Movatterモバイル変換


[0]ホーム

URL:


CN111210217A - Data processing method, device and storage medium - Google Patents

Data processing method, device and storage medium
Download PDF

Info

Publication number
CN111210217A
CN111210217ACN202010004471.5ACN202010004471ACN111210217ACN 111210217 ACN111210217 ACN 111210217ACN 202010004471 ACN202010004471 ACN 202010004471ACN 111210217 ACN111210217 ACN 111210217A
Authority
CN
China
Prior art keywords
transaction data
user
target object
server
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010004471.5A
Other languages
Chinese (zh)
Other versions
CN111210217B (en
Inventor
刘龙坡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co LtdfiledCriticalTencent Technology Shenzhen Co Ltd
Priority to CN202010004471.5ApriorityCriticalpatent/CN111210217B/en
Publication of CN111210217ApublicationCriticalpatent/CN111210217A/en
Application grantedgrantedCritical
Publication of CN111210217BpublicationCriticalpatent/CN111210217B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The embodiment of the invention discloses a data processing method, a data processing device and a storage medium. Uploading, by a terminal of a first user identifier, first transaction data indicating transfer of a digital asset from a wallet address of a first user to a wallet address of a second user to a blockchain network, sending a target order to a first server, the target order comprising the first user identifier, the second user identifier, a first target object identifier, and a hash value of the first transaction data; and the first server receives the target order, and sends the authorization information corresponding to the first target object identifier to the terminal of the first user identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data. Because the first transaction data is stored in the blockchain network, any node in the blockchain network can check and verify the first transaction data, so that the transaction is public and transparent, and the security and the credibility of the transaction data are improved.

Description

Data processing method, device and storage medium
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method and an apparatus for data processing, and a storage medium.
Background
With the continuous development of internet technology, online transactions are improved, products transacted on the internet are more and more, and transactions of digital resources are also one of the products, for example, an activation code of an application program. At present, the transaction of digital resources is mainly performed by various third party platforms. For example, in the transaction of the activation code of the application, the developer transacts the activation code of the application through a third party platform, such as "Taobao" or the like. In the transaction mode that the digital resources depend on the third-party platform, the transaction data is completely managed by the third-party platform, and the safety and the credibility are difficult to ensure. Therefore, how to improve the security and credibility of the transaction data of the digital resources becomes a problem to be solved urgently at present.
Disclosure of Invention
The embodiment of the invention provides a data sharing method, a data sharing device and a storage medium, and can provide a block chain-based digital resource purchasing method so as to make transaction data public and transparent, thereby improving the security and credibility of the transaction data.
In a first aspect, an embodiment of the present invention provides a data processing method, including:
receiving a target order sent by a terminal of a first user identifier, wherein the target order comprises the first user identifier, a second user identifier, a first target object identifier and a hash value of first transaction data, the first transaction data is used for indicating that a transaction digital asset is transferred from a wallet address of the first user identifier to a wallet address of the second user identifier, and the target order is uploaded to a block chain network by the terminal of the first user identifier;
and when the first transaction data is found from the blockchain network according to the hash value of the first transaction data, sending authorization information corresponding to the first target object identifier to the terminal of the first user identifier.
As a possible implementation, the method further comprises:
the terminal receiving the second user identifier uploads second transaction data to the blockchain network, wherein the second transaction data comprises authorization information corresponding to the first target object identifier encrypted by a public key of a first server;
and decrypting the encrypted authorization information corresponding to the first target object identifier through a private key of the first server, and storing the authorization information corresponding to the first target object identifier.
As a possible implementation manner, the second transaction data further includes a hash value of authorization information corresponding to the first target object identifier, and after the encrypted authorization information corresponding to the first target object identifier is decrypted by a private key of the first server and before the authorization information corresponding to the first target object identifier is stored, the method further includes:
carrying out hash operation on the data obtained by decryption to obtain a predicted hash value;
and storing the authorization information corresponding to the first target object identification when the predicted hash value is the same as the hash value of the authorization information corresponding to the first target object identification.
As a possible implementation manner, after storing the authorization information corresponding to the first target object identifier and before the target order sent by the terminal that receives the first user identifier, the method further includes:
and sending the first target object identification, the public key of the second user and the transaction digital asset to a terminal of the first user identification.
As a possible implementation, the method further comprises:
generating top-up transaction data when the terminal of the first user identifier successfully charges up the top-up digital asset, wherein the top-up transaction data indicates that the top-up digital asset is transferred from the wallet address of the first server to the wallet address of the first user identifier;
and sending the recharging transaction data to the blockchain network.
As a possible implementation, the method further comprises:
receiving a cash withdrawal request for the cash withdrawal digital asset sent by the terminal of the second user identification;
uploading cash-out transaction data to the blockchain network, the cash-out transaction data indicating a transfer of the cash-out digital asset from the wallet address of the second user identification to the wallet address of the first server;
transferring the cash-out digital asset from the account of the first server to the account of the second user after the blockchain network stores the cash-out transaction data.
In a second aspect, an embodiment of the present invention provides a data processing method, including:
uploading first transaction data to a blockchain network, the first transaction data indicating a transfer of a transaction digital asset from a first user-identified wallet address to a second user-identified wallet address;
sending a target order to a first server, wherein the target order comprises a first user identifier, a second user identifier, a first target object identifier and a hash value of first transaction data, so that the first server sends authorization information corresponding to the first target object identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data;
and receiving authorization information corresponding to the first target object identification.
As a possible implementation, the method further comprises:
receiving an input account number and an input password;
under the condition that the account is calculated according to the password, a login request is sent to a first server, wherein the login request carries the account of a first user, so that the first server sends login response information to a terminal of the first user identifier after receiving the login request and verifying that the account of the first user is a node in the block chain network, and the login response information is used for prompting that the first user successfully logs in;
and receiving and outputting the login response information sent by the first server.
In a third aspect, an embodiment of the present application provides a data processing apparatus, including:
a receiving unit, configured to receive a target order sent by a terminal of a first user identifier, where the target order includes the first user identifier, a second user identifier, a first target object identifier, and a hash value of first transaction data, where the first transaction data is used to indicate that a transaction digital asset is transferred from a wallet address of the first user identifier to a wallet address of the second user identifier, and the target order is uploaded to a blockchain network by the terminal of the first user identifier;
and the sending unit is used for sending the authorization information corresponding to the first target object identifier to the terminal of the first user identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data.
As a possible implementation, the apparatus further comprises:
the receiving unit is further configured to receive second transaction data uploaded to the blockchain network by the terminal of the second user identifier, where the second transaction data includes authorization information corresponding to the first target object identifier encrypted by a public key of the first server;
and the storage unit is used for decrypting the encrypted authorization information corresponding to the first target object identifier through a private key of the first server and storing the authorization information corresponding to the first target object identifier.
As a possible implementation manner, the second transaction data further includes a hash value of authorization information corresponding to the first target object identifier, and after the encrypted authorization information corresponding to the first target object identifier is decrypted by a private key of the first server and before the storage unit stores the authorization information corresponding to the first target object identifier, the apparatus further includes:
the processing unit is used for carrying out Hash operation on the data obtained by decryption to obtain a predicted Hash value;
when the predicted hash value is the same as the hash value of the authorization information corresponding to the first target object identifier, the storage unit stores the authorization information corresponding to the first target object identifier.
As a possible implementation manner, after the storage unit stores the authorization information corresponding to the first target object identifier, and before the receiving unit receives the target order sent by the terminal of the first user identifier, the sending unit is further configured to:
and sending the first target object identification, the public key of the second user and the transaction digital asset to a terminal of the first user identification.
As a possible implementation:
the processing unit is further configured to generate top-up transaction data when the top-up of the terminal of the first user identifier for the top-up digital asset is successful, the top-up transaction data indicating that the top-up digital asset is to be transferred from the wallet address of the first server to the wallet address of the first user identifier;
the sending unit sends the recharge transaction data to the blockchain network.
As a possible way of realisation, it is,
the receiving unit is further configured to receive a cash withdrawal request for a cash withdrawal digital asset, which is sent by the terminal of the second user identifier;
the sending unit is further to upload cash-out transaction data to the blockchain network, the cash-out transaction data indicating a transfer of the cash-out digital asset from the wallet address of the second user identification to the wallet address of the first server;
the processing unit is further to transfer the cash-out digital asset from the account of the first server to the account of the second user after the blockchain network stores the cash-out transaction data.
In a fourth aspect, an embodiment of the present application provides a data processing apparatus, including:
an upload unit to upload first transaction data to a blockchain network, the first transaction data to indicate a transfer of a transaction digital asset from a wallet address of a first user identity to a wallet address of a second user identity;
the sending unit is used for sending a target order to a first server, wherein the target order comprises a first user identifier, a second user identifier, a first target object identifier and a hash value of first transaction data, so that the first server sends authorization information corresponding to the first target object identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data;
and the first receiving unit is used for receiving the authorization information corresponding to the first target object identifier.
As a possible implementation, the apparatus further comprises:
the second receiving unit is used for receiving the input account and the input password;
under the condition that the account is calculated according to the password, the sending unit is further configured to send a login request to a first server, where the login request carries an account of a first user, so that the first server sends login response information to the terminal of the first user identifier after receiving the login request and when verifying that the account of the first user is a node in the blockchain network, where the login response information is used to prompt that the first user successfully logs in;
the first receiving unit is further configured to receive and output the login response information sent by the first server.
In a fifth aspect, the present application provides a data processing apparatus, which includes a processor and a memory, where the processor and the memory are coupled, where the memory is configured to store computer instructions, and the processor is configured to execute the computer instructions to call the program code to implement the data processing method disclosed in the embodiments of the first aspect.
In a sixth aspect, the present application provides a data processing apparatus, which includes a processor and a memory, where the processor and the memory are coupled, where the memory is configured to store computer instructions, and the processor is configured to execute the computer instructions to call the program code to implement the data processing method disclosed in the embodiment of the second aspect.
In a seventh aspect, this application provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a computer device, the data processing method disclosed in the embodiments of the first aspect is implemented.
In an eighth aspect, the present application provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a computer device, the data processing method disclosed in the embodiment of the second aspect is implemented.
In a ninth aspect, the present application provides a computer program, which when executed by a computer device, implements the data processing method disclosed in the embodiments of the first aspect.
In a tenth aspect, the present application provides a computer program, which, when executed by a computer device, implements the data processing method disclosed in the embodiment of the second aspect.
In an embodiment of the invention, a terminal of a first user identity uploads first transaction data to a blockchain network, the first transaction data indicating a transfer of a digital asset from a wallet address of the first user identity to a wallet address of a second user identity; then, the terminal of the first user identifier sends a target order to the first server, wherein the target order comprises the first user identifier, the second user identifier, the first target object identifier and the hash value of the first transaction data; a first server receives a target order sent by a terminal of a first user identifier; and when the first server finds the first transaction data from the blockchain network according to the hash value of the first transaction data, the first server sends the authorization information corresponding to the first target object identifier to the terminal of the first user identifier. It can be seen that the first transaction data is stored in the blockchain network, so that any node in the blockchain network can view the first transaction data, the transaction is made public and transparent, and the security and credibility of the transaction data are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic system architecture diagram of a data processing method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a login method according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for uploading an application according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a method for generating second transaction data according to an embodiment of the invention;
FIG. 5 is a schematic diagram of another method for generating second transaction data according to an embodiment of the invention;
fig. 6 is a flowchart of a method for recharging according to an embodiment of the present invention;
FIG. 7 is a flow chart of a method of purchasing provided by embodiments of the present invention;
FIG. 8 is a flow chart of a method for cash-out provided by an embodiment of the present invention;
FIG. 9 is a diagram of a data processing apparatus 900 according to an embodiment of the present invention;
FIG. 10 is a schematic diagram of another data processing apparatus 1000 according to an embodiment of the present invention;
FIG. 11 is a block diagram of another data processing apparatus 1100 according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of another data processing apparatus 1200 according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Referring to fig. 1, fig. 1 is a schematic diagram of a system architecture of a data processing method according to an embodiment of the present invention. The system architecture diagram includes aterminal 101 of a first subscriber identity, aterminal 102 of a second subscriber identity, ablockchain network 103, afirst server 104, and asecond server 105. Wherein theterminal 101 of the first subscriber identity, theterminal 102 of the second subscriber identity and thefirst server 104 are nodes in theblockchain network 103.
Theterminal 101 of the first subscriber identity may be understood as a terminal of the buyer; theterminal 102 of the second subscriber identity may be understood as a terminal of the seller; thefirst server 104 is used for storing authorization information corresponding to the target object identification uploaded by the seller. The target object may be various digital resources, such as an application, an electronic book, a movie, and the like; the target object identifier is used for uniquely identifying a target object, for example, a unique serial Number is set for an application program in a transaction process, an ISBN (International Standard Book Number) of an electronic Book can be used as a unique identifier in a transaction process of the electronic Book, and the like; the authorization information corresponding to the target object identifier may be an activation code, an authorization code, a license, and the like; thesecond server 105 is a server of the payment platform for completing the transfer of the digital assets down the chain, e.g. a server of WeChat, a server of a bank, etc.
In one implementation manner, the authorization information corresponding to the first target object identifier is uploaded to thefirst server 104 by theterminal 102 of the second user identifier, that is, the authorization information corresponding to the first target object identifier is owned by the second user. In the implementation that theterminal 101 of the first user identifier purchases the authorization information corresponding to the first target object identifier from theterminal 102 of the second user identifier, specifically: the terminal 102 (seller) of the second user identifier may send the authorization information corresponding to the first target object identifier to thefirst server 104 through theblockchain network 103, and after receiving the authorization information corresponding to the first target object identifier, thefirst server 104 may store the authorization information corresponding to the first target object identifier. After storing the authorization information corresponding to the first target object identifier, thefirst server 104 may further push relevant information of the authorization information corresponding to the first target object identifier, for example, the first target object identifier, the profile of the authorization information corresponding to the first target object identifier, the public key of the second user, and the like, to terminals of the respective user identifiers, including theterminal 101 of the first user identifier and theterminal 102 of the second user identifier. Theterminal 101 of the first user identifier may output the related information of the authorization information corresponding to the first target object identifier based on the client, so that the first user may purchase the authorization information corresponding to the first target object identifier from the second user based on the client when viewing the related information of the authorization information corresponding to the first target object identifier.
The terminal 101 (buyer) of the first subscriber identity may add value to the wallet address of the first subscriber identity before purchasing the authorization information corresponding to the first target object identity. Wherein the wallet address of the first user identification indicates a wallet address used by the first user to conduct transactions (payments, collections) of digital assets in the blockchain network. In one implementation, theterminal 101 of the first subscriber identity sends a recharge order to the second server 105 (the server of the payment platform). After thesecond server 105 transfers the top-up digital asset from the account of the first user to the account of the first server according to the top-up order, thesecond server 105 sends a successful top-up message to theterminal 101 of the first user identity and thefirst server 104. After receiving the message of successful recharging, thefirst server 104 generates recharging transaction data and sends the recharging transaction data to theblockchain network 103. Wherein the load transaction data indicates to transfer the load digital asset from the wallet address of the first server to the wallet address of the first user identification. Theblockchain network 103 may verify and store the load transaction data. After receiving the message of successful recharging sent by thesecond server 105, theterminal 101 of the first user identifier may view the recharging transaction data in theblockchain network 103.
Theterminal 101 of the first user identifier may purchase the authorization information corresponding to the first target object identifier after completing the recharging of the wallet address of the first user identifier. First, theterminal 101 of the first user identifier receives a purchase operation instruction for purchasing authorization information corresponding to the first target object identifier, then generates first transaction data according to the purchase instruction, and uploads the first transaction data to theblockchain network 103. Wherein the first transaction data indicates a transfer of the transaction digital asset from the first user-identified wallet address to the second user-identified wallet address. Wherein the wallet address of the second user identification indicates a wallet address used by the second user to conduct transactions (payments, collections) of digital assets in the blockchain network. Next, theterminal 101 of the first user identifier sends a target order for purchasing authorization information corresponding to the first target object identifier to thefirst server 104, where the target order includes the first user identifier, the second user identifier, the first target object identifier, and the hash value of the first transaction data. The first user identifier may refer to a public key of the first user, and the second user identifier may refer to a public key of the second user. When thefirst server 104 receives the target order, it searches whether the hash value of the first transaction data exists in theblockchain network 103 according to the hash value of the first transaction data carried in the target order. When thefirst server 104 finds the hash value of the first transaction data from theblockchain network 103, it proves that the first transaction data is already stored in the blockchain network, which indicates that the first user has paid the second user for purchasing the digital asset corresponding to the authorization information corresponding to the first target object identifier. At this time, thefirst server 104 sends the authorization information corresponding to the first target object identifier to theterminal 101 of the first user identifier.
After the first transaction data is stored in theblockchain network 103, theterminal 102 of the second subscriber identity may also view the first transaction data in theblockchain network 103, and in turn, may view the digital assets remaining from the wallet address of the second subscriber identity. Thus, theterminal 102 of the second subscriber identity may send a cash-out request to thefirst server 104. Upon receiving the cash-out request,first server 104 generates cash-out transaction data from the cash-out request, the cash-out transaction data indicating that the cash-out digital asset is to be transferred from the wallet address of the second user identification to the wallet address of the first server. Thefirst server 104 then uploads the cash-out transaction data to theblockchain network 103. After theblock chain network 103 verifies and stores the cash withdrawal transaction data, thefirst server 104 generates a cash withdrawal order according to the cash withdrawal transaction data and sends the cash withdrawal order to thesecond server 105, and after the second server receives the cash withdrawal order, the second server transfers the designated cash withdrawal digital assets of the cash withdrawal order from the account of the first server to the account of the second user and sends the cash withdrawal result to thefirst server 104 and theterminal 102 of the second user identifier.
Alternatively, theterminal 101 of the first subscriber identity and theterminal 102 of the second subscriber identity may be smart devices such as a mobile phone, a computer, a smart watch, and the like, which is not limited herein.
Alternatively, the client based on the application platform may be an APP, an applet, a web page, or the like, and is not limited herein.
Based on the above description, an embodiment of the present invention proposes a data processing method that can be executed by the above-mentioned data processing system. The terminal of the first subscriber identity may be a terminal 101 of the first subscriber identity, the terminal of the second subscriber identity may be a terminal 102 of the second subscriber identity, the blockchain network may be ablockchain network 103, the first server may be afirst server 104, and the second server may be asecond server 105. The terminal of the first subscriber identity, the terminal of the second subscriber identity and the first server are all nodes in the block chain network. The data processing method can comprise the following partial or whole steps:
block chain user registration:
before a user logs in and carries out authorization information transaction corresponding to a first target object identifier, a terminal of a first user identifier, a terminal of a second user identifier, and a first server need to be registered first.
After the client is installed on the terminal of the first user identifier, based on that when the client receives a registration request of the first user, the terminal of the first user identifier uses an asymmetric encryption algorithm, such as an ECC (elliptic curve encryption algorithm), to create a key pair of the first user. The key pair comprises a public key of the first user and a private key of the first user, the private key of the first user is used for data signature, and the public key of the first user is used for data encryption. At this point, the first user registration is complete.
The terminal of the second subscriber identity and the first server are both registered in the above-described manner.
A first user (buyer) logs in:
the terminal of the first user identifier outputs a public key of the first user and a private key of the first user based on the client, so that the first user logs in by taking the public key of the first user as an account and the private key of the first user as a password. Fig. 2 is a schematic flowchart of a login method according to an embodiment of the present invention, and as shown in fig. 2, the method may include all or part of the following steps:
s201, the terminal of the first user identification receives an input account and a password.
The terminal of the first user identification can receive an account number and a password input by the first user based on the client.
S202, the terminal of the first user identification calculates whether the input account can be obtained according to the input password.
After receiving the input account and password, the terminal of the first user identifier generates an asymmetric encryption algorithm with the same public key of the first user by adopting the private key of the first user, and verifies whether the input password can obtain the input account through the asymmetric encryption algorithm. Executing steps S2021-S2024 when the input account is obtained according to the input password; if the input account is not obtained from the input password, step S203 is executed.
S2021, the terminal of the first user identifier sends a login request to the first server.
The login request carries an account of the first user.
S2022, when receiving the login request sent by the terminal of the first user identifier, the first server verifies whether the account of the first user is a node in the block chain.
S2023, the first server sends login response information to the terminal of the first user identifier.
The login response information is used for prompting whether the first user successfully logs in. When the first server verifies that the account of the first user is a node in the block chain, login response information of successful login is sent to the terminal of the first user identifier; and when the account number of the first user is verified not to be one node in the block chain, the first server sends login response information of login failure to the terminal of the first user identifier.
S2024, the terminal of the first user identifier receives the login response information sent by the first server.
Optionally, in step S2022, after receiving the login request sent by the terminal of the first user identifier, the first server may also send login information of a login page to the terminal of the first user identifier, for example, an account of the first user, identifiers of a plurality of target objects, a target object recommended to the first user, and the like. Step S2024 forms a login page at the terminal of the first user identifier after receiving the login information sent by the first server, and further outputs the login information of the login page to the first user.
Alternatively, step S203 may not be necessary.
The seller uploads authorization information corresponding to the target object identifier:
and the terminal of the second user identifier logs in according to the login mode of the terminal of the first user identifier, so that data interaction is carried out with the first server. For example, the terminal of the second user identifier uploads authorization information corresponding to the first target object identifier to the first server. Fig. 3 is a flowchart of a method for uploading authorization information corresponding to a target object identifier according to an embodiment of the present invention. The method flow is described by taking an example that a terminal of a second user identifier uploads authorization information corresponding to a first target object identifier, as shown in fig. 3, the method may include some or all of the following steps.
S301, the terminal of the second user identification generates second transaction data, and the second transaction data comprises authorization information corresponding to the first target object identification encrypted by the public key of the first server.
Before S301 is executed, the terminal of the second user identifier requests the public key of the first server from the first server through the blockchain network, so as to encrypt the authorization information corresponding to the first target object identifier by using the public key of the first server.
And after the terminal of the second user identifier receives the public key of the first server sent by the first server, generating second transaction data according to the authorization information corresponding to the first target object identifier received by the terminal of the second user identifier and the public key of the first server. The embodiment of the application provides two implementation modes for generating the second transaction data.
Implementation mode (one):
referring to fig. 4, fig. 4 is a schematic diagram illustrating a method for generating second transaction data according to an embodiment of the present disclosure. As shown in fig. 4, the specific process includes: firstly, a terminal of a second user identifier receives input or generated authorization information corresponding to a first target object identifier, and performs hash operation on the authorization information corresponding to the first target object identifier to obtain a hash value of the authorization information corresponding to the first target object identifier; secondly, encrypting the authorization information corresponding to the first target object identification and the hash value of the authorization information corresponding to the first target object identification through the public key of the first server to obtain second transaction data; then, carrying out hash operation on the second transaction data to obtain a hash value of the second transaction data; and finally, signing the second transaction data and the hash value of the second transaction data through a private key of a second user.
Implementation mode (b):
referring to fig. 5, fig. 5 is a schematic diagram illustrating another method for generating second transaction data according to an embodiment of the present disclosure. As shown in fig. 5, first, a terminal of a second user identifier receives input or generated authorization information corresponding to a first target object identifier, and encrypts the authorization information corresponding to the first target object identifier through a public key of a first server to obtain second transaction data; secondly, performing hash operation on the second transaction data to obtain a hash value of the second transaction data; and finally, signing the second transaction data and the hash value of the second transaction data through a private key of a second user. The authorization information corresponding to the first target object identifier may also be referred to as authorization information of the first target object, which refers to authorization information that authorizes use of the first target object, for example, an activation code of an application program.
Optionally, without being limited to the implementation manners of generating the second transaction data given in the foregoing implementation manner (a) and implementation manner (b), the second transaction data may also be in other forms that ensure that the authorization information corresponding to the first target object identifier is securely sent to the first server without being tampered and leaked, which is not limited herein.
S302, the terminal of the second user identification uploads second transaction data to the blockchain network.
And after receiving the second transaction data, the node in the block chain network verifies and stores the second transaction data. In one implementation, a node in the blockchain network receives second transaction data signed by a private key of a second user and a hash value of the second transaction data. Firstly, decrypting second transaction data signed by a private key of a second user and a hash value of the second transaction data through a public key of the second user, and verifying that the second transaction data and the hash value of the second transaction data come from a terminal of a second user identifier; secondly, performing hash operation on the received second transaction data to obtain a hash value, comparing whether the hash value is the same as that of the received second transaction data, verifying whether the hash values of the second transaction data and the second transaction data are falsified, and if the hash values are the same, verifying that the hash values of the received second transaction data and the second transaction data are not falsified; and finally, under the condition that the verification is passed, taking the public key of the second user, the second transaction data and the hash value of the second transaction data as an uploading record to be temporarily stored in the transaction pool. Other nodes in the blockchain also verify and temporarily store each received upload record in the manner described above. And at set intervals, the recording node in the block chain network takes the public key of the second user from the terminal of the second user identifier, the second transaction data and the hash value of the second transaction data as an upload record and packs and stores the upload record and other temporary records in the transaction pool in a new block.
In some embodiments, a specific implementation of the second transaction data is obtained by encrypting, by the public key of the first server, the authorization information corresponding to the first target object identifier: and encrypting the authorization information corresponding to the first target object identification and the first target object through the public key of the first server to obtain second transaction data. When the blockchain network stores the second transaction data, the first target object is also stored in the blockchain network. The property that the block chain storage data is difficult to be tampered can be used for performing copyright forensics on the first target object. In one implementation: when the second user needs the copyright certification of the first target object, the upload record can be acquired from the blockchain network to certify the ownership of the first target object by the second user. When the second user finds that the second target object owned by the third user is similar to the first target object owned by the second user, it may obtain evidence from the blockchain network, and obtain an upload record of the first target object recorded in the blockchain block: a public key of the second user, the second transaction data, a hash value of the second transaction data, a timestamp, etc. The uploading record comprises a public key of the second user to prove that the uploading record is uploaded by the second user, and the time stamp proves the uploading time of the second user. If the time stamp of the uploading record of the first target object uploaded by the second user is earlier than the time stamp of the uploading record of the second target object uploaded by the third user, the first target object can be proved to be owned by the second user, and the second target object which is the same as or similar to the first target object is suspected to be infringed.
S303, the first server receives the second transaction data from the terminal of the second user identifier.
S304, the first server decrypts the authorization information corresponding to the encrypted first target object identifier through a private key of the first server, and stores the authorization information corresponding to the first target object identifier.
And the first server receives second transaction data from the terminal of the second user identifier, and stores the authorization information corresponding to the first target object identifier obtained by decryption after verifying that the second transaction data is from the terminal of the second user identifier and is not tampered. Specifically, after receiving the second transaction data signed by the private key of the second user and the hash value of the second transaction data, the first server verifies whether the hash value of the second transaction data and the hash value of the second transaction data are from the terminal identified by the second user and are tampered or not according to the way that the node in the block chain verifies the received data. In case of passing the verification:
in the form of the second transaction data targeted by the implementation manner (i), first, the first server performs hash operation on the data obtained by decryption to obtain a predicted hash value; and secondly, storing the authorization information corresponding to the first target object identification when the predicted hash value is the same as the hash value of the authorization information corresponding to the first target object identification. Specifically, the method comprises the following steps: the first server decrypts the second transaction data through a private key of the first server to obtain authorization information corresponding to the first target object identifier and a hash value of the authorization information corresponding to the first target object identifier, then performs hash operation on the authorization information corresponding to the first target object identifier to obtain a predicted hash value, compares the predicted hash value with the hash value of the authorization information corresponding to the decrypted first target object identifier to determine whether the predicted hash value is the same as the hash value of the authorization information corresponding to the decrypted first target object identifier, if so, proves that the authorization information corresponding to the first target object identifier is not tampered in the uploading process again, and then the first server stores the authorization information corresponding to the decrypted first target object identifier. The implementation mode (I) is that the safety of the authorization information corresponding to the first target object identification in the uploading process is improved through the comparison and verification of the hash values twice; and the authorization information corresponding to the first target object identification is prevented from being stolen by other users in the uploading process by encrypting the public key of the first server and only decrypting the public key of the first server.
In the form of the second transaction data targeted by the implementation manner (b), the first server decrypts the second transaction data by using the private key of the first server to obtain the authorization information corresponding to the first target object identifier, and then the first server stores the authorization information corresponding to the first target object identifier obtained by decryption. Through one-time Hash verification, the authorization information corresponding to the first target object identifier is prevented from being tampered in the process of uploading to the first server; and the authorization information corresponding to the first target object identification is prevented from being stolen by other users in the uploading process by encrypting the public key of the first server and only decrypting the public key of the first server.
In one implementation, if the verification of the blockchain network fails or the verification of the first server fails to pass the second transaction data, the authorization information corresponding to the second transaction data and the first target object identifier carried by the second transaction data cannot be stored.
Optionally, the authorization information corresponding to the first target object identifier may further include the first target object identifier, a profile of the authorization information corresponding to the first target object identifier, and other information related to the authorization information corresponding to the first target object identifier.
In one implementation, after the first server stores the authorization information corresponding to the first target object identifier, the first server sends, to the terminal of the first user identifier, the first target object identifier, the public key of the second user, the transaction digital asset, and other information related to the authorization information corresponding to the first target object identifier. The terminal of the first user identifier receives and outputs the first target object identifier, the public key of the second user, the transaction digital asset and the like sent by the first server, so that the first user can purchase the authorization information corresponding to the first target object identifier based on the terminal of the first user identifier.
Optionally, the other terminal, including the terminal of the second user identifier, may also receive information related to the authorization information corresponding to the first target object identifier, such as the first target object identifier, the public key of the second user, and the transaction digital asset, sent by the first server, so that the user of the other terminal may view and purchase the authorization information corresponding to the first target object identifier.
User recharge:
the following takes the first user as an example to explain the specific implementation of recharging. And when the terminal of the first user identifier receives and outputs the first target object identifier, the public key of the second user and the transaction digital asset, the first user can purchase the authorization information corresponding to the first target object identifier. The terminal of the first user identifier may further receive an input recharging operation, so that the wallet address of the first user identifier has a sufficient balance to be used for paying the authorization information corresponding to the first target object identifier. Referring to fig. 6, fig. 6 is a flowchart of a recharging method according to an embodiment of the present invention, and as shown in fig. 6, the method may include the following steps:
s601, when the terminal of the first user identification successfully charges the rechargeable digital assets, the first server generates rechargeable transaction data, and the rechargeable transaction data indicates that the rechargeable digital assets are transferred from the wallet address of the first server to the wallet address of the first user identification.
And the terminal of the first user identification performs the chain recharging on the recharging digital assets, and then sends the recharging result to the first server under the condition of successful recharging. In one implementation: firstly, a terminal of a first user identification receives recharging information input by a recharging interface and sends the recharging information to a first server; secondly, the first server generates a recharging order according to the recharging information and sends the recharging order to a terminal of the first user identification; and finally, the terminal of the first user identifier sends the recharging order to a server (a second server) of the payment platform according to the input payment platform, and the server of the payment platform completes payment according to the recharging order, namely the appointed recharging digital assets are transferred from the account of the first user to the account of the first server. And under the condition of successful recharging, the server of the payment platform sends the recharging result to the first server and the terminal of the first user identifier. At this time, the terminal of the first user identifier is successful in recharging the rechargeable digital assets.
And after receiving the recharging result of successful recharging, the first server generates recharging transaction data according to the recharging result, wherein the recharging transaction data indicates that the recharging digital assets are transferred from the wallet address of the first server to the wallet address of the first user identifier.
S602, the first server sends the recharging transaction data to the block chain network.
Firstly, the first server performs hash operation on the recharging transaction data to obtain a hash value of the recharging transaction data; secondly, the first server signs the recharging transaction data and the hash value of the recharging transaction data by using the private key of the first server; and finally, uploading the recharging transaction data signed by the public key of the first server and the private key of the first server and the hash value of the recharging transaction data to the blockchain network.
When one node in the block chain network receives the recharging transaction data and the hash value of the recharging transaction data signed by the public key of the first server and the private key of the first server: firstly, the public key of the first server decrypts the recharging transaction data signed by the private key of the first server and the hash value of the recharging transaction data, and proves that the recharging transaction data come from the first server; secondly, carrying out hash operation on the recharging transaction data to obtain a hash value, comparing the hash value with the hash value of the recharging transaction data from the first server, and if the hash value is consistent with the hash value of the recharging transaction data from the first server, determining that the recharging transaction data is not tampered; finally, when the verification is passed (it can be considered that the balance of the wallet address of the first server is infinite, so that it is not necessary to verify whether the balance of the wallet address of the first server is sufficient), the public key of the first server from the first server, the recharge transaction data and the hash value of the recharge transaction data are temporarily stored in the transaction pool as a recharge record. And other nodes in the block chain network also carry out verification and temporarily store each received recharging record according to the mode. At set intervals, the record node in the block chain network takes the public key of the first server from the first server, the recharge transaction data and the hash value of the recharge transaction data as a recharge record and packs and stores the recharge record and other records temporarily stored in the transaction pool in a new block.
And (3) purchasing the application program:
when the wallet address of the first user identifier has enough balance to purchase the authorization information corresponding to the first target object identifier, the terminal of the first user identifier can upload first transaction data of the authorization information corresponding to the second target object identifier purchased by the terminal of the second user identifier to the blockchain network. In one implementation, a terminal of a first user identifier receives a purchase operation for authorization information corresponding to a first target object identifier, and generates first transaction data according to the purchase operation, where the first transaction data may include a wallet address of the first user identifier, a wallet address of a second user identifier, a purchase digital asset, and so on. Referring to fig. 7, fig. 7 is a flowchart illustrating a purchasing method according to an embodiment of the present disclosure. The method can comprise the following partial or whole steps:
s701, the terminal of the first user identification uploads first transaction data to the blockchain network, wherein the first transaction data is used for indicating that the transaction digital assets are transferred from the wallet address of the first user identification to the wallet address of the second user identification.
Firstly, a terminal of a first user identifier firstly adopts Hash operation on first transaction data to obtain a Hash value of the first transaction data; secondly, the terminal of the first user identifier signs the first transaction data and the hash value of the first transaction data through the private key of the first user; and finally, the terminal of the first user identifier uploads the first transaction data and the hash value of the first transaction data after the public key of the first user and the private key of the first user are signed to the blockchain network.
After a node in the blockchain network receives first transaction data and a hash value of the first transaction data signed by a public key of a first user and a private key of the first user: firstly, decrypting first transaction data encrypted by a private key of a first user and a hash value of the first transaction data through a public key of the first user to prove that the first transaction data comes from the first user; secondly, performing hash operation on the received first transaction data to obtain a hash value, comparing the hash value of the received first transaction data with the hash value, and if the hash value of the received first transaction data is the same as the hash value, proving that the hash values of the first transaction data and the first transaction data are not tampered; finally, it is verified whether the first user has sufficient digital assets by verifying the transaction record for the wallet address of the first user identification. And under the condition that the verification is passed, taking the public key of the first user from the terminal of the first user identifier, the first transaction data and the hash value of the first transaction data as a transaction record to be temporarily stored in the transaction pool. Other nodes in the blockchain network also validate each received transaction record in the manner described above. At set intervals, a recording node in the block chain network takes the public key of the first user from the terminal of the first user identifier, the first transaction data and the hash value of the first transaction data as a transaction record and packs and stores the transaction record and other records temporarily stored in the transaction pool in a new block.
S702, the terminal of the first user identification sends a target order to the first server, wherein the target order comprises the first user identification, the second user identification, the first target object identification and the hash value of the first transaction data.
After uploading the public key of the first user, the first transaction data encrypted by the private key of the first user, and the hash value of the first transaction data to the blockchain network, the terminal of the first user identifier further sends a target order to the first server, where the first user identifier indicates an identifier of the first user, and may be, for example, the public key of the first user; the second user identity indicates an identity of the second user, which may be, for example, a public key of the second user; the first target object identifier is used for uniquely identifying the first target object, for example, a unique serial number is set for an application program in a transaction process; the hash value of the first transaction data is obtained by performing a hash operation on the first transaction data.
S703, the first server receives the target order sent by the terminal of the first user identifier.
And after receiving the target order, the first server analyzes the target order to obtain the hash value of the first transaction data.
S704, the first server searches the first transaction data from the blockchain network according to the hash value of the first transaction data.
When the first server finds the first transaction data in the blockchain network, step S705 is executed; when the first server does not find the first transaction data in the blockchain network, the first server may ignore the target order sent by the terminal of the first user identifier, or send a message indicating that the terminal of the first user identifier does not complete payment to the terminal of the first user identifier, and the first server may also perform other operations, which is not limited herein.
S705, when the first server finds the first transaction data in the blockchain network, the first server sends the authorization information corresponding to the first target object identifier to the terminal of the first user identifier.
In the process of performing the hash operation on the first transaction data, an order number, a transaction number, a random character or the like may be added on the basis of original information (i.e., information indicating that the transaction digital asset is transferred from the wallet address of the first user identifier to the wallet address of the second user identifier).
And searching a transaction record aimed by the target order in the blockchain network according to the received hash value of the first transaction data, namely whether the hash value of the first transaction data is written into the blockchain, and if the first server can search the hash value of the first transaction data from the blockchain, proving that the first transaction data is stored into the blockchain, and the terminal of the first user identification completes payment on the target order, namely the transaction digital asset is transferred from the wallet address of the first user identification to the wallet address of the second user identification. At this time, the first server sends the authorization information corresponding to the first target object identifier to the terminal of the first user identifier. The authorization information corresponding to the first target object identifier may be an activation code, an authorization code, an extraction link, and the like, which authorize use of the authorization information corresponding to the first target object identifier, and is not limited herein.
S706, the terminal of the first user identifier receives authorization information corresponding to the first target object identifier sent by the first server.
After receiving the authorization information corresponding to the first target object identifier, the terminal of the first user identifier may authorize and use the first target object according to the authorization information corresponding to the first target object identifier.
Optionally, after receiving the target order from the terminal of the first user identifier, the first server may also directly send the first target object to the terminal of the first user identifier, which is not limited herein.
According to the purchasing method, the terminal of the first user identifier uploads the transaction data to the blockchain network, so that other servers or terminals in the blockchain network can verify and store the transaction data, a centralized platform is not required to manage the transaction data generated in the transaction process, and the transaction data is transparent and cannot be tampered.
User cash withdrawal:
after the terminal of the first user identifier performs the purchase of the authorization information corresponding to the first target object identifier, the digital asset of the wallet address of the first user identifier is transferred to the wallet address of the second user identifier, and at this time, the terminal of the second user identifier may receive an input cash withdrawal operation, that is, the digital asset in the wallet address of the second user is converted into the digital asset in the account of the second user on the payment platform. Referring to fig. 8, fig. 8 is a flowchart of a method for presenting a presentation according to an embodiment of the present invention, as shown in fig. 8, the method includes the following steps:
s801, the terminal of the second user identification sends a cash withdrawal request to the first server.
And the terminal of the second user identification receives cash withdrawal information input by the cash withdrawal interface, the cash withdrawal information comprises cash withdrawal digital assets, transferred accounts of the second user and the like, generates a cash withdrawal request according to the cash withdrawal information, and then sends the cash withdrawal request to the first server.
S802, the first server receives a cash withdrawal request for the cash withdrawal digital asset, which is sent by the terminal of the second user identification.
The first server generates cash withdrawal transaction data according to the cash withdrawal request.
S803, the first server uploads cash-out transaction data to the blockchain network, the cash-out transaction data indicating that the cash-out digital asset is to be transferred from the wallet address of the second user identification to the wallet address of the first server.
Firstly, the first server carries out hash operation on the cash withdrawal transaction data to obtain a hash value of the cash withdrawal transaction data; secondly, signing the cash withdrawal transaction data and the hash value of the cash withdrawal transaction data through a private key of the first server; and finally, uploading the public key of the first server, the cash withdrawal transaction data signed by the private key of the first server and the hash value of the cash withdrawal transaction data to the blockchain network.
S804, the block chain network stores the cash-out transaction data.
When one node in the block chain network receives withdrawal transaction data signed by the public key of the first server and the private key of the first server and the hash value of the withdrawal transaction data: firstly, decrypting cash withdrawal transaction data signed by a private key of a first server and a hash value of the cash withdrawal transaction data through a public key of the first server, and verifying that the cash withdrawal transaction data come from the first server; secondly, carrying out hash operation on the received cash withdrawal transaction data to obtain a hash value, comparing whether the hash value is consistent with the hash value of the cash withdrawal transaction data from the first server, and if so, determining that the cash withdrawal transaction data is not tampered; finally, it is verified whether the digital assets of the wallet address of the second user identification are not less than the cash-out digital assets through the transaction record of the wallet address of the second user identification. And when the verification passes, temporarily storing the public key of the first server from the first server, the cash withdrawal transaction data and the hash value of the cash withdrawal transaction data in the transaction pool as a cash withdrawal record. And other nodes in the block chain network also carry out verification and temporarily store each received cash-out record according to the mode. At set intervals, a recording node in the block chain network takes the public key of the first server from the first server, the cash-out transaction data and the hash value of the cash-out transaction data as a cash-out record and packs and stores the cash-out record and other records temporarily stored in the transaction pool in a new block.
S805, the first server searches the cash-out transaction data from the blockchain network.
The first server searches whether the cash-out transaction data is stored in a block in the blockchain network according to the hash value of the cash-out transaction data.
S806, when the first server finds the cash withdrawal transaction data from the blockchain network, the cash withdrawal digital asset is transferred from the account of the first server to the account of the second user.
When the first server finds the hash value of the cash-out transaction data in the transaction record of the blockchain network according to the hash value of the cash-out transaction data, the fact that the cash-out transaction data is stored in one block is proved. At this point, the first server transfers the cash-out digital asset from the account of the first server to the account of the second user. In one implementation, a first server sends a cash-out order to a second server. And after receiving the withdrawal order, the second server transfers the withdrawal digital assets from the account of the first server to the account of the second user according to the withdrawal order, and under the condition of successful withdrawal, the second server sends information of successful withdrawal to the first server and the second user.
Optionally, the terminal of the first user identity may view the transaction record of the wallet address of the first user identity through the blockchain network to obtain the remaining digital assets of the wallet address of the first user identity.
Optionally, the terminal of the second user identity may view the transaction record of the wallet address of the second user identity through the blockchain network, thereby obtaining the digital assets remaining from the wallet address of the second user identity.
Optionally, in the performance of the top-up and cash-out operations, the digital assets of the wallet address and the digital assets of the account of the payment platform may be converted in a certain ratio. For example, in the account corresponding to the payment platform, the digital asset with a "unitary" value may be converted into the digital asset with a "binary" value corresponding to the wallet address, which is not limited herein.
In an embodiment of the invention, a terminal of a first user identity uploads first transaction data to a blockchain network, the first transaction data indicating a transfer of a digital asset from a wallet address of the first user identity to a wallet address of a second user identity; then, the terminal of the first user identifier sends a target order to the first server, wherein the target order comprises the first user identifier, the second user identifier, an authorization information identifier corresponding to the first target object identifier and a hash value of the first transaction data; a first server receives a target order sent by a terminal of a first user identifier; and when the first server finds the first transaction data from the blockchain network according to the hash value of the first transaction data, the first server sends the authorization information corresponding to the first target object identifier to the terminal of the first user identifier. Therefore, the terminal of the first user identifier uploads the first transaction data to the block chain network, the reliability of data storage is improved based on the distributed storage structure of the block chain, each transaction data can be stored in the storage units in different regions, even if one node in the block chain is damaged, the transaction data stored by other nodes in the block chain network cannot be influenced, and the reliability of the data is greatly improved; and secondly, all nodes in the block chain network can verify and store the first transaction data, and the centralized platform is not required to manage the transaction data, so that the transaction data is public and transparent and cannot be tampered, and the reliability of the transaction data is improved.
Based on the description of the method embodiments, the data processing apparatus 900 according to the embodiments of the present invention is provided, where the data processing apparatus 900 may be run on a first server as shown in fig. 2, fig. 3, fig. 6, fig. 7, or fig. 8, and the data processing apparatus 900 may be a computer program (including program code) running on the first server. Referring to fig. 9, the data processing apparatus may operate the following units:
a receivingunit 901, configured to receive a target order sent by a terminal of a first user identifier, where the target order includes the first user identifier, a second user identifier, an authorization information identifier corresponding to a first target object identifier, and a hash value of first transaction data, where the first transaction data is used to indicate that a transaction digital asset is transferred from a wallet address of the first user identifier to a wallet address of the second user identifier, and the target order is uploaded to a blockchain network by the terminal of the first user identifier;
a sendingunit 902, configured to send, when the first transaction data is found from the blockchain network according to the hash value of the first transaction data, authorization information corresponding to the authorization information identifier corresponding to the first target object identifier to the terminal of the first user identifier.
In one embodiment, the apparatus further comprises:
the receivingunit 901 is further configured to receive second transaction data uploaded to the blockchain network by the terminal of the second user identifier, where the second transaction data includes authorization information corresponding to the first target object identifier encrypted by the public key of the first server;
astorage unit 903, configured to decrypt, by using a private key of the first server, the encrypted authorization information corresponding to the first target object identifier, and store the authorization information corresponding to the first target object identifier.
In one embodiment, the second transaction data further includes a hash value of authorization information corresponding to the first target object identifier, and after the encrypted authorization information corresponding to the first target object identifier is decrypted by a private key of the first server, before thestorage unit 903 stores the authorization information corresponding to the first target object identifier, the apparatus further includes:
aprocessing unit 904, configured to perform a hash operation on the decrypted data to obtain a predicted hash value;
when the predicted hash value is the same as the hash value of the authorization information corresponding to the first target object identifier, thestorage unit 903 stores the authorization information corresponding to the first target object identifier.
In an embodiment, after thestorage unit 903 stores the authorization information corresponding to the first target object identifier, and before the receivingunit 901 receives the target order sent by the terminal of the first user identifier, the sendingunit 902 is further configured to:
and sending the first target object identification, the public key of the second user and the transaction digital asset to a terminal of the first user identification.
In one embodiment, theprocessing unit 904 is further configured to generate top-up transaction data when the top-up of the terminal of the first user identity for the top-up digital asset is successful, the top-up transaction data indicating that the top-up digital asset is to be transferred from the wallet address of the first server to the wallet address of the first user identity;
the sendingunit 902 sends the recharge transaction data to the blockchain network.
In one embodiment, the receivingunit 901 is further configured to receive a cash-out request for cashout a digital asset, sent by the terminal of the second user identifier;
the sendingunit 902 is further configured to upload cash-out transaction data to the blockchain network, the cash-out transaction data indicating a transfer of the cash-out digital asset from the wallet address of the second user identification to the wallet address of the first server;
theprocessing unit 904 is also configured to transfer the cash-out digital asset from the account of the first server to the account of the second user after the blockchain network stores the cash-out transaction data.
It should be understood that, for specific functional implementation manners of the above-mentioned functional units, reference may be made to the related descriptions in the corresponding embodiments of fig. 2, fig. 3, fig. 6, fig. 7, or fig. 8, and details are not described here again.
In the embodiment of the invention, a first server receives a target order sent by a terminal of a first user identifier, wherein the target order comprises the first user identifier, a second user identifier, an authorization information identifier corresponding to a first target object identifier, and a hash value of first transaction data, the first transaction data is used for indicating to transfer a transaction digital asset from a wallet address of the first user identifier to a wallet address of the second user identifier, and the target order is uploaded to a blockchain network by the terminal of the first user identifier; and when the first transaction data is found from the blockchain network according to the hash value of the first transaction data, the first server sends the authorization information corresponding to the first target object identifier to the terminal of the first user identifier. Therefore, the terminal of the first user identifier uploads the first transaction data to the block chain network, the reliability of data storage is improved based on a distributed storage structure of the block chain, each transaction data can be stored in storage units in different regions, even if one node in the block chain is damaged, the transaction data stored by other nodes in the block chain network cannot be influenced, and the reliability of the data is greatly improved; and secondly, all nodes in the block chain network can verify and store the first transaction data, and the centralized platform is not required to manage the transaction data, so that the transaction data is public and transparent and cannot be tampered, and the reliability of the transaction data is improved.
Referring to fig. 10, fig. 10 is another data processing apparatus 1000 according to the embodiment of the present invention, where the data processing apparatus 1000 is operable in a terminal of a first subscriber identity or a terminal of a second subscriber identity, as shown in fig. 2, fig. 3, fig. 7, or fig. 8, and the data processing apparatus may be a computer program (including a program code) operable in the terminal of the first subscriber identity or the terminal of the second subscriber identity. The data processing apparatus 1000 may include:
an uploadunit 1001 for uploading first transaction data to a blockchain network, the first transaction data indicating a transfer of a transaction digital asset from a first user-identified wallet address to a second user-identified wallet address;
a sendingunit 1002, configured to send a target order to a first server, where the target order includes a first user identifier, a second user identifier, an authorization information identifier corresponding to a first target object identifier, and a hash value of first transaction data, so that the first server sends authorization information corresponding to the authorization information identifier corresponding to the first target object identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data;
afirst receiving unit 1003, configured to receive authorization information corresponding to an authorization information identifier corresponding to the first target object identifier.
In one implementation, the apparatus 1000 further includes:
asecond receiving unit 1004 for receiving an input account and an input password;
under the condition that the account is calculated according to the password, the sendingunit 1002 is further configured to send a login request to a first server, where the login request carries an account of a first user, so that the first server sends login response information to the terminal of the first user identifier after receiving the login request and when verifying that the account of the first user is a node in the blockchain network, where the login response information is used to prompt that the first user successfully logs in;
thefirst receiving unit 1003 is further configured to receive and output the login response information sent by the first server.
It should be understood that, for specific functional implementation manners of the above-mentioned functional units, reference may be made to the related description in the corresponding embodiments of fig. 2, fig. 3, fig. 7, or fig. 8, and details are not described here again.
In an embodiment of the invention, a terminal of a first user identity uploads first transaction data to a blockchain network, the first transaction data being indicative of transferring a transaction digital asset from a wallet address of the first user identity to a wallet address of a second user identity; a terminal of a first user identifier sends a target order to a first server, wherein the target order comprises the first user identifier, a second user identifier, an authorization information identifier corresponding to a first target object identifier and a hash value of first transaction data, so that the first server sends the authorization information corresponding to the first target object identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data; and the terminal of the first user identification receives the authorization information corresponding to the first target object identification. Therefore, the terminal of the first user identifier uploads the first transaction data to the block chain network, the reliability of data storage is improved based on a distributed storage structure of the block chain, each transaction data can be stored in storage units in different regions, even if one node in the block chain is damaged, the transaction data stored by other nodes in the block chain network cannot be influenced, and the reliability of the data is greatly improved; and secondly, all nodes in the block chain network can verify and store the first transaction data, and the centralized platform is not required to manage the transaction data, so that the transaction data is public and transparent and cannot be tampered, and the reliability of the transaction data is improved.
Fig. 11 is a schematic structural diagram of another data processing apparatus 1100 according to an embodiment of the present invention. The data processing apparatus 1100 may specifically be the terminal 101 of the first subscriber identity or theterminal 102 of the second subscriber identity in fig. 1, and may include: aprocessor 1101, abus 1102, auser interface 1103, anetwork interface 1104, and amemory 1105. Wherein acommunication bus 1102 is used to enable connective communication between these components. Theuser interface 1103 may optionally include a display screen, a keyboard. Thenetwork interface 1104 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). As shown in fig. 11, thememory 1105, which is a computer-readable storage medium, may include an operating system, a network communication module, a user interface module, and a device control application program, which may be executed when the apparatus 1100 is run.
In the data processing apparatus 1100 shown in fig. 11, thenetwork interface 1104 may provide a network communication function; and theprocessor 1101 may be configured to invoke a device control application stored in thememory 1105 to implement:
uploading, via thenetwork interface 1104, first transaction data to the blockchain network, the first transaction data indicating a transfer of a transaction digital asset from a first user-identified wallet address to a second user-identified wallet address;
sending a target order to a first server, wherein the target order comprises a first user identifier, a second user identifier, an authorization information identifier corresponding to a first target object identifier, and a hash value of first transaction data, so that the first server sends authorization information corresponding to the authorization information identifier corresponding to the first target object identifier when the first transaction data is found from the blockchain network according to the hash value of the first transaction data;
and receiving authorization information corresponding to the authorization information identifier corresponding to the first target object identifier.
In one implementation of the embodiment of the present application, the following is implemented by the network interface 1104:
receiving an input account number and an input password;
under the condition that the account is calculated according to the password, a login request is sent to a first server, wherein the login request carries the account of a first user, so that the first server sends login response information to a terminal of the first user identifier after receiving the login request and verifying that the account of the first user is a node in the block chain network, and the login response information is used for prompting that the first user successfully logs in;
and receiving and outputting the login response information sent by the first server.
Theuploading unit 1001, thetransmitting unit 1002, thefirst receiving unit 1003, and thesecond receiving unit 1004 in fig. 10 may be implemented by thenetwork interface 1104 in fig. 11.
It should be understood that the data processing apparatus 1100 described in the embodiment of the present invention can perform the description of the data processing method in the embodiment corresponding to fig. 2, fig. 3, fig. 7, or fig. 8, which is not repeated herein. In addition, the beneficial effects of the same method are not described in detail.
Referring to fig. 12, fig. 12 is a schematic structural diagram of another data processing apparatus 1200 according to an embodiment of the present invention. The data processing apparatus 1200 may specifically correspond to thefirst server 104 in fig. 1, and may include: aprocessor 1201, abus 1202, anetwork interface 1203, and amemory 1204. Wherein acommunication bus 1202 is used to enable connective communication between these components. Thenetwork interface 1203 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). As shown in fig. 12, thememory 1204, which is a computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application, which may be executed when the apparatus 1200 is operated.
In the data processing apparatus 1200 shown in fig. 12, thenetwork interface 1203 may provide a network communication function; and theprocessor 1201 may be configured to invoke a device control application stored in thememory 1204 to implement:
receiving a target order sent by a terminal of a first user identifier through anetwork interface 1203, where the target order includes the first user identifier, a second user identifier, an authorization information identifier corresponding to a first target object identifier, and a hash value of first transaction data, where the first transaction data is used to indicate that a transaction digital asset is transferred from a wallet address of the first user identifier to a wallet address of the second user identifier, and the target order is uploaded to a blockchain network by the terminal of the first user identifier;
and when the first transaction data is searched from the blockchain network according to the hash value of the first transaction data, sending authorization information corresponding to the authorization information identifier corresponding to the first target object identifier to the terminal of the first user identifier.
In an implementation of the embodiment of the present application, thenetwork interface 1203 is further configured to:
the terminal receiving the second user identifier uploads second transaction data to the blockchain network, wherein the second transaction data comprises authorization information corresponding to the first target object identifier encrypted by a public key of a first server;
and decrypting the encrypted authorization information corresponding to the first target object identifier through a private key of the first server, and storing the authorization information corresponding to the first target object identifier.
In an implementation of the embodiment of the present application, the second transaction data further includes a hash value of authorization information corresponding to the first target object identifier, and after the encrypted authorization information corresponding to the first target object identifier is decrypted by using a private key of the first server and before the authorization information corresponding to the first target object identifier is stored, the implementation is performed by the processor 1201:
carrying out hash operation on the data obtained by decryption to obtain a predicted hash value;
and storing the authorization information corresponding to the first target object identification when the predicted hash value is the same as the hash value of the authorization information corresponding to the first target object identification.
In an implementation of the embodiment of the present application, after the authorization information corresponding to the first target object identifier is stored and before the target order sent by the terminal that receives the first user identifier is received, the following is implemented through the network interface 1203:
and sending the first target object identification, the public key of the second user and the transaction digital asset to a terminal of the first user identification.
In one implementation of an embodiment of the present application, the following is implemented by the network interface 1203:
generating top-up transaction data when the terminal of the first user identifier successfully charges up the top-up digital asset, wherein the top-up transaction data indicates that the top-up digital asset is transferred from the wallet address of the first server to the wallet address of the first user identifier;
and sending the recharging transaction data to the blockchain network.
In one implementation of the embodiment of the present application, the following is implemented by the network interface 1203:
receiving a cash withdrawal request for the cash withdrawal digital asset sent by the terminal of the second user identification;
uploading cash-out transaction data to the blockchain network, the cash-out transaction data indicating a transfer of the cash-out digital asset from the wallet address of the second user identification to the wallet address of the first server;
transferring the cash-out digital asset from the account of the first server to the account of the second user after the blockchain network stores the cash-out transaction data.
It should be noted that the receivingunit 901 and the sendingunit 902 in fig. 9 may be implemented by thenetwork interface 1203 in fig. 12, and thestoring unit 903 and theprocessing unit 904 in fig. 9 may be implemented by theprocessor 1201 in fig. 12.
It should be understood that the data processing apparatus 1200 described in the embodiment of the present invention may perform the description of the data processing method in the embodiment corresponding to any of the foregoing fig. 2, fig. 3, fig. 6, fig. 7, or fig. 8, and is not described herein again. In addition, the beneficial effects of the same method are not described in detail.
Further, here, it is to be noted that: an embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores the aforementioned computer programs executed by the data processing apparatus 900 and the data processing apparatus 1200, and the computer programs include program instructions, and when the processor executes the program instructions, the method executed by the first server in the embodiment corresponding to fig. 2, fig. 3, fig. 6, fig. 7, or fig. 8 can be executed, which will not be described again here.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores the aforementioned computer programs executed by the data processing apparatus 1000 and the data processing apparatus 1100, and the computer programs include program instructions, and when the processor executes the program instructions, the method executed by the terminal of the first user identifier or the terminal of the second user identifier in the embodiment corresponding to fig. 2, fig. 3, fig. 7, or fig. 8 can be executed, which will not be described herein again.
In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in the embodiments of the computer storage medium to which the present invention relates, reference is made to the description of the method embodiments of the present invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (15)

CN202010004471.5A2020-01-022020-01-02Data processing method, device and storage mediumActiveCN111210217B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010004471.5ACN111210217B (en)2020-01-022020-01-02Data processing method, device and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010004471.5ACN111210217B (en)2020-01-022020-01-02Data processing method, device and storage medium

Publications (2)

Publication NumberPublication Date
CN111210217Atrue CN111210217A (en)2020-05-29
CN111210217B CN111210217B (en)2024-08-23

Family

ID=70787513

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010004471.5AActiveCN111210217B (en)2020-01-022020-01-02Data processing method, device and storage medium

Country Status (1)

CountryLink
CN (1)CN111210217B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113139775A (en)*2021-05-122021-07-20北京京东乾石科技有限公司Cargo allocation information processing method, device, equipment and storage medium
CN113554439A (en)*2021-07-272021-10-26深圳康佳电子科技有限公司 NFT transaction control method, device, terminal and computer-readable storage medium
CN114493585A (en)*2020-10-262022-05-13华为技术有限公司 Blockchain-based data transmission method and device
WO2022121346A1 (en)*2020-12-092022-06-16杭州复杂美科技有限公司Wallet retrieval method and device, and storage medium
CN115660840A (en)*2022-09-272023-01-31网易(杭州)网络有限公司Transaction method and system based on block chain and block chain system
CN120320959A (en)*2025-06-172025-07-15上海特高信息技术有限公司 An intelligent DAPP device integrating large models

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107493162A (en)*2017-07-252017-12-19中国联合网络通信集团有限公司The implementation method and device of block chain node
CN107659610A (en)*2017-08-022018-02-02北京瑞卓喜投科技发展有限公司Copyright protection methods, devices and systems based on block chain technology
CN109995523A (en)*2019-03-132019-07-09网易(杭州)网络有限公司Activate code management method and device, activation code generating method and device
CN110011996A (en)*2019-03-262019-07-12阿里巴巴集团控股有限公司Application authorization method and device and electronic equipment based on block chain
CN110086792A (en)*2019-04-182019-08-02湖南搜云网络科技股份有限公司A kind of authorization method based on authorization code
CN110414952A (en)*2019-07-292019-11-05杭州复杂美科技有限公司Decentralization application dissemination method, equipment and storage medium
CN110503499A (en)*2018-05-172019-11-26上海富脉实业有限公司It is a kind of for confirming the method and system of product information
CN110599184A (en)*2019-09-302019-12-20腾讯科技(深圳)有限公司Method and device for network service account transaction, server and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107493162A (en)*2017-07-252017-12-19中国联合网络通信集团有限公司The implementation method and device of block chain node
CN107659610A (en)*2017-08-022018-02-02北京瑞卓喜投科技发展有限公司Copyright protection methods, devices and systems based on block chain technology
CN110503499A (en)*2018-05-172019-11-26上海富脉实业有限公司It is a kind of for confirming the method and system of product information
CN109995523A (en)*2019-03-132019-07-09网易(杭州)网络有限公司Activate code management method and device, activation code generating method and device
CN110011996A (en)*2019-03-262019-07-12阿里巴巴集团控股有限公司Application authorization method and device and electronic equipment based on block chain
CN110086792A (en)*2019-04-182019-08-02湖南搜云网络科技股份有限公司A kind of authorization method based on authorization code
CN110414952A (en)*2019-07-292019-11-05杭州复杂美科技有限公司Decentralization application dissemination method, equipment and storage medium
CN110599184A (en)*2019-09-302019-12-20腾讯科技(深圳)有限公司Method and device for network service account transaction, server and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汤强著: "《区块链很简单 链圈入门与生存指南》", 31 July 2019, 机械工业出版社, pages: 41 - 45*

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114493585A (en)*2020-10-262022-05-13华为技术有限公司 Blockchain-based data transmission method and device
WO2022121346A1 (en)*2020-12-092022-06-16杭州复杂美科技有限公司Wallet retrieval method and device, and storage medium
CN113139775A (en)*2021-05-122021-07-20北京京东乾石科技有限公司Cargo allocation information processing method, device, equipment and storage medium
WO2022237385A1 (en)*2021-05-122022-11-17北京京东乾石科技有限公司Goods transfer information processing method and apparatus, device, and storage medium
CN113554439A (en)*2021-07-272021-10-26深圳康佳电子科技有限公司 NFT transaction control method, device, terminal and computer-readable storage medium
CN115660840A (en)*2022-09-272023-01-31网易(杭州)网络有限公司Transaction method and system based on block chain and block chain system
CN120320959A (en)*2025-06-172025-07-15上海特高信息技术有限公司 An intelligent DAPP device integrating large models

Also Published As

Publication numberPublication date
CN111210217B (en)2024-08-23

Similar Documents

PublicationPublication DateTitle
CN111210217B (en)Data processing method, device and storage medium
EP3607728B1 (en)Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
JP5766199B2 (en) Secure mobile payment processing
CN112333198A (en) Secure cross-domain login method, system and server
US20180158058A1 (en)Apparatus and method to prevent execution of an unauthorized transaction via a distributed database
CN108694330A (en)Internet of Things data management method, platform and equipment
CN110598377B (en) Software serial number management method and device based on blockchain
CN111476652B (en) Blockchain-based data processing method, device, terminal and storage medium
CN112699353B (en)Financial information transmission method and financial information transmission system
CN103281187A (en)Security authentication method, equipment and system
CN112347516A (en)Asset certification method and device based on block chain
CN111079190A (en)Block chain supply chain transaction hiding dynamic supervision system and method
CN111311259B (en) Bill processing method, device, terminal and computer-readable storage medium
CN115688188A (en) A data sharing method, server, client and storage medium
US10990982B2 (en)Authenticating a payment card
CN110992034A (en)Supply chain transaction privacy protection system and method based on block chain and related equipment
US12141248B2 (en)Systems and methods for whitebox device binding
CN112488686B (en)Secure payment method, system, electronic device and readable storage medium
CN113971561A (en)Intelligent contract processing method, payment end, receiving end, server end and system
CN112865981A (en)Token obtaining and verifying method and device
KR101744697B1 (en)Encoded Package Manufacturing and Transmission System for E-training Contents
KR102468511B1 (en)Method for paying with contactless payment card based on decentralized identifier of blockchain network, and mobile device using them
KR102463362B1 (en)Blockchain-based vehicle message management apparatus and the operating method thereof
CN116112178B (en)Verification identifier generation method, system, electronic device and storage medium
CN119341804B (en) Cross-chain transaction processing method, device, electronic device, medium and program product

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
TG01Patent term adjustment
TG01Patent term adjustment

[8]ページ先頭

©2009-2025 Movatter.jp