WO2019223276A1 - Method and device for realizing authentication of transaction information - Google Patents
Method and device for realizing authentication of transaction information Download PDFInfo
- Publication number
- WO2019223276A1 WO2019223276A1 PCT/CN2018/117567 CN2018117567W WO2019223276A1 WO 2019223276 A1 WO2019223276 A1 WO 2019223276A1 CN 2018117567 W CN2018117567 W CN 2018117567W WO 2019223276 A1 WO2019223276 A1 WO 2019223276A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transaction information
- public key
- key source
- encryption result
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Definitions
- the present application relates to the field of data processing, for example, to a method and device for implementing transaction information verification.
- the owner of the transaction address When conducting transactions involving digital currencies, in order to verify the authenticity of transaction information (for example, a transaction address, etc.), the owner of the transaction address usually encrypts a previously agreed message or initiates a payment based on the transaction address.
- transaction information for example, a transaction address, etc.
- the embodiments of the present disclosure provide a method and a device for verifying transaction information, so as to improve the security of transaction information.
- An embodiment of the present disclosure provides a method for implementing transaction information verification, which includes: using digital certificates to implement transaction information verification.
- An embodiment of the present disclosure further provides a device for verifying transaction information, which is used to implement verification of transaction information by using a digital certificate.
- An embodiment of the present disclosure further provides a server including the foregoing device for verifying transaction information.
- An embodiment of the present disclosure also provides a computer-readable storage medium storing computer-executable instructions configured to perform the foregoing method for implementing verification of transaction information.
- An embodiment of the present disclosure also provides a computer program product.
- the computer program product includes a computer program stored on a computer-readable storage medium.
- the computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for verifying transaction information described above.
- An embodiment of the present disclosure further provides an electronic device, including:
- At least one processor At least one processor
- a memory connected in communication with the at least one processor; wherein,
- the memory stores instructions executable by the at least one processor, and when the instructions are executed by the at least one processor, the at least one processor is caused to execute the foregoing method for implementing transaction information verification.
- FIG. 1 is a schematic diagram of a method for implementing transaction information verification according to an embodiment of the present disclosure
- FIG. 2 is a schematic diagram of a method for encrypting transaction information according to an embodiment of the present disclosure
- FIG. 3 is a schematic diagram of a method for encrypting a public key source according to an embodiment of the present disclosure
- FIG. 4 is a schematic diagram of a method for decrypting an encrypted result of transaction information according to an embodiment of the present disclosure
- FIG. 5 is a schematic diagram of a method for verifying transaction information according to an embodiment of the present disclosure
- FIG. 6 is a schematic diagram of a method for decrypting a public key source encryption result according to an embodiment of the present disclosure
- FIG. 7 is a schematic diagram of a method for verifying a public key source according to an embodiment of the present disclosure.
- FIG. 8 is a schematic diagram of a device for implementing transaction information verification according to an embodiment of the present disclosure
- FIG. 9 is a schematic diagram of an apparatus for encrypting transaction information according to an embodiment of the present disclosure.
- FIG. 10 is a schematic diagram of an apparatus for providing a result of encrypting transaction information according to an embodiment of the present disclosure
- FIG. 11 is a schematic diagram of a device for encrypting a public key source according to an embodiment of the present disclosure
- FIG. 12 is a schematic diagram of an apparatus for providing a public key source encryption result according to an embodiment of the present disclosure
- FIG. 13 is a schematic diagram of an apparatus for decrypting a result of encrypting transaction information according to an embodiment of the present disclosure
- FIG. 14 is a schematic diagram of an apparatus for receiving an encrypted result of transaction information according to an embodiment of the present disclosure
- 15 is a schematic diagram of a device for verifying transaction information according to an embodiment of the present disclosure.
- 16 is a schematic diagram of an apparatus for decrypting a public key source encryption result according to an embodiment of the present disclosure
- 17 is a schematic diagram of an apparatus for receiving a public key source encryption result according to an embodiment of the present disclosure
- FIG. 18 is a schematic diagram of a device for verifying a public key source according to an embodiment of the present disclosure
- FIG. 19 is a schematic diagram of a device for implementing a payment operation according to an embodiment of the present disclosure.
- FIG. 20 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
- decryption module 40: decryption module
- an embodiment of the present disclosure provides a method for verifying transaction information, which includes: using a digital certificate to verify transaction information.
- the verification of transaction information by using a digital certificate may include: encrypting the transaction information by using a private key of the digital certificate to obtain a transaction information encryption result.
- the transaction information encryption result may be provided.
- the payee the operating entity can be the payee's device, such as the payee's website server, etc .; the same applies below
- the payer the operating entity can be the payer's device, such as the payer's client terminal and other devices ; The same applies hereinafter) to send the transaction information encryption result.
- the transaction information may be provided.
- the payee may send the transaction information to the payer.
- a public key source may be provided.
- the payee may send the public key source to the payer.
- the public key source can be encrypted by using the private key of the digital certificate to obtain a public key source encryption result.
- the encryption of at least one of the transaction information and the public key source may be based on a request or an initiative.
- the payee encrypts at least one of the transaction information and public key source based on a request from the payer or other third party; or, the payee actively proactively encrypts the transaction information based on preset policies, conditions, etc.
- At least one of the public key sources is encrypted.
- the public key source encryption result may be provided.
- the payee may send the public key source encryption result to the payer.
- At least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be provided directly or indirectly.
- the payee may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.
- the indirect providing may include providing through a transaction intermediary.
- the payee may send the transaction information encryption result and the public key source encryption result to the payer through a transaction intermediary (the operating entity may be a device of the transaction website, such as the website server of the transaction website; the same applies below).
- the operating entity may be a device of the transaction website, such as the website server of the transaction website; the same applies below).
- Transaction information and at least one of the public key sources.
- implementing transaction information verification by using a digital certificate may include: using a public key of the digital certificate to decrypt a transaction information encryption result obtained after the transaction information is encrypted to obtain the transaction information.
- the transaction information encryption result may be received before decrypting the transaction information encryption result.
- the payer may receive the transaction information encryption result from the payee; or, the payer may actively obtain the transaction information encryption result from the payee through active inquiry, request, or the like.
- the transaction information may be received.
- the payer may receive the transaction information from the payee; or, the payer may actively obtain the transaction information from the payee through active inquiry, request, or the like.
- the received transaction information and the decrypted transaction information may be used for verification, and a payment operation may be triggered after the verification is passed.
- the payer may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger the payment operation after the verification is passed.
- the verification may include comparing the consistency between the received transaction information and the decrypted transaction information, and comparing the received transaction information with the decrypted transaction information. Confirm the verification when there is consistency between the two.
- the payer may compare whether the transaction information received from or obtained from the payee is the same as the transaction information decrypted by the payer, and the transaction information received from or obtained from the payee is decrypted with the payer. When the obtained transaction information is the same, it is confirmed that the verification is passed.
- the public key source can be decrypted by using the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption.
- the public key source encryption result may be received before decrypting the public key source encryption result.
- the payer may receive the public key source encryption result from the payee; or, the payer may actively obtain the public key source encryption result from the payee by actively querying, requesting, etc.
- the public key source may be received.
- the payer may receive the public key source from the payee; or, the payer may actively obtain the public key source from the payee through active inquiry, request, and the like.
- the public key may be obtained according to the received public key source.
- the payer may obtain (eg, download) the public key from the public key source by receiving, actively requesting, or the like.
- the received public key source and the decrypted public key source may be used for verification, and a payment operation may be triggered after the verification is passed.
- the payer may use the public key source received from or obtained from the payee and the public key source decrypted by the payer for verification, and trigger the payment operation after the verification is passed.
- the verification may include comparing the consistency between the received public key source and the decrypted public key source, and comparing the received public key source with the decrypted
- the verification is confirmed.
- the payer may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the payer.
- the transaction information received from or obtained from the payee is compared with the payment.
- the source of the public key decrypted by the party is the same, it is confirmed that the verification passes.
- the payment operation may include paying digital currency.
- the decryption of at least one of the transaction information encryption result and the public key source encryption result may be based on a request or an initiative.
- the payer decrypts at least one of the transaction information encryption result and the public key source encryption result based on a request from the payee or another third party; or, the payer proactively decrypts the transaction information based on preset policies, conditions, etc.
- At least one of the transaction information encryption result and the public key source encryption result is decrypted.
- At least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be received directly or indirectly.
- the payer may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.
- the indirect receiving may include receiving through a transaction intermediary.
- the payer may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.
- the digital certificate may include a Hypertext Transfer Protocol (HTTPS) certificate; it may also include a Secure Sockets Layer (SSL) certificate, a Transport Layer Security (TLS) ) Certificates, etc.
- HTTPS Hypertext Transfer Protocol
- SSL Secure Sockets Layer
- TLS Transport Layer Security
- the transaction information may include at least one of a transaction address (for example: a payment address; the same applies hereinafter) and a transaction amount (for example: a payment amount; the same applies hereinafter).
- a transaction address for example: a payment address; the same applies hereinafter
- a transaction amount for example: a payment amount; the same applies hereinafter
- the public key source may include a Uniform Resource Locator (URL) of an HTTPS website.
- URL Uniform Resource Locator
- the digital currency may be a cryptocurrency.
- an embodiment of the present disclosure further provides a device 10 for implementing transaction information verification, which is used to implement verification of transaction information by using a digital certificate.
- the device 10 may be installed on a payee (the operating entity may be a payee device, such as a web server of the payee; the same applies hereinafter).
- the device 10 may include an encryption module 20, configured to encrypt the transaction information by using the private key of the digital certificate to obtain a transaction information encryption result.
- the device 10 may further include a data interface 30, configured to provide an encryption result of the transaction information.
- the data interface 30 may send the transaction information encryption result to the payer.
- the data interface 30 may also be used to provide the transaction information.
- the data interface 30 may send the transaction information to a payer.
- the data interface 30 may also be used to provide a public key source.
- the data interface 30 may send the public key source to the payer.
- the encryption module 20 may be configured to: use the private key of the digital certificate to encrypt the public key source to obtain a public key source encryption result.
- the encryption module 20 may be configured to: based on a request or actively initiate encryption of at least one of the transaction information and a public key source. For example, the encryption module 20 encrypts at least one of the transaction information and the public key source based on a request from a payer or other third party; or, the encryption module 20 actively encrypts the transaction information based on preset policies, conditions, etc. At least one of the public key sources is encrypted.
- the data interface 30 may be configured to provide the public key source encryption result.
- the data interface 30 may send the public key source encryption result to the payer.
- the data interface 30 may be configured to directly or indirectly provide at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source.
- the data interface 30 may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.
- the data interface 30 may be configured to provide at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source through a transaction intermediary.
- the data interface 30 may send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer through a transaction intermediary such as a transaction website.
- the apparatus 10 may include a decryption module 40, configured to: decrypt the transaction information encryption result obtained by encrypting the transaction information using the public key of the digital certificate to obtain the transaction information.
- a decryption module 40 configured to: decrypt the transaction information encryption result obtained by encrypting the transaction information using the public key of the digital certificate to obtain the transaction information.
- the apparatus 10 may include a data interface 50 for receiving the transaction information encryption result before decrypting the transaction information encryption result.
- the data interface 50 may receive the transaction information encryption result from the payee; or, the data interface 50 may actively obtain the transaction information encryption result from the payee through an active query, request, or the like.
- the data interface 50 may be configured to receive the transaction information.
- the data interface 50 may receive the transaction information from the beneficiary; or, the data interface 50 may actively obtain the transaction information from the beneficiary through active inquiry, request, and the like.
- the device 10 may include a verification module 60, configured to perform verification by using the received transaction information and the decrypted transaction information, and trigger a payment operation after the verification is passed.
- the verification module 60 may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger a payment operation after the verification is passed.
- the verification module 60 may be configured to compare the consistency between the received transaction information and the decrypted transaction information, and compare the received transaction information with the decrypted transaction information. When there is consistency between the transaction information, it is confirmed that the verification is passed. For example, the verification module 60 may compare whether the transaction information received or obtained from the payee is the same as the transaction information decrypted by the decryption module 40. The transaction information received or obtained from the payee is compared with the decryption module 40. When the decrypted transaction information is the same, it is confirmed that the verification is passed.
- the decryption module 40 may be configured to: use the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption to obtain the public key source.
- the data interface 50 may be configured to: before decrypting the public key source encryption result, receive the public key source encryption result.
- the data interface 50 may receive the public key source encryption result from the payee; or, the data interface 50 may actively obtain the public key source encryption result from the payee through an active query, request, or the like.
- the data interface 50 may be configured to receive the public key source.
- the data interface 50 may receive the public key source from the payee; or, the data interface 50 may actively obtain the public key source from the payee through active query, request, or the like.
- the data interface 50 may be configured to obtain the public key according to the received public key source.
- the data interface 50 may obtain (for example, download) the public key from the public key source by receiving, actively requesting, or the like.
- the verification module 60 may be configured to perform verification by using the received public key source and the decrypted public key source, and trigger a payment operation after the verification is passed.
- the verification module 60 may use the public key source received from or obtained from the payee and the public key source decrypted by the decryption module 40 to perform verification, and trigger a payment operation after the verification is passed.
- the verification module 60 may be configured to compare the consistency between the received public key source and the decrypted public key source, and compare the received public key source with the decrypted public key source. When the source of the decrypted public key is consistent, it is confirmed that the verification passes. For example, the verification module 60 may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the decryption module 40. The transaction information received from or obtained from the payee is decrypted. When the source of the public key decrypted by the module 40 is the same, it is confirmed that the verification is passed.
- the device 10 may include a payment module 70 for performing a payment operation according to a trigger of the verification module 60.
- the payment module 70 may be configured to pay digital currency.
- the data interface 50 may be configured to directly or indirectly receive at least one of the transaction information encryption result, a public key source encryption result, transaction information, and a public key source.
- the data interface 50 may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.
- the data interface 50 may be configured to receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source through a transaction intermediary.
- the data interface 50 may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.
- the digital certificate may include an HTTPS certificate, and may also include an SSL certificate, a TLS certificate, and the like.
- the transaction information may include at least one of a transaction address and a transaction amount.
- the public key source may include a URL of an HTTPS website.
- the digital currency may be a cryptocurrency.
- the public key mentioned above can be cached by the payer and other third parties.
- the provision, acquisition, encryption, and decryption of the above-mentioned various data may also be achieved through other channels such as a third party.
- An embodiment of the present disclosure further provides a server including the device 10 for verifying transaction information in the foregoing embodiment, for example, including at least one of an encryption module 20 and a data interface 30, or including a decryption module 40, a data interface 50, and verification. At least one of the module 60 and the payment module 70.
- An embodiment of the present disclosure further provides a computer-readable storage medium storing computer-executable instructions configured to execute the method for implementing transaction information verification in the foregoing embodiment, for example, with the encryption module 20 and data A method related to at least one of the interfaces 30, or a method related to at least one of the decryption module 40, the data interface 50, the verification module 60, and the payment module 70.
- An embodiment of the present disclosure also provides a computer program product.
- the computer program product includes a computer program stored on a computer-readable storage medium.
- the computer program includes program instructions.
- the computer executes the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the encryption module 20 and the data interface 30, or the decryption module 40, the data interface 50, the verification module 60, and the payment module 70. At least one of the related methods.
- the computer-readable storage medium may be a transitory computer-readable storage medium, or may be a non-transitory computer-readable storage medium.
- An embodiment of the present disclosure further provides an electronic device, whose structure is shown in FIG. 20.
- the electronic device 200 includes:
- At least one processor 201, and one processor 201 is taken as an example in FIG. 20; and the memory 202 may further include a communication interface 203 and a bus 204.
- the processor 201, the communication interface 203, and the memory 202 can complete communication with each other through the bus 204.
- the communication interface 203 can be used for information transmission.
- the processor 201 may call the logical instructions in the memory 202 to execute the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the encryption module 20 and the data interface 30, or a method related to the decryption module 40 and data. A method related to at least one of the interface 50, the verification module 60, and the payment module 70.
- logic instructions in the memory 202 can be implemented in the form of software functional units and sold or used as an independent product, and can be stored in a computer-readable storage medium.
- the memory 202 is a computer-readable storage medium and can be used to store software programs and computer-executable programs, such as program instructions / modules corresponding to the methods in the embodiments of the present disclosure.
- the processor 201 executes functional applications and data processing by running software programs, instructions, and modules stored in the memory 202, that is, implementing the method for verifying transaction information in the foregoing method embodiment, for example, interfaces with the encryption module 20 and data A method related to at least one of 30, or a method related to at least one of the decryption module 40, the data interface 50, the verification module 60, and the payment module 70.
- the memory 202 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like.
- the memory 202 may include a high-speed random access memory, and may further include a non-volatile memory.
- the solution for verifying transaction information in the embodiments of the present disclosure improves the security and efficiency of transaction information verification.
- the data processing described in this application may include at least one of setting, calculation, judgment, transmission, storage, management, etc. based on or performed on the data.
- the data processing may be data processing related to a digital certificate by a data processing device
- the digital certificate may be obtained through the data processing
- the data processing device may be a digital certificate processing device.
- the digital certificate processing device may be a digital currency mining machine, and the digital currency may be a cryptocurrency such as Bitcoin.
- the technical solution of the embodiment of the present disclosure may be embodied in the form of a software product.
- the computer software product is stored in a storage medium and includes one or more instructions for making a computer device (which may be a personal computer, a server, or a network). Equipment, etc.) perform all or part of the steps of the method described in the embodiments of the present disclosure.
- the foregoing storage medium may be a non-transitory storage medium, including: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk, or an optical disc A medium that can store program code, or a transient storage medium.
- first, second, etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
- the first element can be called the second element, and likewise, the second element can be called the first element, as long as all occurrences of the "first element” are renamed consistently and all occurrences of The “second component” can be renamed consistently.
- the first element and the second element are both elements, but may not be the same element.
- the aspects, implementations, implementations or features in the described embodiments can be used individually or in any combination.
- Various aspects in the described embodiments may be implemented by software, hardware, or a combination of software and hardware.
- the described embodiments may also be embodied by a computer-readable medium storing computer-readable code, the computer-readable code including instructions executable by at least one computing device.
- the computer-readable medium can be associated with any data storage device capable of storing data, which can be read by a computer system.
- Computer-readable media for example may include read-only memory, random-access memory, CD-ROM, HDD, DVD, magnetic tape, and optical data storage devices.
- the computer-readable medium can also be distributed among computer systems connected through a network, so that the computer-readable code can be stored and executed in a distributed manner.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
Description
本申请涉及数据处理领域,例如涉及一种实现交易信息验证的方法和装置。The present application relates to the field of data processing, for example, to a method and device for implementing transaction information verification.
在进行涉及数字货币的交易时,为了验证交易信息(例如,交易地址等)的真实性,通常由该交易地址的拥有者基于该交易地址加密一段提前商定的消息或发起一笔支付。When conducting transactions involving digital currencies, in order to verify the authenticity of transaction information (for example, a transaction address, etc.), the owner of the transaction address usually encrypts a previously agreed message or initiates a payment based on the transaction address.
但是,现有的信息加密方式容易被盗取,安全性较低。However, the existing information encryption methods are easy to be stolen and have low security.
发明内容Summary of the Invention
本公开实施例提供了一种实现交易信息验证的方法和装置,以期提高交易信息的安全性。The embodiments of the present disclosure provide a method and a device for verifying transaction information, so as to improve the security of transaction information.
本公开实施例提供了一种实现交易信息验证的方法,包括:利用数字证书实现交易信息的验证。An embodiment of the present disclosure provides a method for implementing transaction information verification, which includes: using digital certificates to implement transaction information verification.
本公开实施例还提供了一种实现交易信息验证的装置,用于:利用数字证书实现交易信息的验证。An embodiment of the present disclosure further provides a device for verifying transaction information, which is used to implement verification of transaction information by using a digital certificate.
本公开实施例还提供了一种服务器,包含上述的实现交易信息验证的装置。An embodiment of the present disclosure further provides a server including the foregoing device for verifying transaction information.
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述的实现交易信息验证的方法。An embodiment of the present disclosure also provides a computer-readable storage medium storing computer-executable instructions configured to perform the foregoing method for implementing verification of transaction information.
本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述的实现交易信息验证的方法。An embodiment of the present disclosure also provides a computer program product. The computer program product includes a computer program stored on a computer-readable storage medium. The computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for verifying transaction information described above.
本公开实施例还提供了一种电子设备,包括:An embodiment of the present disclosure further provides an electronic device, including:
至少一个处理器;以及At least one processor; and
与所述至少一个处理器通信连接的存储器;其中,A memory connected in communication with the at least one processor; wherein,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行上述的实现交易信息验证的方法。The memory stores instructions executable by the at least one processor, and when the instructions are executed by the at least one processor, the at least one processor is caused to execute the foregoing method for implementing transaction information verification.
一个或多个实施例通过与之对应的附图进行示例性说明,这些示例性说明和附图并不构成对实施例的限定,附图中具有相同参考数字标号的元件示为类似的元件,附图不构成比例限制,并且其中:One or more embodiments are exemplarily described by corresponding drawings. These exemplary descriptions and drawings do not limit the embodiments. Elements with the same reference numerals in the drawings are shown as similar elements. The drawings do not constitute a scale limitation, and in which:
图1为本公开实施例的实现交易信息验证的方法示意图;1 is a schematic diagram of a method for implementing transaction information verification according to an embodiment of the present disclosure;
图2为本公开实施例的对交易信息进行加密的方法示意图;2 is a schematic diagram of a method for encrypting transaction information according to an embodiment of the present disclosure;
图3为本公开实施例的对公钥来源进行加密的方法示意图;3 is a schematic diagram of a method for encrypting a public key source according to an embodiment of the present disclosure;
图4为本公开实施例的对交易信息加密结果进行解密的方法示意图;4 is a schematic diagram of a method for decrypting an encrypted result of transaction information according to an embodiment of the present disclosure;
图5为本公开实施例的对交易信息进行验证的方法示意图;5 is a schematic diagram of a method for verifying transaction information according to an embodiment of the present disclosure;
图6为本公开实施例的对公钥来源加密结果进行解密的方法示意图;6 is a schematic diagram of a method for decrypting a public key source encryption result according to an embodiment of the present disclosure;
图7为本公开实施例的对公钥来源进行验证的方法示意图;7 is a schematic diagram of a method for verifying a public key source according to an embodiment of the present disclosure;
图8为本公开实施例的实现交易信息验证的装置示意图;8 is a schematic diagram of a device for implementing transaction information verification according to an embodiment of the present disclosure;
图9为本公开实施例的对交易信息进行加密的装置示意图;9 is a schematic diagram of an apparatus for encrypting transaction information according to an embodiment of the present disclosure;
图10为本公开实施例的提供交易信息加密结果的装置示意图;10 is a schematic diagram of an apparatus for providing a result of encrypting transaction information according to an embodiment of the present disclosure;
图11为本公开实施例的对公钥来源进行加密的装置示意图;11 is a schematic diagram of a device for encrypting a public key source according to an embodiment of the present disclosure;
图12为本公开实施例的提供公钥来源加密结果的装置示意图;12 is a schematic diagram of an apparatus for providing a public key source encryption result according to an embodiment of the present disclosure;
图13为本公开实施例的对交易信息加密结果进行解密的装置示意图;13 is a schematic diagram of an apparatus for decrypting a result of encrypting transaction information according to an embodiment of the present disclosure;
图14为本公开实施例的接收交易信息加密结果的装置示意图;14 is a schematic diagram of an apparatus for receiving an encrypted result of transaction information according to an embodiment of the present disclosure;
图15为本公开实施例的对交易信息进行验证的装置示意图;15 is a schematic diagram of a device for verifying transaction information according to an embodiment of the present disclosure;
图16为本公开实施例的对公钥来源加密结果进行解密的装置示意图;16 is a schematic diagram of an apparatus for decrypting a public key source encryption result according to an embodiment of the present disclosure;
图17为本公开实施例的接收公钥来源加密结果的装置示意图;17 is a schematic diagram of an apparatus for receiving a public key source encryption result according to an embodiment of the present disclosure;
图18为本公开实施例的对公钥来源进行验证的装置示意图;18 is a schematic diagram of a device for verifying a public key source according to an embodiment of the present disclosure;
图19为本公开实施例的实现支付操作的装置示意图;以及19 is a schematic diagram of a device for implementing a payment operation according to an embodiment of the present disclosure; and
图20为本公开实施例的电子设备的结构示意图。FIG. 20 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
附图标记:Reference signs:
10:实现交易信息验证的装置;10: Device for verifying transaction information;
20:加密模块;20: encryption module;
30:数据接口;30: data interface;
40:解密模块;40: decryption module;
50:数据接口;50: data interface;
60:验证模块;60: verification module;
70:支付模块。70: payment module.
为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。在以下的技术描述中,为方便解释起见,通过多个细节以提供对所披露实施例的充分理解。然而,在没有这些细节的情况下,一个或多个实施例仍然可以实施。在其它情况下,为简化附图,熟知的结构和装置可以简化展示。In order to understand the features and technical contents of the embodiments of the present disclosure in more detail, the implementation of the embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. In the following technical description, for convenience of explanation, various details are provided to provide a full understanding of the disclosed embodiments. However, without these details, one or more embodiments can still be implemented. In other cases, to simplify the drawings, well-known structures and devices may simplify the display.
参见图1,本公开实施例提供了一种实现交易信息验证的方法,包括:利用数字证书实现交易信息的验证。Referring to FIG. 1, an embodiment of the present disclosure provides a method for verifying transaction information, which includes: using a digital certificate to verify transaction information.
参见图2,所述利用数字证书实现交易信息的验证可以包括:利用所述数字证书的私钥对所述交易信息进行加密得到交易信息加密结果。Referring to FIG. 2, the verification of transaction information by using a digital certificate may include: encrypting the transaction information by using a private key of the digital certificate to obtain a transaction information encryption result.
作为一个实施例,可以提供所述交易信息加密结果。例如,收款方(操作实体可以是收款方设备,例如收款方的网站服务器等;以下亦同)可以向 付款方(操作实体可以是付款方设备,例如付款方的客户端等终端设备;以下亦同)发送所述交易信息加密结果。As an embodiment, the transaction information encryption result may be provided. For example, the payee (the operating entity can be the payee's device, such as the payee's website server, etc .; the same applies below) to the payer (the operating entity can be the payer's device, such as the payer's client terminal and other devices ; The same applies hereinafter) to send the transaction information encryption result.
作为一个实施例,可以提供所述交易信息。例如,收款方可以向付款方发送所述交易信息。As an embodiment, the transaction information may be provided. For example, the payee may send the transaction information to the payer.
作为一个实施例,可以提供公钥来源。例如,收款方可以向付款方发送所述公钥来源。As an embodiment, a public key source may be provided. For example, the payee may send the public key source to the payer.
参见图3,可以利用所述数字证书的私钥对所述公钥来源进行加密得到公钥来源加密结果。Referring to FIG. 3, the public key source can be encrypted by using the private key of the digital certificate to obtain a public key source encryption result.
作为一个实施例,对所述交易信息、公钥来源中至少之一进行的加密可以是基于请求或主动发起的。例如,收款方基于付款方或其他第三方的请求对所述交易信息、公钥来源中至少之一进行加密;或,收款方基于预设的策略、条件等主动对所述交易信息、公钥来源中至少之一进行加密。As an embodiment, the encryption of at least one of the transaction information and the public key source may be based on a request or an initiative. For example, the payee encrypts at least one of the transaction information and public key source based on a request from the payer or other third party; or, the payee actively proactively encrypts the transaction information based on preset policies, conditions, etc. At least one of the public key sources is encrypted.
作为一个实施例,可以提供所述公钥来源加密结果。例如,收款方可以向付款方发送所述公钥来源加密结果。As an embodiment, the public key source encryption result may be provided. For example, the payee may send the public key source encryption result to the payer.
作为一个实施例,所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一可以是直接或间接提供的。例如,收款方可以直接或间接向付款方发送所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, at least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be provided directly or indirectly. For example, the payee may directly or indirectly send at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source to the payer.
作为一个实施例,所述间接提供可以包括通过交易中介提供。例如,收款方可以通过交易网站(操作实体可以是交易网站的设备,例如交易网站的网站服务器等;以下亦同)等交易中介向付款方发送所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the indirect providing may include providing through a transaction intermediary. For example, the payee may send the transaction information encryption result and the public key source encryption result to the payer through a transaction intermediary (the operating entity may be a device of the transaction website, such as the website server of the transaction website; the same applies below). , Transaction information, and at least one of the public key sources.
参见图4,所述利用数字证书实现交易信息验证可以包括:利用所述数字证书的公钥对所述交易信息在加密后得到的交易信息加密结果进行解密得到所述交易信息。Referring to FIG. 4, implementing transaction information verification by using a digital certificate may include: using a public key of the digital certificate to decrypt a transaction information encryption result obtained after the transaction information is encrypted to obtain the transaction information.
作为一个实施例,在解密所述交易信息加密结果之前,可以接收所述交易信息加密结果。例如,付款方可以接收来自收款方的所述交易信息加密结果;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述交易 信息加密结果。As an embodiment, before decrypting the transaction information encryption result, the transaction information encryption result may be received. For example, the payer may receive the transaction information encryption result from the payee; or, the payer may actively obtain the transaction information encryption result from the payee through active inquiry, request, or the like.
作为一个实施例,可以接收所述交易信息。例如,付款方可以接收来自收款方的所述交易信息;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述交易信息。As an embodiment, the transaction information may be received. For example, the payer may receive the transaction information from the payee; or, the payer may actively obtain the transaction information from the payee through active inquiry, request, or the like.
参见图5,可以利用所述接收到的交易信息以及所述解密得到的交易信息进行验证,在验证通过后触发支付操作。例如,付款方可以利用接收自或获取自收款方的所述交易信息以及付款方解密得到的交易信息进行验证,在验证通过后触发支付操作。Referring to FIG. 5, the received transaction information and the decrypted transaction information may be used for verification, and a payment operation may be triggered after the verification is passed. For example, the payer may use the transaction information received from or obtained from the payee and the transaction information decrypted by the payer for verification, and trigger the payment operation after the verification is passed.
作为一个实施例,所述验证可以包括:对比所述接收到的交易信息以及所述解密得到的交易信息之间的一致性,在所述接收到的交易信息与所述解密得到的交易信息之间具有一致性时确认验证通过。例如,付款方可以比较接收自或获取自收款方的所述交易信息是否与付款方解密得到的交易信息相同,在付款方接收自或获取自收款方的所述交易信息与付款方解密得到的交易信息相同时,确认验证通过。As an embodiment, the verification may include comparing the consistency between the received transaction information and the decrypted transaction information, and comparing the received transaction information with the decrypted transaction information. Confirm the verification when there is consistency between the two. For example, the payer may compare whether the transaction information received from or obtained from the payee is the same as the transaction information decrypted by the payer, and the transaction information received from or obtained from the payee is decrypted with the payer. When the obtained transaction information is the same, it is confirmed that the verification is passed.
参见图6,可以利用所述数字证书的公钥对公钥来源在加密后得到的公钥来源加密结果进行解密得到所述公钥来源。Referring to FIG. 6, the public key source can be decrypted by using the public key of the digital certificate to decrypt the public key source encryption result obtained by the public key source after encryption.
作为一个实施例,在解密所述公钥来源加密结果之前,可以接收所述公钥来源加密结果。例如,付款方可以接收来自收款方的所述公钥来源加密结果;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述公钥来源加密结果。As an embodiment, before decrypting the public key source encryption result, the public key source encryption result may be received. For example, the payer may receive the public key source encryption result from the payee; or, the payer may actively obtain the public key source encryption result from the payee by actively querying, requesting, etc.
作为一个实施例,可以接收所述公钥来源。例如,付款方可以接收来自收款方的所述公钥来源;或,付款方可以通过主动查询、请求等方式从收款方主动获取所述公钥来源。As an embodiment, the public key source may be received. For example, the payer may receive the public key source from the payee; or, the payer may actively obtain the public key source from the payee through active inquiry, request, and the like.
作为一个实施例,可以根据所述接收到的公钥来源获取所述公钥。例如,付款方可以通过接收、主动请求等方式从所述公钥来源获取(例如:下载)所述公钥。As an embodiment, the public key may be obtained according to the received public key source. For example, the payer may obtain (eg, download) the public key from the public key source by receiving, actively requesting, or the like.
参见图7,可以利用所述接收到的公钥来源以及所述解密得到的公钥来源进行验证,在验证通过后触发支付操作。例如,付款方可以利用接收自或 获取自收款方的所述公钥来源以及付款方解密得到的公钥来源进行验证,在验证通过后触发支付操作。Referring to FIG. 7, the received public key source and the decrypted public key source may be used for verification, and a payment operation may be triggered after the verification is passed. For example, the payer may use the public key source received from or obtained from the payee and the public key source decrypted by the payer for verification, and trigger the payment operation after the verification is passed.
作为一个实施例,所述验证可以包括:对比所述接收到的公钥来源以及所述解密得到的公钥来源之间的一致性,在所述接收到的公钥来源与所述解密得到的公钥来源之间具有一致性时确认验证通过。例如,付款方可以比较接收自或获取自收款方的所述公钥来源是否与付款方解密得到的公钥来源相同,在付款方接收自或获取自收款方的所述交易信息与付款方解密得到的公钥来源相同时,确认验证通过。As an embodiment, the verification may include comparing the consistency between the received public key source and the decrypted public key source, and comparing the received public key source with the decrypted When there is consistency between the public key sources, the verification is confirmed. For example, the payer may compare whether the source of the public key received or obtained from the payee is the same as the source of the public key decrypted by the payer. The transaction information received from or obtained from the payee is compared with the payment. When the source of the public key decrypted by the party is the same, it is confirmed that the verification passes.
作为一个实施例,所述支付操作可以包括支付数字货币。As an embodiment, the payment operation may include paying digital currency.
作为一个实施例,对所述交易信息加密结果、公钥来源加密结果中至少之一进行的解密可以是基于请求或主动发起的。例如,付款方基于收款方或其他第三方的请求对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密;或,付款方基于预设的策略、条件等主动对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密。As an embodiment, the decryption of at least one of the transaction information encryption result and the public key source encryption result may be based on a request or an initiative. For example, the payer decrypts at least one of the transaction information encryption result and the public key source encryption result based on a request from the payee or another third party; or, the payer proactively decrypts the transaction information based on preset policies, conditions, etc. At least one of the transaction information encryption result and the public key source encryption result is decrypted.
作为一个实施例,所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一可以是直接或间接接收的。例如,付款方可以直接或间接接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, at least one of the transaction information encryption result, public key source encryption result, transaction information, and public key source may be received directly or indirectly. For example, the payer may directly or indirectly receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee.
作为一个实施例,所述间接接收可以包括通过交易中介接收。例如,付款方可以通过交易网站等交易中介接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the indirect receiving may include receiving through a transaction intermediary. For example, the payer may receive at least one of the transaction information encryption result, the public key source encryption result, the transaction information, and the public key source from the payee through a transaction intermediary such as a transaction website.
作为一个实施例,所述数字证书可以包括超文本安全传送协议(Hypertext Transfer Protocol Secure,HTTPS)证书;也可以包括安全套接层(Secure Socket Layer,SSL)证书、安全传输层(Transport Layer Security,TLS)证书等。As an embodiment, the digital certificate may include a Hypertext Transfer Protocol (HTTPS) certificate; it may also include a Secure Sockets Layer (SSL) certificate, a Transport Layer Security (TLS) ) Certificates, etc.
所述交易信息可以包括交易地址(例如:支付地址;以下亦同)、交易数额(例如:支付数额;以下亦同)中至少之一。The transaction information may include at least one of a transaction address (for example: a payment address; the same applies hereinafter) and a transaction amount (for example: a payment amount; the same applies hereinafter).
作为一个实施例,所述公钥来源可以包括HTTPS网站的统一资源定位符(Uniform Resource Locator,URL)。As an embodiment, the public key source may include a Uniform Resource Locator (URL) of an HTTPS website.
作为一个实施例,所述数字货币可以为加密货币。As an embodiment, the digital currency may be a cryptocurrency.
参见图8,本公开实施例还提供了一种实现交易信息验证的装置10,用于:利用数字证书实现交易信息的验证。所述装置10可以设置于收款方(操作实体可以是收款方设备,例如收款方的网站服务器等;以下亦同)。Referring to FIG. 8, an embodiment of the present disclosure further provides a
参见图9,所述装置10可以包括加密模块20,用于:利用所述数字证书的私钥对所述交易信息进行加密得到交易信息加密结果。Referring to FIG. 9, the
参见图10,所述装置10还可以包括数据接口30,用于:提供所述交易信息加密结果。例如,数据接口30可以向付款方发送所述交易信息加密结果。Referring to FIG. 10, the
所述数据接口30还可以用于提供所述交易信息。例如,数据接口30可以向付款方发送所述交易信息。The data interface 30 may also be used to provide the transaction information. For example, the
所述数据接口30还可以用于提供公钥来源。例如,数据接口30可以向付款方发送所述公钥来源。The data interface 30 may also be used to provide a public key source. For example, the
参见图11,所述加密模块20可以用于:利用所述数字证书的私钥对所述公钥来源进行加密得到公钥来源加密结果。Referring to FIG. 11, the
作为一个实施例,所述加密模块20可以用于:基于请求或主动发起对所述交易信息、公钥来源中至少之一的加密。例如,加密模块20基于付款方或其他第三方的请求对所述交易信息、公钥来源中至少之一进行加密;或,加密模块20基于预设的策略、条件等主动对所述交易信息、公钥来源中至少之一进行加密。As an embodiment, the
参见图12,所述数据接口30可以用于:提供所述公钥来源加密结果。例如,数据接口30可以向付款方发送所述公钥来源加密结果。Referring to FIG. 12, the
作为一个实施例,所述数据接口30可以用于:直接或间接提供所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如:数据接口30可以直接或间接向付款方发送所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the
作为一个实施例,所述数据接口30可以用于:通过交易中介提供所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如,数据接口30可以通过交易网站等交易中介向付款方发送所述交易信息加 密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the
参见图13,所述装置10可以包括解密模块40,用于:利用所述数字证书的公钥对所述交易信息在加密后得到的交易信息加密结果进行解密得到所述交易信息。Referring to FIG. 13, the
参见图14,所述装置10可以包括数据接口50,用于:在解密所述交易信息加密结果之前,接收所述交易信息加密结果。例如,数据接口50可以接收来自收款方的所述交易信息加密结果;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述交易信息加密结果。Referring to FIG. 14, the
作为一个实施例,所述数据接口50可以用于:接收所述交易信息。例如,数据接口50可以接收来自收款方的所述交易信息;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述交易信息。As an embodiment, the
参见图15,所述装置10可以包括验证模块60,用于:利用所述接收到的交易信息以及所述解密得到的交易信息进行验证,在验证通过后触发支付操作。例如,验证模块60可以利用接收自或获取自收款方的所述交易信息以及付款方解密得到的交易信息进行验证,在验证通过后触发支付操作。Referring to FIG. 15, the
作为一个实施例,所述验证模块60可以用于:对比所述接收到的交易信息以及所述解密得到的交易信息之间的一致性,在所述接收到的交易信息与所述解密得到的交易信息之间具有一致性时确认验证通过。例如,验证模块60可以比较接收自或获取自收款方的所述交易信息是否与解密模块40解密得到的交易信息相同,在接收自或获取自收款方的所述交易信息与解密模块40解密得到的交易信息相同时,确认验证通过。As an embodiment, the
参见图16,所述解密模块40可以用于:利用所述数字证书的公钥对公钥来源在加密后得到的公钥来源加密结果进行解密得到所述公钥来源。Referring to FIG. 16, the
参加图17,所述数据接口50可以用于:在解密所述公钥来源加密结果之前,接收所述公钥来源加密结果。例如,数据接口50可以接收来自收款方的所述公钥来源加密结果;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述公钥来源加密结果。Referring to FIG. 17, the
作为一个实施例,所述数据接口50可以用于:接收所述公钥来源。例如, 数据接口50可以接收来自收款方的所述公钥来源;或,数据接口50可以通过主动查询、请求等方式从收款方主动获取所述公钥来源。As an embodiment, the
作为一个实施例,所述数据接口50可以用于:根据所述接收到的公钥来源获取所述公钥。例如,数据接口50可以通过接收、主动请求等方式从所述公钥来源获取(例如:下载)所述公钥。As an embodiment, the
参见图18,所述验证模块60可以用于:利用所述接收到的公钥来源以及所述解密得到的公钥来源进行验证,在验证通过后触发支付操作。例如,验证模块60可以利用接收自或获取自收款方的所述公钥来源以及解密模块40解密得到的公钥来源进行验证,在验证通过后触发支付操作。Referring to FIG. 18, the
作为一个实施例,所述验证模块60可以用于:对比所述接收到的公钥来源以及所述解密得到的公钥来源之间的一致性,在所述接收到的公钥来源与所述解密得到的公钥来源之间具有一致性时确认验证通过。例如,验证模块60可以比较接收自或获取自收款方的所述公钥来源是否与解密模块40解密得到的公钥来源相同,在接收自或获取自收款方的所述交易信息与解密模块40解密得到的公钥来源相同时,确认验证通过。As an embodiment, the
参加图19,所述装置10可以包括支付模块70,用于:根据所述验证模块60的触发执行支付操作。As shown in FIG. 19, the
作为一个实施例,所述支付模块70可以用于:支付数字货币。As an embodiment, the
作为一个实施例,所述解密模块40可以用于:基于请求或主动发起对所述交易信息加密结果、公钥来源加密结果中至少之一进行的解密。例如,解密模块40基于收款方或其他第三方的请求对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密;或,解密模块40基于预设的策略、条件等主动对所述交易信息加密结果、公钥来源加密结果中至少之一进行解密。As an embodiment, the
作为一个实施例,所述数据接口50可以用于:直接或间接接收所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如,数据接口50可以直接或间接接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the
作为一个实施例,所述数据接口50可以用于:通过交易中介接收所述交 易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。例如,数据接口50可以通过交易网站等交易中介接收来自收款方的所述交易信息加密结果、公钥来源加密结果、交易信息、公钥来源中至少之一。As an embodiment, the
作为一个实施例,所述数字证书可以包括HTTPS证书;也可以包括SSL证书、TLS证书等。As an embodiment, the digital certificate may include an HTTPS certificate, and may also include an SSL certificate, a TLS certificate, and the like.
所述交易信息可以包括交易地址、交易数额中至少之一。The transaction information may include at least one of a transaction address and a transaction amount.
作为一个实施例,所述公钥来源可以包括HTTPS网站的URL。As an embodiment, the public key source may include a URL of an HTTPS website.
作为一个实施例,所述数字货币可以为加密货币。As an embodiment, the digital currency may be a cryptocurrency.
上述的公钥可由付款方以及其他第三方等缓存。The public key mentioned above can be cached by the payer and other third parties.
上述各种数据(例如:交易信息加密结果、公钥来源加密结果、交易信息、公钥来源等)的提供、获取、加密、解密等,也可以是通过第三方等其他途径实现的。The provision, acquisition, encryption, and decryption of the above-mentioned various data (for example, the encryption result of the transaction information, the encryption result of the public key source, the transaction information, and the source of the public key, etc.) may also be achieved through other channels such as a third party.
本公开实施例还提供了一种服务器,包含上述实施例的实现交易信息验证的装置10,例如:包含加密模块20、数据接口30中至少之一,或包含解密模块40、数据接口50、验证模块60、支付模块70中至少之一。An embodiment of the present disclosure further provides a server including the
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述实施例的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。An embodiment of the present disclosure further provides a computer-readable storage medium storing computer-executable instructions configured to execute the method for implementing transaction information verification in the foregoing embodiment, for example, with the
本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述实施例的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。An embodiment of the present disclosure also provides a computer program product. The computer program product includes a computer program stored on a computer-readable storage medium. The computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for verifying transaction information in the foregoing embodiment, for example, a method related to at least one of the
上述的计算机可读存储介质可以是暂态计算机可读存储介质,也可以是非暂态计算机可读存储介质。The computer-readable storage medium may be a transitory computer-readable storage medium, or may be a non-transitory computer-readable storage medium.
本公开实施例还提供了一种电子设备,其结构如图20所示,该电子设备 200包括:An embodiment of the present disclosure further provides an electronic device, whose structure is shown in FIG. 20. The
至少一个处理器(processor)201,图20中以一个处理器201为例;和存储器(memory)202,还可以包括通信接口(Communication Interface)203和总线204。其中,处理器201、通信接口203、存储器202可以通过总线204完成相互间的通信。通信接口203可以用于信息传输。处理器201可以调用存储器202中的逻辑指令,以执行上述实施例的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。At least one
此外,上述的存储器202中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。In addition, the logic instructions in the
存储器202作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中的方法对应的程序指令/模块。处理器201通过运行存储在存储器202中的软件程序、指令以及模块,从而执行功能应用以及数据处理,即实现上述方法实施例中的实现交易信息验证的方法,例如:与加密模块20、数据接口30中至少之一相关的方法,或与解密模块40、数据接口50、验证模块60、支付模块70中至少之一相关的方法。The
存储器202可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储器202可以包括高速随机存取存储器,还可以包括非易失性存储器。The
本公开实施例的实现交易信息验证的方案,提高了交易信息验证的安全性和效率。The solution for verifying transaction information in the embodiments of the present disclosure improves the security and efficiency of transaction information verification.
无论是哪一方面,例如方法方面、装置方面等,本申请中所述的数据处理可以包括基于数据或对数据进行的设置、计算、判断、传输、存储、管理等至少之一。No matter which aspect, for example, method aspect, device aspect, etc., the data processing described in this application may include at least one of setting, calculation, judgment, transmission, storage, management, etc. based on or performed on the data.
作为一个实施例,所述数据处理可以是由数据处理装置进行的与数字证书相关的数据处理,所述数字证书可以通过所述数据处理得到,所述数据处理装置可以是数字证书处理装置。As an embodiment, the data processing may be data processing related to a digital certificate by a data processing device, the digital certificate may be obtained through the data processing, and the data processing device may be a digital certificate processing device.
此外,当所述数字证书与数字货币相关或体现为数字货币时,所述数字证书处理装置可以是数字货币挖矿机,所述数字货币可以是比特币等加密货币。In addition, when the digital certificate is related to or embodied as digital currency, the digital certificate processing device may be a digital currency mining machine, and the digital currency may be a cryptocurrency such as Bitcoin.
本公开实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括一个或多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开实施例所述方法的全部或部分步骤。而前述的存储介质可以是非暂态存储介质,包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等多种可以存储程序代码的介质,也可以是暂态存储介质。The technical solution of the embodiment of the present disclosure may be embodied in the form of a software product. The computer software product is stored in a storage medium and includes one or more instructions for making a computer device (which may be a personal computer, a server, or a network). Equipment, etc.) perform all or part of the steps of the method described in the embodiments of the present disclosure. The foregoing storage medium may be a non-transitory storage medium, including: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk, or an optical disc A medium that can store program code, or a transient storage medium.
当用于本申请中时,虽然术语“第一”、“第二”等可能会在本申请中使用以描述各元件,但这些元件不应受到这些术语的限制。这些术语仅用于将一个元件与另一个元件区别开。比如,在不改变描述的含义的情况下,第一元件可以叫做第二元件,并且同样第,第二元件可以叫做第一元件,只要所有出现的“第一元件”一致重命名并且所有出现的“第二元件”一致重命名即可。第一元件和第二元件都是元件,但可以不是相同的元件。When used in this application, although the terms "first", "second", etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, without changing the meaning of the description, the first element can be called the second element, and likewise, the second element can be called the first element, as long as all occurrences of the "first element" are renamed consistently and all occurrences of The "second component" can be renamed consistently. The first element and the second element are both elements, but may not be the same element.
本申请中使用的用词仅用于描述实施例并且不用于限制权利要求。如在实施例以及权利要求的描述中使用的,除非上下文清楚地表明,否则单数形式的“一个”(a)、“一个”(an)和“所述”(the)旨在同样包括复数形式。类似地,如在本申请中所使用的术语“和/或”是指包含一个或一个以上相关联的列出的任何以及所有可能的组合。另外,当用于本申请中时,术语“包括”(comprise)及其变型“包括”(comprises)和/或包括(comprising)等指陈述的特征、整体、步骤、操作、元素,和/或组件的存在,但不排除一个或一个以上其它特征、整体、步骤、操作、元素、组件和/或这些的分组的存在或添加。The words used in this application are used to describe embodiments only and not to limit the claims. As used in the description of the embodiments and claims, the singular forms "a" (a), "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise . Similarly, the term "and / or" as used in this application means any and all possible combinations containing one or more of the associated listings. In addition, the terms "comprise" and variations thereof "comprises" and / or "comprising" when used in this application refer to stated features, wholes, steps, operations, elements, and / or The presence of components does not exclude the presence or addition of one or more other features, wholes, steps, operations, elements, components, and / or groups of these.
所描述的实施例中的各方面、实施方式、实现或特征能够单独使用或以任意组合的方式使用。所描述的实施例中的各方面可由软件、硬件或软硬件的结合实现。所描述的实施例也可以由存储有计算机可读代码的计算机可读介质体现,该计算机可读代码包括可由至少一个计算装置执行的指令。所述 计算机可读介质可与任何能够存储数据的数据存储装置相关联,该数据可由计算机系统读取。用于举例的计算机可读介质可以包括只读存储器、随机存取存储器、CD-ROM、HDD、DVD、磁带以及光数据存储装置等。所述计算机可读介质还可以分布于通过网络联接的计算机系统中,这样计算机可读代码就可以分布式存储并执行。The aspects, implementations, implementations or features in the described embodiments can be used individually or in any combination. Various aspects in the described embodiments may be implemented by software, hardware, or a combination of software and hardware. The described embodiments may also be embodied by a computer-readable medium storing computer-readable code, the computer-readable code including instructions executable by at least one computing device. The computer-readable medium can be associated with any data storage device capable of storing data, which can be read by a computer system. Computer-readable media for example may include read-only memory, random-access memory, CD-ROM, HDD, DVD, magnetic tape, and optical data storage devices. The computer-readable medium can also be distributed among computer systems connected through a network, so that the computer-readable code can be stored and executed in a distributed manner.
上述技术描述可参照附图,这些附图形成了本申请的一部分,并且通过描述在附图中示出了依照所描述的实施例的实施方式。虽然这些实施例描述的足够详细以使本领域技术人员能够实现这些实施例,但这些实施例是非限制性的;这样就可以使用其它的实施例,并且在不脱离所描述的实施例的范围的情况下还可以做出变化。比如,流程图中所描述的操作顺序是非限制性的,因此在流程图中阐释并且根据流程图描述的两个或两个以上操作的顺序可以根据若干实施例进行改变。作为另一个例子,在若干实施例中,在流程图中阐释并且根据流程图描述的一个或一个以上操作是可选的,或是可删除的。另外,某些步骤或功能可以添加到所公开的实施例中,或两个以上的步骤顺序被置换。所有这些变化被认为包含在所公开的实施例以及权利要求中。The above technical description can be referred to the accompanying drawings, which form a part of the present application, and show in the drawings an implementation according to the described embodiments. Although the embodiments are described in sufficient detail to enable those skilled in the art to implement the embodiments, the embodiments are non-limiting; thus, other embodiments can be used without departing from the scope of the described embodiments. Situations can also make changes. For example, the order of operations described in the flowchart is non-limiting, so the order of two or more operations explained in the flowchart and described according to the flowchart can be changed according to several embodiments. As another example, in several embodiments, one or more operations illustrated in the flowchart and described in accordance with the flowchart are optional or deleteable. In addition, certain steps or functions may be added to the disclosed embodiments, or two or more steps may be sequentially replaced. All of these variations are considered to be included in the disclosed embodiments and the claims.
另外,上述技术描述中使用术语以提供所描述的实施例的透彻理解。然而,并不需要过于详细的细节以实现所描述的实施例。因此,实施例的上述描述是为了阐释和描述而呈现的。上述描述中所呈现的实施例以及根据这些实施例所公开的例子是单独提供的,以添加上下文并有助于理解所描述的实施例。上述说明书不用于做到无遗漏或将所描述的实施例限制到本公开的精确形式。根据上述教导,若干修改、选择适用以及变化是可行的。在某些情况下,没有详细描述为人所熟知的处理步骤以避免不必要地影响所描述的实施例。In addition, terminology is used in the foregoing technical description to provide a thorough understanding of the described embodiments. However, too detailed details are not required to implement the described embodiments. Therefore, the foregoing description of the embodiments has been presented for the purposes of illustration and description. The embodiments presented in the above description and the examples disclosed based on these embodiments are provided separately to add context and help to understand the described embodiments. The above description is not intended to be exhaustive or to limit the described embodiments to the precise form of the disclosure. Based on the above teachings, several modifications, alternatives, and variations are possible. In some cases, well-known process steps have not been described in detail to avoid unnecessarily affecting the described embodiments.
Claims (39)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810506808.5 | 2018-05-24 | ||
| CN201810506808.5A CN108764921A (en) | 2018-05-24 | 2018-05-24 | A kind of method and apparatus for realizing Transaction Information verification |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019223276A1 true WO2019223276A1 (en) | 2019-11-28 |
Family
ID=64005374
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/117567 Ceased WO2019223276A1 (en) | 2018-05-24 | 2018-11-27 | Method and device for realizing authentication of transaction information |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108764921A (en) |
| WO (1) | WO2019223276A1 (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108764921A (en) * | 2018-05-24 | 2018-11-06 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verification |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102609841A (en) * | 2012-01-13 | 2012-07-25 | 东北大学 | Remote mobile payment system based on digital certificate and payment method |
| CN104182876A (en) * | 2013-05-24 | 2014-12-03 | 中国电信股份有限公司 | Secure payment trading method and secure payment trading system |
| US20160080157A1 (en) * | 2014-09-16 | 2016-03-17 | Keypasco Ab | Network authentication method for secure electronic transactions |
| CN106651331A (en) * | 2016-12-22 | 2017-05-10 | 飞天诚信科技股份有限公司 | Digital currency-based electronic transaction method and system |
| CN108764867A (en) * | 2018-05-24 | 2018-11-06 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verification |
| CN108764921A (en) * | 2018-05-24 | 2018-11-06 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verification |
| CN108846650A (en) * | 2018-05-24 | 2018-11-20 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verifying |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100250947A1 (en) * | 2006-10-18 | 2010-09-30 | Kamfu Wong | System and method of preventing spam by using pay-charge-contribution and authentication means |
| US20090183000A1 (en) * | 2008-01-16 | 2009-07-16 | Scott Krig | Method And System For Dynamically Granting A DRM License Using A URL |
| AU2010100533B4 (en) * | 2010-04-02 | 2010-12-16 | Isx Ip Ltd | Method and system for verifying transactions |
| CN107077674B (en) * | 2016-12-29 | 2021-06-11 | 达闼机器人有限公司 | Transaction verification processing method and device and node equipment |
| CN107911222B (en) * | 2017-11-21 | 2020-08-28 | 沃通电子认证服务有限公司 | Digital signature generating method, digital signature verifying method, digital signature generating apparatus, digital signature verifying apparatus, and storage medium storing digital signature verifying program |
-
2018
- 2018-05-24 CN CN201810506808.5A patent/CN108764921A/en active Pending
- 2018-11-27 WO PCT/CN2018/117567 patent/WO2019223276A1/en not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102609841A (en) * | 2012-01-13 | 2012-07-25 | 东北大学 | Remote mobile payment system based on digital certificate and payment method |
| CN104182876A (en) * | 2013-05-24 | 2014-12-03 | 中国电信股份有限公司 | Secure payment trading method and secure payment trading system |
| US20160080157A1 (en) * | 2014-09-16 | 2016-03-17 | Keypasco Ab | Network authentication method for secure electronic transactions |
| CN106651331A (en) * | 2016-12-22 | 2017-05-10 | 飞天诚信科技股份有限公司 | Digital currency-based electronic transaction method and system |
| CN108764867A (en) * | 2018-05-24 | 2018-11-06 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verification |
| CN108764921A (en) * | 2018-05-24 | 2018-11-06 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verification |
| CN108846650A (en) * | 2018-05-24 | 2018-11-20 | 北京比特大陆科技有限公司 | A kind of method and apparatus for realizing Transaction Information verifying |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108764921A (en) | 2018-11-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11985239B2 (en) | Forward secrecy in transport layer security (TLS) using ephemeral keys | |
| US12401505B2 (en) | Agile cryptographic deployment service | |
| US20210367795A1 (en) | Identity-Linked Authentication Through A User Certificate System | |
| US12278916B2 (en) | Data processing method and apparatus, device, and medium | |
| USRE49673E1 (en) | Systems and methods for secure data exchange | |
| WO2017045552A1 (en) | Method and device for loading digital certificate in ssl or tls communication | |
| WO2020233235A1 (en) | Blockchain data verification method and apparatus | |
| US20240048361A1 (en) | Key Management for Cryptography-as-a-service and Data Governance Systems | |
| TWI663865B (en) | Identity management system based on cross-chain and method thereof | |
| US12141248B2 (en) | Systems and methods for whitebox device binding | |
| CN106960343B (en) | A kind of electronic cash safe payment method and device | |
| CN110519304A (en) | HTTPS mutual authentication method based on TEE | |
| CN110602075A (en) | File stream processing method, device and system for encryption access control | |
| US9578016B2 (en) | Optimizing secure communications between a client authenticating server and a mobile client | |
| CN111049789A (en) | Domain name access method and device | |
| WO2019223232A1 (en) | Method and device for realizing authentication of transaction information | |
| WO2021082222A1 (en) | Communication method and apparatus, storage method and apparatus, and operation method and apparatus | |
| WO2019223231A1 (en) | Method and device for realizing authentication of transaction information | |
| WO2019223276A1 (en) | Method and device for realizing authentication of transaction information | |
| CN107809412A (en) | The method and apparatus being decrypted using the website certificate and private key of targeted website | |
| CN115529129B (en) | Encrypted communication method, system, computer device, readable storage medium, and program product | |
| US20250156860A1 (en) | Security authentication method, apparatus and system for digital currency transaction | |
| US20240048532A1 (en) | Data exchange protection and governance system | |
| CN116318897A (en) | A data transmission method, system, device, computer equipment and storage medium | |
| CN116405319B (en) | Block chain-based carbon financial credential sharing method, device, equipment and medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18919760 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18919760 Country of ref document: EP Kind code of ref document: A1 |