CN108616514A - A kind of region chain realizes the management method of financial transaction - Google Patents

A kind of region chain realizes the management method of financial transaction Download PDF

Info

Publication number
CN108616514A
CN108616514A CN201810309300.6A CN201810309300A CN108616514A CN 108616514 A CN108616514 A CN 108616514A CN 201810309300 A CN201810309300 A CN 201810309300A CN 108616514 A CN108616514 A CN 108616514A
Authority
CN
China
Prior art keywords
region
user
catenary system
chain
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810309300.6A
Other languages
Chinese (zh)
Inventor
杨静秋
王艳丽
李明月
石荃
石一荃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Teachers Institute of Engineering and Technology
Original Assignee
Jilin Teachers Institute of Engineering and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Teachers Institute of Engineering and Technology filed Critical Jilin Teachers Institute of Engineering and Technology
Priority to CN201810309300.6A priority Critical patent/CN108616514A/en
Publication of CN108616514A publication Critical patent/CN108616514A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Abstract

The invention discloses a kind of region chains to realize the management method of financial transaction, are related to region chain technical field comprising following steps:S1:When catenary system is registered for the first time when user login area, necessary log-on message, and the mobile phone contact details corresponding to association user are filled in first, are completed the registration of region catenary system, are obtained corresponding User ID, S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain by region catenary system, judged according to the log-on message of user and corresponding mobile phone contact details, then region catenary system is according to the information of user's volumetric region chain, since the chain of current individual region, whole region chain is traversed according to the order that region generates.Registered users in the present invention are required for logging on the catenary system of region using dynamic password every time, effectively prevent by other people assume another's name log in appearance so that region chain come realize financial transaction management method have stronger security performance.

Description

A kind of region chain realizes the management method of financial transaction
Technical field
The present invention relates to region chain technical fields more particularly to a kind of region chain to realize the management method of financial transaction.
Background technology
Enterprise and financial institution are for supporting the finance that E-Security is handled between client and enterprise to set It applies and has carried out great amount of investment on (including hardware and software).It is received and the associated client of financial transaction for example, many enterprises have The front-end processor (such as point of sales terminal) of Financial Information (such as credit card or debit card information).These front-end processor Send client's Financial Information to back-end processor (sometimes referred to as " acquirer's processor "), back-end processor is transferred and financial machine Structure interaction is approval or the financial transaction that refusal gives with determination.Regrettably, different enterprises and financial institution use finance The different distortion of facility, and these deformations are often incompatible.For example, different debit payments processing systems is to each receipts Folk prescription processor uses different encryption key sections, and each acquirer's processor its corresponding trade company is used it is different Encryption key section.Thus, client is typically only capable to use its debit card in the physical locations of trade company.Therefore it credit card or borrows Note card payment processing system includes the monetary facilities with specific enterprise unique association, and in addition incompatible monetary facilities may give quotient Business especially Online e-business (sometimes referred to as e-commerce) brings obstacle.
In order to solve the above problem, it is that a kind of of " CN106097101A " realizes gold with block chain there has been proposed notification number Melt the management method of transaction, which includes the following steps:S1, when user logs in block catenary system, fill in necessary registration Information after succeeding in registration, inputs essential information login system, including User ID, password;S2, block catenary system step on personal Record information is recorded as individual block chain;Judged according to user information;S3, block catenary system are according to user's individual block chain Information traverses entire block chain, according to traversing result, block since current individual block chain according to the order that block generates Catenary system collects user information, user role information, user right information and block chain information, establishes user's set, user angle Color set, user right set and block chain set;Generate using user as the permission tree of root node, permission tree with user role, Permission and block chain are each level of child nodes;S4, when user operates block chain, system is corresponding according to traverse user Permission tree, judges whether user there is lawful authority to carry out the operation to block chain, allows to be operated if having, if without prohibiting Only operated.This patent carries out flexible permission control by establishing permission tree, since permission tree has the number of plies few, updating decision Feature can reduce permission resource consumption, and take into account the efficiency for ensureing rights management;But corresponding to the User ID in this patent Password freely set by client, do not have dynamic, when the ID passwords of the user are known by other people, be easy There is User ID to be assumed another's name to log in by other people so that security performance is relatively low.
In order to solve a kind of management method institute realizing financial transaction with block chain of notification number " CN106097101A " There are the problem of, it is proposed that a kind of region chain realizes the management method of financial transaction.
Invention content
Technical problems based on background technology, the present invention propose a kind of region chain to realize the management of financial transaction Method.
A kind of region chain proposed by the present invention realizes the management method of financial transaction, includes the following steps:
S1:When catenary system is registered for the first time when user login area, necessary log-on message is filled in first, and be associated with use Mobile phone contact details corresponding to family complete the registration of region catenary system, obtain corresponding User ID;
S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain, root by region catenary system Judge that then region catenary system is according to user's volumetric region chain according to the log-on message and corresponding mobile phone contact details of user Information, since the chain of current individual region, according to region generate order traverse whole region chain, according to traversing result, area Domain catenary system collects user information, user contact infonnation, user role information, user right information and region chain information, and builds Vertical user's set, user contact infonnation set, user role set, user right set and region chain set, generate with user For the permission tree of root node, permission tree is with user contact infonnation, user role, permission and region chain for each level of child nodes;
S3:After ID account input interface of the registered user in the catenary system of region carries out input User ID, region Catenary system filter out the connection of the mobile phone corresponding to the user from user contact infonnation set automatically according to the User ID logged in It is information;
S4:Region catenary system carries out automatically generating dynamic password in the mobile phone contact details described in S3, then region The dynamic password automatically generated is sent on the association mobile phone of the user by catenary system;
S5:User according to the dynamic password that is received on association mobile phone, interface for password input in the catenary system of region into Row inputs corresponding dynamic password;
S6:The dynamic password that the dynamic password that region catenary system is inputted according to interface for password input is internally generated with it It is compared, if the result of comparison is inconsistent, repeatedly step S3 to step S6, if the result compared is consistent, user is to area Domain chain carries out subsequent operation, and region catenary system judges whether user has lawful authority according to the corresponding permission tree of traverse user The operation is carried out to region chain, allows to be operated if having, if without forbidding being operated.
Preferably, in the S1, region catenary system is linked by different zones according to generation time successively, each region Including generation time, current region root cryptographic Hash, previous region root cryptographic Hash and the assets transfer record for being included.
Preferably, in the S3, after ID accounts input interface carries out input User ID, region catenary system can redirect automatically To interface for password input.
Preferably, in the S4, dynamic password generation modules are built-in in the catenary system of region, dynamic password generation modules connect The mobile phone contact details described in S3 are received, and are carried out according to mobile phone contact details automatically generating dynamic password.
Preferably, in the S4, info push module is built-in in the catenary system of region, info push module is used for will dynamic The dynamic password that secret generation module is automatically generated is pushed on corresponding association mobile phone.
Preferably, in the S3 and S5, region catenary system includes input equipment, and input equipment is used to input boundary in ID accounts Face carries out input User ID, and input equipment is additionally operable to carry out input dynamic password in interface for password input.
Preferably, in the S6, region chain is built-in with contrast module, and contrast module is for being inputted interface for password input The dynamic password that is internally generated with it of dynamic password compared.
Registered users in the present invention are required for logging on the catenary system of region using dynamic password every time, effectively Prevent by other people assume another's name log in appearance so that region chain come realize financial transaction management method have stronger safety Energy.
Specific implementation mode
The present invention is made further to explain with reference to specific embodiment.
Embodiment
A kind of region chain is proposed in the present embodiment to realize the management method of financial transaction, is included the following steps:
S1:When catenary system is registered for the first time when user login area, necessary log-on message is filled in first, and be associated with use Mobile phone contact details corresponding to family, complete region catenary system registration, obtain corresponding User ID, with time domain catenary system by Different zones link successively according to generation time, and each region includes generation time, current region root cryptographic Hash, previous area Domain root cryptographic Hash and the assets transfer record for being included;
S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain, root by region catenary system Judge that then region catenary system is according to user's volumetric region chain according to the log-on message and corresponding mobile phone contact details of user Information, since the chain of current individual region, according to region generate order traverse whole region chain, according to traversing result, area Domain catenary system collects user information, user contact infonnation, user role information, user right information and region chain information, and builds Vertical user's set, user contact infonnation set, user role set, user right set and region chain set, generate with user For the permission tree of root node, permission tree is with user contact infonnation, user role, permission and region chain for each level of child nodes;
S3:When registered user carries out input use using ID accounts input interface of the input equipment in the catenary system of region After the ID of family, region catenary system can automatic jump to interface for password input, with time domain catenary system according to the User ID logged in, Automatically from user contact infonnation set filter out the mobile phone contact details corresponding to the user;
S4:Dynamic password generation modules in the catenary system of region receive the mobile phone contact details described in S3, and according to hand Machine contact details carry out automatically generating dynamic password, and then dynamic password is generated mould by the info push module in the catenary system of region The dynamic password that block is automatically generated is pushed on corresponding association mobile phone;
S5:User is close in the catenary system of region using input equipment according to the dynamic password received on association mobile phone Code input interface carries out inputting corresponding dynamic password;
S6:The dynamic password that contrast module in the catenary system of region inputs interface for password input is internally generated with it Dynamic password compared, if the comparing result of contrast module is inconsistent, repeatedly step S3 to step S6, if comparison mould When the comparing result of block is consistent, then user carries out subsequent operation to region chain, and region catenary system is according to the corresponding power of traverse user Limit tree, judges whether user there is lawful authority to carry out the operation to region chain, allows to be operated if having, if without forbidding It is operated.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (7)

1. a kind of region chain realizes the management method of financial transaction, which is characterized in that include the following steps:
S1:When catenary system is registered for the first time when user login area, necessary log-on message, and association user institute are filled in first Corresponding mobile phone contact details complete the registration of region catenary system, obtain corresponding User ID;
S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain by region catenary system, according to The log-on message at family and corresponding mobile phone contact details are judged, then region catenary system is according to the letter of user's volumetric region chain Breath traverses whole region chain, according to traversing result, region chain since the chain of current individual region according to the order that region generates System collects user information, user contact infonnation, user role information, user right information and region chain information, and establishes use Family set, user contact infonnation set, user role set, user right set and region chain set are generated using user as root The permission tree of node, permission tree is with user contact infonnation, user role, permission and region chain for each level of child nodes;
S3:After ID account input interface of the registered user in the catenary system of region carries out input User ID, region linkwork System filter out the contact letter of the mobile phone corresponding to the user from user contact infonnation set automatically according to the User ID logged in Breath;
S4:Region catenary system carries out automatically generating dynamic password in the mobile phone contact details described in S3, then region linkwork The dynamic password automatically generated is sent on the association mobile phone of the user by system;
S5:According to the dynamic password received on association mobile phone, the interface for password input in the catenary system of region carries out defeated user Enter corresponding dynamic password;
S6:The dynamic password that the dynamic password that region catenary system is inputted according to interface for password input is internally generated with it carries out Comparison, if the result of comparison is inconsistent, repeatedly step S3 to step S6, if the result compared is consistent, user is to region chain Subsequent operation is carried out, region catenary system judges whether user has lawful authority to area according to the corresponding permission tree of traverse user Domain chain carries out the operation, allows to be operated if having, if without forbidding being operated.
2. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S1 In, region catenary system is linked by different zones according to generation time successively, and each region includes generation time, current region Root cryptographic Hash, previous region root cryptographic Hash and the assets transfer record for being included.
3. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S3 In, after ID accounts input interface carries out input User ID, region catenary system can automatic jump to interface for password input.
4. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S4 In, dynamic password generation modules are built-in in the catenary system of region, dynamic password generation modules receive the mobile phone contact described in S3 Information, and carried out according to mobile phone contact details automatically generating dynamic password.
5. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S4 In, info push module is built-in in the catenary system of region, info push module for giving birth to dynamic password generation modules automatically At dynamic password be pushed on corresponding association mobile phone.
6. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S3 In S5, region catenary system includes input equipment, and input equipment is used to carry out input User ID in ID accounts input interface, and defeated Enter equipment to be additionally operable to carry out input dynamic password in interface for password input.
7. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S6 In, region chain is built-in with contrast module, the dynamic password that contrast module is used to be inputted interface for password input and its internal institute The dynamic password of generation is compared.
CN201810309300.6A 2018-04-09 2018-04-09 A kind of region chain realizes the management method of financial transaction Pending CN108616514A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810309300.6A CN108616514A (en) 2018-04-09 2018-04-09 A kind of region chain realizes the management method of financial transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810309300.6A CN108616514A (en) 2018-04-09 2018-04-09 A kind of region chain realizes the management method of financial transaction

Publications (1)

Publication Number Publication Date
CN108616514A true CN108616514A (en) 2018-10-02

Family

ID=63659597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810309300.6A Pending CN108616514A (en) 2018-04-09 2018-04-09 A kind of region chain realizes the management method of financial transaction

Country Status (1)

Country Link
CN (1) CN108616514A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788348A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of anti-intrusion method based on Intelligent set top box

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150850A (en) * 2006-09-19 2008-03-26 联想(北京)有限公司 Secure login device and method in information processing system
CN106097101A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain realizes the management method of financial transaction
CN107612934A (en) * 2017-10-24 2018-01-19 济南浪潮高新科技投资发展有限公司 A kind of block chain mobile terminal computing system and method based on Secret splitting
US20180047014A1 (en) * 2014-01-13 2018-02-15 uQontrol, Inc. Multi-Function Data Key

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150850A (en) * 2006-09-19 2008-03-26 联想(北京)有限公司 Secure login device and method in information processing system
US20180047014A1 (en) * 2014-01-13 2018-02-15 uQontrol, Inc. Multi-Function Data Key
CN106097101A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain realizes the management method of financial transaction
CN107612934A (en) * 2017-10-24 2018-01-19 济南浪潮高新科技投资发展有限公司 A kind of block chain mobile terminal computing system and method based on Secret splitting

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788348A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of anti-intrusion method based on Intelligent set top box

Similar Documents

Publication Publication Date Title
US20200336315A1 (en) Validation cryptogram for transaction
US10346814B2 (en) System and method for executing financial transactions
Tiwari et al. A multi-factor security protocol for wireless payment-secure web authentication using mobile devices
Ahmed et al. Security in next generation mobile payment systems: A comprehensive survey
US7983979B2 (en) Method and system for managing account information
CN108234478A (en) A kind of personal credit information share system and method based on block chain
EP2953076A1 (en) System and method for executing financial transactions
CA3211990A1 (en) Systems and methods for personal identification and verification
TW201800997A (en) Management method for realizing financial transaction by using block chain
WO2012167941A1 (en) Method to validate a transaction between a user and a service provider
CN102197407A (en) System and method of secure payment transactions
CN105260890A (en) On-line secure payment method based on multi-domain user information big data analysis
US20200342459A1 (en) Trusted customer identity systems and methods
EP2533486A1 (en) Method to validate a transaction between a user and a service provider
CN101901306A (en) Network transaction encryption method and dynamic password equipment used by same
CN104657860A (en) Mobile banking security authentication method
CN101425901A (en) Control method and device for customer identity verification in processing terminals
CN108616514A (en) A kind of region chain realizes the management method of financial transaction
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)
US20040015688A1 (en) Interactive authentication process
Jawale et al. Towards trusted mobile payment services: a security analysis on Apple Pay
Panduro-Ramirez et al. Blockchain Implementation in Financial Sector and Cyber Security System
He et al. Research on Internet Security Payment Based on Multi-factors and Strong Authentication
US20230066582A1 (en) Threshold multi-party computation with must-have member
Agwanyanjaba Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181002

RJ01 Rejection of invention patent application after publication