CN111432365B - Financial big data processing method and system applying 5G network and block chain - Google Patents
Financial big data processing method and system applying 5G network and block chain Download PDFInfo
- Publication number
- CN111432365B CN111432365B CN202010198205.0A CN202010198205A CN111432365B CN 111432365 B CN111432365 B CN 111432365B CN 202010198205 A CN202010198205 A CN 202010198205A CN 111432365 B CN111432365 B CN 111432365B
- Authority
- CN
- China
- Prior art keywords
- data
- customer service
- client
- financial
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 10
- 238000004891 communication Methods 0.000 claims abstract description 196
- 238000012795 verification Methods 0.000 claims abstract description 111
- 238000012545 processing Methods 0.000 claims abstract description 56
- 125000004122 cyclic group Chemical group 0.000 claims abstract description 28
- 230000005540 biological transmission Effects 0.000 claims description 18
- 239000013307 optical fiber Substances 0.000 claims description 9
- 238000000034 method Methods 0.000 claims description 6
- 239000004576 sand Substances 0.000 claims description 6
- 238000006073 displacement reaction Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000003912 environmental pollution Methods 0.000 abstract description 5
- 230000000694 effects Effects 0.000 description 4
- 230000005855 radiation Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 239000000835 fiber Substances 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/35—Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Technology Law (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Optics & Photonics (AREA)
- Electromagnetism (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010198205.0A CN111432365B (en) | 2020-03-19 | 2020-03-19 | Financial big data processing method and system applying 5G network and block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010198205.0A CN111432365B (en) | 2020-03-19 | 2020-03-19 | Financial big data processing method and system applying 5G network and block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111432365A CN111432365A (en) | 2020-07-17 |
CN111432365B true CN111432365B (en) | 2020-12-29 |
Family
ID=71548197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010198205.0A Expired - Fee Related CN111432365B (en) | 2020-03-19 | 2020-03-19 | Financial big data processing method and system applying 5G network and block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111432365B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115205041B (en) * | 2022-07-15 | 2023-07-07 | 山东大学 | Financial big data processing system and method based on blockchain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104346526A (en) * | 2014-10-11 | 2015-02-11 | 北京网秦天下科技有限公司 | Medical image processing method, cloud server and medical image processing system |
CN104917738A (en) * | 2014-03-14 | 2015-09-16 | 陈衡 | Finance platform data processing method and system |
CN107909370A (en) * | 2017-12-04 | 2018-04-13 | 厦门信分红网络科技有限公司 | The maltilevel security control method and system of a kind of electronic payment platform |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070277224A1 (en) * | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
US20110137720A1 (en) * | 2009-12-08 | 2011-06-09 | Kane Larry J | System and method of supporting a community based program, increase business for local merchants, and increase use of financial cards |
US8700888B2 (en) * | 2011-01-27 | 2014-04-15 | Wyse Technology L.L.C. | Specific-purpose client with configuration history for self-provisioning of configuration and obviating reinstallation of embedded image |
US8825990B2 (en) * | 2011-01-27 | 2014-09-02 | Wyse Technology L.L.C. | Configuring and customizing a specific-purpose client having a windows-based embedded image using extensible markup language (XML) configuration |
US9256765B2 (en) * | 2012-06-29 | 2016-02-09 | Kip Sign P1 Lp | System and method for identifying software changes |
-
2020
- 2020-03-19 CN CN202010198205.0A patent/CN111432365B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917738A (en) * | 2014-03-14 | 2015-09-16 | 陈衡 | Finance platform data processing method and system |
CN104346526A (en) * | 2014-10-11 | 2015-02-11 | 北京网秦天下科技有限公司 | Medical image processing method, cloud server and medical image processing system |
CN107909370A (en) * | 2017-12-04 | 2018-04-13 | 厦门信分红网络科技有限公司 | The maltilevel security control method and system of a kind of electronic payment platform |
Also Published As
Publication number | Publication date |
---|---|
CN111432365A (en) | 2020-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111314056B (en) | Heaven and earth integrated network anonymous access authentication method based on identity encryption system | |
CN101340437B (en) | Time source regulating method and system | |
CN110247965A (en) | A kind of storage method and system of the IoT data-storage system based on block chain | |
CN103795543B (en) | A kind of secure two-way authentication method for rfid system | |
CN110958111B (en) | Block chain-based identity authentication mechanism of electric power mobile terminal | |
CN101247407B (en) | Network authentication service system and method | |
CN111429278B (en) | Financial big data processing system and method based on 5G and block chain | |
CN102685749B (en) | Wireless safety authentication method orienting to mobile terminal | |
CN107483191A (en) | A kind of SM2 algorithm secret keys segmentation signature system and method | |
CN113300836B (en) | Vehicle-mounted network message authentication method and system based on block chain and ECC | |
CN106529963A (en) | System and method for security authentication of mobile devices | |
CN101577620A (en) | Authentication method of Ethernet passive optical network (EPON) system | |
CN112566121B (en) | Method for preventing attack, server and storage medium | |
CN109726578A (en) | A kind of anti-fake solution of novel dynamic two-dimension code | |
CN111432365B (en) | Financial big data processing method and system applying 5G network and block chain | |
US20180083777A1 (en) | Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols | |
CN113810391A (en) | Cross-machine-room communication bidirectional authentication and encryption method | |
CN112311553B (en) | Equipment authentication method based on challenge response | |
CN107135228A (en) | A kind of Verification System and authentication method based on Centroid | |
CN115801341A (en) | Distributed adjustable load interaction-oriented block chain credible authentication method | |
CN107370728B (en) | Instant license generation and verification system and method based on electronic license library | |
CN106162645B (en) | A kind of the quick of Mobile solution reconnects method for authenticating and system | |
CN101425925B (en) | Method, system and apparatus for providing authentication of data communication | |
WO2024007122A1 (en) | Point-to-point secure communication method for internet of things | |
CN113645250A (en) | Chinese herbal medicine traceability platform RFID protocol method based on cloud |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210107 Address after: 2 / F, No. 324-18, Huiyuan North Road, Jinjiang District, Chengdu, Sichuan 610000 Patentee after: Sichuan Yuntian Shengde Technology Co.,Ltd. Address before: 430300 room 2, 18 / F, unit 1, building 2, phase I, Hankou lakeside, xumiao village, panlongcheng Economic Development Zone, Huangpi District, Wuhan City, Hubei Province Patentee before: Wuhan qianyida Management Consulting Co.,Ltd. |
|
TR01 | Transfer of patent right |
Effective date of registration: 20210603 Address after: No. 804, unit 1, building 1, No. 1700, north section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan 610000 Patentee after: Chengdu weiding Network Technology Co.,Ltd. Address before: 2 / F, No. 324-18, Huiyuan North Road, Jinjiang District, Chengdu, Sichuan 610000 Patentee before: Sichuan Yuntian Shengde Technology Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220729 Address after: No. 39 Zhonghe Zhongjia lane, high tech Zone, Chengdu, Sichuan 610000 Patentee after: Sichuan Yiwang Jiayuan Information Technology Co.,Ltd. Address before: No. 804, unit 1, building 1, No. 1700, north section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan 610000 Patentee before: Chengdu weiding Network Technology Co.,Ltd. |
|
TR01 | Transfer of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201229 |
|
CF01 | Termination of patent right due to non-payment of annual fee |