CN107516214A - A kind of credit card illegal use resisting method based on block chain - Google Patents
A kind of credit card illegal use resisting method based on block chain Download PDFInfo
- Publication number
- CN107516214A CN107516214A CN201710746318.8A CN201710746318A CN107516214A CN 107516214 A CN107516214 A CN 107516214A CN 201710746318 A CN201710746318 A CN 201710746318A CN 107516214 A CN107516214 A CN 107516214A
- Authority
- CN
- China
- Prior art keywords
- record
- block chain
- credit card
- bank
- brush
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention belongs to bank card security technical field, specially a kind of credit card illegal use resisting method based on block chain.The inventive method is recorded using block chained record All Activity, and credit card issuers are that bank establishes original block;Publisher marks a pair unique public keys and private key to each credit card, is issued holder, and each public key marks unique credit card, and holder can modify to private key;Each consumer sale record can all broadcast to the whole network first;When legal consumer record will be broadcasted to the whole network, if holder does not have objection to consumer record, block chain is write into, intelligent contract is triggered and is transferred accounts to seller.Present invention can ensure that being present in each consumer record on block chain is consumed for me, do not brushed to steal;Data on block chain will not be distorted artificially, thus can effectively be prevented to steal and be brushed.
Description
Technical field
The invention belongs to bank card security technical field, and in particular to a kind of bank card anti-theft brush method.
Background technology
According to《Domestic bank's card steals the report of brush big data within 2016》Point out, 2016, the whole network statistics bank card steals brush altogether
It is 7095 times, accumulative to cause client's loss up to 1.83 hundred million yuan.
2362 robber's brushes according to brush channel is clearly stolen complain statistics, and 65% robber's brush channel is quick payment, and 23% is net
Silver is paid.In quick payment steals brush, 97% steals brush by Third-party payment.Wherein, the bank card that Alipay is related to is stolen brush and complained
At most, annual totally 562 times, row industry first, Jingdone district wallet takes second place, 278 times, and wealth is paid logical(Paid containing wechat)Rank 245 times
Three.
Among all complaints, industrial and commercial bank's whole year complaint amount is 1923 times, turns into robber's brush and complains the first rich and influential family, accounts for total complaint
The 25.6% of amount, user lose 3874.8 ten thousand yuan of the amount of money.Construction Bank steals brush complaint amount and taken second place, annual 1507 times, and user loses gold
3720.4 ten thousand yuan of volume.It is 875 times that China Merchants Bank, which steals brush complaint amount, surmounts the agricultural bank in four big rows, Bank of China, and position is lifted complete
Industry the 3rd, user lose the amount of money up to 2358.3 ten thousand yuan.
From the point of view of statistics case is complained, the fix-rate that robber's brush is complained is extremely low, not exclusively the complaint fix-rate of bank
Low, the situation of reporting a case to the security authorities for stealing brush event is also unsatisfactory.7095 times robber's brush is complained in case, is had 2268 times, is clearly stated in complaint
Alarm condition, wherein there are 148 alarms to complain the reflection police off the docket, report a case to the security authorities and be not bound by rate up to 6.5%.
Block chain, it is essentially the distributed data base of a decentralization, while as the Floor layer Technology of bit coin, area
Block chain is that one kind is associated caused data block using cryptography method, and a Transaction Information is contained in each data block,
For verifying the validity of its information(It is false proof)With the next block of generation.
For narrow sense, block chain be it is a kind of sequentially in time by data block by sequentially be connected in a manner of be combined into one
Kind linked data structure, and the distributed account book that can not be distorted He can not forge ensured in a manner of cryptography.Broadly, area
Block chain technology is verified and data storage using block chain data structure, knows together algorithm using distributed node to generate and more
New data, ensure data transfer and access safety using the mode of cryptography, closed using the intelligence of automatized script code composition
About come program and a kind of brand-new distributed basis framework of operation data with calculate normal form.
It is essentially distributed data base based on block chain, among its system, there is the uniformity of data, if certain
The data of each node do not have compliance in degree, then can determine the transaction and problem be present, can be used in bank card
Robber's brush problem among.
Block chain is used for credit card field by the present invention, by credit khaki Transaction Information and block chain combination.Utilize block
Chain needs to carry out broadcast message to the whole network, the characteristics such as miners need to reach common understanding, and confirms its credit card with the presence or absence of stealing brush etc.
Behavior.
The content of the invention
It is an object of the invention to provide a kind of credit card illegal use resisting method that can ensure that bank card safety.
Credit card illegal use resisting method provided by the invention, it is based on block chain technology, comprises the following steps that:
(1)Credit card issuers(Bank)Establish original block;
(2)Credit card issuers mark a pair unique public keys and private key to each credit card, are issued holder, often
One public key marks unique credit card, and holder can modify to private key;
(3)Holder is consumed using the credit card, and each transaction record is all broadcasted by the whole network, by it after reaching common understanding
Block chain is write into, and triggers intelligent contract and is transferred accounts to businessman;
(4)If occurring stealing brush behavior, credit cardholder is stolen the Transaction Information of brush, and the credit for stealing brush record occurs in related its
The public and private key of card is sent to bank;
(5)Bank is matched after the public and private key is received, if no problem, can determine that the consumer record is brushed to steal, Xiang Quan
Net carries out broadcasting the transaction record, and adds mark wherein, is identified as robber's brush record, and bank side writes into number by brush record is stolen
According to database among, bank itself as backup;
(6)Node in network(The node that block chain is safeguarded in book keeping operation jointly is participated in, such as:Part businessman, Third-party payment platform
Deng), after receiving with significant transaction record, then it can determine that and previously brushed without the transaction record of mark to steal, and will
It refuses to write among the block of itself, finally achieves uniformity common recognition, the consumer record of this robber's brush is not write into block
Chain, banking institution is blocked to transfer accounts the automatic of businessman.
The inventive method, recorded using block chained record All Activity, each consumer sale record first all can be to the whole network
Broadcast, consumer record are divided into two kinds, and a kind of is legal consumer record, a kind of consumer record for robber's brush.
When legal consumer record will be broadcasted to the whole network, if objection, consumer record to consumer record be present in holder
It can broadcast to the whole network, the whole network and reach common understanding eventually, write into block chain, trigger intelligent contract and transferred accounts to seller.
The inventive method, it can be ensured that being present in each consumer record on block chain is consumed for me, is not brushed to steal:
(1)If holder has objection to consumer record, i.e. the consumption then needs only provide for out the public and private of the card to steal brush behavior
Key is in bank, and bank judges that the consumer record is brushed to steal it is determined that after errorless, refuses this transaction, and is broadcasted to the whole network, entirely
Net finally achieves common recognition and the consumer record is not write into block chain;
(2)Bank writes into this consumer record of problems among the system of oneself as backup.
The inventive method, the data on block chain will not be distorted artificially, if because the data on chain are by artificially
Distort, due to cannot get the common recognition of other nodes on chain, so will not finally write into block chain.
The inventive method, it can effectively prevent to steal and brush:
(1)Bank is after confirming as stealing brush behavior, to Transaction Information of the whole network broadcast with mark, without mark before confirmation
The transaction of information is robber's brush behavior;
(2)Node in network can determine that previous Transaction Information to steal brush behavior and refusing after the transaction record is received
Block chain is written into absolutely, because final the whole network is reached common understanding, determines the consumer record to steal brush behavior, and then prevent this pen from turning
Account.
Brief description of the drawings
Fig. 1 is the operational flowchart of the credit card illegal use resisting system of the present invention based on block chain.
Embodiment
Come below in conjunction with Figure of description and instantiation antitheft to the credit card of the present invention based on block chain
Brush method is described in further detail, but the detailed description is not construed as limiting the invention.
Fig. 1 shows the operating process of the credit card illegal use resisting system of the present invention based on block chain, such as Fig. 1 institutes
Show, the credit card illegal use resisting system based on block chain;Comprise the following steps:
(1)Credit card issuers are on establishing an original block;
(2)Credit card issuers generate a pair of public and private keys to each credit card by RSA Algorithm, are issued holder,
Each credit card has one uniquely No. id, and holder needs to take care of private key;
(3)Holder is consumed using the credit card, and each transaction record is all broadcasted by the whole network, all sections in the whole network
Point is responsible for safeguarding block chain, and this record is write among the block of itself, is write into block chain after reaching common understanding again, and
Intelligent contract bank is triggered to be transferred accounts to businessman;
(4)If occurring stealing brush behavior, holder must will steal the consumer record of brush, is encrypted together with private key by public key, together
It is sent in bank;
(5)Bank is decrypted after the information of the public key encryption is received using private, then the private with being carried secretly in solution confidential information
Key is matched, and is not malfunctioned if matching, and can determine that the consumer record to steal the consumer record of brush, and carry out broadcast to the whole network and be somebody's turn to do
Transaction record, and wherein add mark, be identified as robber brush record, bank side by steal brush record write into data database work as
In, bank itself is as backup;
(6)Node in network then can determine that previously without the transaction of mark after receiving with significant transaction record
It is recorded as stealing brush, is rejected among the block itself safeguarded, finally because the whole network is reached common understanding, the transaction record is robber's brush
Consumer record, the final data write among block chain will not include this consumer record, so that oneself of bank will not be triggered
Turn account;
(7)Finally with respect to consumer, itself all consumer record of the consumer record all on each bank will be integrated into one
Merkle Tree(Merkel tree), deposit on block chain, consumer can be by retrieving Merkle Tree(Merkel
Tree), search consumer record.
The above-mentioned public key being previously mentioned is generated with private key by RSA Algorithm, wherein crossing data by public key encryption, can only be passed through
Private key is decrypted, and AES and decipherment algorithm are all disclosures, can not be according to public affairs although private key is determined by public key
Key calculates private key.
Merkle Tree(Merkel tree)For a kind of data structure, generally also referred to as Hash Tree, as one
The one tree of hash values is stored, the leaf of Merkle trees is the hash values of data block, and the hash values are to merchandise in the present system
The hash values of record, nonleaf node are the hash of its corresponding child node series strings.Merkle Tree are also made by block chain
Data structure.
Hash is a function for the data of random length being mapped to fixed-length data.
Intelligent contract is a kind of block chain technology, and the technology nests into code among block chain, by energy when condition meets
Autonomous triggering, exempt excessive human intervention operation.
Compared with existing technology, the present invention has the advantage that:
(1)A specific consumer, it will all be integrated into a Merkle on the transaction record of all bank cards
Tree, most embodied at last on block chain, all transaction records can all be searched;
(2)In consumer angle, consumer independently can block to stealing brush consumption, and release interacts with bank cumbersomely,
Determine whether robber's brush behavior is true;
(3)The possibility for distorting consumer record is blocked, due to writing data into block chain, it is necessary to which most of nodes reach one
The common recognition of cause can perform, so one-sided ground altered data, will not successfully write into block chain;
(4)Function of transferring accounts is triggered automatically using intelligent contract, and after consumer record is correctly write into block chain, bank is safeguarded
Block on intelligent contract will be triggered and transferred accounts, the consumer record for stealing brush, due to condition, be unsatisfactory for can not
Trigger intelligent contract to transfer accounts to businessman, eliminate manual operation excessive in process of exchange;
(5)By the collective effect of nodes, block chain is safeguarded jointly, and the characteristic of block chain causes each transaction information
Become open and clear, it is traceable, become the mechanisms such as decentralization, bank without being the consumer record for safeguarding consumer again, pay
Expensive cost, bank need to only take good care of the information such as the public and private key of consumer carefully.All information can all be found on block chain,
On the other hand the possibility of the error of error single management account book and damage is decreased.
Claims (1)
- A kind of 1. credit card illegal use resisting method based on block chain, it is characterised in that comprise the following steps that:(1)Credit card issuers are that bank establishes original block;(2)Credit card issuers mark a pair unique public keys and private key to each credit card, are issued holder, often One public key marks unique credit card, and holder can modify to private key;(3)Holder is consumed using the credit card, and each transaction record is all broadcasted by the whole network, by it after reaching common understanding Block chain is write into, and triggers intelligent contract and is transferred accounts to businessman;(4)If occurring stealing brush behavior, credit cardholder is stolen the Transaction Information of brush, and the credit for stealing brush record occurs in related its The public and private key of card is sent to bank;(5)Bank is matched after the public and private key is received, if no problem, can determine that the consumer record is brushed to steal, Xiang Quan Net carries out broadcasting the transaction record, and adds mark wherein, is identified as robber's brush record, and bank side writes into number by brush record is stolen According to database among, bank itself as backup;(6)Each node in network, that is, the node that block chain is safeguarded in book keeping operation jointly is participated in, remembered receiving with significant transaction After record, then it can determine that and previously brushed without the transaction record of mark to steal, and refused to write among the block of oneself, finally Compliance common recognition is not write into block chain, is transferred accounts so as to not trigger the automatic of bank.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710746318.8A CN107516214B (en) | 2017-08-26 | 2017-08-26 | Credit card anti-theft method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710746318.8A CN107516214B (en) | 2017-08-26 | 2017-08-26 | Credit card anti-theft method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107516214A true CN107516214A (en) | 2017-12-26 |
CN107516214B CN107516214B (en) | 2020-11-20 |
Family
ID=60724141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710746318.8A Active CN107516214B (en) | 2017-08-26 | 2017-08-26 | Credit card anti-theft method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107516214B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109889504A (en) * | 2019-01-23 | 2019-06-14 | 北京航空航天大学 | Decentralization data access rights method of commerce and system |
WO2019137283A1 (en) * | 2018-01-11 | 2019-07-18 | 杭州复杂美科技有限公司 | Iou transaction method based on block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1416079A (en) * | 2001-10-29 | 2003-05-07 | 英华达股份有限公司 | Method for preventing credit card from embezzlement and its system |
CN102103770A (en) * | 2009-12-21 | 2011-06-22 | 中国移动通信集团公司 | Processing method for transaction abnormity in electronic wallet application, and device and system thereof |
CN103679458A (en) * | 2013-12-04 | 2014-03-26 | 天地融科技股份有限公司 | Transaction data handling method and smart card |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN106506146A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | Based on the Transaction Information method of calibration of block chain technology, apparatus and system |
CN106850622A (en) * | 2017-02-07 | 2017-06-13 | 杭州秘猿科技有限公司 | A kind of user identity management method based on license chain |
CN107038638A (en) * | 2017-02-24 | 2017-08-11 | 杭州象链网络技术有限公司 | A kind of equity registration transaction system construction method based on alliance's chain |
-
2017
- 2017-08-26 CN CN201710746318.8A patent/CN107516214B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1416079A (en) * | 2001-10-29 | 2003-05-07 | 英华达股份有限公司 | Method for preventing credit card from embezzlement and its system |
CN102103770A (en) * | 2009-12-21 | 2011-06-22 | 中国移动通信集团公司 | Processing method for transaction abnormity in electronic wallet application, and device and system thereof |
CN103679458A (en) * | 2013-12-04 | 2014-03-26 | 天地融科技股份有限公司 | Transaction data handling method and smart card |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN106506146A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | Based on the Transaction Information method of calibration of block chain technology, apparatus and system |
CN106850622A (en) * | 2017-02-07 | 2017-06-13 | 杭州秘猿科技有限公司 | A kind of user identity management method based on license chain |
CN107038638A (en) * | 2017-02-24 | 2017-08-11 | 杭州象链网络技术有限公司 | A kind of equity registration transaction system construction method based on alliance's chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019137283A1 (en) * | 2018-01-11 | 2019-07-18 | 杭州复杂美科技有限公司 | Iou transaction method based on block chain |
CN109889504A (en) * | 2019-01-23 | 2019-06-14 | 北京航空航天大学 | Decentralization data access rights method of commerce and system |
CN109889504B (en) * | 2019-01-23 | 2020-08-28 | 北京航空航天大学 | Decentralized data access right transaction method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107516214B (en) | 2020-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107688944A (en) | A kind of power system method of commerce based on block chain | |
CN107369010A (en) | A kind of creation method of the stored value card based on block chain | |
CN108805707A (en) | Works copyright revenue distribution method and device based on block chain | |
CN110827028B (en) | Block chain-based data acquisition transaction system and method | |
CN106600405A (en) | Block-chain-based data rights protection method | |
CN106920098A (en) | Digital ticket transaction supervisory systems and method based on block chain and digital cash | |
CN106097101A (en) | A kind of block chain realizes the management method of financial transaction | |
CN108614683A (en) | A kind of motor vehicle violation management system Construction method based on block chain technology | |
CN106875254A (en) | A kind of Android malicious application control methods based on block chain technology | |
CN108123801A (en) | A kind of block chain wallet uses audio encryption private key system and method | |
US20190005495A1 (en) | Method for verifying transactions in chip cards | |
CN109428892A (en) | Multistage rewritable block chain | |
CN107516214A (en) | A kind of credit card illegal use resisting method based on block chain | |
CN107194677B (en) | Statistical method for bit currency region flow direction | |
KR20190120680A (en) | Block Chain Based Cryptocurrency Transaction Method | |
JP3081247B2 (en) | Method for generating a common key on two devices to implement a common encryption procedure, and related devices | |
CN111724156A (en) | Payment system based on block chain | |
CN109785120A (en) | A kind of personal credit system based on block chain technology | |
CN110443612A (en) | A kind of dividing method of submitting an expense account, device and electronic equipment based on block chain | |
CN109919605A (en) | The block catenary system and method for virtual coin are issued using Transaction Information as sole criterion | |
De Vauplane | Blockchain and intermediated securities | |
CN113657994A (en) | Loan risk management control method and device based on alliance chain | |
JP2004526226A (en) | Aging electronic payment units | |
KR102376783B1 (en) | The blockchain-based transaction history confirmation system | |
Patmanathan et al. | The effectiveness of blockchain technology in preventing financial cybercrime |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |