CN107516214A - A kind of credit card illegal use resisting method based on block chain - Google Patents

A kind of credit card illegal use resisting method based on block chain Download PDF

Info

Publication number
CN107516214A
CN107516214A CN201710746318.8A CN201710746318A CN107516214A CN 107516214 A CN107516214 A CN 107516214A CN 201710746318 A CN201710746318 A CN 201710746318A CN 107516214 A CN107516214 A CN 107516214A
Authority
CN
China
Prior art keywords
record
block chain
credit card
bank
brush
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710746318.8A
Other languages
Chinese (zh)
Other versions
CN107516214B (en
Inventor
阚海斌
张思贤
文捷
刘百祥
向望
李雪峰
赵敬
宋文鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CN201710746318.8A priority Critical patent/CN107516214B/en
Publication of CN107516214A publication Critical patent/CN107516214A/en
Application granted granted Critical
Publication of CN107516214B publication Critical patent/CN107516214B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention belongs to bank card security technical field, specially a kind of credit card illegal use resisting method based on block chain.The inventive method is recorded using block chained record All Activity, and credit card issuers are that bank establishes original block;Publisher marks a pair unique public keys and private key to each credit card, is issued holder, and each public key marks unique credit card, and holder can modify to private key;Each consumer sale record can all broadcast to the whole network first;When legal consumer record will be broadcasted to the whole network, if holder does not have objection to consumer record, block chain is write into, intelligent contract is triggered and is transferred accounts to seller.Present invention can ensure that being present in each consumer record on block chain is consumed for me, do not brushed to steal;Data on block chain will not be distorted artificially, thus can effectively be prevented to steal and be brushed.

Description

A kind of credit card illegal use resisting method based on block chain
Technical field
The invention belongs to bank card security technical field, and in particular to a kind of bank card anti-theft brush method.
Background technology
According to《Domestic bank's card steals the report of brush big data within 2016》Point out, 2016, the whole network statistics bank card steals brush altogether It is 7095 times, accumulative to cause client's loss up to 1.83 hundred million yuan.
2362 robber's brushes according to brush channel is clearly stolen complain statistics, and 65% robber's brush channel is quick payment, and 23% is net Silver is paid.In quick payment steals brush, 97% steals brush by Third-party payment.Wherein, the bank card that Alipay is related to is stolen brush and complained At most, annual totally 562 times, row industry first, Jingdone district wallet takes second place, 278 times, and wealth is paid logical(Paid containing wechat)Rank 245 times Three.
Among all complaints, industrial and commercial bank's whole year complaint amount is 1923 times, turns into robber's brush and complains the first rich and influential family, accounts for total complaint The 25.6% of amount, user lose 3874.8 ten thousand yuan of the amount of money.Construction Bank steals brush complaint amount and taken second place, annual 1507 times, and user loses gold 3720.4 ten thousand yuan of volume.It is 875 times that China Merchants Bank, which steals brush complaint amount, surmounts the agricultural bank in four big rows, Bank of China, and position is lifted complete Industry the 3rd, user lose the amount of money up to 2358.3 ten thousand yuan.
From the point of view of statistics case is complained, the fix-rate that robber's brush is complained is extremely low, not exclusively the complaint fix-rate of bank Low, the situation of reporting a case to the security authorities for stealing brush event is also unsatisfactory.7095 times robber's brush is complained in case, is had 2268 times, is clearly stated in complaint Alarm condition, wherein there are 148 alarms to complain the reflection police off the docket, report a case to the security authorities and be not bound by rate up to 6.5%.
Block chain, it is essentially the distributed data base of a decentralization, while as the Floor layer Technology of bit coin, area Block chain is that one kind is associated caused data block using cryptography method, and a Transaction Information is contained in each data block, For verifying the validity of its information(It is false proof)With the next block of generation.
For narrow sense, block chain be it is a kind of sequentially in time by data block by sequentially be connected in a manner of be combined into one Kind linked data structure, and the distributed account book that can not be distorted He can not forge ensured in a manner of cryptography.Broadly, area Block chain technology is verified and data storage using block chain data structure, knows together algorithm using distributed node to generate and more New data, ensure data transfer and access safety using the mode of cryptography, closed using the intelligence of automatized script code composition About come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.
It is essentially distributed data base based on block chain, among its system, there is the uniformity of data, if certain The data of each node do not have compliance in degree, then can determine the transaction and problem be present, can be used in bank card Robber's brush problem among.
Block chain is used for credit card field by the present invention, by credit khaki Transaction Information and block chain combination.Utilize block Chain needs to carry out broadcast message to the whole network, the characteristics such as miners need to reach common understanding, and confirms its credit card with the presence or absence of stealing brush etc. Behavior.
The content of the invention
It is an object of the invention to provide a kind of credit card illegal use resisting method that can ensure that bank card safety.
Credit card illegal use resisting method provided by the invention, it is based on block chain technology, comprises the following steps that:
(1)Credit card issuers(Bank)Establish original block;
(2)Credit card issuers mark a pair unique public keys and private key to each credit card, are issued holder, often One public key marks unique credit card, and holder can modify to private key;
(3)Holder is consumed using the credit card, and each transaction record is all broadcasted by the whole network, by it after reaching common understanding Block chain is write into, and triggers intelligent contract and is transferred accounts to businessman;
(4)If occurring stealing brush behavior, credit cardholder is stolen the Transaction Information of brush, and the credit for stealing brush record occurs in related its The public and private key of card is sent to bank;
(5)Bank is matched after the public and private key is received, if no problem, can determine that the consumer record is brushed to steal, Xiang Quan Net carries out broadcasting the transaction record, and adds mark wherein, is identified as robber's brush record, and bank side writes into number by brush record is stolen According to database among, bank itself as backup;
(6)Node in network(The node that block chain is safeguarded in book keeping operation jointly is participated in, such as:Part businessman, Third-party payment platform Deng), after receiving with significant transaction record, then it can determine that and previously brushed without the transaction record of mark to steal, and will It refuses to write among the block of itself, finally achieves uniformity common recognition, the consumer record of this robber's brush is not write into block Chain, banking institution is blocked to transfer accounts the automatic of businessman.
The inventive method, recorded using block chained record All Activity, each consumer sale record first all can be to the whole network Broadcast, consumer record are divided into two kinds, and a kind of is legal consumer record, a kind of consumer record for robber's brush.
When legal consumer record will be broadcasted to the whole network, if objection, consumer record to consumer record be present in holder It can broadcast to the whole network, the whole network and reach common understanding eventually, write into block chain, trigger intelligent contract and transferred accounts to seller.
The inventive method, it can be ensured that being present in each consumer record on block chain is consumed for me, is not brushed to steal:
(1)If holder has objection to consumer record, i.e. the consumption then needs only provide for out the public and private of the card to steal brush behavior Key is in bank, and bank judges that the consumer record is brushed to steal it is determined that after errorless, refuses this transaction, and is broadcasted to the whole network, entirely Net finally achieves common recognition and the consumer record is not write into block chain;
(2)Bank writes into this consumer record of problems among the system of oneself as backup.
The inventive method, the data on block chain will not be distorted artificially, if because the data on chain are by artificially Distort, due to cannot get the common recognition of other nodes on chain, so will not finally write into block chain.
The inventive method, it can effectively prevent to steal and brush:
(1)Bank is after confirming as stealing brush behavior, to Transaction Information of the whole network broadcast with mark, without mark before confirmation The transaction of information is robber's brush behavior;
(2)Node in network can determine that previous Transaction Information to steal brush behavior and refusing after the transaction record is received Block chain is written into absolutely, because final the whole network is reached common understanding, determines the consumer record to steal brush behavior, and then prevent this pen from turning Account.
Brief description of the drawings
Fig. 1 is the operational flowchart of the credit card illegal use resisting system of the present invention based on block chain.
Embodiment
Come below in conjunction with Figure of description and instantiation antitheft to the credit card of the present invention based on block chain Brush method is described in further detail, but the detailed description is not construed as limiting the invention.
Fig. 1 shows the operating process of the credit card illegal use resisting system of the present invention based on block chain, such as Fig. 1 institutes Show, the credit card illegal use resisting system based on block chain;Comprise the following steps:
(1)Credit card issuers are on establishing an original block;
(2)Credit card issuers generate a pair of public and private keys to each credit card by RSA Algorithm, are issued holder, Each credit card has one uniquely No. id, and holder needs to take care of private key;
(3)Holder is consumed using the credit card, and each transaction record is all broadcasted by the whole network, all sections in the whole network Point is responsible for safeguarding block chain, and this record is write among the block of itself, is write into block chain after reaching common understanding again, and Intelligent contract bank is triggered to be transferred accounts to businessman;
(4)If occurring stealing brush behavior, holder must will steal the consumer record of brush, is encrypted together with private key by public key, together It is sent in bank;
(5)Bank is decrypted after the information of the public key encryption is received using private, then the private with being carried secretly in solution confidential information Key is matched, and is not malfunctioned if matching, and can determine that the consumer record to steal the consumer record of brush, and carry out broadcast to the whole network and be somebody's turn to do Transaction record, and wherein add mark, be identified as robber brush record, bank side by steal brush record write into data database work as In, bank itself is as backup;
(6)Node in network then can determine that previously without the transaction of mark after receiving with significant transaction record It is recorded as stealing brush, is rejected among the block itself safeguarded, finally because the whole network is reached common understanding, the transaction record is robber's brush Consumer record, the final data write among block chain will not include this consumer record, so that oneself of bank will not be triggered Turn account;
(7)Finally with respect to consumer, itself all consumer record of the consumer record all on each bank will be integrated into one Merkle Tree(Merkel tree), deposit on block chain, consumer can be by retrieving Merkle Tree(Merkel Tree), search consumer record.
The above-mentioned public key being previously mentioned is generated with private key by RSA Algorithm, wherein crossing data by public key encryption, can only be passed through Private key is decrypted, and AES and decipherment algorithm are all disclosures, can not be according to public affairs although private key is determined by public key Key calculates private key.
Merkle Tree(Merkel tree)For a kind of data structure, generally also referred to as Hash Tree, as one The one tree of hash values is stored, the leaf of Merkle trees is the hash values of data block, and the hash values are to merchandise in the present system The hash values of record, nonleaf node are the hash of its corresponding child node series strings.Merkle Tree are also made by block chain Data structure.
Hash is a function for the data of random length being mapped to fixed-length data.
Intelligent contract is a kind of block chain technology, and the technology nests into code among block chain, by energy when condition meets Autonomous triggering, exempt excessive human intervention operation.
Compared with existing technology, the present invention has the advantage that:
(1)A specific consumer, it will all be integrated into a Merkle on the transaction record of all bank cards Tree, most embodied at last on block chain, all transaction records can all be searched;
(2)In consumer angle, consumer independently can block to stealing brush consumption, and release interacts with bank cumbersomely, Determine whether robber's brush behavior is true;
(3)The possibility for distorting consumer record is blocked, due to writing data into block chain, it is necessary to which most of nodes reach one The common recognition of cause can perform, so one-sided ground altered data, will not successfully write into block chain;
(4)Function of transferring accounts is triggered automatically using intelligent contract, and after consumer record is correctly write into block chain, bank is safeguarded Block on intelligent contract will be triggered and transferred accounts, the consumer record for stealing brush, due to condition, be unsatisfactory for can not Trigger intelligent contract to transfer accounts to businessman, eliminate manual operation excessive in process of exchange;
(5)By the collective effect of nodes, block chain is safeguarded jointly, and the characteristic of block chain causes each transaction information Become open and clear, it is traceable, become the mechanisms such as decentralization, bank without being the consumer record for safeguarding consumer again, pay Expensive cost, bank need to only take good care of the information such as the public and private key of consumer carefully.All information can all be found on block chain, On the other hand the possibility of the error of error single management account book and damage is decreased.

Claims (1)

  1. A kind of 1. credit card illegal use resisting method based on block chain, it is characterised in that comprise the following steps that:
    (1)Credit card issuers are that bank establishes original block;
    (2)Credit card issuers mark a pair unique public keys and private key to each credit card, are issued holder, often One public key marks unique credit card, and holder can modify to private key;
    (3)Holder is consumed using the credit card, and each transaction record is all broadcasted by the whole network, by it after reaching common understanding Block chain is write into, and triggers intelligent contract and is transferred accounts to businessman;
    (4)If occurring stealing brush behavior, credit cardholder is stolen the Transaction Information of brush, and the credit for stealing brush record occurs in related its The public and private key of card is sent to bank;
    (5)Bank is matched after the public and private key is received, if no problem, can determine that the consumer record is brushed to steal, Xiang Quan Net carries out broadcasting the transaction record, and adds mark wherein, is identified as robber's brush record, and bank side writes into number by brush record is stolen According to database among, bank itself as backup;
    (6)Each node in network, that is, the node that block chain is safeguarded in book keeping operation jointly is participated in, remembered receiving with significant transaction After record, then it can determine that and previously brushed without the transaction record of mark to steal, and refused to write among the block of oneself, finally Compliance common recognition is not write into block chain, is transferred accounts so as to not trigger the automatic of bank.
CN201710746318.8A 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain Active CN107516214B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710746318.8A CN107516214B (en) 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710746318.8A CN107516214B (en) 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain

Publications (2)

Publication Number Publication Date
CN107516214A true CN107516214A (en) 2017-12-26
CN107516214B CN107516214B (en) 2020-11-20

Family

ID=60724141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710746318.8A Active CN107516214B (en) 2017-08-26 2017-08-26 Credit card anti-theft method based on block chain

Country Status (1)

Country Link
CN (1) CN107516214B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889504A (en) * 2019-01-23 2019-06-14 北京航空航天大学 Decentralization data access rights method of commerce and system
WO2019137283A1 (en) * 2018-01-11 2019-07-18 杭州复杂美科技有限公司 Iou transaction method based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1416079A (en) * 2001-10-29 2003-05-07 英华达股份有限公司 Method for preventing credit card from embezzlement and its system
CN102103770A (en) * 2009-12-21 2011-06-22 中国移动通信集团公司 Processing method for transaction abnormity in electronic wallet application, and device and system thereof
CN103679458A (en) * 2013-12-04 2014-03-26 天地融科技股份有限公司 Transaction data handling method and smart card
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106850622A (en) * 2017-02-07 2017-06-13 杭州秘猿科技有限公司 A kind of user identity management method based on license chain
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1416079A (en) * 2001-10-29 2003-05-07 英华达股份有限公司 Method for preventing credit card from embezzlement and its system
CN102103770A (en) * 2009-12-21 2011-06-22 中国移动通信集团公司 Processing method for transaction abnormity in electronic wallet application, and device and system thereof
CN103679458A (en) * 2013-12-04 2014-03-26 天地融科技股份有限公司 Transaction data handling method and smart card
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106850622A (en) * 2017-02-07 2017-06-13 杭州秘猿科技有限公司 A kind of user identity management method based on license chain
CN107038638A (en) * 2017-02-24 2017-08-11 杭州象链网络技术有限公司 A kind of equity registration transaction system construction method based on alliance's chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019137283A1 (en) * 2018-01-11 2019-07-18 杭州复杂美科技有限公司 Iou transaction method based on block chain
CN109889504A (en) * 2019-01-23 2019-06-14 北京航空航天大学 Decentralization data access rights method of commerce and system
CN109889504B (en) * 2019-01-23 2020-08-28 北京航空航天大学 Decentralized data access right transaction method and system

Also Published As

Publication number Publication date
CN107516214B (en) 2020-11-20

Similar Documents

Publication Publication Date Title
CN107688944A (en) A kind of power system method of commerce based on block chain
CN107369010A (en) A kind of creation method of the stored value card based on block chain
CN108805707A (en) Works copyright revenue distribution method and device based on block chain
CN110827028B (en) Block chain-based data acquisition transaction system and method
CN106600405A (en) Block-chain-based data rights protection method
CN106920098A (en) Digital ticket transaction supervisory systems and method based on block chain and digital cash
CN106097101A (en) A kind of block chain realizes the management method of financial transaction
CN108614683A (en) A kind of motor vehicle violation management system Construction method based on block chain technology
CN106875254A (en) A kind of Android malicious application control methods based on block chain technology
CN108123801A (en) A kind of block chain wallet uses audio encryption private key system and method
US20190005495A1 (en) Method for verifying transactions in chip cards
CN109428892A (en) Multistage rewritable block chain
CN107516214A (en) A kind of credit card illegal use resisting method based on block chain
CN107194677B (en) Statistical method for bit currency region flow direction
KR20190120680A (en) Block Chain Based Cryptocurrency Transaction Method
JP3081247B2 (en) Method for generating a common key on two devices to implement a common encryption procedure, and related devices
CN111724156A (en) Payment system based on block chain
CN109785120A (en) A kind of personal credit system based on block chain technology
CN110443612A (en) A kind of dividing method of submitting an expense account, device and electronic equipment based on block chain
CN109919605A (en) The block catenary system and method for virtual coin are issued using Transaction Information as sole criterion
De Vauplane Blockchain and intermediated securities
CN113657994A (en) Loan risk management control method and device based on alliance chain
JP2004526226A (en) Aging electronic payment units
KR102376783B1 (en) The blockchain-based transaction history confirmation system
Patmanathan et al. The effectiveness of blockchain technology in preventing financial cybercrime

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant