CN108875407A - For the sensitive information processing method and processing device of financial business, client, data framework - Google Patents

For the sensitive information processing method and processing device of financial business, client, data framework Download PDF

Info

Publication number
CN108875407A
CN108875407A CN201810601874.0A CN201810601874A CN108875407A CN 108875407 A CN108875407 A CN 108875407A CN 201810601874 A CN201810601874 A CN 201810601874A CN 108875407 A CN108875407 A CN 108875407A
Authority
CN
China
Prior art keywords
user
sensitive information
transaction
financial business
sensitive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810601874.0A
Other languages
Chinese (zh)
Inventor
王宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oriental Silver Valley (beijing) Cci Capital Ltd
Original Assignee
Oriental Silver Valley (beijing) Cci Capital Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oriental Silver Valley (beijing) Cci Capital Ltd filed Critical Oriental Silver Valley (beijing) Cci Capital Ltd
Priority to CN201810601874.0A priority Critical patent/CN108875407A/en
Publication of CN108875407A publication Critical patent/CN108875407A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application discloses a kind of for the sensitive information processing method and processing device of financial business, client, data framework.This method includes the primary block chain the second financial business user being added where the first financial business user;Record the transaction business between the first financial business user and the second financial business user;And obtain the transaction record in the transaction business stored on the primary block chain with sensitive information.Present application addresses lack to sensitive information is effectively treated in financial business the technical issues of.The application realizes the distributed storage to the sensitive information of financial business, and has safety, anti-tamper, retrospective technical effect.

Description

For the sensitive information processing method and processing device of financial business, client, data framework
Technical field
This application involves internet financial fields, handle in particular to a kind of sensitive information for financial business Method and device, client, data framework.
Background technique
In the data information memory system of financial field, sensitive information is usually carried out unified control by the administrative center of authority System, and there is centralized control permission by data management staff.
Inventors have found that lacking necessary restriction between data management staff in environment nodes, sensitive information passes through pipe Reason center is uniformly controlled, and submitted sensitive information data can not further be prevented to be tampered.
Lack in the related technology to sensitive information is effectively treated in financial business aiming at the problem that, not yet propose at present effective Solution.
Summary of the invention
The main purpose of the application is to provide a kind of sensitive information processing method for financial business, to solve to lack The problem of sensitive information in financial business is effectively treated.
To achieve the goals above, according to the one aspect of the application, a kind of sensitivity letter for financial business is provided Cease processing method.
Include according to the sensitive information processing method for financial business of the application:Second financial business user is added Primary block chain where first financial business user;It records between the first financial business user and the second financial business user Transaction business;And the transaction obtained in the transaction business stored on the primary block chain with sensitive information is remembered Record.
Further, the transaction business between the first financial business user of record and the second financial business user includes:Note Record the first sensitive information between the first financial business user and the second financial business user;Judge the first sensitive users letter Whether default transaction sensitive information is had in breath;And if it is determined that there is the sensitive letter of default transaction in first sensitive user information Breath, then store the default transaction sensitive information to the user node on primary block chain.
Further, the transaction business between the first financial business user of record and the second financial business user includes:Note Record the second sensitive information between the first financial business user and the second financial business user;Judge the second sensitive users letter Whether pre-set user sensitive information is had in breath;And if it is determined that there is pre-set user sensitivity letter in second sensitive user information Breath, then store the default transaction sensitive information to the user node on primary block chain.
Further, the transaction in the transaction business stored on the primary block chain with sensitive information is obtained Further include before record:Asymmetric encryption, the asymmetric encryption include:Transaction data, digital signature or login authentication.
Further, further include:First financial business user and the second financial business user are recorded using default client Between transaction business, include at least in the first financial business user, the second financial business user:Pre-set user is quick Feel information, is included at least in the transaction business:Default transaction sensitive information.
To achieve the goals above, according to the another aspect of the application, a kind of sensitivity letter for financial business is provided Cease processing unit.
Include according to the sensitive information processing unit for financial business of the application:Module is added, is used for the second gold medal Melt the primary block chain that service-user is added where the first financial business user;Logging modle, for recording the first financial business Transaction business between user and the second financial business user;And module is obtained, for obtaining in the primary block chain With the transaction record of sensitive information in the transaction business of storage.
Further, the logging modle includes:First recording unit, for recording the first financial business user and second The first sensitive information between financial business user;First judging unit is in first sensitive user information for judging It is no to have default transaction sensitive information;And first storage element, for judging there is default friendship in first sensitive user information When easy sensitive information, then the default transaction sensitive information is stored to the user node on primary block chain.
Further, the logging modle includes:Second recording unit, for recording the first financial business user and second The second sensitive information between financial business user;Second judgment unit is in second sensitive user information for judging It is no to have pre-set user sensitive information;And second storage element, for judging there is default use in second sensitive user information When the sensitive information of family, then the default transaction sensitive information is stored to the user node on primary block chain.
In the embodiment of the present application, using will the second financial business user be added the first financial business user where it is primary The mode of block chain is reached by the transaction business between the first financial business user of record and the second financial business user The purpose of the transaction record in the transaction business stored on the primary block chain with sensitive information is obtained, thus real Show the technical effect of sensitive information distributed storage record while ensure that the safety of transaction data, it is anti-tamper and can chase after It traces back, and then solves and lack to the technical issues of sensitive information is effectively treated in financial business.
Detailed description of the invention
The attached drawing constituted part of this application is used to provide further understanding of the present application, so that the application's is other Feature, objects and advantages become more apparent upon.The illustrative examples attached drawing and its explanation of the application is for explaining the application, not Constitute the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the sensitive information processing method schematic diagram for financial business according to the application first embodiment;
Fig. 2 is the sensitive information processing method schematic diagram for financial business according to the application second embodiment;
Fig. 3 is the sensitive information processing method schematic diagram for financial business according to the application 3rd embodiment;
Fig. 4 is the sensitive information processing method schematic diagram for financial business according to the application fourth embodiment;
Fig. 5 is the sensitive information processing unit schematic diagram for financial business according to the application first embodiment;
Fig. 6 is the sensitive information processing unit schematic diagram for financial business according to the application second embodiment;And
Fig. 7 is the data framework schematic diagram according to the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be noted that the description and claims of this application and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to embodiments herein described herein.In addition, term " includes " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
For the sensitive information processing method of financial business, the first financial business user is added in the second financial business user The primary block chain at place;Record the transaction business between the first financial business user and the second financial business user;And it obtains Obtain the transaction record in the transaction business stored on the primary block chain with sensitive information.It is increased income based on ether mill Frame, with intelligent contract, the form of transaction record carries out persistent storage to user sensitive information, obtains in the primary block With the transaction record of sensitive information in the transaction business stored on chain.Simultaneously by incorporating Encryption Algorithm, account pipe Reason, condition monitoring, the functions such as data directory externally provide unified calling interface, are seamlessly connected with financial business platform.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
As shown in Figure 1, this method includes the following steps, namely S102 to step S106:
The primary block chain where the first financial business user is added in second financial business user by step S102;
Primary block chain typically refers to the publicly-owned chain where the first financial business user originally.
By the publicly-owned chain the second financial business user being added to where the first financial business user, then realize the second gold medal Melt being added on the node of block chain of service-user.
Step S104 records the transaction business between the first financial business user and the second financial business user;
Due to the first financial business user and the second financial business user cochain, it is possible to every on block chain A node allowed by way of broadcast each node can record the first financial business user and the second financial business user it Between transaction business.
Step S106 obtains the transaction in the transaction business stored on the primary block chain with sensitive information Record.
The transaction record in the transaction business with sensitive information is stored on each node on primary block chain.I.e. The sensitive information being related in transaction business is subjected to distributed storage by block chain.
It can be seen from the above description that the application realizes following technical effect:
In the embodiment of the present application, using will the second financial business user be added the first financial business user where it is primary The mode of block chain is reached by the transaction business between the first financial business user of record and the second financial business user The purpose of the transaction record in the transaction business stored on the primary block chain with sensitive information is obtained, thus real Show the technical effect of sensitive information distributed storage record while ensure that the safety of transaction data, it is anti-tamper and can chase after It traces back, and then solves and lack to the technical issues of sensitive information is effectively treated in financial business.
According to the embodiment of the present application, it is preferable that as shown in Fig. 2, the first financial business user of record and the second financial business Transaction business between user includes:
Step S202 records the first sensitive information between the first financial business user and the second financial business user;
First sensitive information, which is used to be used as, is related to Transaction Information relevant sensitization information.
Pass through the first sensitive information of each nodes records on block chain.
Step S204 judges whether there is default transaction sensitive information in first sensitive user information;
Judge whether there is default transaction sensitive information can be in first sensitive user information, judges whether there is default Transaction sensitive information:User, which borrows money, to be recorded.
For example, user A involved in Transaction Information borrows money 50,000 yuan to financial institution B.
For another example, it borrows money 50,000 yuan in user A involved in Transaction Information and time limit A to financial institution B, to finance in time limit B Mechanism B borrows money 20,000 yuan.
Judge whether there is default transaction sensitive information can be in first sensitive user information, judges whether there is default Transaction sensitive information:User lends record.
For example, user B involved in Transaction Information externally lends 50,000 yuan, lending the time limit is 5 months, and lender is user C.
For example, user B involved in Transaction Information externally lends 50,000 yuan, lender is user C1, is used involved in Transaction Information Family B externally lends 60,000 yuan, and lender is user C2.
Step S206, if it is determined that have default transaction sensitive information in first sensitive user information, then it will be described pre- If transaction sensitive information is stored to the user node on primary block chain.
If it is determined that belonging to default transaction sensitive information as described above, user lends record or user borrows money and records, Then the default transaction sensitive information is stored to the user node on primary block chain.
There is user node different operations to check permission, specifically, different check can be set by workload Operating right.
According to the embodiment of the present application, it is preferable that as shown in figure 3, the first financial business user of record and the second financial business Transaction business between user includes:
Step S302 records the second sensitive information between the first financial business user and the second financial business user;
Second sensitive information, which is used to be used as, is related to user's credulity manner of breathing pass sensitive information.
Pass through the second sensitive information of each nodes records on block chain.
Step S304 judges whether there is pre-set user sensitive information in second sensitive user information;
Judge whether there is pre-set user sensitive information can be in second sensitive user information, user's name.
For example, can be the name of user.
It for another example, can be with Business Name.
Judge whether there is pre-set user sensitive information can be in second sensitive user information, user identity.
For example, can be the identification card number of user.
For another example, it can be business standing code.
Judge whether there is pre-set user sensitive information can be in second sensitive user information, user contact details.
For example, the phone etc. that can be user can be used for social sensitive information.
For another example, can be business standing code etc. can be used for the sensitive information of social credibility.
Judge whether there is pre-set user sensitive information can be in second sensitive user information, the gold with user's binding Melt payment consumption card.
For example, can be the bank card of user.
For another example, it can be enterprise to open an account account.
Step S306, if it is determined that have pre-set user sensitive information in second sensitive user information, then it will be described pre- If transaction sensitive information is stored to the user node on primary block chain.
If it is determined that meeting in above-mentioned second sensitive user information has pre-set user sensitive information, the default transaction is quick Sense information is for example, user mobile phone number, address name, user bank card number and user identity card information are stored to primary block chain On user node on.
By block chain technology, be conducive to safe and reliable data management, reduce user sensitive information distort possibility and Various risks.In addition, the trustability of business is increased for financial business, since block chain technology can provide day Right believable distributed data platform, does not need additional third party intermediary or credit information service.
By storing the pre-set user sensitive information to the user node on target block chain, block chain itself With distributed fault-tolerance, network extremely robust, the abnormality of fault-tolerant 1/3 or so node.Block chain has and can not usurp simultaneously It is modified:The data Yi Dan submitted of user sensitive information can always exist, can not destroyed or modification.Further, block chain With Privacy Safeguarding:Key ensure that can be accessed data without permission, but can not parse.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
According to the embodiment of the present application, additionally provide a kind of for implementing the above-mentioned sensitive information processing side for financial business The device of method, as shown in figure 4, the device includes:Module 10 is added, for the first financial circles to be added in the second financial business user Primary block chain where business user;Logging modle 20, for recording the first financial business user and the second financial business user Between transaction business;And module 30 is obtained, for obtaining in the transaction business stored on the primary block chain Transaction record with sensitive information.
Primary block chain typically refers to the first financial business user place originally in the addition module 10 of the embodiment of the present application Publicly-owned chain.
By the publicly-owned chain the second financial business user being added to where the first financial business user, then realize the second gold medal Melt being added on the node of block chain of service-user.
In the logging modle 20 of the embodiment of the present application due to the first financial business user and the second financial business user Cochain, it is possible to which each node on block chain allows each node that can record the first financial circles by way of broadcast The transaction business being engaged between user and the second financial business user.
The transaction business is stored on each node on primary block chain in the acquisition module 30 of the embodiment of the present application In with sensitive information transaction record.The sensitive information being related in transaction business is subjected to distributed storage by block chain It deposits.
According to the embodiment of the present application, it is preferable that as shown in figure 5, the logging modle 20 includes:First recording unit 201, For recording the first sensitive information between the first financial business user and the second financial business user;First judging unit 202, For judging whether there is default transaction sensitive information in first sensitive user information;And first storage element 203, it is used for When judging to have default transaction sensitive information in first sensitive user information, then by the default transaction sensitive information store to On user node on primary block chain.
The first sensitive information is used for quick as Transaction Information correlation is related in first recording unit 201 of the embodiment of the present application Feel information.
Pass through the first sensitive information of each nodes records on block chain.
Judge whether there is default friendship in first sensitive user information in first judging unit 202 of the embodiment of the present application Easy sensitive information can be, and judge whether there is default transaction sensitive information:User, which borrows money, to be recorded.
For example, user A involved in Transaction Information borrows money 50,000 yuan to financial institution B.
For another example, it borrows money 50,000 yuan in user A involved in Transaction Information and time limit A to financial institution B, to finance in time limit B Mechanism B borrows money 20,000 yuan.
Judge whether there is default transaction sensitive information can be in first sensitive user information, judges whether there is default Transaction sensitive information:User lends record.
For example, user B involved in Transaction Information externally lends 50,000 yuan, lending the time limit is 5 months, and lender is user C.
For example, user B involved in Transaction Information externally lends 50,000 yuan, lender is user C1, is used involved in Transaction Information Family B externally lends 60,000 yuan, and lender is user C2.
If it is determined that belonging to the sensitive letter of default transaction as described above in first storage element 203 of the embodiment of the present application Breath, user lends record or user borrows money and records, then stores the default transaction sensitive information to primary block chain User node.
There is user node different operations to check permission, specifically, different check can be set by workload Operating right.
According to the embodiment of the present application, it is preferable that as shown in fig. 6, the logging modle 20 includes:Second recording unit 204, For recording the second sensitive information between the first financial business user and the second financial business user;Second judgment unit 205, For judging whether there is pre-set user sensitive information in second sensitive user information;And second storage element 206, it is used for When judging to have pre-set user sensitive information in second sensitive user information, then by the default transaction sensitive information store to On user node on primary block chain.
The second sensitive information, which is used to be used as, in second recording unit 204 of the embodiment of the present application is related to user's credulity manner of breathing pass Sensitive information.
Pass through the second sensitive information of each nodes records on block chain.
Judge whether there is default use in second sensitive user information in the second judgment unit 205 of the embodiment of the present application Family sensitive information can be, user's name.
For example, can be the name of user.
It for another example, can be with Business Name.
Judge whether there is pre-set user sensitive information can be in second sensitive user information, user identity.
For example, can be the identification card number of user.
For another example, it can be business standing code.
Judge whether there is pre-set user sensitive information can be in second sensitive user information, user contact details.
For example, the phone etc. that can be user can be used for social sensitive information.
For another example, can be business standing code etc. can be used for the sensitive information of social credibility.
Judge whether there is pre-set user sensitive information can be in second sensitive user information, the gold with user's binding Melt payment consumption card.
For example, can be the bank card of user.
For another example, it can be enterprise to open an account account.
In second storage element 206 of the embodiment of the present application if it is determined that meet in above-mentioned second sensitive user information have it is pre- If user sensitive information, by the default transaction sensitive information for example, user mobile phone number, address name, user bank card number with And user identity card information is stored to the user node on primary block chain.
According to the embodiment of the present application, a kind of sensitive information processing client for financial business is additionally provided, including:Institute The sensitive information processing unit stated.The realization principle and beneficial effect of the sensitive information processing unit are for example above-mentioned, herein no longer It is repeated.
It is the data framework schematic diagram according to the embodiment of the present application as shown in Figure 7, the data framework in the embodiment of the present application, Including:Application-interface layer, for being docked with business interface and calling the sensitive information in uniform service logical layer;Uniform service is patrolled Layer is collected, for storage and read of sensitive information;Data storage layer, for providing the storage of block chain data.The application-interface layer Including:Pre-set user sensitive information obtains interface and default transaction sensitive information obtains interface.
When specifically implementing, the data storage layer in the embodiment of the present application uses ether mill official client Ethereum Geth incorporates the library Web3J, provides bottom data for whole system and stores infrastructure service.
Include in application-interface layer:User information interface and Transaction Information interface.Application in the embodiment of the present application connects Mouth layer is the realization of actual service logic, is externally docked by way of standard Web Services with operation system, internally logical It crosses and actual functional capability is completed to the calling of uniform service logical layer.
Include in uniform service logical layer:Authentication module, can by using address as verifying identity mark, Verifier finally location.For example, common recognition mechanism related data format.
Include in uniform service logical layer:Credential management module is used for managing digital certificate.Digital certificate is through certificate The file comprising public-key cryptography owner information and public-key cryptography of authorization center digital signature.
Include in uniform service logical layer:Private key signature module, it is unjust for managing in the key pair being generated for user The part account private key opened.
Include in uniform service logical layer:Transaction sending module includes initiator address for handling;Recipient Location;Business processing amount incurred;Business processing expense;
Include in uniform service logical layer:Account management module is used for account executive public key;Account private key;Account money It produces, digital certificate, account institutional affiliation etc..
Include in uniform service logical layer:Contract administration module is identified for management agreement;Contract version number;Contract Code;Contract storage etc..
Uniform service logical layer in the embodiment of the present application contains authentication, private key signature, and transaction is sent, contract pipe The functional modules such as reason realize the basic function of information storage and reading by interacting with block chain node.
Obviously, those skilled in the art should be understood that each module of above-mentioned the application or each step can be with general Computing device realize that they can be concentrated on a single computing device, or be distributed in multiple computing devices and formed Network on, optionally, they can be realized with the program code that computing device can perform, it is thus possible to which they are stored Be performed by computing device in the storage device, perhaps they are fabricated to each integrated circuit modules or by they In multiple modules or step be fabricated to single integrated circuit module to realize.In this way, the application be not limited to it is any specific Hardware and software combines.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.

Claims (10)

1. a kind of sensitive information processing method for financial business, which is characterized in that including:
Second financial business user is added to the primary block chain where the first financial business user;
Record the transaction business between the first financial business user and the second financial business user;And
Obtain the transaction record in the transaction business stored on the primary block chain with sensitive information.
2. sensitive information processing method according to claim 1, which is characterized in that the first financial business user of record and the Transaction business between two financial business users includes:
Record the first sensitive information between the first financial business user and the second financial business user;
Judge whether there is default transaction sensitive information in first sensitive user information;And
If it is determined that having default transaction sensitive information in first sensitive user information, then by the default transaction sensitive information On storage to the user node on primary block chain.
3. sensitive information processing method according to claim 1, which is characterized in that the first financial business user of record and the Transaction business between two financial business users includes:
Record the second sensitive information between the first financial business user and the second financial business user;
Judge whether there is pre-set user sensitive information in second sensitive user information;And
If it is determined that having pre-set user sensitive information in second sensitive user information, then by the default transaction sensitive information On storage to the user node on primary block chain.
4. sensitive information processing method according to claim 1, which is characterized in that acquisition is stored up on the primary block chain Further include before transaction record in the transaction business deposited with sensitive information:Asymmetric encryption, the asymmetric encryption Including:Transaction data, digital signature or login authentication.
5. sensitive information processing method according to claim 1, which is characterized in that further include:Remembered using default client Record the transaction business between the first financial business user and the second financial business user, it is the first financial business user, described It is included at least in second financial business user:Pre-set user sensitive information includes at least in the transaction business:Default transaction is quick Feel information.
6. a kind of sensitive information processing unit for financial business, which is characterized in that
Be added module, for by the second financial business user be added the first financial business user where primary block chain;
Logging modle, for recording the transaction business between the first financial business user and the second financial business user;And
Module is obtained, for obtaining the transaction in the transaction business stored on the primary block chain with sensitive information Record.
7. sensitive information processing unit according to claim 6, which is characterized in that the logging modle includes:
First recording unit, for recording the first sensitive letter between the first financial business user and the second financial business user Breath;
First judging unit, for judging whether there is default transaction sensitive information in first sensitive user information;And
First storage element then will be described when for judging to have default transaction sensitive information in first sensitive user information Default transaction sensitive information is stored to the user node on primary block chain.
8. sensitive information processing unit according to claim 6, which is characterized in that the logging modle includes:
Second recording unit, for recording the second sensitive letter between the first financial business user and the second financial business user Breath;
Second judgment unit, for judging whether there is pre-set user sensitive information in second sensitive user information;And
Second storage element then will be described when for judging to have pre-set user sensitive information in second sensitive user information Default transaction sensitive information is stored to the user node on primary block chain.
9. a kind of sensitive information for financial business handles client, which is characterized in that including:As claim 6 to 8 is any Sensitive information processing unit described in.
10. a kind of data framework, which is characterized in that including:
Application-interface layer, for being docked with business interface and calling the sensitive information in uniform service logical layer;
Uniform service logical layer, for storage and read of sensitive information;
Data storage layer, for providing the storage of block chain data;
Wherein,
The application-interface layer includes:Pre-set user sensitive information obtains interface and default transaction sensitive information obtains interface.
CN201810601874.0A 2018-06-12 2018-06-12 For the sensitive information processing method and processing device of financial business, client, data framework Pending CN108875407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810601874.0A CN108875407A (en) 2018-06-12 2018-06-12 For the sensitive information processing method and processing device of financial business, client, data framework

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810601874.0A CN108875407A (en) 2018-06-12 2018-06-12 For the sensitive information processing method and processing device of financial business, client, data framework

Publications (1)

Publication Number Publication Date
CN108875407A true CN108875407A (en) 2018-11-23

Family

ID=64338011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810601874.0A Pending CN108875407A (en) 2018-06-12 2018-06-12 For the sensitive information processing method and processing device of financial business, client, data framework

Country Status (1)

Country Link
CN (1) CN108875407A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135175A (en) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 Information processing, acquisition methods, device, equipment and medium based on block chain
CN110598463A (en) * 2019-04-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
CN113179324A (en) * 2021-04-29 2021-07-27 中国人民银行数字货币研究所 Block chain node and service processing method executed by same

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503995A (en) * 2016-11-17 2017-03-15 中国银行股份有限公司 A kind of data sharing method, source node, destination node and system
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN106503995A (en) * 2016-11-17 2017-03-15 中国银行股份有限公司 A kind of data sharing method, source node, destination node and system
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598463A (en) * 2019-04-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
WO2020211660A1 (en) * 2019-04-19 2020-10-22 腾讯科技(深圳)有限公司 Information processing method and device based on blockchain, and computer-readable storage medium
KR20210038658A (en) * 2019-04-19 2021-04-07 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Blockchain-based information processing method and device and computer-readable storage medium
CN110598463B (en) * 2019-04-19 2021-05-14 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
US11442912B2 (en) 2019-04-19 2022-09-13 Tencent Technology (Shenzhen) Company Limited Blockchain-based information processing method and apparatus and computer-readable storage medium
KR102459318B1 (en) 2019-04-19 2022-10-27 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Information processing method and device based on block chain and computer readable storage medium
CN110135175A (en) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 Information processing, acquisition methods, device, equipment and medium based on block chain
WO2020215685A1 (en) * 2019-04-26 2020-10-29 平安科技(深圳)有限公司 Block chain-based information processing and acquisition methods and apparatus, device, and medium
CN113179324A (en) * 2021-04-29 2021-07-27 中国人民银行数字货币研究所 Block chain node and service processing method executed by same
CN113179324B (en) * 2021-04-29 2024-03-26 中国人民银行数字货币研究所 Block chain link point and service processing method executed by block chain link point

Similar Documents

Publication Publication Date Title
US20220277307A1 (en) Systems and methods for personal identification and verification
Alam et al. Blockchain-based initiatives: current state and challenges
US11861615B2 (en) Child support and centralized distribution network
US10142312B2 (en) System for establishing secure access for users in a process data network
US7958032B2 (en) Generating event messages corresponding to event indicators
CN111400749B (en) Government affair financial data sharing platform based on block chain and implementation method thereof
Andrew et al. Blockchain for healthcare systems: Architecture, security challenges, trends and future directions
US20170243222A1 (en) System for use of secure data from a process data network as secured access by users
US20210377310A1 (en) Method, system, apparatus and program for secure distributed data management using collaborative artificial intelligence
CN107944837A (en) A kind of authority processing method, device and system
US20070265946A1 (en) Aggregating event indicators
CN108875407A (en) For the sensitive information processing method and processing device of financial business, client, data framework
CN109034987A (en) A kind of tax administration method and system based on block chain
CN112991045A (en) Medical health consumption financing method, device, equipment and medium based on block chain
Pouwelse et al. Laws for creating trust in the blockchain age
US20070265945A1 (en) Communicating event messages corresponding to event indicators
CN109146452A (en) A kind of Internet of Things cost management method and system based on block chain
KR20210117731A (en) The blockchain-based transaction history confirmation system
US10152712B2 (en) Inspecting event indicators
CN113570369A (en) Block chain privacy transaction method, device, equipment and readable storage medium
CN110310011A (en) A kind of asset management system and its method based on block chain
CN109067824A (en) User information processing method and processing device based on block chain
KR102201083B1 (en) Financial transaction system and method thereof
Dhananjay et al. Distributed Ledger Technology based data minimization of digital identities
Gunasundari et al. Digital Cash: Tracking of Users in Bitcoin Transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123