CN108616514A - A kind of region chain realizes the management method of financial transaction - Google Patents
A kind of region chain realizes the management method of financial transaction Download PDFInfo
- Publication number
- CN108616514A CN108616514A CN201810309300.6A CN201810309300A CN108616514A CN 108616514 A CN108616514 A CN 108616514A CN 201810309300 A CN201810309300 A CN 201810309300A CN 108616514 A CN108616514 A CN 108616514A
- Authority
- CN
- China
- Prior art keywords
- region
- user
- catenary system
- chain
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Abstract
The invention discloses a kind of region chains to realize the management method of financial transaction, are related to region chain technical field comprising following steps:S1:When catenary system is registered for the first time when user login area, necessary log-on message, and the mobile phone contact details corresponding to association user are filled in first, are completed the registration of region catenary system, are obtained corresponding User ID, S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain by region catenary system, judged according to the log-on message of user and corresponding mobile phone contact details, then region catenary system is according to the information of user's volumetric region chain, since the chain of current individual region, whole region chain is traversed according to the order that region generates.Registered users in the present invention are required for logging on the catenary system of region using dynamic password every time, effectively prevent by other people assume another's name log in appearance so that region chain come realize financial transaction management method have stronger security performance.
Description
Technical field
The present invention relates to region chain technical fields more particularly to a kind of region chain to realize the management method of financial transaction.
Background technology
Enterprise and financial institution are for supporting the finance that E-Security is handled between client and enterprise to set
It applies and has carried out great amount of investment on (including hardware and software).It is received and the associated client of financial transaction for example, many enterprises have
The front-end processor (such as point of sales terminal) of Financial Information (such as credit card or debit card information).These front-end processor
Send client's Financial Information to back-end processor (sometimes referred to as " acquirer's processor "), back-end processor is transferred and financial machine
Structure interaction is approval or the financial transaction that refusal gives with determination.Regrettably, different enterprises and financial institution use finance
The different distortion of facility, and these deformations are often incompatible.For example, different debit payments processing systems is to each receipts
Folk prescription processor uses different encryption key sections, and each acquirer's processor its corresponding trade company is used it is different
Encryption key section.Thus, client is typically only capable to use its debit card in the physical locations of trade company.Therefore it credit card or borrows
Note card payment processing system includes the monetary facilities with specific enterprise unique association, and in addition incompatible monetary facilities may give quotient
Business especially Online e-business (sometimes referred to as e-commerce) brings obstacle.
In order to solve the above problem, it is that a kind of of " CN106097101A " realizes gold with block chain there has been proposed notification number
Melt the management method of transaction, which includes the following steps:S1, when user logs in block catenary system, fill in necessary registration
Information after succeeding in registration, inputs essential information login system, including User ID, password;S2, block catenary system step on personal
Record information is recorded as individual block chain;Judged according to user information;S3, block catenary system are according to user's individual block chain
Information traverses entire block chain, according to traversing result, block since current individual block chain according to the order that block generates
Catenary system collects user information, user role information, user right information and block chain information, establishes user's set, user angle
Color set, user right set and block chain set;Generate using user as the permission tree of root node, permission tree with user role,
Permission and block chain are each level of child nodes;S4, when user operates block chain, system is corresponding according to traverse user
Permission tree, judges whether user there is lawful authority to carry out the operation to block chain, allows to be operated if having, if without prohibiting
Only operated.This patent carries out flexible permission control by establishing permission tree, since permission tree has the number of plies few, updating decision
Feature can reduce permission resource consumption, and take into account the efficiency for ensureing rights management;But corresponding to the User ID in this patent
Password freely set by client, do not have dynamic, when the ID passwords of the user are known by other people, be easy
There is User ID to be assumed another's name to log in by other people so that security performance is relatively low.
In order to solve a kind of management method institute realizing financial transaction with block chain of notification number " CN106097101A "
There are the problem of, it is proposed that a kind of region chain realizes the management method of financial transaction.
Invention content
Technical problems based on background technology, the present invention propose a kind of region chain to realize the management of financial transaction
Method.
A kind of region chain proposed by the present invention realizes the management method of financial transaction, includes the following steps:
S1:When catenary system is registered for the first time when user login area, necessary log-on message is filled in first, and be associated with use
Mobile phone contact details corresponding to family complete the registration of region catenary system, obtain corresponding User ID;
S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain, root by region catenary system
Judge that then region catenary system is according to user's volumetric region chain according to the log-on message and corresponding mobile phone contact details of user
Information, since the chain of current individual region, according to region generate order traverse whole region chain, according to traversing result, area
Domain catenary system collects user information, user contact infonnation, user role information, user right information and region chain information, and builds
Vertical user's set, user contact infonnation set, user role set, user right set and region chain set, generate with user
For the permission tree of root node, permission tree is with user contact infonnation, user role, permission and region chain for each level of child nodes;
S3:After ID account input interface of the registered user in the catenary system of region carries out input User ID, region
Catenary system filter out the connection of the mobile phone corresponding to the user from user contact infonnation set automatically according to the User ID logged in
It is information;
S4:Region catenary system carries out automatically generating dynamic password in the mobile phone contact details described in S3, then region
The dynamic password automatically generated is sent on the association mobile phone of the user by catenary system;
S5:User according to the dynamic password that is received on association mobile phone, interface for password input in the catenary system of region into
Row inputs corresponding dynamic password;
S6:The dynamic password that the dynamic password that region catenary system is inputted according to interface for password input is internally generated with it
It is compared, if the result of comparison is inconsistent, repeatedly step S3 to step S6, if the result compared is consistent, user is to area
Domain chain carries out subsequent operation, and region catenary system judges whether user has lawful authority according to the corresponding permission tree of traverse user
The operation is carried out to region chain, allows to be operated if having, if without forbidding being operated.
Preferably, in the S1, region catenary system is linked by different zones according to generation time successively, each region
Including generation time, current region root cryptographic Hash, previous region root cryptographic Hash and the assets transfer record for being included.
Preferably, in the S3, after ID accounts input interface carries out input User ID, region catenary system can redirect automatically
To interface for password input.
Preferably, in the S4, dynamic password generation modules are built-in in the catenary system of region, dynamic password generation modules connect
The mobile phone contact details described in S3 are received, and are carried out according to mobile phone contact details automatically generating dynamic password.
Preferably, in the S4, info push module is built-in in the catenary system of region, info push module is used for will dynamic
The dynamic password that secret generation module is automatically generated is pushed on corresponding association mobile phone.
Preferably, in the S3 and S5, region catenary system includes input equipment, and input equipment is used to input boundary in ID accounts
Face carries out input User ID, and input equipment is additionally operable to carry out input dynamic password in interface for password input.
Preferably, in the S6, region chain is built-in with contrast module, and contrast module is for being inputted interface for password input
The dynamic password that is internally generated with it of dynamic password compared.
Registered users in the present invention are required for logging on the catenary system of region using dynamic password every time, effectively
Prevent by other people assume another's name log in appearance so that region chain come realize financial transaction management method have stronger safety
Energy.
Specific implementation mode
The present invention is made further to explain with reference to specific embodiment.
Embodiment
A kind of region chain is proposed in the present embodiment to realize the management method of financial transaction, is included the following steps:
S1:When catenary system is registered for the first time when user login area, necessary log-on message is filled in first, and be associated with use
Mobile phone contact details corresponding to family, complete region catenary system registration, obtain corresponding User ID, with time domain catenary system by
Different zones link successively according to generation time, and each region includes generation time, current region root cryptographic Hash, previous area
Domain root cryptographic Hash and the assets transfer record for being included;
S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain, root by region catenary system
Judge that then region catenary system is according to user's volumetric region chain according to the log-on message and corresponding mobile phone contact details of user
Information, since the chain of current individual region, according to region generate order traverse whole region chain, according to traversing result, area
Domain catenary system collects user information, user contact infonnation, user role information, user right information and region chain information, and builds
Vertical user's set, user contact infonnation set, user role set, user right set and region chain set, generate with user
For the permission tree of root node, permission tree is with user contact infonnation, user role, permission and region chain for each level of child nodes;
S3:When registered user carries out input use using ID accounts input interface of the input equipment in the catenary system of region
After the ID of family, region catenary system can automatic jump to interface for password input, with time domain catenary system according to the User ID logged in,
Automatically from user contact infonnation set filter out the mobile phone contact details corresponding to the user;
S4:Dynamic password generation modules in the catenary system of region receive the mobile phone contact details described in S3, and according to hand
Machine contact details carry out automatically generating dynamic password, and then dynamic password is generated mould by the info push module in the catenary system of region
The dynamic password that block is automatically generated is pushed on corresponding association mobile phone;
S5:User is close in the catenary system of region using input equipment according to the dynamic password received on association mobile phone
Code input interface carries out inputting corresponding dynamic password;
S6:The dynamic password that contrast module in the catenary system of region inputs interface for password input is internally generated with it
Dynamic password compared, if the comparing result of contrast module is inconsistent, repeatedly step S3 to step S6, if comparison mould
When the comparing result of block is consistent, then user carries out subsequent operation to region chain, and region catenary system is according to the corresponding power of traverse user
Limit tree, judges whether user there is lawful authority to carry out the operation to region chain, allows to be operated if having, if without forbidding
It is operated.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Any one skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (7)
1. a kind of region chain realizes the management method of financial transaction, which is characterized in that include the following steps:
S1:When catenary system is registered for the first time when user login area, necessary log-on message, and association user institute are filled in first
Corresponding mobile phone contact details complete the registration of region catenary system, obtain corresponding User ID;
S2:Personal log-on message and corresponding mobile phone contact details are recorded as volumetric region chain by region catenary system, according to
The log-on message at family and corresponding mobile phone contact details are judged, then region catenary system is according to the letter of user's volumetric region chain
Breath traverses whole region chain, according to traversing result, region chain since the chain of current individual region according to the order that region generates
System collects user information, user contact infonnation, user role information, user right information and region chain information, and establishes use
Family set, user contact infonnation set, user role set, user right set and region chain set are generated using user as root
The permission tree of node, permission tree is with user contact infonnation, user role, permission and region chain for each level of child nodes;
S3:After ID account input interface of the registered user in the catenary system of region carries out input User ID, region linkwork
System filter out the contact letter of the mobile phone corresponding to the user from user contact infonnation set automatically according to the User ID logged in
Breath;
S4:Region catenary system carries out automatically generating dynamic password in the mobile phone contact details described in S3, then region linkwork
The dynamic password automatically generated is sent on the association mobile phone of the user by system;
S5:According to the dynamic password received on association mobile phone, the interface for password input in the catenary system of region carries out defeated user
Enter corresponding dynamic password;
S6:The dynamic password that the dynamic password that region catenary system is inputted according to interface for password input is internally generated with it carries out
Comparison, if the result of comparison is inconsistent, repeatedly step S3 to step S6, if the result compared is consistent, user is to region chain
Subsequent operation is carried out, region catenary system judges whether user has lawful authority to area according to the corresponding permission tree of traverse user
Domain chain carries out the operation, allows to be operated if having, if without forbidding being operated.
2. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S1
In, region catenary system is linked by different zones according to generation time successively, and each region includes generation time, current region
Root cryptographic Hash, previous region root cryptographic Hash and the assets transfer record for being included.
3. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S3
In, after ID accounts input interface carries out input User ID, region catenary system can automatic jump to interface for password input.
4. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S4
In, dynamic password generation modules are built-in in the catenary system of region, dynamic password generation modules receive the mobile phone contact described in S3
Information, and carried out according to mobile phone contact details automatically generating dynamic password.
5. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S4
In, info push module is built-in in the catenary system of region, info push module for giving birth to dynamic password generation modules automatically
At dynamic password be pushed on corresponding association mobile phone.
6. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S3
In S5, region catenary system includes input equipment, and input equipment is used to carry out input User ID in ID accounts input interface, and defeated
Enter equipment to be additionally operable to carry out input dynamic password in interface for password input.
7. a kind of region chain according to claim 1 realizes the management method of financial transaction, which is characterized in that the S6
In, region chain is built-in with contrast module, the dynamic password that contrast module is used to be inputted interface for password input and its internal institute
The dynamic password of generation is compared.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810309300.6A CN108616514A (en) | 2018-04-09 | 2018-04-09 | A kind of region chain realizes the management method of financial transaction |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810309300.6A CN108616514A (en) | 2018-04-09 | 2018-04-09 | A kind of region chain realizes the management method of financial transaction |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108616514A true CN108616514A (en) | 2018-10-02 |
Family
ID=63659597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810309300.6A Pending CN108616514A (en) | 2018-04-09 | 2018-04-09 | A kind of region chain realizes the management method of financial transaction |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108616514A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109788348A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of anti-intrusion method based on Intelligent set top box |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101150850A (en) * | 2006-09-19 | 2008-03-26 | 联想(北京)有限公司 | Secure login device and method in information processing system |
CN106097101A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain realizes the management method of financial transaction |
CN107612934A (en) * | 2017-10-24 | 2018-01-19 | 济南浪潮高新科技投资发展有限公司 | A kind of block chain mobile terminal computing system and method based on Secret splitting |
US20180047014A1 (en) * | 2014-01-13 | 2018-02-15 | uQontrol, Inc. | Multi-Function Data Key |
-
2018
- 2018-04-09 CN CN201810309300.6A patent/CN108616514A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101150850A (en) * | 2006-09-19 | 2008-03-26 | 联想(北京)有限公司 | Secure login device and method in information processing system |
US20180047014A1 (en) * | 2014-01-13 | 2018-02-15 | uQontrol, Inc. | Multi-Function Data Key |
CN106097101A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain realizes the management method of financial transaction |
CN107612934A (en) * | 2017-10-24 | 2018-01-19 | 济南浪潮高新科技投资发展有限公司 | A kind of block chain mobile terminal computing system and method based on Secret splitting |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109788348A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of anti-intrusion method based on Intelligent set top box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200336315A1 (en) | Validation cryptogram for transaction | |
US10346814B2 (en) | System and method for executing financial transactions | |
Tiwari et al. | A multi-factor security protocol for wireless payment-secure web authentication using mobile devices | |
Ahmed et al. | Security in next generation mobile payment systems: A comprehensive survey | |
US7983979B2 (en) | Method and system for managing account information | |
CN108234478A (en) | A kind of personal credit information share system and method based on block chain | |
EP2953076A1 (en) | System and method for executing financial transactions | |
CA3211990A1 (en) | Systems and methods for personal identification and verification | |
TW201800997A (en) | Management method for realizing financial transaction by using block chain | |
WO2012167941A1 (en) | Method to validate a transaction between a user and a service provider | |
CN102197407A (en) | System and method of secure payment transactions | |
CN105260890A (en) | On-line secure payment method based on multi-domain user information big data analysis | |
US20200342459A1 (en) | Trusted customer identity systems and methods | |
EP2533486A1 (en) | Method to validate a transaction between a user and a service provider | |
CN101901306A (en) | Network transaction encryption method and dynamic password equipment used by same | |
CN104657860A (en) | Mobile banking security authentication method | |
CN101425901A (en) | Control method and device for customer identity verification in processing terminals | |
CN108616514A (en) | A kind of region chain realizes the management method of financial transaction | |
CN107403310A (en) | Payment system and its method of payment under quantum Metropolitan Area Network (MAN) | |
US20040015688A1 (en) | Interactive authentication process | |
Jawale et al. | Towards trusted mobile payment services: a security analysis on Apple Pay | |
Panduro-Ramirez et al. | Blockchain Implementation in Financial Sector and Cyber Security System | |
He et al. | Research on Internet Security Payment Based on Multi-factors and Strong Authentication | |
US20230066582A1 (en) | Threshold multi-party computation with must-have member | |
Agwanyanjaba | Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181002 |
|
RJ01 | Rejection of invention patent application after publication |