CN115631045A - Electronic certificate transaction method, device, computer equipment and storage medium - Google Patents

Electronic certificate transaction method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN115631045A
CN115631045A CN202211408736.3A CN202211408736A CN115631045A CN 115631045 A CN115631045 A CN 115631045A CN 202211408736 A CN202211408736 A CN 202211408736A CN 115631045 A CN115631045 A CN 115631045A
Authority
CN
China
Prior art keywords
electronic certificate
encrypted file
file
electronic
applicant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211408736.3A
Other languages
Chinese (zh)
Inventor
祝世存
武兴武
姜雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An E Wallet Electronic Commerce Co Ltd
Original Assignee
Ping An E Wallet Electronic Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An E Wallet Electronic Commerce Co Ltd filed Critical Ping An E Wallet Electronic Commerce Co Ltd
Priority to CN202211408736.3A priority Critical patent/CN115631045A/en
Publication of CN115631045A publication Critical patent/CN115631045A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/351Virtual cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to an electronic certificate transaction method, an electronic certificate transaction device, computer equipment and a storage medium, wherein the method comprises the following steps: generating an electronic certificate of a business party; carrying out encryption operation on the electronic certificate to obtain an encrypted file, and storing the encrypted file to an electronic certificate management terminal; responding to an electronic certificate application request of an applicant, acquiring basic information of the applicant, and performing qualification verification on the applicant according to the basic information; and if the qualification passes, acquiring the corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain the target file in the preset format. According to the method, a user can inquire own card information through the platform without worrying about the loss of the card. And binding activation is carried out on the corresponding platform, and card management and goods picking operation can be carried out anytime and anywhere as long as a network and mobile terminal equipment, such as a mobile phone, are available.

Description

Electronic certificate transaction method, device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of computer processing, in particular to an electronic certificate transaction method, an electronic certificate transaction device, computer equipment and a storage medium.
Background
With the development of science and technology, people are more and more generally using various types of electronic certificates in daily use. Common electronic certificates are electronic identity cards, electronic driving licenses, virtual credit cards, electronic social security cards and the like. Some electronic certificates are mainly used for identity authentication, some electronic certificates are mainly used for transaction, and other electronic certificates have the two functions.
The electronic voucher is issued by a unit organization of qualified vouchers, is a virtual voucher for extracting one or more goods designated by a merchant, and belongs to a shopping voucher. The goods merchant signs a contract at a unit organization with issuance qualification to provide own goods, and the unit organization provides a platform to display the electronic certificate associated with the goods merchant. And selecting the corresponding electronic certificate for ordering by the purchased unit or person on the platform, placing the order, deducting the corresponding fund from the corresponding unit or person account after the order is checked by the salesman, and generating the corresponding electronic certificate to be sent to the unit or person for extracting the corresponding goods.
The goods-picking ticket entity cards are issued in the industry, but with the rapid development of informatization, the original goods-picking ticket issuing mode has the problems of insufficient safety, complicated issuing process and long issuing period, so that the process needs to be simplified and the efficiency needs to be improved, and a safe algorithm needs to be adopted to ensure the safety of the goods-picking ticket, wherein the safety comprises the processes of preparation, exchange and the like. The issue of the electronic voucher belongs to an innovative way of issuing the gift certificate.
Disclosure of Invention
The invention provides an electronic certificate transaction method, an electronic certificate transaction device, computer equipment and a storage medium.
An electronic voucher transaction method comprising:
generating an electronic certificate of a business party;
carrying out encryption operation on the electronic certificate to obtain an encrypted file, and storing the encrypted file to an electronic certificate management terminal;
responding to an electronic certificate application request of an applicant, acquiring basic information of the applicant, and performing qualification verification on the applicant according to the basic information;
and if the qualification passes, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file.
In some embodiments, the generating the electronic certificate of the business party includes:
generating a card number of an electronic certificate, wherein the card number of the electronic certificate comprises an identification part, a weight prevention part and a check position part of a shipper;
generating an activation code of the electronic certificate by adopting a random algorithm;
and binding the card number, the activation code and the use range of the electronic certificate to generate the electronic certificate.
In some embodiments, the encrypting the electronic certificate to obtain an encrypted file includes:
sending a key acquisition request to a key management end, and receiving a server public key returned by the key management end;
generating a symmetric key by using an SM4 algorithm, and encrypting the symmetric key by using the server public key to obtain a symmetric key encryption file;
sending the symmetric key encryption file to a key management end so that the key management end can generate a master key ciphertext by using a master key generated by encrypting the symmetric key, wherein the master key is generated by using an SM4 algorithm;
and carrying out encryption operation on the electronic certificate by using the master key to obtain an encrypted file.
In some embodiments, the sending the encrypted file to the electronic certificate management side includes:
generating a file number according to the encrypted file, and storing the encrypted file to a corresponding storage address of the electronic certificate management terminal according to the relationship between the file type and the storage address of a preset encrypted file;
and setting the access authority of the encrypted file, generating index information according to the file number, the access authority and the file path, and storing the index information in an electronic certificate management terminal.
In some embodiments, the obtaining a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file includes:
sending a downloading request to the electronic certificate management terminal, wherein the downloading request carries an appointed storage path, a storage path of an encrypted file to be downloaded in the downloading end node and node information of the downloading end node;
verifying the storage node of the downloading terminal based on the node information of the storage node of the downloading terminal in the file downloading request;
when the verification is passed, downloading the encrypted file to be downloaded from the electronic certificate management terminal through the encrypted file to be downloaded;
uploading the encrypted file to be downloaded to the designated storage path in the target node;
and decrypting the encrypted file to obtain a preset format target file.
In some embodiments, after obtaining the target file with the preset format, the method further includes:
and determining delivery type information corresponding to the data file according to a preset electronic certificate delivery rule and a corresponding relation between the electronic certificate, and delivering the electronic certificate to the applicant according to the delivery type information.
In some embodiments, said qualifying said applicant based on said base information comprises:
analyzing the base information to determine a user rating of the user;
and judging whether the user grade of the user reaches a preset grade, and if so, determining that the user of the applicant passes the verification.
An electronic voucher transaction device comprising:
the card data generating unit is used for generating an electronic certificate of a business party;
the encryption unit is used for carrying out encryption operation on the electronic certificate to obtain an encrypted file;
the verification unit is used for acquiring the basic information of the applicant when receiving the electronic certificate application and verifying the qualification of the applicant according to the basic information;
and the card delivery unit is used for acquiring a corresponding encrypted file from the electronic certificate management terminal and decrypting the encrypted file to obtain a preset format target file if the qualification verification is passed.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the above-mentioned method steps.
In the scheme realized by the electronic certificate transaction method, the device, the computer equipment and the storage medium, the electronic certificate of a business party can be generated;
carrying out encryption operation on the electronic certificate to obtain an encrypted file;
when an electronic certificate application is received, acquiring basic information of an applicant, and performing qualification verification on the applicant according to the basic information;
and if the qualification passes the verification, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file.
The electronic certificate transaction method, the electronic certificate transaction device, the computer equipment and the storage medium generate the electronic certificate of a business party; carrying out encryption operation on the electronic certificate to obtain an encrypted file; when an electronic certificate application is received, acquiring basic information of an applicant, and performing qualification verification on the applicant according to the basic information; and if the qualification passes the verification, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file. Therefore, the issue mode of the virtual voucher card fills the blank of the issuance of the voucher in the industry, and compared with the traditional entity voucher card, the issue mode has the advantages of high issue speed, safer issuing to users, lighter operation and the like. The user can inquire the own card information through the platform without worrying about the loss of the card. And binding activation is carried out on the corresponding platform, and card management and goods picking operation can be carried out anytime and anywhere as long as a network and mobile terminal equipment such as a mobile phone are available.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a diagram of an application environment of a method for electronic voucher transactions according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating an electronic voucher transaction method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an electronic certificate transaction apparatus according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a computer device according to an embodiment of the present invention;
fig. 5 is another schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The electronic certificate transaction method provided by the embodiment of the invention can be applied to the application environment shown in fig. 1, wherein the client communicates with the electronic certificate management terminal through a network. The electronic certificate management terminal can receive an electronic certificate application through a client, and the client generates an electronic certificate of a business party; carrying out encryption operation on the electronic certificate to obtain an encrypted file; when an electronic certificate application is received, acquiring basic information of an applicant, and performing qualification verification on the applicant according to the basic information; if the qualification is verified, acquiring a corresponding encrypted file from the electronic certificate management terminal, decrypting the encrypted file and acquiring a preset format target file. The client may be, but is not limited to, various personal computers, laptops, smart phones, tablet computers, and portable wearable devices. The electronic certificate management terminal can be implemented by an independent server or a server cluster consisting of a plurality of servers. The present invention is described in detail below with reference to specific examples.
Referring to fig. 2, fig. 2 is a schematic flow chart of an electronic certificate transaction method according to an embodiment of the present invention, including the following steps:
s10, generating an electronic certificate of a business party;
it is understood that the present embodiment relates to three parties, a business party, a client and an electronic certificate management end, where the business party refers to issuers of various certificates, and may be individuals, merchants, companies or other organizations, such as movie theaters selling movie tickets, companies issuing employee cards, banks issuing bank cards, hospitals issuing registration tickets, and also includes merchants issuing various types of coupons, and individuals issuing loans or debts, and the above are only some specific examples, and the business party of the present invention includes but is not limited to the above examples. In addition, the electronic certificate is a certificate for short, and consists of a series of characters, and the exchange code of the electronic certificate corresponds to a group of information in a system, and can be preferential information or related commodity information. Each voucher corresponds to one preferential message or commodity right. The voucher of the present invention is not limited to the movie ticket, employee card, bank card, registration ticket, coupon, debt and debit mentioned above, and other physical or electronic carriers that can be used as a voucher are also within the scope of the present invention.
The electronic certificate generation platform is communicated with the business party and the client through the Internet respectively, and finally the business party and the client can transmit messages through the electronic certificate generation platform. Before the business party and the client communicate with the electronic certificate generation platform, respective account numbers are required to be registered to log in the electronic certificate generation platform, wherein the mode of logging in the electronic certificate generation platform by the business party and the client is not limited, and the mode of inputting account number passwords, a fingerprint mode, an unlocking pattern, characters or numbers and the like can be adopted.
In some embodiments, the S10 may include:
s101, generating a card number of the electronic certificate, wherein the card number of the electronic certificate comprises an identification part, a weight prevention part and a check position part of a delivery party;
s102, generating an activation code of the electronic certificate by adopting a random algorithm;
s103, binding the card number, the activation code and the use range of the electronic certificate to generate the electronic certificate.
In an application scenario, the ticket code obtains an encrypted secret key from the side of the air control system, then displacement operation is carried out, and the ticket code of the card is generated through random characters, and is used for a ticket buyer staff to achieve a function of platform binding of the virtual delivery ticket. The random algorithm generates a six-digit activation code, the activation code is used for activating the goods picking ticket by the staff, and the goods picking ticket can be used for exchanging goods and goods after the activation.
S20, responding to an electronic certificate application request of the applicant, acquiring basic information of the applicant, and performing qualification verification on the applicant according to the basic information;
it can be understood that the electronic certificate can be encrypted through an algorithm to obtain an encrypted file, wherein the algorithm is a national commercial cipher algorithm. The code algorithm is a code algorithm standard and an application specification thereof which are recognized and published by the national code administration, wherein part of code algorithms become international standards. Like the SM family of passwords, SM stands for a trade secret, i.e., a commercial password, refers to a cryptographic technique for commerce that does not involve national secrets.
In some embodiments, the S20 may include:
s201, receiving a key management terminal public key returned by an electronic certificate management terminal (electronic certificate management terminal);
s202, generating a first public key and a first private key corresponding to the first public key, generating a symmetric key, and encrypting the first public key by using the symmetric key to obtain a first public key encrypted file;
s203, encrypting the symmetric secret key by using the public key of the secret key management end to obtain a symmetric secret key encryption file;
s204, sending the first public key encrypted file and the symmetric key encrypted file to the electronic certificate management end so that the electronic certificate management end can encrypt the first public key and the symmetric key to generate a return (return) encrypted file;
s205, receiving a returned encrypted file returned by the electronic certificate management terminal;
s206, decrypting the returned encrypted file to obtain a main key and a second public key;
s207, encrypting the electronic certificate by using a first private key to obtain an encrypted file;
and S208, sending the encrypted file to an electronic certificate management terminal.
In this embodiment, the method includes two steps of key exchange and data transmission; the key exchange process comprises the following steps: the electronic certificate generation end and the key management end respectively prepare keys which are needed to be used in a data transmission process, and then respectively encrypt and transmit the respective keys to the other side; the two data transmission processes are as follows: and the electronic certificate generating end encrypts and decrypts the transmitted data by using the key acquired by the key exchange process. Similarly, the key management end also encrypts and decrypts the transmitted data by using the corresponding key. During the key exchange process, the SM2 asymmetric encryption algorithm is needed to encrypt the key, so that security guarantee is provided for key transmission. In the data transmission process, an SM4 symmetric encryption algorithm is required to encrypt and decrypt the message, so as to ensure the security and tamper resistance of message transmission. Therefore, the security of the algorithm is improved by adopting the national cryptographic algorithm; in the data transmission process, asymmetric algorithm encryption is carried out on data with higher security, such as a secret key and the like; the encryption algorithm idea is easy to transplant, is compatible with multi-platform equipment and has wide universality.
S30, responding to an electronic certificate application request of the applicant, acquiring basic information of the applicant, and performing qualification verification on the applicant according to the basic information;
in some embodiments, the S30 may include:
s301, analyzing the basic information to determine the user grade of the user;
s302, judging whether the user level of the user reaches a preset level, and if so, determining that the user verification of the applicant is passed.
In some application scenarios, the server is provided with different user classes, and the different user classes have corresponding criteria. For example, the user score is 0-10 points for one level, 11-20 points for two levels, etc., and the specific grading is not limited again, and which grade the user is in can be determined according to the current user score. Of course, the user grade can also be graded according to one or more items of basic information such as whether the user is real name, historical transaction records, registration time and the like. The server judges whether the user reaches a preset level or not according to the user level, and if the user level of the user reaches the preset level, the server determines that the user meets a preset condition; and if the level of the user does not reach the preset level, determining that the user does not meet the preset condition temporarily. For example, if the user level reaches three levels or five levels, it may be determined that the user meets the preset condition, and the specific preset level is not limited herein.
In some application scenes, the collection of identity information can be real name or non-real name (network ID), for a real-name user, for common certificates uploaded by the user, such as identity cards, driving licenses and other file information, an OCR recognition button is clicked, a request background can be directly called, OCR recognition is carried out, user certificate information is rapidly acquired, user input can be reduced, efficiency of information input and the like is improved, and different problems of auditing caused by unclear certificates are reduced.
And S40, if the qualification passes, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file.
In some embodiments, the S40 may include:
s401, sending a downloading request to an electronic certificate management terminal, wherein the downloading request carries an appointed storage path and an encrypted file to be downloaded;
s402, storing paths in the storage nodes of the downloading end and node information of the storage nodes of the downloading end;
s403, verifying the storage node of the downloading terminal based on the node information of the storage node of the downloading terminal in the file downloading request;
s404, when the verification is passed, downloading the encrypted file to be downloaded from the electronic certificate management terminal through the encrypted file to be downloaded;
s405, uploading the encrypted file to be downloaded to a designated storage path in the target node;
s406, decrypting the encrypted file to obtain a preset format target file.
In some application scenarios, the staff of the ticket purchasing company goes to the platform to purchase the delivery ticket and make an order. Front is that the company has registered with the platform and opened a funding account, the funding account amount being greater than the order amount
And the platform checks the order, and if the order passes the checking, deducts money from a fund account of the platform of the ticket purchasing company, and starts to prepare and generate related information of the delivery ticket, wherein the information comprises information such as a ticket code, an activation code, a use range and the like.
And generating information, namely acquiring an encrypted secret key from a pneumatic control system, and then performing shift operation on the encrypted secret key, and generating a ticket code of the card by using random characters, wherein the ticket code is used for a ticket buyer employee to perform a function of platform binding of the virtual goods-picking ticket.
The random algorithm generates a six-digit activation code, the activation code is used for activating the goods picking ticket by the staff, and the goods picking ticket can be used for exchanging goods and goods after the activation.
If the configuration shows that the compressed packet file needs to be generated, setting a compressed packet password, and storing the generated compressed file in a small file system for waiting use.
And after the goods-picking ticket information is generated, sending a short message or an email to inform the purchaser.
The purchaser logs on the platform to download the ticket package, inputs six random numbers set by the purchaser on the page, and after the system takes the six random alphanumerics, generates eight random alphanumerics or numbers randomly to form fourteen-digit password for the new compressed package to decompress the password.
The information in the compressed packet is the plaintext information of the ticket, and is inquired and acquired from a database or the compressed packet of the original small file system is decrypted.
After the ticket buying party downloads the ticket package, the platform informs the latter eight passwords to the ticket buying party in a mail or short message mode.
The ticket buyer combined the password to unlock the compressed packet and distribute the ticket code to the company employee. And binding the company staff by using the coupon code, activating the coupon by using the activation code, and using the coupon for subsequent article exchange after short message or mailbox verification.
According to the scheme, the electronic certificate of the business party is generated; carrying out encryption operation on the electronic certificate to obtain an encrypted file; when an electronic certificate application is received, acquiring basic information of an applicant, and performing qualification verification on the applicant according to the basic information; and if the qualification passes the verification, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file. Therefore, the issue mode of the virtual voucher card fills the blank of the issuance of the voucher in the industry, and compared with the traditional entity voucher card, the issue mode has the advantages of high issue speed, safer issuing to users, lighter operation and the like. The user can inquire the own card information through the platform without worrying about the loss of the card. The binding activation is carried out on the corresponding platform, and card management and goods picking operation can be carried out anytime and anywhere as long as a network and mobile terminal equipment such as a mobile phone are available
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In one embodiment, an electronic voucher transaction device is provided, which corresponds to the electronic voucher transaction method in the above embodiments one to one. As shown in fig. 3, the smart question answering processing apparatus includes a card data generating unit 41, an encrypting unit 42, an authenticating unit 43, and a card delivering unit 44. The detailed description of each functional module is as follows:
a card data generating unit 41, configured to generate an electronic certificate of a service party;
the encryption unit 42 is used for carrying out encryption operation on the electronic certificate to obtain an encrypted file;
the verification unit 43 is used for acquiring the basic information of the applicant when receiving the electronic certificate application, and verifying the qualification of the applicant according to the basic information;
and the card delivery unit 44 is configured to, if the qualification passes the verification, obtain a corresponding encrypted file from the electronic certificate management side, and decrypt the encrypted file to obtain a preset format target file.
For the specific limitations of the electronic certificate transaction apparatus, reference may be made to the above limitations of the electronic certificate transaction method, which are not described herein again. The modules in the electronic certificate transaction device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be an electronic certificate authority, and its internal structure diagram may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes non-volatile and/or volatile storage media, internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The network interface of the computer device is used for communicating with an external client through a network connection. The computer program is executed by a processor to implement functions or steps of an electronic certificate transaction method electronic certificate management side.
In one embodiment, a computer device is provided, which may be a client, and its internal structure diagram may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external server through a network connection. The computer program when executed by a processor implements the functions or steps of a client side of an electronic voucher transaction method.
In one embodiment, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
generating an electronic certificate of a business party;
carrying out encryption operation on the electronic certificate to obtain an encrypted file;
when an electronic certificate application is received, acquiring basic information of an applicant, and performing qualification verification on the applicant according to the basic information;
and if the qualification passes the verification, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, performs the steps of:
generating an electronic certificate of a business party;
carrying out encryption operation on the electronic certificate to obtain an encrypted file;
when an electronic certificate application is received, acquiring basic information of an applicant, and performing qualification verification on the applicant according to the basic information;
and if the qualification passes the verification, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-only memory (ROM), or a Random Access Memory (RAM).
All possible combinations of the technical features of the above embodiments may not be described for the sake of brevity, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An electronic voucher transaction method, comprising:
generating an electronic certificate of a business party;
carrying out encryption operation on the electronic certificate to obtain an encrypted file, and storing the encrypted file to an electronic certificate management terminal;
responding to an electronic certificate application request of an applicant, acquiring basic information of the applicant, and performing qualification verification on the applicant according to the basic information;
and if the qualification passes, acquiring a corresponding encrypted file from the electronic certificate management terminal, and decrypting the encrypted file to obtain a preset format target file.
2. The electronic voucher transaction method of claim 1, wherein generating an electronic voucher for a party to the transaction comprises:
generating a card number of an electronic certificate, wherein the card number of the electronic certificate comprises an identification part, a weight prevention part and a check position part of a shipper;
generating an activation code of the electronic certificate by adopting a random algorithm;
and binding the card number, the activation code and the use range of the electronic certificate to generate the electronic certificate.
3. The electronic voucher transaction method of claim 1, wherein the encrypting the electronic voucher resulting in an encrypted file comprises:
sending a key acquisition request to a key management end, and receiving a server public key returned by the key management end;
generating a symmetric key by using an SM4 algorithm, and encrypting the symmetric key by using the server public key to obtain a symmetric key encryption file;
sending the symmetric key encryption file to a key management end so that the key management end can generate a master key ciphertext by using a master key generated by encrypting the symmetric key, wherein the master key is generated by using an SM4 algorithm;
and carrying out encryption operation on the electronic certificate by using the master key to obtain an encrypted file.
4. The electronic voucher transaction method of claim 1, wherein sending the encrypted file to the electronic voucher management terminal comprises:
generating a file number according to the encrypted file, and storing the encrypted file to a corresponding storage address of the electronic certificate management terminal according to the relationship between the file type and the storage address of a preset encrypted file;
and setting the access authority of the encrypted file, generating index information according to the file number, the access authority and the file path, and storing the index information in an electronic certificate management terminal.
5. The electronic certificate transaction method as claimed in claim 1, wherein the obtaining of the corresponding encrypted file from the electronic certificate management terminal and the decryption of the encrypted file to obtain a target file in a preset format comprises:
sending a downloading request to the electronic certificate management terminal, wherein the downloading request carries an appointed storage path, a storage path of an encrypted file to be downloaded in the downloading end node and node information of the downloading end node;
verifying the storage node of the downloading terminal based on the node information of the storage node of the downloading terminal in the file downloading request;
when the verification is passed, downloading the encrypted file to be downloaded from the electronic certificate management terminal through the encrypted file to be downloaded;
uploading the encrypted file to be downloaded to the designated storage path in the target node;
and decrypting the encrypted file to obtain a preset format target file.
6. The electronic voucher transaction method of claim 1, further comprising, after obtaining the target file in the predetermined format:
and determining delivery type information corresponding to the data file according to a preset electronic certificate delivery rule and a corresponding relation between the electronic certificate, and delivering the electronic certificate to the applicant according to the delivery type information.
7. The electronic voucher transaction method of claim 1, wherein the qualifying the applicant based on the base information comprises:
analyzing the base information to determine a user rating of the user;
and judging whether the user grade of the user reaches a preset grade, and if so, determining that the user of the applicant passes the verification.
8. An electronic voucher transaction apparatus comprising:
the card data generating unit is used for generating an electronic certificate of a business party;
the encryption unit is used for carrying out encryption operation on the electronic certificate to obtain an encrypted file and storing the encrypted file to an electronic certificate management terminal;
the verification unit is used for responding to an electronic certificate application request of an applicant, acquiring basic information of the applicant, and verifying the qualification of the applicant according to the basic information;
and the card delivery unit is used for acquiring a corresponding encrypted file from the electronic certificate management terminal and decrypting the encrypted file to obtain a preset format target file if the qualification verification is passed.
9. A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the electronic voucher transaction method of any of claims 1 to 7.
10. A storage medium having computer-readable instructions stored thereon which, when executed by one or more processors, cause the one or more processors to perform the steps of the electronic voucher transaction method of any of claims 1 to 7.
CN202211408736.3A 2022-11-11 2022-11-11 Electronic certificate transaction method, device, computer equipment and storage medium Pending CN115631045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211408736.3A CN115631045A (en) 2022-11-11 2022-11-11 Electronic certificate transaction method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211408736.3A CN115631045A (en) 2022-11-11 2022-11-11 Electronic certificate transaction method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115631045A true CN115631045A (en) 2023-01-20

Family

ID=84910132

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211408736.3A Pending CN115631045A (en) 2022-11-11 2022-11-11 Electronic certificate transaction method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115631045A (en)

Similar Documents

Publication Publication Date Title
US20230133210A1 (en) Secure authentication system and method
CN107230050B (en) Method and system for paying digital currency based on visible digital currency chip card
CN108352024A (en) Biometric authentication based on server
CN107230068B (en) Method and system for paying digital currency using a visual digital currency chip card
CN107230053B (en) Method and system for exchanging digital currency by cash
CN107230049B (en) Method and system for providing digital currency
US11888995B1 (en) Systems and methods for value transfers using signcryption
AU2015259162A1 (en) Master applet for secure remote payment processing
CN107230055A (en) The method and system of payout figure currency
CN107230079A (en) The method and system of offline electronic payment are carried out using digital cash chip card
CN107240010B (en) Method and system for transferring digital currency to digital currency chip card
CN107230077B (en) Method for exchanging and paying digital currency and digital currency system
CN107230054B (en) Method and system for depositing digital currency into a deposit account
CN116802661A (en) Token-based out-of-chain interaction authorization
CN107230052A (en) The method and system of digital cash payment is carried out using digital cash chip card
CN107230078B (en) Method and system for paying digital currency using a visual digital currency chip card
CN107230074B (en) Method and system for depositing digital currency into digital currency chip card
CN107230076B (en) Method and system for online payment of digital currency
CN107230073A (en) The method and system of payout figure currency between viewable numbers currency chip card
CN107230067A (en) Exchange and method of payment and digital coin systems based on digital cash chip card
CN107230072A (en) The method and system of online payment is carried out using digital cash chip card
CN115631045A (en) Electronic certificate transaction method, device, computer equipment and storage medium
CN107636664A (en) For to the method and system of mobile device supply access data
US11812260B2 (en) Secure offline mobile interactions
El Madhoun et al. For small merchants: A secure smartphone-based architecture to process and accept nfc payments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination