CN111695890A - Charging method and device based on block chain and cloud platform - Google Patents

Charging method and device based on block chain and cloud platform Download PDF

Info

Publication number
CN111695890A
CN111695890A CN202010441407.3A CN202010441407A CN111695890A CN 111695890 A CN111695890 A CN 111695890A CN 202010441407 A CN202010441407 A CN 202010441407A CN 111695890 A CN111695890 A CN 111695890A
Authority
CN
China
Prior art keywords
encryption algorithm
module
charging information
server
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010441407.3A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin Network Technology Co ltd
Original Assignee
Guangdong Hongxin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin Network Technology Co ltd filed Critical Guangdong Hongxin Network Technology Co ltd
Priority to CN202010441407.3A priority Critical patent/CN111695890A/en
Publication of CN111695890A publication Critical patent/CN111695890A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention discloses a charging method and a device based on a block chain and a cloud platform, wherein the method comprises the following steps: the client collects charging information; the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the server records the received charging information in a block chain; intelligent contracts for blockchains automatically charge fees. The block chain and cloud platform based charging method and device have the following beneficial effects: the wireless data transmission system has various wireless data transmission modes, can meet the requirements of users on various data transmission modes, and has higher data transmission safety.

Description

Charging method and device based on block chain and cloud platform
Technical Field
The invention relates to the field of block chains, in particular to a charging method and device based on a block chain and a cloud platform.
Background
In the traditional charging system, the charging data is stored in the block chain cloud node, so that the non-tampering property of the charging data is ensured, and the reliability of the charging data is improved; meanwhile, when the payment condition is met, the intelligent contract of the block chain automatically triggers the charging operation, so that the integrated automation of charging and payment is realized; in addition, all cloud nodes of the server are arranged on the cloud computing platform, so that dynamic and rapid migration of the charging cloud nodes is realized, and the continuity of charging is ensured. However, the data transmission method is single, and the user's demand for diversified data transmission methods cannot be satisfied. In addition, the data transmission is not safe due to the lack of safety protection measures in the data transmission process.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a charging method and device based on a block chain and a cloud platform, which have multiple wireless data transmission modes, can meet the requirements of users on diversified data transmission modes, and has high security of data transmission, and the device and method provided by the present invention are directed to the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a charging method based on a block chain and a cloud platform is constructed, and the method comprises the following steps:
A) the client collects charging information;
B) the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
C) the server records the received charging information in a block chain;
D) the intelligent contracts for the blockchains automatically charge a fee.
In the charging method based on the block chain and the cloud platform, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm or a BLOWFSH encryption algorithm.
In the charging method based on the block chain and the cloud platform, the server is provided with a plurality of cloud nodes, and the cloud nodes operate on the cloud computing platform.
The invention also relates to a device for realizing the charging method based on the block chain and the cloud platform, which is characterized by comprising the following steps:
a charging information collection unit: the client is used for collecting charging information;
an encryption transmission unit: the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
block chain recording unit: the server records the received charging information in a block chain;
an automatic charging unit: intelligent contracts for the blockchain automatically charge a fee.
In the device of the present invention, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
In the device, the server side is provided with a plurality of cloud nodes, and the cloud nodes operate on a cloud computing platform.
The block chain and cloud platform based charging method and device have the following beneficial effects: as the client collects the charging information; the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and provides a plurality of wireless communication modes to encrypt and transmit charging information and improve the safety of data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method in an embodiment of a charging method and apparatus based on a block chain and a cloud platform according to the present invention;
fig. 2 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the charging method based on the block chain and the cloud platform, a schematic structural diagram of the charging method based on the block chain and the cloud platform is shown in fig. 1. In fig. 1, the charging method based on the block chain and the cloud platform includes the following steps:
step S01 the client collects charging information: in this step, the client collects charging information.
Step S02, the client selects the server, and sends the charging information to the server through the wireless communication module after being encrypted by the encryption algorithm: in the step, the client selects the server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. The charging information is encrypted and then transmitted, so that the data transmission safety is high. The server is provided with a plurality of cloud nodes, and the cloud nodes run on the cloud computing platform.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The charging method based on the block chain and the cloud platform has various wireless data transmission modes and can meet the requirements of users on various data transmission modes.
Step S03, the server records the received charging information in the blockchain: in this step, the server records the received charging information in the block chain.
Step S04 intelligent contract for blockchain automatically charges a fee: in this step, the intelligent contract of the block chain automatically collects the fee.
The embodiment also relates to a device for implementing the charging method based on the block chain and the cloud platform, and a schematic structural diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes a billing information collection unit 1, an encryption transmission unit 2, a block chain recording unit 3, and an automatic charging unit 4.
The charging information collecting unit 1 is used for collecting charging information by a client; the encryption transmission unit 2 is used for the client to select the server, and the charging information is encrypted by the encryption algorithm and then sent to the server through the wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. The charging information is encrypted and then transmitted, so that the data transmission safety is high. The server is provided with a plurality of cloud nodes, and the cloud nodes run on the cloud computing platform.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The device of the invention has multiple wireless data transmission modes and can meet the requirements of users on diversified data transmission modes.
The block chain recording unit 3 is used for the server to record the received charging information in the block chain; the automatic charging unit 4 is used for automatically charging the intelligent contract of the block chain.
In summary, in this embodiment, the client collects charging information; the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and provides a plurality of wireless communication modes to encrypt and transmit charging information and improve the safety of data.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A charging method based on a block chain and a cloud platform is characterized by comprising the following steps:
A) the client collects charging information;
B) the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
C) the server records the received charging information in a block chain;
D) the intelligent contracts for the blockchains automatically charge a fee.
2. The blockchain and cloud platform based charging method according to claim 1, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
3. The charging method based on the blockchain and the cloud platform according to claim 2, wherein the server is provided with a plurality of cloud nodes, and the cloud nodes operate on a cloud computing platform.
4. An apparatus for implementing the block chain and cloud platform based charging method according to claim 1, comprising:
a charging information collection unit: the client is used for collecting charging information;
an encryption transmission unit: the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
block chain recording unit: the server records the received charging information in a block chain;
an automatic charging unit: intelligent contracts for the blockchain automatically charge a fee.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFSH encryption algorithm.
6. The device according to claim 5, wherein the server is provided with a plurality of cloud nodes, and the cloud nodes run on a cloud computing platform.
CN202010441407.3A 2020-05-22 2020-05-22 Charging method and device based on block chain and cloud platform Withdrawn CN111695890A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010441407.3A CN111695890A (en) 2020-05-22 2020-05-22 Charging method and device based on block chain and cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010441407.3A CN111695890A (en) 2020-05-22 2020-05-22 Charging method and device based on block chain and cloud platform

Publications (1)

Publication Number Publication Date
CN111695890A true CN111695890A (en) 2020-09-22

Family

ID=72476778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010441407.3A Withdrawn CN111695890A (en) 2020-05-22 2020-05-22 Charging method and device based on block chain and cloud platform

Country Status (1)

Country Link
CN (1) CN111695890A (en)

Similar Documents

Publication Publication Date Title
CN109559122A (en) Block chain data transmission method and block chain data transmission system
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN105376261A (en) Encryption method and system for instant communication message
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN116321129A (en) Lightweight dynamic key-based power transaction private network communication encryption method
CN111432403A (en) Data auditing method and device based on block chain
CN111800784A (en) Block chain cloud service system based on cloud computing
Chaeikar et al. Secure SMS transmission based on social network messages
CN111683061A (en) Block chain-based Internet of things equipment access control method and device
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN115102768B (en) Data processing method and device and computer equipment
CN111800384A (en) Financial service application management method and device based on block chain
CN111641494A (en) Method and device for realizing global block chain
CN111654859A (en) Mobile block chain resource allocation method and device
CN111695890A (en) Charging method and device based on block chain and cloud platform
CN111654854A (en) Remote data optimized transmission method and system based on cloud computing system
CN111698679A (en) Data searching method and device based on block chain as service platform
CN111682944A (en) Block chain network-based certificate revocation method and device
CN111800785A (en) Cloud forensics process recording method and device based on block chain
CN111698219A (en) Block chain ledger implementation method and device based on material spectral characteristics
CN111711950A (en) Outsourcing calculation payment method and device based on bitcoin
Meng et al. A multi-connection encryption algorithm applied in secure channel service system
Kanickam et al. Comparative analysis of hash authentication algorithms and ECC based security algorithms in cloud data
Libed et al. Enhancing MD5 Collision Susceptibility

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200922

WW01 Invention patent application withdrawn after publication