CN111695890A - Charging method and device based on block chain and cloud platform - Google Patents
Charging method and device based on block chain and cloud platform Download PDFInfo
- Publication number
- CN111695890A CN111695890A CN202010441407.3A CN202010441407A CN111695890A CN 111695890 A CN111695890 A CN 111695890A CN 202010441407 A CN202010441407 A CN 202010441407A CN 111695890 A CN111695890 A CN 111695890A
- Authority
- CN
- China
- Prior art keywords
- encryption algorithm
- module
- charging information
- server
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/14—Payment architectures specially adapted for billing systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Abstract
The invention discloses a charging method and a device based on a block chain and a cloud platform, wherein the method comprises the following steps: the client collects charging information; the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the server records the received charging information in a block chain; intelligent contracts for blockchains automatically charge fees. The block chain and cloud platform based charging method and device have the following beneficial effects: the wireless data transmission system has various wireless data transmission modes, can meet the requirements of users on various data transmission modes, and has higher data transmission safety.
Description
Technical Field
The invention relates to the field of block chains, in particular to a charging method and device based on a block chain and a cloud platform.
Background
In the traditional charging system, the charging data is stored in the block chain cloud node, so that the non-tampering property of the charging data is ensured, and the reliability of the charging data is improved; meanwhile, when the payment condition is met, the intelligent contract of the block chain automatically triggers the charging operation, so that the integrated automation of charging and payment is realized; in addition, all cloud nodes of the server are arranged on the cloud computing platform, so that dynamic and rapid migration of the charging cloud nodes is realized, and the continuity of charging is ensured. However, the data transmission method is single, and the user's demand for diversified data transmission methods cannot be satisfied. In addition, the data transmission is not safe due to the lack of safety protection measures in the data transmission process.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a charging method and device based on a block chain and a cloud platform, which have multiple wireless data transmission modes, can meet the requirements of users on diversified data transmission modes, and has high security of data transmission, and the device and method provided by the present invention are directed to the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a charging method based on a block chain and a cloud platform is constructed, and the method comprises the following steps:
A) the client collects charging information;
B) the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
C) the server records the received charging information in a block chain;
D) the intelligent contracts for the blockchains automatically charge a fee.
In the charging method based on the block chain and the cloud platform, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm or a BLOWFSH encryption algorithm.
In the charging method based on the block chain and the cloud platform, the server is provided with a plurality of cloud nodes, and the cloud nodes operate on the cloud computing platform.
The invention also relates to a device for realizing the charging method based on the block chain and the cloud platform, which is characterized by comprising the following steps:
a charging information collection unit: the client is used for collecting charging information;
an encryption transmission unit: the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
block chain recording unit: the server records the received charging information in a block chain;
an automatic charging unit: intelligent contracts for the blockchain automatically charge a fee.
In the device of the present invention, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
In the device, the server side is provided with a plurality of cloud nodes, and the cloud nodes operate on a cloud computing platform.
The block chain and cloud platform based charging method and device have the following beneficial effects: as the client collects the charging information; the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and provides a plurality of wireless communication modes to encrypt and transmit charging information and improve the safety of data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method in an embodiment of a charging method and apparatus based on a block chain and a cloud platform according to the present invention;
fig. 2 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the charging method based on the block chain and the cloud platform, a schematic structural diagram of the charging method based on the block chain and the cloud platform is shown in fig. 1. In fig. 1, the charging method based on the block chain and the cloud platform includes the following steps:
step S01 the client collects charging information: in this step, the client collects charging information.
Step S02, the client selects the server, and sends the charging information to the server through the wireless communication module after being encrypted by the encryption algorithm: in the step, the client selects the server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. The charging information is encrypted and then transmitted, so that the data transmission safety is high. The server is provided with a plurality of cloud nodes, and the cloud nodes run on the cloud computing platform.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The charging method based on the block chain and the cloud platform has various wireless data transmission modes and can meet the requirements of users on various data transmission modes.
Step S03, the server records the received charging information in the blockchain: in this step, the server records the received charging information in the block chain.
Step S04 intelligent contract for blockchain automatically charges a fee: in this step, the intelligent contract of the block chain automatically collects the fee.
The embodiment also relates to a device for implementing the charging method based on the block chain and the cloud platform, and a schematic structural diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes a billing information collection unit 1, an encryption transmission unit 2, a block chain recording unit 3, and an automatic charging unit 4.
The charging information collecting unit 1 is used for collecting charging information by a client; the encryption transmission unit 2 is used for the client to select the server, and the charging information is encrypted by the encryption algorithm and then sent to the server through the wireless communication module. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. The charging information is encrypted and then transmitted, so that the data transmission safety is high. The server is provided with a plurality of cloud nodes, and the cloud nodes run on the cloud computing platform.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The device of the invention has multiple wireless data transmission modes and can meet the requirements of users on diversified data transmission modes.
The block chain recording unit 3 is used for the server to record the received charging information in the block chain; the automatic charging unit 4 is used for automatically charging the intelligent contract of the block chain.
In summary, in this embodiment, the client collects charging information; the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and provides a plurality of wireless communication modes to encrypt and transmit charging information and improve the safety of data.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A charging method based on a block chain and a cloud platform is characterized by comprising the following steps:
A) the client collects charging information;
B) the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
C) the server records the received charging information in a block chain;
D) the intelligent contracts for the blockchains automatically charge a fee.
2. The blockchain and cloud platform based charging method according to claim 1, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
3. The charging method based on the blockchain and the cloud platform according to claim 2, wherein the server is provided with a plurality of cloud nodes, and the cloud nodes operate on a cloud computing platform.
4. An apparatus for implementing the block chain and cloud platform based charging method according to claim 1, comprising:
a charging information collection unit: the client is used for collecting charging information;
an encryption transmission unit: the client selects a server, encrypts the charging information by an encryption algorithm and then sends the charging information to the server through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
block chain recording unit: the server records the received charging information in a block chain;
an automatic charging unit: intelligent contracts for the blockchain automatically charge a fee.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFSH encryption algorithm.
6. The device according to claim 5, wherein the server is provided with a plurality of cloud nodes, and the cloud nodes run on a cloud computing platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010441407.3A CN111695890A (en) | 2020-05-22 | 2020-05-22 | Charging method and device based on block chain and cloud platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010441407.3A CN111695890A (en) | 2020-05-22 | 2020-05-22 | Charging method and device based on block chain and cloud platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111695890A true CN111695890A (en) | 2020-09-22 |
Family
ID=72476778
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010441407.3A Withdrawn CN111695890A (en) | 2020-05-22 | 2020-05-22 | Charging method and device based on block chain and cloud platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111695890A (en) |
-
2020
- 2020-05-22 CN CN202010441407.3A patent/CN111695890A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109559122A (en) | Block chain data transmission method and block chain data transmission system | |
CN112165443A (en) | Multi-key information encryption and decryption method and device and storage medium | |
CN105376261A (en) | Encryption method and system for instant communication message | |
CN111049738B (en) | E-mail data security protection method based on hybrid encryption | |
CN114499857B (en) | Method for realizing data correctness and consistency in encryption and decryption of large data quanta | |
CN116321129A (en) | Lightweight dynamic key-based power transaction private network communication encryption method | |
CN111432403A (en) | Data auditing method and device based on block chain | |
CN111800784A (en) | Block chain cloud service system based on cloud computing | |
Chaeikar et al. | Secure SMS transmission based on social network messages | |
CN111683061A (en) | Block chain-based Internet of things equipment access control method and device | |
CN111931194A (en) | Security monitoring big data processing method and device based on cloud computing | |
CN115102768B (en) | Data processing method and device and computer equipment | |
CN111800384A (en) | Financial service application management method and device based on block chain | |
CN111641494A (en) | Method and device for realizing global block chain | |
CN111654859A (en) | Mobile block chain resource allocation method and device | |
CN111695890A (en) | Charging method and device based on block chain and cloud platform | |
CN111654854A (en) | Remote data optimized transmission method and system based on cloud computing system | |
CN111698679A (en) | Data searching method and device based on block chain as service platform | |
CN111682944A (en) | Block chain network-based certificate revocation method and device | |
CN111800785A (en) | Cloud forensics process recording method and device based on block chain | |
CN111698219A (en) | Block chain ledger implementation method and device based on material spectral characteristics | |
CN111711950A (en) | Outsourcing calculation payment method and device based on bitcoin | |
Meng et al. | A multi-connection encryption algorithm applied in secure channel service system | |
Kanickam et al. | Comparative analysis of hash authentication algorithms and ECC based security algorithms in cloud data | |
Libed et al. | Enhancing MD5 Collision Susceptibility |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200922 |
|
WW01 | Invention patent application withdrawn after publication |