[go: up one dir, main page]

WO2019223276A1 - Method and device for realizing authentication of transaction information - Google Patents

Method and device for realizing authentication of transaction information Download PDF

Info

Publication number
WO2019223276A1
WO2019223276A1 PCT/CN2018/117567 CN2018117567W WO2019223276A1 WO 2019223276 A1 WO2019223276 A1 WO 2019223276A1 CN 2018117567 W CN2018117567 W CN 2018117567W WO 2019223276 A1 WO2019223276 A1 WO 2019223276A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction information
public key
key source
encryption result
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2018/117567
Other languages
French (fr)
Chinese (zh)
Inventor
李志波
张理
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Winway Energy Ltd
Original Assignee
Winway Energy Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Winway Energy Ltd filed Critical Winway Energy Ltd
Publication of WO2019223276A1 publication Critical patent/WO2019223276A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Definitions

  • the present application relates to the field of data processing, for example, to a method and device for implementing transaction information verification.
  • the owner of the transaction address When conducting transactions involving digital currencies, in order to verify the authenticity of transaction information (for example, a transaction address, etc.), the owner of the transaction address usually encrypts a previously agreed message or initiates a payment based on the transaction address.
  • transaction information for example, a transaction address, etc.
  • the embodiments of the present disclosure provide a method and a device for verifying transaction information, so as to improve the security of transaction information.
  • An embodiment of the present disclosure provides a method for implementing transaction information verification, which includes: using digital certificates to implement transaction information verification.
  • An embodiment of the present disclosure further provides a device for verifying transaction information, which is used to implement verification of transaction information by using a digital certificate.
  • An embodiment of the present disclosure further provides a server including the foregoing device for verifying transaction information.
  • An embodiment of the present disclosure also provides a computer-readable storage medium storing computer-executable instructions configured to perform the foregoing method for implementing verification of transaction information.
  • An embodiment of the present disclosure also provides a computer program product.
  • the computer program product includes a computer program stored on a computer-readable storage medium.
  • the computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for verifying transaction information described above.
  • An embodiment of the present disclosure further provides an electronic device, including:
  • At least one processor At least one processor
  • a memory connected in communication with the at least one processor; wherein,
  • the memory stores instructions executable by the at least one processor, and when the instructions are executed by the at least one processor, the at least one processor is caused to execute the foregoing method for implementing transaction information verification.
  • FIG. 1 is a schematic diagram of a method for implementing transaction information verification according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of a method for encrypting transaction information according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of a method for encrypting a public key source according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of a method for decrypting an encrypted result of transaction information according to an embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of a method for verifying transaction information according to an embodiment of the present disclosure
  • FIG. 6 is a schematic diagram of a method for decrypting a public key source encryption result according to an embodiment of the present disclosure
  • FIG. 7 is a schematic diagram of a method for verifying a public key source according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic diagram of a device for implementing transaction information verification according to an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of an apparatus for encrypting transaction information according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic diagram of an apparatus for providing a result of encrypting transaction information according to an embodiment of the present disclosure
  • FIG. 11 is a schematic diagram of a device for encrypting a public key source according to an embodiment of the present disclosure
  • FIG. 12 is a schematic diagram of an apparatus for providing a public key source encryption result according to an embodiment of the present disclosure
  • FIG. 13 is a schematic diagram of an apparatus for decrypting a result of encrypting transaction information according to an embodiment of the present disclosure
  • FIG. 14 is a schematic diagram of an apparatus for receiving an encrypted result of transaction information according to an embodiment of the present disclosure
  • 15 is a schematic diagram of a device for verifying transaction information according to an embodiment of the present disclosure.
  • 16 is a schematic diagram of an apparatus for decrypting a public key source encryption result according to an embodiment of the present disclosure
  • 17 is a schematic diagram of an apparatus for receiving a public key source encryption result according to an embodiment of the present disclosure
  • FIG. 18 is a schematic diagram of a device for verifying a public key source according to an embodiment of the present disclosure
  • FIG. 19 is a schematic diagram of a device for implementing a payment operation according to an embodiment of the present disclosure.
  • FIG. 20 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
  • decryption module 40: decryption module
  • an embodiment of the present disclosure provides a method for verifying transaction information, which includes: using a digital certificate to verify transaction information.
  • the verification of transaction information by using a digital certificate may include: encrypting the transaction information by using a private key of the digital certificate to obtain a transaction information encryption result.
  • the transaction information encryption result may be provided.
  • the payee the operating entity can be the payee's device, such as the payee's website server, etc .; the same applies below
  • the payer the operating entity can be the payer's device, such as the payer's client terminal and other devices ; The same applies hereinafter) to send the transaction information encryption result.
  • the transaction information may be provided.
  • the payee may send the transaction information to the payer.
  • a public key source may be provided.
  • the payee may send the public key source to the payer.
  • the public key source can be encrypted by using the private key of the digital certificate to obtain a public key source encryption result.
  • the encryption of at least one of the transaction information and the public key source may be based on a request or an initiative.
  • the payee encrypts at least one of the transaction information and public key source based on a request from the payer or other third party; or, the payee actively proactively encrypts the transaction information based on preset policies, conditions, etc.
  • At least one of the public key sources is encrypted.
  • the public key source encryption result may be provided.
  • the payee may send the public key source encryption result to the payer.
  • At least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be provided directly or indirectly.
  • the payee may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.
  • the indirect providing may include providing through a transaction intermediary.
  • the payee may send the transaction information encryption result and the public key source encryption result to the payer through a transaction intermediary (the operating entity may be a device of the transaction website, such as the website server of the transaction website; the same applies below).
  • the operating entity may be a device of the transaction website, such as the website server of the transaction website; the same applies below).
  • Transaction information and at least one of the public key sources.
  • implementing transaction information verification by using a digital certificate may include: using a public key of the digital certificate to decrypt a transaction information encryption result obtained after the transaction information is encrypted to obtain the transaction information.
  • the transaction information encryption result may be received before decrypting the transaction information encryption result.
  • the payer may receive the transaction information encryption result from the payee; or, the payer may actively obtain the transaction information encryption result from the payee through active inquiry, request, or the like.
  • the transaction information may be received.
  • the payer may receive the transaction information from the payee; or, the payer may actively obtain the transaction information from the payee through active inquiry, request, or the like.
  • the received transaction information and the decrypted transaction information may be used for verification, and a payment operation may be triggered after the verification is passed.
  • the payer may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger the payment operation after the verification is passed.
  • the verification may include comparing the consistency between the received transaction information and the decrypted transaction information, and comparing the received transaction information with the decrypted transaction information. Confirm the verification when there is consistency between the two.
  • the payer may compare whether the transaction information received from or obtained from the payee is the same as the transaction information decrypted by the payer, and the transaction information received from or obtained from the payee is decrypted with the payer. When the obtained transaction information is the same, it is confirmed that the verification is passed.
  • the public key source can be decrypted by using the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption.
  • the public key source encryption result may be received before decrypting the public key source encryption result.
  • the payer may receive the public key source encryption result from the payee; or, the payer may actively obtain the public key source encryption result from the payee by actively querying, requesting, etc.
  • the public key source may be received.
  • the payer may receive the public key source from the payee; or, the payer may actively obtain the public key source from the payee through active inquiry, request, and the like.
  • the public key may be obtained according to the received public key source.
  • the payer may obtain (eg, download) the public key from the public key source by receiving, actively requesting, or the like.
  • the received public key source and the decrypted public key source may be used for verification, and a payment operation may be triggered after the verification is passed.
  • the payer may use the public key source received from or obtained from the payee and the public key source decrypted by the payer for verification, and trigger the payment operation after the verification is passed.
  • the verification may include comparing the consistency between the received public key source and the decrypted public key source, and comparing the received public key source with the decrypted
  • the verification is confirmed.
  • the payer may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the payer.
  • the transaction information received from or obtained from the payee is compared with the payment.
  • the source of the public key decrypted by the party is the same, it is confirmed that the verification passes.
  • the payment operation may include paying digital currency.
  • the decryption of at least one of the transaction information encryption result and the public key source encryption result may be based on a request or an initiative.
  • the payer decrypts at least one of the transaction information encryption result and the public key source encryption result based on a request from the payee or another third party; or, the payer proactively decrypts the transaction information based on preset policies, conditions, etc.
  • At least one of the transaction information encryption result and the public key source encryption result is decrypted.
  • At least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be received directly or indirectly.
  • the payer may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.
  • the indirect receiving may include receiving through a transaction intermediary.
  • the payer may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.
  • the digital certificate may include a Hypertext Transfer Protocol (HTTPS) certificate; it may also include a Secure Sockets Layer (SSL) certificate, a Transport Layer Security (TLS) ) Certificates, etc.
  • HTTPS Hypertext Transfer Protocol
  • SSL Secure Sockets Layer
  • TLS Transport Layer Security
  • the transaction information may include at least one of a transaction address (for example: a payment address; the same applies hereinafter) and a transaction amount (for example: a payment amount; the same applies hereinafter).
  • a transaction address for example: a payment address; the same applies hereinafter
  • a transaction amount for example: a payment amount; the same applies hereinafter
  • the public key source may include a Uniform Resource Locator (URL) of an HTTPS website.
  • URL Uniform Resource Locator
  • the digital currency may be a cryptocurrency.
  • an embodiment of the present disclosure further provides a device 10 for implementing transaction information verification, which is used to implement verification of transaction information by using a digital certificate.
  • the device 10 may be installed on a payee (the operating entity may be a payee device, such as a web server of the payee; the same applies hereinafter).
  • the device 10 may include an encryption module 20, configured to encrypt the transaction information by using the private key of the digital certificate to obtain a transaction information encryption result.
  • the device 10 may further include a data interface 30, configured to provide an encryption result of the transaction information.
  • the data interface 30 may send the transaction information encryption result to the payer.
  • the data interface 30 may also be used to provide the transaction information.
  • the data interface 30 may send the transaction information to a payer.
  • the data interface 30 may also be used to provide a public key source.
  • the data interface 30 may send the public key source to the payer.
  • the encryption module 20 may be configured to: use the private key of the digital certificate to encrypt the public key source to obtain a public key source encryption result.
  • the encryption module 20 may be configured to: based on a request or actively initiate encryption of at least one of the transaction information and a public key source. For example, the encryption module 20 encrypts at least one of the transaction information and the public key source based on a request from a payer or other third party; or, the encryption module 20 actively encrypts the transaction information based on preset policies, conditions, etc. At least one of the public key sources is encrypted.
  • the data interface 30 may be configured to provide the public key source encryption result.
  • the data interface 30 may send the public key source encryption result to the payer.
  • the data interface 30 may be configured to directly or indirectly provide at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source.
  • the data interface 30 may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.
  • the data interface 30 may be configured to provide at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source through a transaction intermediary.
  • the data interface 30 may send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer through a transaction intermediary such as a transaction website.
  • the apparatus 10 may include a decryption module 40, configured to: decrypt the transaction information encryption result obtained by encrypting the transaction information using the public key of the digital certificate to obtain the transaction information.
  • a decryption module 40 configured to: decrypt the transaction information encryption result obtained by encrypting the transaction information using the public key of the digital certificate to obtain the transaction information.
  • the apparatus 10 may include a data interface 50 for receiving the transaction information encryption result before decrypting the transaction information encryption result.
  • the data interface 50 may receive the transaction information encryption result from the payee; or, the data interface 50 may actively obtain the transaction information encryption result from the payee through an active query, request, or the like.
  • the data interface 50 may be configured to receive the transaction information.
  • the data interface 50 may receive the transaction information from the beneficiary; or, the data interface 50 may actively obtain the transaction information from the beneficiary through active inquiry, request, and the like.
  • the device 10 may include a verification module 60, configured to perform verification by using the received transaction information and the decrypted transaction information, and trigger a payment operation after the verification is passed.
  • the verification module 60 may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger a payment operation after the verification is passed.
  • the verification module 60 may be configured to compare the consistency between the received transaction information and the decrypted transaction information, and compare the received transaction information with the decrypted transaction information. When there is consistency between the transaction information, it is confirmed that the verification is passed. For example, the verification module 60 may compare whether the transaction information received or obtained from the payee is the same as the transaction information decrypted by the decryption module 40. The transaction information received or obtained from the payee is compared with the decryption module 40. When the decrypted transaction information is the same, it is confirmed that the verification is passed.
  • the decryption module 40 may be configured to: use the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption to obtain the public key source.
  • the data interface 50 may be configured to: before decrypting the public key source encryption result, receive the public key source encryption result.
  • the data interface 50 may receive the public key source encryption result from the payee; or, the data interface 50 may actively obtain the public key source encryption result from the payee through an active query, request, or the like.
  • the data interface 50 may be configured to receive the public key source.
  • the data interface 50 may receive the public key source from the payee; or, the data interface 50 may actively obtain the public key source from the payee through active query, request, or the like.
  • the data interface 50 may be configured to obtain the public key according to the received public key source.
  • the data interface 50 may obtain (for example, download) the public key from the public key source by receiving, actively requesting, or the like.
  • the verification module 60 may be configured to perform verification by using the received public key source and the decrypted public key source, and trigger a payment operation after the verification is passed.
  • the verification module 60 may use the public key source received from or obtained from the payee and the public key source decrypted by the decryption module 40 to perform verification, and trigger a payment operation after the verification is passed.
  • the verification module 60 may be configured to compare the consistency between the received public key source and the decrypted public key source, and compare the received public key source with the decrypted public key source. When the source of the decrypted public key is consistent, it is confirmed that the verification passes. For example, the verification module 60 may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the decryption module 40. The transaction information received from or obtained from the payee is decrypted. When the source of the public key decrypted by the module 40 is the same, it is confirmed that the verification is passed.
  • the device 10 may include a payment module 70 for performing a payment operation according to a trigger of the verification module 60.
  • the payment module 70 may be configured to pay digital currency.
  • the data interface 50 may be configured to directly or indirectly receive at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source.
  • the data interface 50 may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.
  • the data interface 50 may be configured to receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source through a transaction intermediary.
  • the data interface 50 may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.
  • the digital certificate may include an HTTPS certificate, and may also include an SSL certificate, a TLS certificate, and the like.
  • the transaction information may include at least one of a transaction address and a transaction amount.
  • the public key source may include a URL of an HTTPS website.
  • the digital currency may be a cryptocurrency.
  • the public key mentioned above can be cached by the payer and other third parties.
  • the provision, acquisition, encryption, and decryption of the above-mentioned various data may also be achieved through other channels such as a third party.
  • An embodiment of the present disclosure further provides a server including the device 10 for verifying transaction information in the foregoing embodiment, for example, including at least one of an encryption module 20 and a data interface 30, or including a decryption module 40, a data interface 50, and verification. At least one of the module 60 and the payment module 70.
  • An embodiment of the present disclosure further provides a computer-readable storage medium storing computer-executable instructions configured to execute the method for implementing transaction information verification in the foregoing embodiment, for example, with the encryption module 20 and data A method related to at least one of the interfaces 30, or a method related to at least one of the decryption module 40, the data interface 50, the verification module 60, and the payment module 70.
  • An embodiment of the present disclosure also provides a computer program product.
  • the computer program product includes a computer program stored on a computer-readable storage medium.
  • the computer program includes program instructions.
  • the computer executes the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the encryption module 20 and the data interface 30, or the decryption module 40, the data interface 50, the verification module 60, and the payment module 70. At least one of the related methods.
  • the computer-readable storage medium may be a transitory computer-readable storage medium, or may be a non-transitory computer-readable storage medium.
  • An embodiment of the present disclosure further provides an electronic device, whose structure is shown in FIG. 20.
  • the electronic device 200 includes:
  • At least one processor 201, and one processor 201 is taken as an example in FIG. 20; and the memory 202 may further include a communication interface 203 and a bus 204.
  • the processor 201, the communication interface 203, and the memory 202 can complete communication with each other through the bus 204.
  • the communication interface 203 can be used for information transmission.
  • the processor 201 may call the logical instructions in the memory 202 to execute the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the encryption module 20 and the data interface 30, or a method related to the decryption module 40 and data. A method related to at least one of the interface 50, the verification module 60, and the payment module 70.
  • logic instructions in the memory 202 can be implemented in the form of software functional units and sold or used as an independent product, and can be stored in a computer-readable storage medium.
  • the memory 202 is a computer-readable storage medium and can be used to store software programs and computer-executable programs, such as program instructions / modules corresponding to the methods in the embodiments of the present disclosure.
  • the processor 201 executes functional applications and data processing by running software programs, instructions, and modules stored in the memory 202, that is, implementing the method for verifying transaction information in the foregoing method embodiment, for example, interfaces with the encryption module 20 and data A method related to at least one of 30, or a method related to at least one of the decryption module 40, the data interface 50, the verification module 60, and the payment module 70.
  • the memory 202 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like.
  • the memory 202 may include a high-speed random access memory, and may further include a non-volatile memory.
  • the solution for verifying transaction information in the embodiments of the present disclosure improves the security and efficiency of transaction information verification.
  • the data processing described in this application may include at least one of setting, calculation, judgment, transmission, storage, management, etc. based on or performed on the data.
  • the data processing may be data processing related to a digital certificate by a data processing device
  • the digital certificate may be obtained through the data processing
  • the data processing device may be a digital certificate processing device.
  • the digital certificate processing device may be a digital currency mining machine, and the digital currency may be a cryptocurrency such as Bitcoin.
  • the technical solution of the embodiment of the present disclosure may be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes one or more instructions for making a computer device (which may be a personal computer, a server, or a network). Equipment, etc.) perform all or part of the steps of the method described in the embodiments of the present disclosure.
  • the foregoing storage medium may be a non-transitory storage medium, including: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk, or an optical disc A medium that can store program code, or a transient storage medium.
  • first, second, etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
  • the first element can be called the second element, and likewise, the second element can be called the first element, as long as all occurrences of the "first element” are renamed consistently and all occurrences of The “second component” can be renamed consistently.
  • the first element and the second element are both elements, but may not be the same element.
  • the aspects, implementations, implementations or features in the described embodiments can be used individually or in any combination.
  • Various aspects in the described embodiments may be implemented by software, hardware, or a combination of software and hardware.
  • the described embodiments may also be embodied by a computer-readable medium storing computer-readable code, the computer-readable code including instructions executable by at least one computing device.
  • the computer-readable medium can be associated with any data storage device capable of storing data, which can be read by a computer system.
  • Computer-readable media for example may include read-only memory, random-access memory, CD-ROM, HDD, DVD, magnetic tape, and optical data storage devices.
  • the computer-readable medium can also be distributed among computer systems connected through a network, so that the computer-readable code can be stored and executed in a distributed manner.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

A method and device for realizing authentication of transaction information. The method comprises: using a digital certificate to realize authentication of transaction information. An electronic apparatus comprises: at least one processor; and a storage device in a communication connection with the at least one processor, wherein the storage device stores an instruction executable by the at least one processor, and when executing the instruction, the at least one processor implements the method for realizing authentication of transaction information. A server comprises the device for realizing authentication of transaction information.

Description

实现交易信息验证的方法和装置Method and device for realizing transaction information verification 技术领域Technical field

本申请涉及数据处理领域,例如涉及一种实现交易信息验证的方法和装置。The present application relates to the field of data processing, for example, to a method and device for implementing transaction information verification.

背景技术Background technique

在进行涉及数字货币的交易时,为了验证交易信息(例如,交易地址等)的真实性,通常由该交易地址的拥有者基于该交易地址加密一段提前商定的消息或发起一笔支付。When conducting transactions involving digital currencies, in order to verify the authenticity of transaction information (for example, a transaction address, etc.), the owner of the transaction address usually encrypts a previously agreed message or initiates a payment based on the transaction address.

但是,现有的信息加密方式容易被盗取,安全性较低。However, the existing information encryption methods are easy to be stolen and have low security.

发明内容Summary of the Invention

本公开实施例提供了一种实现交易信息验证的方法和装置,以期提高交易信息的安全性。The embodiments of the present disclosure provide a method and a device for verifying transaction information, so as to improve the security of transaction information.

本公开实施例提供了一种实现交易信息验证的方法,包括:利用数字证书实现交易信息的验证。An embodiment of the present disclosure provides a method for implementing transaction information verification, which includes: using digital certificates to implement transaction information verification.

本公开实施例还提供了一种实现交易信息验证的装置,用于:利用数字证书实现交易信息的验证。An embodiment of the present disclosure further provides a device for verifying transaction information, which is used to implement verification of transaction information by using a digital certificate.

本公开实施例还提供了一种服务器,包含上述的实现交易信息验证的装置。An embodiment of the present disclosure further provides a server including the foregoing device for verifying transaction information.

本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述的实现交易信息验证的方法。An embodiment of the present disclosure also provides a computer-readable storage medium storing computer-executable instructions configured to perform the foregoing method for implementing verification of transaction information.

本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述的实现交易信息验证的方法。An embodiment of the present disclosure also provides a computer program product. The computer program product includes a computer program stored on a computer-readable storage medium. The computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for verifying transaction information described above.

本公开实施例还提供了一种电子设备,包括:An embodiment of the present disclosure further provides an electronic device, including:

至少一个处理器;以及At least one processor; and

与所述至少一个处理器通信连接的存储器;其中,A memory connected in communication with the at least one processor; wherein,

所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行上述的实现交易信息验证的方法。The memory stores instructions executable by the at least one processor, and when the instructions are executed by the at least one processor, the at least one processor is caused to execute the foregoing method for implementing transaction information verification.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

一个或多个实施例通过与之对应的附图进行示例性说明,这些示例性说明和附图并不构成对实施例的限定,附图中具有相同参考数字标号的元件示为类似的元件,附图不构成比例限制,并且其中:One or more embodiments are exemplarily described by corresponding drawings. These exemplary descriptions and drawings do not limit the embodiments. Elements with the same reference numerals in the drawings are shown as similar elements. The drawings do not constitute a scale limitation, and in which:

图1为本公开实施例的实现交易信息验证的方法示意图;1 is a schematic diagram of a method for implementing transaction information verification according to an embodiment of the present disclosure;

图2为本公开实施例的对交易信息进行加密的方法示意图;2 is a schematic diagram of a method for encrypting transaction information according to an embodiment of the present disclosure;

图3为本公开实施例的对公钥来源进行加密的方法示意图;3 is a schematic diagram of a method for encrypting a public key source according to an embodiment of the present disclosure;

图4为本公开实施例的对交易信息加密结果进行解密的方法示意图;4 is a schematic diagram of a method for decrypting an encrypted result of transaction information according to an embodiment of the present disclosure;

图5为本公开实施例的对交易信息进行验证的方法示意图;5 is a schematic diagram of a method for verifying transaction information according to an embodiment of the present disclosure;

图6为本公开实施例的对公钥来源加密结果进行解密的方法示意图;6 is a schematic diagram of a method for decrypting a public key source encryption result according to an embodiment of the present disclosure;

图7为本公开实施例的对公钥来源进行验证的方法示意图;7 is a schematic diagram of a method for verifying a public key source according to an embodiment of the present disclosure;

图8为本公开实施例的实现交易信息验证的装置示意图;8 is a schematic diagram of a device for implementing transaction information verification according to an embodiment of the present disclosure;

图9为本公开实施例的对交易信息进行加密的装置示意图;9 is a schematic diagram of an apparatus for encrypting transaction information according to an embodiment of the present disclosure;

图10为本公开实施例的提供交易信息加密结果的装置示意图;10 is a schematic diagram of an apparatus for providing a result of encrypting transaction information according to an embodiment of the present disclosure;

图11为本公开实施例的对公钥来源进行加密的装置示意图;11 is a schematic diagram of a device for encrypting a public key source according to an embodiment of the present disclosure;

图12为本公开实施例的提供公钥来源加密结果的装置示意图;12 is a schematic diagram of an apparatus for providing a public key source encryption result according to an embodiment of the present disclosure;

图13为本公开实施例的对交易信息加密结果进行解密的装置示意图;13 is a schematic diagram of an apparatus for decrypting a result of encrypting transaction information according to an embodiment of the present disclosure;

图14为本公开实施例的接收交易信息加密结果的装置示意图;14 is a schematic diagram of an apparatus for receiving an encrypted result of transaction information according to an embodiment of the present disclosure;

图15为本公开实施例的对交易信息进行验证的装置示意图;15 is a schematic diagram of a device for verifying transaction information according to an embodiment of the present disclosure;

图16为本公开实施例的对公钥来源加密结果进行解密的装置示意图;16 is a schematic diagram of an apparatus for decrypting a public key source encryption result according to an embodiment of the present disclosure;

图17为本公开实施例的接收公钥来源加密结果的装置示意图;17 is a schematic diagram of an apparatus for receiving a public key source encryption result according to an embodiment of the present disclosure;

图18为本公开实施例的对公钥来源进行验证的装置示意图;18 is a schematic diagram of a device for verifying a public key source according to an embodiment of the present disclosure;

图19为本公开实施例的实现支付操作的装置示意图;以及19 is a schematic diagram of a device for implementing a payment operation according to an embodiment of the present disclosure; and

图20为本公开实施例的电子设备的结构示意图。FIG. 20 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.

附图标记:Reference signs:

10:实现交易信息验证的装置;10: Device for verifying transaction information;

20:加密模块;20: encryption module;

30:数据接口;30: data interface;

40:解密模块;40: decryption module;

50:数据接口;50: data interface;

60:验证模块;60: verification module;

70:支付模块。70: payment module.

具体实施方式Detailed ways

为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。在以下的技术描述中,为方便解释起见,通过多个细节以提供对所披露实施例的充分理解。然而,在没有这些细节的情况下,一个或多个实施例仍然可以实施。在其它情况下,为简化附图,熟知的结构和装置可以简化展示。In order to understand the features and technical contents of the embodiments of the present disclosure in more detail, the implementation of the embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. In the following technical description, for convenience of explanation, various details are provided to provide a full understanding of the disclosed embodiments. However, without these details, one or more embodiments can still be implemented. In other cases, to simplify the drawings, well-known structures and devices may simplify the display.

参见图1,本公开实施例提供了一种实现交易信息验证的方法,包括:利用数字证书实现交易信息的验证。Referring to FIG. 1, an embodiment of the present disclosure provides a method for verifying transaction information, which includes: using a digital certificate to verify transaction information.

参见图2,所述利用数字证书实现交易信息的验证可以包括:利用所述数字证书的私钥对所述交易信息进行加密得到交易信息加密结果。Referring to FIG. 2, the verification of transaction information by using a digital certificate may include: encrypting the transaction information by using a private key of the digital certificate to obtain a transaction information encryption result.

作为一个实施例,可以提供所述交易信息加密结果。例如,收款方(操作实体可以是收款方设备,例如收款方的网站服务器等;以下亦同)可以向 付款方(操作实体可以是付款方设备,例如付款方的客户端等终端设备;以下亦同)发送所述交易信息加密结果。As an embodiment, the transaction information encryption result may be provided. For example, the payee (the operating entity can be the payee's device, such as the payee's website server, etc .; the same applies below) to the payer (the operating entity can be the payer's device, such as the payer's client terminal and other devices ; The same applies hereinafter) to send the transaction information encryption result.

作为一个实施例,可以提供所述交易信息。例如,收款方可以向付款方发送所述交易信息。As an embodiment, the transaction information may be provided. For example, the payee may send the transaction information to the payer.

作为一个实施例,可以提供公钥来源。例如,收款方可以向付款方发送所述公钥来源。As an embodiment, a public key source may be provided. For example, the payee may send the public key source to the payer.

参见图3,可以利用所述数字证书的私钥对所述公钥来源进行加密得到公钥来源加密结果。Referring to FIG. 3, the public key source can be encrypted by using the private key of the digital certificate to obtain a public key source encryption result.

作为一个实施例,对所述交易信息、公钥来源中至少之一进行的加密可以是基于请求或主动发起的。例如,收款方基于付款方或其他第三方的请求对所述交易信息、公钥来源中至少之一进行加密;或,收款方基于预设的策略、条件等主动对所述交易信息、公钥来源中至少之一进行加密。As an embodiment, the encryption of at least one of the transaction information and the public key source may be based on a request or an initiative. For example, the payee encrypts at least one of the transaction information and public key source based on a request from the payer or other third party; or, the payee actively proactively encrypts the transaction information based on preset policies, conditions, etc. At least one of the public key sources is encrypted.

作为一个实施例,可以提供所述公钥来源加密结果。例如,收款方可以向付款方发送所述公钥来源加密结果。As an embodiment, the public key source encryption result may be provided. For example, the payee may send the public key source encryption result to the payer.

作为一个实施例,所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一可以是直接或间接提供的。例如,收款方可以直接或间接向付款方发送所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, at least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be provided directly or indirectly. For example, the payee may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.

作为一个实施例,所述间接提供可以包括通过交易中介提供。例如,收款方可以通过交易网站(操作实体可以是交易网站的设备,例如交易网站的网站服务器等;以下亦同)等交易中介向付款方发送所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the indirect providing may include providing through a transaction intermediary. For example, the payee may send the transaction information encryption result and the public key source encryption result to the payer through a transaction intermediary (the operating entity may be a device of the transaction website, such as the website server of the transaction website; the same applies below). , Transaction information, and at least one of the public key sources.

参见图4,所述利用数字证书实现交易信息验证可以包括:利用所述数字证书的公钥对所述交易信息在加密后得到的交易信息加密结果进行解密得到所述交易信息。Referring to FIG. 4, implementing transaction information verification by using a digital certificate may include: using a public key of the digital certificate to decrypt a transaction information encryption result obtained after the transaction information is encrypted to obtain the transaction information.

作为一个实施例,在解密所述交易信息加密结果之前,可以接收所述交易信息加密结果。例如,付款方可以接收来自收款方的所述交易信息加密结果;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述交易 信息加密结果。As an embodiment, before decrypting the transaction information encryption result, the transaction information encryption result may be received. For example, the payer may receive the transaction information encryption result from the payee; or, the payer may actively obtain the transaction information encryption result from the payee through active inquiry, request, or the like.

作为一个实施例,可以接收所述交易信息。例如,付款方可以接收来自收款方的所述交易信息;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述交易信息。As an embodiment, the transaction information may be received. For example, the payer may receive the transaction information from the payee; or, the payer may actively obtain the transaction information from the payee through active inquiry, request, or the like.

参见图5,可以利用所述接收到的交易信息以及所述解密得到的交易信息进行验证,在验证通过后触发支付操作。例如,付款方可以利用接收自或获取自收款方的所述交易信息以及付款方解密得到的交易信息进行验证,在验证通过后触发支付操作。Referring to FIG. 5, the received transaction information and the decrypted transaction information may be used for verification, and a payment operation may be triggered after the verification is passed. For example, the payer may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger the payment operation after the verification is passed.

作为一个实施例,所述验证可以包括:对比所述接收到的交易信息以及所述解密得到的交易信息之间的一致性,在所述接收到的交易信息与所述解密得到的交易信息之间具有一致性时确认验证通过。例如,付款方可以比较接收自或获取自收款方的所述交易信息是否与付款方解密得到的交易信息相同,在付款方接收自或获取自收款方的所述交易信息与付款方解密得到的交易信息相同时,确认验证通过。As an embodiment, the verification may include comparing the consistency between the received transaction information and the decrypted transaction information, and comparing the received transaction information with the decrypted transaction information. Confirm the verification when there is consistency between the two. For example, the payer may compare whether the transaction information received from or obtained from the payee is the same as the transaction information decrypted by the payer, and the transaction information received from or obtained from the payee is decrypted with the payer. When the obtained transaction information is the same, it is confirmed that the verification is passed.

参见图6,可以利用所述数字证书的公钥对公钥来源在加密后得到的公钥来源加密结果进行解密得到所述公钥来源。Referring to FIG. 6, the public key source can be decrypted by using the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption.

作为一个实施例,在解密所述公钥来源加密结果之前,可以接收所述公钥来源加密结果。例如,付款方可以接收来自收款方的所述公钥来源加密结果;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述公钥来源加密结果。As an embodiment, before decrypting the public key source encryption result, the public key source encryption result may be received. For example, the payer may receive the public key source encryption result from the payee; or, the payer may actively obtain the public key source encryption result from the payee by actively querying, requesting, etc.

作为一个实施例,可以接收所述公钥来源。例如,付款方可以接收来自收款方的所述公钥来源;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述公钥来源。As an embodiment, the public key source may be received. For example, the payer may receive the public key source from the payee; or, the payer may actively obtain the public key source from the payee through active inquiry, request, and the like.

作为一个实施例,可以根据所述接收到的公钥来源获取所述公钥。例如,付款方可以通过接收、主动请求等方式从所述公钥来源获取(例如:下载)所述公钥。As an embodiment, the public key may be obtained according to the received public key source. For example, the payer may obtain (eg, download) the public key from the public key source by receiving, actively requesting, or the like.

参见图7,可以利用所述接收到的公钥来源以及所述解密得到的公钥来源进行验证,在验证通过后触发支付操作。例如,付款方可以利用接收自或 获取自收款方的所述公钥来源以及付款方解密得到的公钥来源进行验证,在验证通过后触发支付操作。Referring to FIG. 7, the received public key source and the decrypted public key source may be used for verification, and a payment operation may be triggered after the verification is passed. For example, the payer may use the public key source received from or obtained from the payee and the public key source decrypted by the payer for verification, and trigger the payment operation after the verification is passed.

作为一个实施例,所述验证可以包括:对比所述接收到的公钥来源以及所述解密得到的公钥来源之间的一致性,在所述接收到的公钥来源与所述解密得到的公钥来源之间具有一致性时确认验证通过。例如,付款方可以比较接收自或获取自收款方的所述公钥来源是否与付款方解密得到的公钥来源相同,在付款方接收自或获取自收款方的所述交易信息与付款方解密得到的公钥来源相同时,确认验证通过。As an embodiment, the verification may include comparing the consistency between the received public key source and the decrypted public key source, and comparing the received public key source with the decrypted When there is consistency between the public key sources, the verification is confirmed. For example, the payer may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the payer. The transaction information received from or obtained from the payee is compared with the payment. When the source of the public key decrypted by the party is the same, it is confirmed that the verification passes.

作为一个实施例,所述支付操作可以包括支付数字货币。As an embodiment, the payment operation may include paying digital currency.

作为一个实施例,对所述交易信息加密结果、公钥来源加密结果中至少之一进行的解密可以是基于请求或主动发起的。例如,付款方基于收款方或其他第三方的请求对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密;或,付款方基于预设的策略、条件等主动对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密。As an embodiment, the decryption of at least one of the transaction information encryption result and the public key source encryption result may be based on a request or an initiative. For example, the payer decrypts at least one of the transaction information encryption result and the public key source encryption result based on a request from the payee or another third party; or, the payer proactively decrypts the transaction information based on preset policies, conditions, etc. At least one of the transaction information encryption result and the public key source encryption result is decrypted.

作为一个实施例,所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一可以是直接或间接接收的。例如,付款方可以直接或间接接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, at least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be received directly or indirectly. For example, the payer may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.

作为一个实施例,所述间接接收可以包括通过交易中介接收。例如,付款方可以通过交易网站等交易中介接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the indirect receiving may include receiving through a transaction intermediary. For example, the payer may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.

作为一个实施例,所述数字证书可以包括超文本安全传送协议(Hypertext Transfer Protocol Secure,HTTPS)证书;也可以包括安全套接层(Secure Socket Layer,SSL)证书、安全传输层(Transport Layer Security,TLS)证书等。As an embodiment, the digital certificate may include a Hypertext Transfer Protocol (HTTPS) certificate; it may also include a Secure Sockets Layer (SSL) certificate, a Transport Layer Security (TLS) ) Certificates, etc.

所述交易信息可以包括交易地址(例如:支付地址;以下亦同)、交易数额(例如:支付数额;以下亦同)中至少之一。The transaction information may include at least one of a transaction address (for example: a payment address; the same applies hereinafter) and a transaction amount (for example: a payment amount; the same applies hereinafter).

作为一个实施例,所述公钥来源可以包括HTTPS网站的统一资源定位符(Uniform Resource Locator,URL)。As an embodiment, the public key source may include a Uniform Resource Locator (URL) of an HTTPS website.

作为一个实施例,所述数字货币可以为加密货币。As an embodiment, the digital currency may be a cryptocurrency.

参见图8,本公开实施例还提供了一种实现交易信息验证的装置10,用于:利用数字证书实现交易信息的验证。所述装置10可以设置于收款方(操作实体可以是收款方设备,例如收款方的网站服务器等;以下亦同)。Referring to FIG. 8, an embodiment of the present disclosure further provides a device 10 for implementing transaction information verification, which is used to implement verification of transaction information by using a digital certificate. The device 10 may be installed on a payee (the operating entity may be a payee device, such as a web server of the payee; the same applies hereinafter).

参见图9,所述装置10可以包括加密模块20,用于:利用所述数字证书的私钥对所述交易信息进行加密得到交易信息加密结果。Referring to FIG. 9, the device 10 may include an encryption module 20, configured to encrypt the transaction information by using the private key of the digital certificate to obtain a transaction information encryption result.

参见图10,所述装置10还可以包括数据接口30,用于:提供所述交易信息加密结果。例如,数据接口30可以向付款方发送所述交易信息加密结果。Referring to FIG. 10, the device 10 may further include a data interface 30, configured to provide an encryption result of the transaction information. For example, the data interface 30 may send the transaction information encryption result to the payer.

所述数据接口30还可以用于提供所述交易信息。例如,数据接口30可以向付款方发送所述交易信息。The data interface 30 may also be used to provide the transaction information. For example, the data interface 30 may send the transaction information to a payer.

所述数据接口30还可以用于提供公钥来源。例如,数据接口30可以向付款方发送所述公钥来源。The data interface 30 may also be used to provide a public key source. For example, the data interface 30 may send the public key source to the payer.

参见图11,所述加密模块20可以用于:利用所述数字证书的私钥对所述公钥来源进行加密得到公钥来源加密结果。Referring to FIG. 11, the encryption module 20 may be configured to: use the private key of the digital certificate to encrypt the public key source to obtain a public key source encryption result.

作为一个实施例,所述加密模块20可以用于:基于请求或主动发起对所述交易信息、公钥来源中至少之一的加密。例如,加密模块20基于付款方或其他第三方的请求对所述交易信息、公钥来源中至少之一进行加密;或,加密模块20基于预设的策略、条件等主动对所述交易信息、公钥来源中至少之一进行加密。As an embodiment, the encryption module 20 may be configured to: based on a request or actively initiate encryption of at least one of the transaction information and a public key source. For example, the encryption module 20 encrypts at least one of the transaction information and the public key source based on a request from a payer or other third party; or, the encryption module 20 actively encrypts the transaction information based on preset policies, conditions, etc. At least one of the public key sources is encrypted.

参见图12,所述数据接口30可以用于:提供所述公钥来源加密结果。例如,数据接口30可以向付款方发送所述公钥来源加密结果。Referring to FIG. 12, the data interface 30 may be configured to provide the public key source encryption result. For example, the data interface 30 may send the public key source encryption result to the payer.

作为一个实施例,所述数据接口30可以用于:直接或间接提供所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如:数据接口30可以直接或间接向付款方发送所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the data interface 30 may be configured to directly or indirectly provide at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source. For example, the data interface 30 may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.

作为一个实施例,所述数据接口30可以用于:通过交易中介提供所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如,数据接口30可以通过交易网站等交易中介向付款方发送所述交易信息加 密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the data interface 30 may be configured to provide at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source through a transaction intermediary. For example, the data interface 30 may send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer through a transaction intermediary such as a transaction website.

参见图13,所述装置10可以包括解密模块40,用于:利用所述数字证书的公钥对所述交易信息在加密后得到的交易信息加密结果进行解密得到所述交易信息。Referring to FIG. 13, the apparatus 10 may include a decryption module 40, configured to: decrypt the transaction information encryption result obtained by encrypting the transaction information using the public key of the digital certificate to obtain the transaction information.

参见图14,所述装置10可以包括数据接口50,用于:在解密所述交易信息加密结果之前,接收所述交易信息加密结果。例如,数据接口50可以接收来自收款方的所述交易信息加密结果;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述交易信息加密结果。Referring to FIG. 14, the apparatus 10 may include a data interface 50 for receiving the transaction information encryption result before decrypting the transaction information encryption result. For example, the data interface 50 may receive the transaction information encryption result from the payee; or, the data interface 50 may actively obtain the transaction information encryption result from the payee through an active query, request, or the like.

作为一个实施例,所述数据接口50可以用于:接收所述交易信息。例如,数据接口50可以接收来自收款方的所述交易信息;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述交易信息。As an embodiment, the data interface 50 may be configured to receive the transaction information. For example, the data interface 50 may receive the transaction information from the beneficiary; or, the data interface 50 may actively obtain the transaction information from the beneficiary through active inquiry, request, and the like.

参见图15,所述装置10可以包括验证模块60,用于:利用所述接收到的交易信息以及所述解密得到的交易信息进行验证,在验证通过后触发支付操作。例如,验证模块60可以利用接收自或获取自收款方的所述交易信息以及付款方解密得到的交易信息进行验证,在验证通过后触发支付操作。Referring to FIG. 15, the device 10 may include a verification module 60, configured to perform verification by using the received transaction information and the decrypted transaction information, and trigger a payment operation after the verification is passed. For example, the verification module 60 may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger a payment operation after the verification is passed.

作为一个实施例,所述验证模块60可以用于:对比所述接收到的交易信息以及所述解密得到的交易信息之间的一致性,在所述接收到的交易信息与所述解密得到的交易信息之间具有一致性时确认验证通过。例如,验证模块60可以比较接收自或获取自收款方的所述交易信息是否与解密模块40解密得到的交易信息相同,在接收自或获取自收款方的所述交易信息与解密模块40解密得到的交易信息相同时,确认验证通过。As an embodiment, the verification module 60 may be configured to compare the consistency between the received transaction information and the decrypted transaction information, and compare the received transaction information with the decrypted transaction information. When there is consistency between the transaction information, it is confirmed that the verification is passed. For example, the verification module 60 may compare whether the transaction information received or obtained from the payee is the same as the transaction information decrypted by the decryption module 40. The transaction information received or obtained from the payee is compared with the decryption module 40. When the decrypted transaction information is the same, it is confirmed that the verification is passed.

参见图16,所述解密模块40可以用于:利用所述数字证书的公钥对公钥来源在加密后得到的公钥来源加密结果进行解密得到所述公钥来源。Referring to FIG. 16, the decryption module 40 may be configured to: use the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption to obtain the public key source.

参加图17,所述数据接口50可以用于:在解密所述公钥来源加密结果之前,接收所述公钥来源加密结果。例如,数据接口50可以接收来自收款方的所述公钥来源加密结果;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述公钥来源加密结果。Referring to FIG. 17, the data interface 50 may be configured to: before decrypting the public key source encryption result, receive the public key source encryption result. For example, the data interface 50 may receive the public key source encryption result from the payee; or, the data interface 50 may actively obtain the public key source encryption result from the payee through an active query, request, or the like.

作为一个实施例,所述数据接口50可以用于:接收所述公钥来源。例如, 数据接口50可以接收来自收款方的所述公钥来源;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述公钥来源。As an embodiment, the data interface 50 may be configured to receive the public key source. For example, the data interface 50 may receive the public key source from the payee; or, the data interface 50 may actively obtain the public key source from the payee through active query, request, or the like.

作为一个实施例,所述数据接口50可以用于:根据所述接收到的公钥来源获取所述公钥。例如,数据接口50可以通过接收、主动请求等方式从所述公钥来源获取(例如:下载)所述公钥。As an embodiment, the data interface 50 may be configured to obtain the public key according to the received public key source. For example, the data interface 50 may obtain (for example, download) the public key from the public key source by receiving, actively requesting, or the like.

参见图18,所述验证模块60可以用于:利用所述接收到的公钥来源以及所述解密得到的公钥来源进行验证,在验证通过后触发支付操作。例如,验证模块60可以利用接收自或获取自收款方的所述公钥来源以及解密模块40解密得到的公钥来源进行验证,在验证通过后触发支付操作。Referring to FIG. 18, the verification module 60 may be configured to perform verification by using the received public key source and the decrypted public key source, and trigger a payment operation after the verification is passed. For example, the verification module 60 may use the public key source received from or obtained from the payee and the public key source decrypted by the decryption module 40 to perform verification, and trigger a payment operation after the verification is passed.

作为一个实施例,所述验证模块60可以用于:对比所述接收到的公钥来源以及所述解密得到的公钥来源之间的一致性,在所述接收到的公钥来源与所述解密得到的公钥来源之间具有一致性时确认验证通过。例如,验证模块60可以比较接收自或获取自收款方的所述公钥来源是否与解密模块40解密得到的公钥来源相同,在接收自或获取自收款方的所述交易信息与解密模块40解密得到的公钥来源相同时,确认验证通过。As an embodiment, the verification module 60 may be configured to compare the consistency between the received public key source and the decrypted public key source, and compare the received public key source with the decrypted public key source. When the source of the decrypted public key is consistent, it is confirmed that the verification passes. For example, the verification module 60 may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the decryption module 40. The transaction information received from or obtained from the payee is decrypted. When the source of the public key decrypted by the module 40 is the same, it is confirmed that the verification is passed.

参加图19,所述装置10可以包括支付模块70,用于:根据所述验证模块60的触发执行支付操作。As shown in FIG. 19, the device 10 may include a payment module 70 for performing a payment operation according to a trigger of the verification module 60.

作为一个实施例,所述支付模块70可以用于:支付数字货币。As an embodiment, the payment module 70 may be configured to pay digital currency.

作为一个实施例,所述解密模块40可以用于:基于请求或主动发起对所述交易信息加密结果、公钥来源加密结果中至少之一进行的解密。例如,解密模块40基于收款方或其他第三方的请求对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密;或,解密模块40基于预设的策略、条件等主动对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密。As an embodiment, the decryption module 40 may be configured to: decrypt at least one of the transaction information encryption result and the public key source encryption result based on a request or an initiative. For example, the decryption module 40 decrypts at least one of the encryption result of the transaction information and the encryption result of the public key source based on a request from the payee or other third party; At least one of the transaction information encryption result and the public key source encryption result is decrypted.

作为一个实施例,所述数据接口50可以用于:直接或间接接收所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如,数据接口50可以直接或间接接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the data interface 50 may be configured to directly or indirectly receive at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source. For example, the data interface 50 may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.

作为一个实施例,所述数据接口50可以用于:通过交易中介接收所述交 易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如,数据接口50可以通过交易网站等交易中介接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the data interface 50 may be configured to receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source through a transaction intermediary. For example, the data interface 50 may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.

作为一个实施例,所述数字证书可以包括HTTPS证书;也可以包括SSL证书、TLS证书等。As an embodiment, the digital certificate may include an HTTPS certificate, and may also include an SSL certificate, a TLS certificate, and the like.

所述交易信息可以包括交易地址、交易数额中至少之一。The transaction information may include at least one of a transaction address and a transaction amount.

作为一个实施例,所述公钥来源可以包括HTTPS网站的URL。As an embodiment, the public key source may include a URL of an HTTPS website.

作为一个实施例,所述数字货币可以为加密货币。As an embodiment, the digital currency may be a cryptocurrency.

上述的公钥可由付款方以及其他第三方等缓存。The public key mentioned above can be cached by the payer and other third parties.

上述各种数据(例如:交易信息加密结果、公钥来源加密结果、交易信息、公钥来源等)的提供、获取、加密、解密等,也可以是通过第三方等其他途径实现的。The provision, acquisition, encryption, and decryption of the above-mentioned various data (for example, the encryption result of the transaction information, the encryption result of the public key source, the transaction information, and the source of the public key, etc.) may also be achieved through other channels such as a third party.

本公开实施例还提供了一种服务器,包含上述实施例的实现交易信息验证的装置10,例如:包含加密模块20、数据接口30中至少之一,或包含解密模块40、数据接口50、验证模块60、支付模块70中至少之一。An embodiment of the present disclosure further provides a server including the device 10 for verifying transaction information in the foregoing embodiment, for example, including at least one of an encryption module 20 and a data interface 30, or including a decryption module 40, a data interface 50, and verification. At least one of the module 60 and the payment module 70.

本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述实施例的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。An embodiment of the present disclosure further provides a computer-readable storage medium storing computer-executable instructions configured to execute the method for implementing transaction information verification in the foregoing embodiment, for example, with the encryption module 20 and data A method related to at least one of the interfaces 30, or a method related to at least one of the decryption module 40, the data interface 50, the verification module 60, and the payment module 70.

本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述实施例的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。An embodiment of the present disclosure also provides a computer program product. The computer program product includes a computer program stored on a computer-readable storage medium. The computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the encryption module 20 and the data interface 30, or the decryption module 40, the data interface 50, the verification module 60, and the payment module 70. At least one of the related methods.

上述的计算机可读存储介质可以是暂态计算机可读存储介质,也可以是非暂态计算机可读存储介质。The computer-readable storage medium may be a transitory computer-readable storage medium, or may be a non-transitory computer-readable storage medium.

本公开实施例还提供了一种电子设备,其结构如图20所示,该电子设备 200包括:An embodiment of the present disclosure further provides an electronic device, whose structure is shown in FIG. 20. The electronic device 200 includes:

至少一个处理器(processor)201,图20中以一个处理器201为例;和存储器(memory)202,还可以包括通信接口(Communication Interface)203和总线204。其中,处理器201、通信接口203、存储器202可以通过总线204完成相互间的通信。通信接口203可以用于信息传输。处理器201可以调用存储器202中的逻辑指令,以执行上述实施例的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。At least one processor 201, and one processor 201 is taken as an example in FIG. 20; and the memory 202 may further include a communication interface 203 and a bus 204. The processor 201, the communication interface 203, and the memory 202 can complete communication with each other through the bus 204. The communication interface 203 can be used for information transmission. The processor 201 may call the logical instructions in the memory 202 to execute the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the encryption module 20 and the data interface 30, or a method related to the decryption module 40 and data. A method related to at least one of the interface 50, the verification module 60, and the payment module 70.

此外,上述的存储器202中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。In addition, the logic instructions in the memory 202 can be implemented in the form of software functional units and sold or used as an independent product, and can be stored in a computer-readable storage medium.

存储器202作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中的方法对应的程序指令/模块。处理器201通过运行存储在存储器202中的软件程序、指令以及模块,从而执行功能应用以及数据处理,即实现上述方法实施例中的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。The memory 202 is a computer-readable storage medium and can be used to store software programs and computer-executable programs, such as program instructions / modules corresponding to the methods in the embodiments of the present disclosure. The processor 201 executes functional applications and data processing by running software programs, instructions, and modules stored in the memory 202, that is, implementing the method for verifying transaction information in the foregoing method embodiment, for example, interfaces with the encryption module 20 and data A method related to at least one of 30, or a method related to at least one of the decryption module 40, the data interface 50, the verification module 60, and the payment module 70.

存储器202可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储器202可以包括高速随机存取存储器,还可以包括非易失性存储器。The memory 202 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. In addition, the memory 202 may include a high-speed random access memory, and may further include a non-volatile memory.

本公开实施例的实现交易信息验证的方案,提高了交易信息验证的安全性和效率。The solution for verifying transaction information in the embodiments of the present disclosure improves the security and efficiency of transaction information verification.

无论是哪一方面,例如方法方面、装置方面等,本申请中所述的数据处理可以包括基于数据或对数据进行的设置、计算、判断、传输、存储、管理等至少之一。No matter which aspect, for example, method aspect, device aspect, etc., the data processing described in this application may include at least one of setting, calculation, judgment, transmission, storage, management, etc. based on or performed on the data.

作为一个实施例,所述数据处理可以是由数据处理装置进行的与数字证书相关的数据处理,所述数字证书可以通过所述数据处理得到,所述数据处理装置可以是数字证书处理装置。As an embodiment, the data processing may be data processing related to a digital certificate by a data processing device, the digital certificate may be obtained through the data processing, and the data processing device may be a digital certificate processing device.

此外,当所述数字证书与数字货币相关或体现为数字货币时,所述数字证书处理装置可以是数字货币挖矿机,所述数字货币可以是比特币等加密货币。In addition, when the digital certificate is related to or embodied as digital currency, the digital certificate processing device may be a digital currency mining machine, and the digital currency may be a cryptocurrency such as Bitcoin.

本公开实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括一个或多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开实施例所述方法的全部或部分步骤。而前述的存储介质可以是非暂态存储介质,包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等多种可以存储程序代码的介质,也可以是暂态存储介质。The technical solution of the embodiment of the present disclosure may be embodied in the form of a software product. The computer software product is stored in a storage medium and includes one or more instructions for making a computer device (which may be a personal computer, a server, or a network). Equipment, etc.) perform all or part of the steps of the method described in the embodiments of the present disclosure. The foregoing storage medium may be a non-transitory storage medium, including: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk, or an optical disc A medium that can store program code, or a transient storage medium.

当用于本申请中时,虽然术语“第一”、“第二”等可能会在本申请中使用以描述各元件,但这些元件不应受到这些术语的限制。这些术语仅用于将一个元件与另一个元件区别开。比如,在不改变描述的含义的情况下,第一元件可以叫做第二元件,并且同样第,第二元件可以叫做第一元件,只要所有出现的“第一元件”一致重命名并且所有出现的“第二元件”一致重命名即可。第一元件和第二元件都是元件,但可以不是相同的元件。When used in this application, although the terms "first", "second", etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, without changing the meaning of the description, the first element can be called the second element, and likewise, the second element can be called the first element, as long as all occurrences of the "first element" are renamed consistently and all occurrences of The "second component" can be renamed consistently. The first element and the second element are both elements, but may not be the same element.

本申请中使用的用词仅用于描述实施例并且不用于限制权利要求。如在实施例以及权利要求的描述中使用的,除非上下文清楚地表明,否则单数形式的“一个”(a)、“一个”(an)和“所述”(the)旨在同样包括复数形式。类似地,如在本申请中所使用的术语“和/或”是指包含一个或一个以上相关联的列出的任何以及所有可能的组合。另外,当用于本申请中时,术语“包括”(comprise)及其变型“包括”(comprises)和/或包括(comprising)等指陈述的特征、整体、步骤、操作、元素,和/或组件的存在,但不排除一个或一个以上其它特征、整体、步骤、操作、元素、组件和/或这些的分组的存在或添加。The words used in this application are used to describe embodiments only and not to limit the claims. As used in the description of the embodiments and claims, the singular forms "a" (a), "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise . Similarly, the term "and / or" as used in this application means any and all possible combinations containing one or more of the associated listings. In addition, the terms "comprise" and variations thereof "comprises" and / or "comprising" when used in this application refer to stated features, wholes, steps, operations, elements, and / or The presence of components does not exclude the presence or addition of one or more other features, wholes, steps, operations, elements, components, and / or groups of these.

所描述的实施例中的各方面、实施方式、实现或特征能够单独使用或以任意组合的方式使用。所描述的实施例中的各方面可由软件、硬件或软硬件的结合实现。所描述的实施例也可以由存储有计算机可读代码的计算机可读介质体现,该计算机可读代码包括可由至少一个计算装置执行的指令。所述 计算机可读介质可与任何能够存储数据的数据存储装置相关联,该数据可由计算机系统读取。用于举例的计算机可读介质可以包括只读存储器、随机存取存储器、CD-ROM、HDD、DVD、磁带以及光数据存储装置等。所述计算机可读介质还可以分布于通过网络联接的计算机系统中,这样计算机可读代码就可以分布式存储并执行。The aspects, implementations, implementations or features in the described embodiments can be used individually or in any combination. Various aspects in the described embodiments may be implemented by software, hardware, or a combination of software and hardware. The described embodiments may also be embodied by a computer-readable medium storing computer-readable code, the computer-readable code including instructions executable by at least one computing device. The computer-readable medium can be associated with any data storage device capable of storing data, which can be read by a computer system. Computer-readable media for example may include read-only memory, random-access memory, CD-ROM, HDD, DVD, magnetic tape, and optical data storage devices. The computer-readable medium can also be distributed among computer systems connected through a network, so that the computer-readable code can be stored and executed in a distributed manner.

上述技术描述可参照附图,这些附图形成了本申请的一部分,并且通过描述在附图中示出了依照所描述的实施例的实施方式。虽然这些实施例描述的足够详细以使本领域技术人员能够实现这些实施例,但这些实施例是非限制性的;这样就可以使用其它的实施例,并且在不脱离所描述的实施例的范围的情况下还可以做出变化。比如,流程图中所描述的操作顺序是非限制性的,因此在流程图中阐释并且根据流程图描述的两个或两个以上操作的顺序可以根据若干实施例进行改变。作为另一个例子,在若干实施例中,在流程图中阐释并且根据流程图描述的一个或一个以上操作是可选的,或是可删除的。另外,某些步骤或功能可以添加到所公开的实施例中,或两个以上的步骤顺序被置换。所有这些变化被认为包含在所公开的实施例以及权利要求中。The above technical description can be referred to the accompanying drawings, which form a part of the present application, and show in the drawings an implementation according to the described embodiments. Although the embodiments are described in sufficient detail to enable those skilled in the art to implement the embodiments, the embodiments are non-limiting; thus, other embodiments can be used without departing from the scope of the described embodiments. Situations can also make changes. For example, the order of operations described in the flowchart is non-limiting, so the order of two or more operations explained in the flowchart and described according to the flowchart can be changed according to several embodiments. As another example, in several embodiments, one or more operations illustrated in the flowchart and described in accordance with the flowchart are optional or deleteable. In addition, certain steps or functions may be added to the disclosed embodiments, or two or more steps may be sequentially replaced. All of these variations are considered to be included in the disclosed embodiments and the claims.

另外,上述技术描述中使用术语以提供所描述的实施例的透彻理解。然而,并不需要过于详细的细节以实现所描述的实施例。因此,实施例的上述描述是为了阐释和描述而呈现的。上述描述中所呈现的实施例以及根据这些实施例所公开的例子是单独提供的,以添加上下文并有助于理解所描述的实施例。上述说明书不用于做到无遗漏或将所描述的实施例限制到本公开的精确形式。根据上述教导,若干修改、选择适用以及变化是可行的。在某些情况下,没有详细描述为人所熟知的处理步骤以避免不必要地影响所描述的实施例。In addition, terminology is used in the foregoing technical description to provide a thorough understanding of the described embodiments. However, too detailed details are not required to implement the described embodiments. Therefore, the foregoing description of the embodiments has been presented for the purposes of illustration and description. The embodiments presented in the above description and the examples disclosed based on these embodiments are provided separately to add context and help to understand the described embodiments. The above description is not intended to be exhaustive or to limit the described embodiments to the precise form of the disclosure. Based on the above teachings, several modifications, alternatives, and variations are possible. In some cases, well-known process steps have not been described in detail to avoid unnecessarily affecting the described embodiments.

Claims (39)

一种实现交易信息验证的方法,其特征在于,包括:利用数字证书实现交易信息的验证。A method for realizing transaction information verification, which comprises: using digital certificates to implement verification of transaction information. 根据权利要求1所述的方法,其特征在于,所述利用数字证书实现交易信息的验证包括:利用所述数字证书的私钥对所述交易信息进行加密得到交易信息加密结果。The method according to claim 1, wherein the verifying the transaction information by using a digital certificate comprises: encrypting the transaction information by using a private key of the digital certificate to obtain a transaction information encryption result. 根据权利要求2所述的方法,其特征在于,还包括:提供所述交易信息加密结果。The method according to claim 2, further comprising: providing an encrypted result of the transaction information. 根据权利要求2或3所述的方法,其特征在于,还包括:提供所述交易信息。The method according to claim 2 or 3, further comprising: providing the transaction information. 根据权利要求4所述的方法,其特征在于,还包括:提供公钥来源。The method according to claim 4, further comprising: providing a public key source. 根据权利要求5所述的方法,其特征在于,还包括:利用所述数字证书的私钥对所述公钥来源进行加密得到公钥来源加密结果。The method according to claim 5, further comprising: using a private key of the digital certificate to encrypt the public key source to obtain a public key source encryption result. 根据权利要求6所述的方法,其特征在于,还包括:提供所述公钥来源加密结果。The method according to claim 6, further comprising: providing an encryption result of the public key source. 根据权利要求1所述的方法,其特征在于,所述利用数字证书实现交易信息验证包括:利用所述数字证书的公钥对所述交易信息在加密后得到的交易信息加密结果进行解密得到所述交易信息。The method according to claim 1, wherein the verifying the transaction information by using a digital certificate comprises: decrypting a transaction information encryption result obtained by encrypting the transaction information using a public key of the digital certificate to obtain The transaction information. 根据权利要求8所述的方法,其特征在于,在解密所述交易信息加密结果之前,还包括:接收所述交易信息加密结果。The method according to claim 8, before decrypting the transaction information encryption result, further comprising: receiving the transaction information encryption result. 根据权利要求8或9所述的方法,其特征在于,还包括:接收所述交易信息。The method according to claim 8 or 9, further comprising: receiving the transaction information. 根据权利要求10所述的方法,其特征在于,还包括:利用所述接收到的交易信息以及所述解密得到的交易信息进行验证,在验证通过后触发支付操作。The method according to claim 10, further comprising: using the received transaction information and the decrypted transaction information for verification, and triggering a payment operation after the verification is passed. 根据权利要求11所述的方法,其特征在于,还包括:利用所述数字证书的公钥对公钥来源在加密后得到的公钥来源加密结果进行解密得到所述公钥来源。The method according to claim 11, further comprising: using the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption to obtain the public key source. 根据权利要求12所述的方法,其特征在于,在解密所述公钥来源加密结果之前,还包括:接收所述公钥来源加密结果。The method according to claim 12, further comprising: receiving the public key source encryption result before decrypting the public key source encryption result. 根据权利要求12或13所述的方法,其特征在于,还包括:接收所述公钥来源。The method according to claim 12 or 13, further comprising: receiving the public key source. 根据权利要求14所述的方法,其特征在于,还包括:根据所述接收到的公钥来源获取所述公钥。The method according to claim 14, further comprising: obtaining the public key according to the received public key source. 根据权利要求14所述的方法,其特征在于,还包括:利用所述接收到的公钥来源以及所述解密得到的公钥来源进行验证,在验证通过后触发支付操作。The method according to claim 14, further comprising: using the received public key source and the decrypted public key source for verification, and triggering a payment operation after the verification is passed. 根据权利要求1或8所述的方法,其特征在于,The method according to claim 1 or 8, wherein: 所述数字证书包括超文本安全传送协议HTTPS证书;The digital certificate includes a Hypertext Security Transfer Protocol (HTTPS) certificate; 所述交易信息包括交易地址、交易数额中至少之一。The transaction information includes at least one of a transaction address and a transaction amount. 根据权利要求5或12所述的方法,其特征在于,所述公钥来源包括HTTPS网站的统一资源定位符URL。The method according to claim 5 or 12, wherein the public key source comprises a Uniform Resource Locator (URL) of an HTTPS website. 一种实现交易信息验证的装置,其特征在于,用于:利用数字证书实现交易信息的验证。A device for verifying transaction information is characterized in that it is used for: verifying transaction information by using a digital certificate. 根据权利要求19所述的装置,其特征在于,所述装置包括加密模块,用于:利用所述数字证书的私钥对所述交易信息进行加密得到交易信息加密结果。The device according to claim 19, wherein the device comprises an encryption module, configured to: use the private key of the digital certificate to encrypt the transaction information to obtain a transaction information encryption result. 根据权利要求20所述的装置,其特征在于,还包括数据接口,用于:提供所述交易信息加密结果。The device according to claim 20, further comprising a data interface, configured to provide an encrypted result of the transaction information. 根据权利要求21所述的装置,其特征在于,所述数据接口还用于:提供所述交易信息。The device according to claim 21, wherein the data interface is further configured to provide the transaction information. 根据权利要求22所述的装置,其特征在于,所述数据接口还用于:提供公钥来源。The device according to claim 22, wherein the data interface is further configured to provide a public key source. 根据权利要求23所述的装置,其特征在于,所述加密模块还用于:利用所述数字证书的私钥对所述公钥来源进行加密得到公钥来源加密结果。The device according to claim 23, wherein the encryption module is further configured to: use the private key of the digital certificate to encrypt the public key source to obtain a public key source encryption result. 根据权利要求24所述的装置,其特征在于,所述数据接口还用于: 提供所述公钥来源加密结果。The device according to claim 24, wherein the data interface is further configured to: provide the public key source encryption result. 根据权利要求19所述的装置,其特征在于,所述装置包括解密模块,用于:利用所述数字证书的公钥对所述交易信息在加密后得到的交易信息加密结果进行解密得到所述交易信息。The device according to claim 19, wherein the device comprises a decryption module, configured to: use a public key of the digital certificate to decrypt a transaction information encryption result obtained after the transaction information is encrypted to obtain the Trading Information. 根据权利要求26所述的装置,其特征在于,还包括数据接口,用于:在解密所述交易信息加密结果之前,接收所述交易信息加密结果。The device according to claim 26, further comprising a data interface, configured to: before decrypting the transaction information encryption result, receive the transaction information encryption result. 根据权利要求27所述的装置,其特征在于,所述数据接口还用于:接收所述交易信息。The device according to claim 27, wherein the data interface is further configured to: receive the transaction information. 根据权利要求28所述的装置,其特征在于,还包括验证模块,用于:利用所述接收到的交易信息以及所述解密得到的交易信息进行验证,在验证通过后触发支付操作。The device according to claim 28, further comprising a verification module, configured to perform verification by using the received transaction information and the decrypted transaction information, and trigger a payment operation after the verification is passed. 根据权利要求29所述的装置,其特征在于,所述解密模块还用于:利用所述数字证书的公钥对公钥来源在加密后得到的公钥来源加密结果进行解密得到所述公钥来源。The device according to claim 29, wherein the decryption module is further configured to: use the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption to obtain the public key source. 根据权利要求30所述的装置,其特征在于,所述数据接口还用于:在解密所述公钥来源加密结果之前,接收所述公钥来源加密结果。The device according to claim 30, wherein the data interface is further configured to: before decrypting the public key source encryption result, receive the public key source encryption result. 根据权利要求30或31所述的装置,其特征在于,所述数据接口还用于:接收所述公钥来源。The apparatus according to claim 30 or 31, wherein the data interface is further configured to: receive the public key source. 根据权利要求32所述的装置,其特征在于,所述数据接口还用于:根据所述接收到的公钥来源获取所述公钥。The device according to claim 32, wherein the data interface is further configured to obtain the public key according to the received public key source. 根据权利要求32所述的装置,其特征在于,所述验证模块还用于:利用所述接收到的公钥来源以及所述解密得到的公钥来源进行验证,在验证通过后触发支付操作。The device according to claim 32, wherein the verification module is further configured to perform verification using the received public key source and the decrypted public key source, and trigger a payment operation after the verification is passed. 根据权利要求29或34所述的装置,其特征在于,还包括支付模块,用于:根据所述验证模块的触发执行支付操作。The device according to claim 29 or 34, further comprising a payment module, configured to perform a payment operation according to a trigger of the verification module. 根据权利要求19或26所述的装置,其特征在于,The device according to claim 19 or 26, wherein: 所述数字证书包括HTTPS证书;The digital certificate includes an HTTPS certificate; 所述交易信息包括交易地址、交易数额中至少之一。The transaction information includes at least one of a transaction address and a transaction amount. 根据权利要求23或30所述的装置,其特征在于,所述公钥来源包括HTTPS网站的URL。The device according to claim 23 or 30, wherein the public key source includes a URL of an HTTPS website. 一种电子设备,其特征在于,包括:An electronic device, comprising: 至少一个处理器;以及At least one processor; and 与所述至少一个处理器通信连接的存储器;其中,A memory connected in communication with the at least one processor; wherein, 所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行权利要求1-7、17-18任一项或权利要求1、8-18任一项所述的方法。The memory stores instructions executable by the at least one processor, and when the instructions are executed by the at least one processor, causes the at least one processor to execute any one of claims 1-7, 17-18 Or the method according to any one of claims 1, 8-18. 一种服务器,其特征在于,包含权利要求19-25、36-37任一项或权利要求19、26-37任一项所述的装置。A server, comprising the device according to any one of claims 19-25, 36-37 or any one of claims 19, 26-37.
PCT/CN2018/117567 2018-05-24 2018-11-27 Method and device for realizing authentication of transaction information Ceased WO2019223276A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810506808.5 2018-05-24
CN201810506808.5A CN108764921A (en) 2018-05-24 2018-05-24 A kind of method and apparatus for realizing Transaction Information verification

Publications (1)

Publication Number Publication Date
WO2019223276A1 true WO2019223276A1 (en) 2019-11-28

Family

ID=64005374

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/117567 Ceased WO2019223276A1 (en) 2018-05-24 2018-11-27 Method and device for realizing authentication of transaction information

Country Status (2)

Country Link
CN (1) CN108764921A (en)
WO (1) WO2019223276A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108764921A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609841A (en) * 2012-01-13 2012-07-25 东北大学 Remote mobile payment system based on digital certificate and payment method
CN104182876A (en) * 2013-05-24 2014-12-03 中国电信股份有限公司 Secure payment trading method and secure payment trading system
US20160080157A1 (en) * 2014-09-16 2016-03-17 Keypasco Ab Network authentication method for secure electronic transactions
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN108764867A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification
CN108764921A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification
CN108846650A (en) * 2018-05-24 2018-11-20 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verifying

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100250947A1 (en) * 2006-10-18 2010-09-30 Kamfu Wong System and method of preventing spam by using pay-charge-contribution and authentication means
US20090183000A1 (en) * 2008-01-16 2009-07-16 Scott Krig Method And System For Dynamically Granting A DRM License Using A URL
AU2010100533B4 (en) * 2010-04-02 2010-12-16 Isx Ip Ltd Method and system for verifying transactions
CN107077674B (en) * 2016-12-29 2021-06-11 达闼机器人有限公司 Transaction verification processing method and device and node equipment
CN107911222B (en) * 2017-11-21 2020-08-28 沃通电子认证服务有限公司 Digital signature generating method, digital signature verifying method, digital signature generating apparatus, digital signature verifying apparatus, and storage medium storing digital signature verifying program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609841A (en) * 2012-01-13 2012-07-25 东北大学 Remote mobile payment system based on digital certificate and payment method
CN104182876A (en) * 2013-05-24 2014-12-03 中国电信股份有限公司 Secure payment trading method and secure payment trading system
US20160080157A1 (en) * 2014-09-16 2016-03-17 Keypasco Ab Network authentication method for secure electronic transactions
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN108764867A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification
CN108764921A (en) * 2018-05-24 2018-11-06 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verification
CN108846650A (en) * 2018-05-24 2018-11-20 北京比特大陆科技有限公司 A kind of method and apparatus for realizing Transaction Information verifying

Also Published As

Publication number Publication date
CN108764921A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
US11985239B2 (en) Forward secrecy in transport layer security (TLS) using ephemeral keys
US12401505B2 (en) Agile cryptographic deployment service
US20210367795A1 (en) Identity-Linked Authentication Through A User Certificate System
US12278916B2 (en) Data processing method and apparatus, device, and medium
USRE49673E1 (en) Systems and methods for secure data exchange
WO2017045552A1 (en) Method and device for loading digital certificate in ssl or tls communication
WO2020233235A1 (en) Blockchain data verification method and apparatus
US20240048361A1 (en) Key Management for Cryptography-as-a-service and Data Governance Systems
TWI663865B (en) Identity management system based on cross-chain and method thereof
US12141248B2 (en) Systems and methods for whitebox device binding
CN106960343B (en) A kind of electronic cash safe payment method and device
CN110519304A (en) HTTPS mutual authentication method based on TEE
CN110602075A (en) File stream processing method, device and system for encryption access control
US9578016B2 (en) Optimizing secure communications between a client authenticating server and a mobile client
CN111049789A (en) Domain name access method and device
WO2019223232A1 (en) Method and device for realizing authentication of transaction information
WO2021082222A1 (en) Communication method and apparatus, storage method and apparatus, and operation method and apparatus
WO2019223231A1 (en) Method and device for realizing authentication of transaction information
WO2019223276A1 (en) Method and device for realizing authentication of transaction information
CN107809412A (en) The method and apparatus being decrypted using the website certificate and private key of targeted website
CN115529129B (en) Encrypted communication method, system, computer device, readable storage medium, and program product
US20250156860A1 (en) Security authentication method, apparatus and system for digital currency transaction
US20240048532A1 (en) Data exchange protection and governance system
CN116318897A (en) A data transmission method, system, device, computer equipment and storage medium
CN116405319B (en) Block chain-based carbon financial credential sharing method, device, equipment and medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18919760

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18919760

Country of ref document: EP

Kind code of ref document: A1