CN107516214B - Credit card anti-theft method based on block chain - Google Patents

Credit card anti-theft method based on block chain Download PDF

Info

Publication number
CN107516214B
CN107516214B CN201710746318.8A CN201710746318A CN107516214B CN 107516214 B CN107516214 B CN 107516214B CN 201710746318 A CN201710746318 A CN 201710746318A CN 107516214 B CN107516214 B CN 107516214B
Authority
CN
China
Prior art keywords
credit card
record
block chain
bank
embezzled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710746318.8A
Other languages
Chinese (zh)
Other versions
CN107516214A (en
Inventor
阚海斌
张思贤
文捷
刘百祥
向望
李雪峰
赵敬
宋文鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CN201710746318.8A priority Critical patent/CN107516214B/en
Publication of CN107516214A publication Critical patent/CN107516214A/en
Application granted granted Critical
Publication of CN107516214B publication Critical patent/CN107516214B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention belongs to the technical field of bank card security, and particularly relates to a block chain-based credit card anti-theft method. The method of the invention uses a block chain to record all transaction records, and a credit card issuer, namely a bank, establishes an original block; the issuer marks a pair of unique public key and private key for each credit card and sends the public key and private key to the card holder, each public key marks a unique credit card, and the card holder can modify the private key; each consumption transaction record is firstly broadcasted to the whole network; and when legal consumption records are broadcasted to the whole network, if the card holder does not disagree with the consumption records, writing the consumption records into a block chain, and triggering an intelligent contract to transfer the consumption records to the seller. The invention can ensure that each consumption record existing on the block chain is consumed by the user and is not embezzled; data on the blockchain cannot be artificially tampered, so that embezzlement can be effectively prevented.

Description

Credit card anti-theft method based on block chain
Technical Field
The invention belongs to the technical field of bank card security, and particularly relates to an anti-theft method for a bank card.
Background
According to '2016 big data report on embezzlement of bank card in China', 2016, it is pointed out that in 2016, the total number of embezzlement of bank card is 7095 times, and the accumulated loss of customers reaches 1.83 hundred million yuan.
According to 2362 times of complaints of stealing and brushing channels definitely, 65% of stealing and brushing channels are paid quickly, and 23% of stealing and brushing channels are paid online banking. In the quick payment embezzlement, 97% of embezzlement is paid by a third party. The bank card related to the payment treasure is embezzled and complained the most, 562 times in the whole year, the first industry, the second Beijing wallet, 278 times, and the third industry, 245 times.
Among all complaints, the annual complaint amount of the industrial and commercial bank is 1923, which becomes the first major of the embezzled complaints, accounting for 25.6% of the total complaint amount, and the loss amount of the user is 3874.8 ten thousand yuan. The construction bank steals the complaints several times, 1507 times all the year, and the user loses 3720.4 ten thousand yuan. The number of complaints of the calling bank is 875 times, which exceeds the third of agricultural banks and China banks in four major banks, and the lost amount of users reaches 2358.3 ten thousand yuan.
In combination with complaint statistics cases, the solution rate of the embezzled complaints is extremely low, not only the complaint solution rate of banks is low, but also the case reporting situation of embezzled events is not ideal. In 7095 cases of complaints of embezzled brushing, 2268 complaints clearly illustrate the alarm condition, wherein 148 alarm complaints reflect that the police party does not accept the report, and the report acceptance rate reaches 6.5%.
The blockchain is essentially a decentralized distributed database and is used as a bottom-layer technology of bitcoin, the blockchain is a data block which is generated by using a cryptology method in a correlation mode, and each data block contains transaction information which is used for verifying the validity (anti-counterfeiting) of the information and generating the next block.
In a narrow sense, a blockchain is a cryptographically secure, tamper-and forgery-proof distributed book that combines data blocks in a time-sequential manner into a chained data structure. In a broad sense, the blockchain technology is a brand-new distributed infrastructure and computing paradigm that data is verified and stored using a blockchain data structure, data is generated and updated using a distributed node consensus algorithm, data transmission and access security is guaranteed using cryptography, and data is programmed and operated using an intelligent contract composed of automated script codes.
Based on the fact that the block chain is essentially a distributed database, in the system, data consistency exists, if the data of each node does not reach consistency to a certain degree, the problem of the transaction can be judged, and the transaction can be used for the embezzlement problem of the bank card.
The invention uses the block chain in the credit card field, and combines the transaction information of the credit card with the block chain. The characteristics that the block chain needs to broadcast information to the whole network and miners need to achieve consensus and the like are utilized to confirm whether credit cards of the miners have behaviors of embezzlement and the like.
Disclosure of Invention
The invention aims to provide a credit card anti-theft method capable of ensuring the safety of a bank credit card.
The invention provides a credit card anti-theft method based on block chain technology, which comprises the following steps:
(1) a credit card issuer (bank) creates an original block;
(2) the credit card issuer marks a pair of unique public key and private key for each credit card and sends the public key and the private key to the card holder, each public key marks a unique credit card, and the card holder can modify the private key;
(3) the cardholder uses the credit card to consume, each transaction record is broadcast through the whole network, the transaction record is written into a block chain after reaching consensus, and an intelligent contract is triggered to transfer accounts to a merchant;
(4) if the illegal swiping behavior occurs, the credit card holder sends the transaction information which is illegally swiped to the bank together with the public and private keys of the credit card which is illegally swiped and recorded;
(5) after receiving the public and private keys, the bank carries out matching, if no problem exists, the consumption record can be judged to be embezzled, the transaction record is broadcasted to the whole network, a mark is added into the transaction record and is marked as embezzled record, the bank side writes the embezzled record into a database of data, and the bank serves as a backup;
(6) after receiving the transaction record with the mark, the node in the network (i.e. the node participating in accounting the joint maintenance block chain, such as part of merchants, a third party payment platform, etc.) can judge that the previous transaction record without the mark is embezzled, and refuse to write the embezzled transaction record into the block of the node, so as to finally reach the consensus, and the embezzled consumption record is not written into the block chain, thereby blocking the automatic transfer of the bank institution to the merchants.
The method of the invention uses the block chain to record all transaction records, the transaction records are firstly broadcast to the whole network every time of consumption, and the consumption records are divided into two types, one is legal consumption record and the other is embezzled consumption record.
And when legal consumption records are broadcasted to the whole network, if the card holder does not disagree with the consumption records, the consumption records are broadcasted to the whole network, the whole network achieves consensus, a block chain is written, and an intelligent contract is triggered to transfer accounts to the seller.
The method of the invention can ensure that each consumption record existing on the block chain is consumed by the user and is not embezzled:
(1) if the cardholder disagrees with the consumption record, namely the consumption is embezzled, the cardholder only needs to provide the public and private keys of the card to a bank, the bank judges that the consumption record is embezzled after determining that the consumption record is embezzled, the transaction is refused and broadcasted to the whole network, and the whole network finally achieves consensus and does not write the consumption record into a block chain;
(2) the bank writes the problematic consumption record of the pen into its own system as a backup.
The method of the invention can prevent the data on the block chain from being artificially tampered, because if the data on the chain is artificially tampered, the data can not be written into the block chain finally because the consensus of other nodes on the chain can not be obtained.
The method of the invention can effectively prevent the brush from being stolen:
(1) after confirming that the behavior is embezzled, the bank broadcasts transaction information with a mark to the whole network, and confirms that the prior transaction without the mark information is embezzled;
(2) after receiving the transaction record, the node in the network can judge that the previous transaction information is embezzled and refuse to write the transaction information into the block chain, and finally, the consumption record is determined to be embezzled because the consensus is achieved in the whole network, and the transfer is further prevented.
Drawings
Fig. 1 is a flow chart illustrating the operation of the credit card anti-fraud system according to the present invention.
Detailed Description
The block chain based credit card anti-fraud method of the present invention will be described in further detail with reference to the drawings and specific examples of the specification, but the detailed description is not intended to limit the invention.
FIG. 1 is a flow chart illustrating the operation of the anti-fraud system according to the present invention, such as the anti-fraud system of FIG. 1; the method comprises the following steps:
(1) the credit card issuer establishes an initial block;
(2) a credit card issuer generates a pair of public and private keys for each credit card through an RSA algorithm and sends the public and private keys to a card holder, each credit card has a unique id number, and the card holder needs to keep the private keys;
(3) the cardholder uses the credit card to consume, each transaction record is broadcasted through the whole network, all nodes in the whole network are responsible for maintaining a block chain, the record is written into a block of the cardholder, the record is written into the block chain after consensus is achieved, and an intelligent contract bank is triggered to transfer accounts to merchants;
(4) if the behavior of embezzlement occurs, the cardholder needs to encrypt the consumption record of embezzlement together with the private key through the public key and send the encrypted consumption record to the bank;
(5) after receiving the information encrypted by the public key, the bank decrypts the information by using private use, matches the information with the private key carried in the decrypted information, if the matching is not wrong, the consumption record can be judged to be a embezzled consumption record, the transaction record is broadcasted to the whole network, a mark is added into the transaction record and is identified to be the embezzled record, the bank side writes the embezzled record into a database of data, and the bank serves as a backup;
(6) after receiving the transaction record with the mark, the node in the network can judge that the prior transaction record without the mark is embezzled and removed from the block maintained by the node, and finally, the transaction record is the embezzled consumption record because the whole network achieves consensus, and the data written into the block chain does not contain the consumption record, so that the automatic transfer of the bank can not be triggered;
(7) finally, regarding the consumer, all consumption records of the consumer about all consumption records of each bank are integrated into a Merkle Tree (Mercker Tree) and stored on a block chain, and the consumer can search for the consumption records by retrieving the Merkle Tree (Mercker Tree).
The above-mentioned public key and private key are generated by RSA algorithm, wherein the data encrypted by the public key can only be decrypted by the private key, and the encryption algorithm and decryption algorithm are both open, although the private key is determined by the public key, the private key cannot be calculated according to the public key.
A merkel Tree is a data structure, also commonly referred to as a Hash Tree, i.e., a Tree that stores Hash values, the leaves of the merkel Tree are the Hash values of the data blocks, which in the present system are the Hash values of the transaction records, and the non-leaf nodes are the hashes of the concatenation strings of their corresponding child nodes. The Merkle Tree is also a data structure used by blockchains.
Hash is a function that maps data of arbitrary length to fixed length data.
The intelligent synthesis is a block chain technology, codes are nested into a block chain, and when conditions are met, the intelligent synthesis can be triggered automatically, so that excessive manual intervention operation is avoided.
Compared with the prior art, the invention has the following advantages:
(1) the specific consumer integrates the transaction records of all the bank cards into a Merkle Tree, and finally the transaction records are reflected on a block chain, and all the transaction records can be searched;
(2) in the aspect of consumers, consumers can block the embezzlement consumption independently, avoid the complex interaction with banks, and determine whether the embezzlement behavior is real;
(3) the possibility of tampering consumption records is blocked, and data can be executed only when most nodes reach consistent consensus after the data is written into the block chain, so that the data is tampered unilaterally, and the data cannot be successfully written into the block chain;
(4) the intelligent contract is used for automatically triggering the transfer function, when the consumption record is correctly written into a block chain, the intelligent contract on a block maintained by a bank is triggered to transfer, and for the consumption record which is embezzled, the intelligent contract cannot be triggered to transfer accounts to merchants due to the fact that the condition is not met, so that excessive manual operation in the transaction process is avoided;
(5) through the combined action of the nodes in the network, the block chain is maintained together, and the characteristics of the block chain ensure that each transaction information becomes public and transparent, can be tracked and becomes decentralized, and mechanisms such as banks do not need to pay expensive cost for maintaining consumption records of consumers, and the banks only need to keep and manage information such as public and private keys of the consumers well. All information can be found on the blockchain, and on the other hand, the possibility of errors and damages of the single management book with errors is reduced.

Claims (1)

1. A credit card anti-theft method based on a block chain is characterized by comprising the following specific steps:
(1) the credit card issuer, namely the bank, establishes an original block;
(2) the credit card issuer marks a pair of unique public key and private key for each credit card and sends the public key and the private key to the card holder, each public key marks a unique credit card, and the card holder can modify the private key;
(3) the cardholder uses the credit card to consume, each transaction record is broadcast through the whole network, the transaction record is written into a block chain after reaching consensus, and an intelligent contract is triggered to transfer accounts to a merchant;
(4) if the illegal swiping behavior occurs, the credit card holder sends the transaction information which is illegally swiped to the bank together with the public and private keys of the credit card which is illegally swiped and recorded;
(5) after receiving the public and private keys, the bank carries out matching, if no problem exists, the transaction record can be judged to be embezzled, the transaction record is broadcasted to the whole network, a mark is added into the transaction record and is marked as embezzled record, the bank side writes the embezzled record into a database of data, and the bank serves as a backup;
(6) after receiving the transaction record with mark, each node in the network, namely the node participating in accounting and maintaining the block chain together, can judge that the previous transaction record without mark is embezzled, and refuse to write the record into its own block, and finally reach the consensus and do not write the record into the block chain, thereby not triggering the automatic transfer of the bank.
CN201710746318.8A 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain Active CN107516214B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710746318.8A CN107516214B (en) 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710746318.8A CN107516214B (en) 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain

Publications (2)

Publication Number Publication Date
CN107516214A CN107516214A (en) 2017-12-26
CN107516214B true CN107516214B (en) 2020-11-20

Family

ID=60724141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710746318.8A Active CN107516214B (en) 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain

Country Status (1)

Country Link
CN (1) CN107516214B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108241972A (en) * 2018-01-11 2018-07-03 杭州复杂美科技有限公司 A kind of informal voucher method of commerce based on block chain
CN109889504B (en) * 2019-01-23 2020-08-28 北京航空航天大学 Decentralized data access right transaction method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1416079A (en) * 2001-10-29 2003-05-07 英华达股份有限公司 Method for preventing credit card from embezzlement and its system
CN102103770A (en) * 2009-12-21 2011-06-22 中国移动通信集团公司 Processing method for transaction abnormity in electronic wallet application, and device and system thereof
CN103679458A (en) * 2013-12-04 2014-03-26 天地融科技股份有限公司 Transaction data handling method and smart card
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106850622A (en) * 2017-02-07 2017-06-13 杭州秘猿科技有限公司 A kind of user identity management method based on license chain
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1416079A (en) * 2001-10-29 2003-05-07 英华达股份有限公司 Method for preventing credit card from embezzlement and its system
CN102103770A (en) * 2009-12-21 2011-06-22 中国移动通信集团公司 Processing method for transaction abnormity in electronic wallet application, and device and system thereof
CN103679458A (en) * 2013-12-04 2014-03-26 天地融科技股份有限公司 Transaction data handling method and smart card
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106850622A (en) * 2017-02-07 2017-06-13 杭州秘猿科技有限公司 A kind of user identity management method based on license chain
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain

Also Published As

Publication number Publication date
CN107516214A (en) 2017-12-26

Similar Documents

Publication Publication Date Title
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
CN108009917B (en) Transaction verification and registration method and system for digital currency
CN108881165B (en) Multi-center authentication system with block issuing mechanism
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
KR20180115768A (en) Encryption method and system for secure extraction of data from a block chain
CN109947848A (en) Card method and apparatus are deposited based on block chain
CN110009340A (en) Card method and apparatus are deposited based on block chain
CN111198888B (en) Method and system for dynamically generating and supervising digital currency crown word number
US20190005495A1 (en) Method for verifying transactions in chip cards
CN110298180A (en) A kind of notarization management system based on block chain
CN111125245A (en) Data processing method and device based on block chain and storage medium
CN107516214B (en) Credit card anti-theft method based on block chain
CN110619223A (en) Block chain-based safe sharing method for credit data in personal credit investigation system
CN111861479A (en) Financial institution client identity recognition method based on block chain and 5G technology
JP5905945B2 (en) Apparatus and method for detecting fraudulent transactions
Verma et al. Blockchain: An analysis on next-generation internet
CN111583041A (en) Block chain-based bond issue data storage and verification processing method and device
CN109889343B (en) Electronic invoice circulation control method, device and system
De Vauplane Blockchain and intermediated securities
KR102376783B1 (en) The blockchain-based transaction history confirmation system
CN113570369A (en) Block chain privacy transaction method, device, equipment and readable storage medium
Greenspan Where blockchains add real value
Kraus Digital currency: Risks, rewards and investigative techniques
CN111402037A (en) User data processing method and device
Brands Electronic Cash.

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant