证方法、系统和设备
KR20200037490A (ko) * 2018-10-01 2020-04-09 윤태경 디지털통화를 이용한 운용방법 및 운영시스템
CN111275411A (zh) * 2018-12-05 2020-06-12 中国电信股份有限公司 数字货币钱包离线交易方法和系统、用户身份识别卡
CN111144862A (zh) * 2019-12-31 2020-05-12 深圳四方精创资讯股份有限公司 数字货币双离线支付的实现方法、装置、设备、存储介质
CN111709739A (zh) * 2020-05-18 2020-09-25 杜晓楠 区块链系统中排除双花的方法、计算机可读存储介质和区块链系统
CN114186999A (zh) * 2021-10-19 2022-03-15 中国人民银行数字货币研究所 一种数字货币交易异常的验证方法和装置

Also Published As

Publication number Publication date
CN114186999A (zh) 2022-03-15

Similar Documents

Publication Publication Date Title
WO2023066040A1 (zh) 一种数字货币支付方法和装置
EP3594884A1 (en) Electronic bill management method, device, and storage medium
CN113168637A (zh) 交易验证期间的次级欺诈检测
US20130073467A1 (en) Method and system for conducting financial transactions using mobile devices
US10922667B2 (en) Transaction interactions between node groups
EP4318355A1 (en) Methods and apparatuses for generating, verifying and storing transaction voucher, device, and system
WO2022262527A1 (zh) 一种基于数字货币的支付方法、平台、终端及支付系统
WO2023066197A1 (zh) 一种数字货币交易异常的验证方法和装置
CN115033923A (zh) 一种交易隐私数据的保护方法、装置、设备及存储介质
CN111833066A (zh) 一种账户授权的方法、装置及系统
US9836618B2 (en) System and method of authentication of a first party respective of a second party aided by a third party
US11200559B2 (en) Method and system for authorization of transactions
CN114462989A (zh) 数字货币硬件钱包应用的启用方法、装置和系统
WO2023051736A1 (zh) 基于数字货币的交易方法和装置
WO2023143566A1 (zh) 一种数字货币交易方法和系统以及数字货币卡应用装置
WO2023088467A1 (zh) 数字货币支付方法和装置
US20200143381A1 (en) System and Method for Obtaining a Temporary CVV using Tokenization Rails
CN113626850B (zh) 基于联盟链的请求处理方法、装置、设备和存储介质
US11227266B2 (en) Digital holding account
CN114462991A (zh) 基于数字货币的条件交易的方法和装置
CN114037446A (zh) 一种数字货币的交易方法、交易管理方法、装置及系统
CN116263925A (zh) 基于区块链的对账方法和装置
WO2023072115A1 (zh) 一种数字货币交易方法、系统和相关交易终端
EP3332370A1 (en) Systems and methods for interaction authentication using dynamic wireless beacon devices
US20190156334A1 (en) System and method for providing anonymous payments

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22882803

Country of ref document: EP

Kind code of ref document: A1