CN111800384A - Financial service application management method and device based on block chain - Google Patents

Financial service application management method and device based on block chain Download PDF

Info

Publication number
CN111800384A
CN111800384A CN202010490887.2A CN202010490887A CN111800384A CN 111800384 A CN111800384 A CN 111800384A CN 202010490887 A CN202010490887 A CN 202010490887A CN 111800384 A CN111800384 A CN 111800384A
Authority
CN
China
Prior art keywords
encryption algorithm
module
service
financial service
communication module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010490887.2A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin Network Technology Co ltd
Original Assignee
Guangdong Hongxin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin Network Technology Co ltd filed Critical Guangdong Hongxin Network Technology Co ltd
Priority to CN202010490887.2A priority Critical patent/CN111800384A/en
Publication of CN111800384A publication Critical patent/CN111800384A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a financial service application management method and device based on a block chain, wherein the method comprises the following steps: registering with a financial service platform, and issuing the service number and the service key encrypted by the encryption algorithm to each user side by the financial service platform through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; carrying out identity authentication on a user needing financial service; the financial service platform performs business interaction with the user side; the service provided by the ethernet blockchain network is invoked through the invocation interface. The invention has various data transmission modes, can meet the requirements of users on the various data transmission modes, and has higher data transmission safety.

Description

Financial service application management method and device based on block chain
Technical Field
The invention relates to the field of financial service management, in particular to a financial service application management method and device based on a block chain.
Background
The blockchain is an account book data storage mode, and is an addable general ledger database which exists on a point-to-point network in a multi-copy mode. Various financial institutions at home and abroad try to apply a block chain technology to construct or optimize the existing financial infrastructure so as to further improve the existing business. Currently, the ethernet blockchain technology is rapidly developed, and has become one of the most influential solutions in the blockchain field. The existing financial service application systems based on the ether house block chain technology can provide safe and reliable various financial services for users, and simultaneously can reduce the application difficulty of the ether house block chain technology, thereby bringing great convenience to secondary developers, and simultaneously can improve the application range of the ether house block chain technology, so that the financial service application systems can be suitable for various wide business scenes in the fields of electronic commerce and financial services. However, the data transmission method is single, and the user's demand for diversified data transmission methods cannot be satisfied. In addition, the security of data transmission is not high because no security measures are taken.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a block chain-based financial service application management method and apparatus having multiple data transmission modes, capable of meeting the user's requirements for diversified data transmission modes, and having high security of data transmission, in view of the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a financial service application management method based on a block chain is constructed, and the method comprises the following steps:
A) a user inputs a user name and a password at a user side to register an account number to a financial service platform, and after the registration is successful, the financial service platform respectively issues a service number and a service key which are encrypted by an encryption algorithm to each user side through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
B) according to the service number and the service key, performing identity authentication on the user needing financial service;
C) the financial service platform performs business interaction with the user side; the service interaction is identified by a unique resource identifier;
D) the service provided by the ethernet blockchain network is invoked through the invocation interface.
In the financial service application management method based on the block chain, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm or a BLOWFSH encryption algorithm.
In the block chain-based financial service application management method according to the present invention, the step D) further includes:
D1) the user side sends a JSON format calling request to the financial service platform through the wireless communication module;
D2) and after the financial service platform successfully calls the corresponding service provided by the Ether house block chain network, returning a response message based on the JSON format to the user side.
In the block chain-based financial service application management method of the present invention, the unique resource identifier includes a business service name field.
The invention also relates to a device for realizing the financial service application management method based on the block chain, which comprises the following steps:
an account registration unit: the system comprises a financial service platform, a wireless communication module and a data processing module, wherein the financial service platform is used for inputting a user name and a password at a user end to register an account number to the financial service platform, and respectively issuing a service number and a service key which are encrypted by an encryption algorithm to each user end through the wireless communication module after the registration is successful; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
an identity authentication unit: the system is used for carrying out identity authentication on a user needing financial service according to the service number and the service key;
a service interaction unit: the financial service platform is used for carrying out business interaction with the user side; the service interaction is identified by a unique resource identifier;
a service calling unit: for invoking services provided by the ethernet blockchain network through the invocation interface.
In the device of the present invention, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
In the apparatus of the present invention, the service invoking unit further includes:
the calling request sending module: the client sends a JSON format calling request to the financial service platform through the wireless communication module;
a response message returning module: and the response message based on the JSON format is returned to the user side by the financial service platform after the corresponding service provided by the Etherhouse block chain network is successfully called.
In the apparatus of the present invention, the unique resource identifier includes a business service name field.
The implementation of the financial service application management method and device based on the block chain has the following beneficial effects: because the user inputs a user name and a password at the user side to register an account number to the financial service platform, after the registration is successful, the financial service platform respectively issues a service number and a service key which are encrypted by an encryption algorithm to each user side through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the invention provides various wireless communication modes, has various data transmission modes, can meet the requirements of users on various data transmission modes, and has higher data transmission safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method in one embodiment of a method and apparatus for blockchain based financial service application management in accordance with the present invention;
FIG. 2 is a specific flowchart of the embodiment for calling the service provided by the Ethernet bay blockchain network through the calling interface;
fig. 3 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiments of the method and the apparatus for block chain-based financial service application management according to the present invention, a flowchart of the method for block chain-based financial service application management is shown in fig. 1. In fig. 1, the block chain-based financial service application management method includes the following steps:
step S01, the user inputs the user name and the password to register the account number to the financial service platform at the user end, after the registration is successful, the financial service platform respectively issues the service number and the service key encrypted by the encryption algorithm to each user end through the wireless communication module: in this step, the user inputs a user name and a password at the user side to register an account number with the financial service platform, and after the account number registration is successful, the financial service platform respectively issues a service number and a service key encrypted by an encryption algorithm to each user side through the wireless communication module. The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The financial service application management method based on the block chain has various data transmission modes and can meet the requirements of users on various data transmission modes.
The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. Through data encryption, the safety of data transmission can be improved.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, the encryption algorithm adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states to replace the original DES, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. The RSA encryption algorithm, the first algorithm that can be used for both encryption and parity signing, is resistant to all cryptographic attacks known so far, and has been recommended by the ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: the MD5 encryption algorithm processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The idea behind the SHA1 encryption algorithm is to receive a piece of plaintext and then convert it into a (usually smaller) piece of ciphertext in an irreversible manner, which can also be simply understood as the process of taking a string of input codes (called a pre-map or message) and converting them into a short, fixed-bit output sequence, i.e., a hash value (also called a message digest or a message authentication code). The security of the one-way hash function is that the operation process that generates the hash value has a strong one-way property. If a password is embedded in the input sequence, anyone cannot generate the correct hash value without knowing the password, thereby ensuring its security. The SHA1 encryption algorithm input message is unlimited in length, and the output generated is a 160-bit message digest. The input is processed in 512-bit packets. The SHA1 encryption algorithm is irreversible, anti-collision, and has good avalanche effect.
The digital signature can be realized by a Hash algorithm, the principle of the digital signature is that a plaintext to be transmitted is converted into message digests (different plaintext correspond to different message digests) through a function operation (Hash), the message digests are encrypted and then transmitted to a receiver together with the plaintext, the receiver generates a new message digest for the received plaintext and decrypts and compares the new message digest with the message digest sent by the sender, the comparison result shows that the plaintext is not changed consistently, and if the comparison result shows that the plaintext is tampered.
The HMAC encryption algorithm is a key-dependent Hash operation message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The key owned by both the HMAC sender and the HMAC receiver is calculated, and a third party without the key cannot calculate the correct hash value, so that the data can be prevented from being tampered.
The 3DES encryption algorithm is a symmetric DES-based algorithm, and three times of encryption is performed on a block of data by using three different keys, so that the intensity is higher.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (the ECC encryption algorithm is more costly to the CPU than the RSA encryption algorithm).
The RC2 encryption algorithm and the RC4 encryption algorithm encrypt large amounts of data with variable-length keys faster than the DES encryption algorithm. The IDEA encryption algorithm is an international data encryption algorithm and provides very strong security using a 128-bit key. The BLOWFSH encryption algorithm uses a variable-length key, the length can reach 448 bits, and the running speed is high.
Step S02 is to authenticate the user who needs financial service according to the service number and the service key: in this step, the user who needs the financial service is authenticated according to the service number and the service key.
Step S03, the financial service platform performs business interaction with the user side: in this step, the financial service platform performs service interaction with the user side, and the service interaction is identified by the unique resource identifier. The unique resource identifier includes a business service name field.
Step S04 calls the service provided by the ethernet blockchain network through the call interface: in this step, the financial service platform calls the service provided by the ethernet block chain network through the calling interface.
For the present embodiment, the step S04 can be further refined, and the detailed flowchart is shown in fig. 2. In fig. 2, the step S04 further includes:
step S41, the user end sends a JSON format calling request to the financial service platform through the wireless communication module: in this step, the user side sends a JSON format calling request to the financial service platform through the wireless communication module.
Step S42, after the financial service platform successfully calls the corresponding service provided by the etherhouse blockchain network, returns a response message based on the JSON format to the user side: in this step, the financial service platform returns a response message based on the JSON format to the user side after successfully calling the corresponding service provided by the ethernet block chain network.
The embodiment also relates to a device for implementing the block chain-based financial service application management method, and a schematic structural diagram of the device is shown in fig. 3. In fig. 3, the device includes an account registration unit 1, an identity authentication unit 2, a service interaction unit 3, and a service invocation unit 4; the account registration unit 1 is used for a user to input a user name and a password at a user end to perform account registration on a financial service platform, and after the registration is successful, the financial service platform respectively issues a service number and a service key which are encrypted by an encryption algorithm to each user end through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The financial service application management method based on the block chain has various data transmission modes and can meet the requirements of users on various data transmission modes.
The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm, 3DES encryption algorithm, ECC encryption algorithm, RC2 encryption algorithm, RC4 encryption algorithm, IDEA encryption algorithm or BLOWFSH encryption algorithm. Through data encryption, the safety of data transmission can be improved.
The identity authentication unit 2 is used for authenticating the identity of the user needing the financial service according to the service number and the service key; the business interaction unit 3 is used for business interaction between the financial service platform and the user side; the business interaction is identified with a unique resource identifier that includes a business service name field. The service calling unit 4 is used for calling the service provided by the ethernet blockchain network through a calling interface.
In this embodiment, the service invoking unit 4 further includes an invoking request sending module 41 and a response message returning module 42; the calling request sending module 41 is used for sending a calling request in a JSON format to the financial service platform by the user side through the wireless communication module; the response message returning module 42 is configured to return a response message based on the JSON format to the user side after the financial service platform successfully calls the corresponding service provided by the ethernet block chain network.
In short, in this embodiment, because the user inputs the user name and the password at the user side to perform account registration with the financial service platform, after the registration is successful, the financial service platform issues the service number and the service key encrypted by the encryption algorithm to each user side through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the invention provides various wireless communication modes, has various data transmission modes, can meet the requirements of users on various data transmission modes, and has higher data transmission safety.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. A financial service application management method based on a block chain is characterized by comprising the following steps:
A) a user inputs a user name and a password at a user side to register an account number to a financial service platform, and after the registration is successful, the financial service platform respectively issues a service number and a service key which are encrypted by an encryption algorithm to each user side through a wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
B) according to the service number and the service key, performing identity authentication on the user needing financial service;
C) the financial service platform performs business interaction with the user side; the service interaction is identified by a unique resource identifier;
D) the service provided by the ethernet blockchain network is invoked through the invocation interface.
2. The blockchain-based financial services application management method according to claim 1, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFISH encryption algorithm.
3. The block chain-based financial service application management method according to claim 1, wherein said step D) further comprises:
D1) the user side sends a JSON format calling request to the financial service platform through the wireless communication module;
D2) and after the financial service platform successfully calls the corresponding service provided by the Ether house block chain network, returning a response message based on the JSON format to the user side.
4. The block chain based financial services application management method according to any one of claims 1 to 3 in which said unique resource identifier comprises a business service name field.
5. An apparatus for implementing the blockchain-based financial services application management method according to claim 1, comprising:
an account registration unit: the system comprises a financial service platform, a wireless communication module and a data processing module, wherein the financial service platform is used for inputting a user name and a password at a user end to register an account number to the financial service platform, and respectively issuing a service number and a service key which are encrypted by an encryption algorithm to each user end through the wireless communication module after the registration is successful; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
an identity authentication unit: the system is used for carrying out identity authentication on a user needing financial service according to the service number and the service key;
a service interaction unit: the financial service platform is used for carrying out business interaction with the user side; the service interaction is identified by a unique resource identifier;
a service calling unit: for invoking services provided by the ethernet blockchain network through the invocation interface.
6. The apparatus of claim 5, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, a 3DES encryption algorithm, an ECC encryption algorithm, an RC2 encryption algorithm, an RC4 encryption algorithm, an IDEA encryption algorithm, or a BLOWFSH encryption algorithm.
7. The apparatus of claim 5, wherein the service invoking unit further comprises:
the calling request sending module: the client sends a JSON format calling request to the financial service platform through the wireless communication module;
a response message returning module: and the response message based on the JSON format is returned to the user side by the financial service platform after the corresponding service provided by the Etherhouse block chain network is successfully called.
8. The apparatus of any of claims 5 to 7, wherein the unique resource identifier comprises a business service name field.
CN202010490887.2A 2020-06-02 2020-06-02 Financial service application management method and device based on block chain Withdrawn CN111800384A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010490887.2A CN111800384A (en) 2020-06-02 2020-06-02 Financial service application management method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010490887.2A CN111800384A (en) 2020-06-02 2020-06-02 Financial service application management method and device based on block chain

Publications (1)

Publication Number Publication Date
CN111800384A true CN111800384A (en) 2020-10-20

Family

ID=72806320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010490887.2A Withdrawn CN111800384A (en) 2020-06-02 2020-06-02 Financial service application management method and device based on block chain

Country Status (1)

Country Link
CN (1) CN111800384A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395175A (en) * 2021-06-03 2021-09-14 广东省城乡规划设计研究院有限责任公司 Network management system based on virtualization

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395175A (en) * 2021-06-03 2021-09-14 广东省城乡规划设计研究院有限责任公司 Network management system based on virtualization

Similar Documents

Publication Publication Date Title
US7305548B2 (en) Using atomic messaging to increase the security of transferring data across a network
CN105376261B (en) Encryption method and system for instant messaging message
US20200351100A1 (en) Cryptographic method for verifying data
CN108090370A (en) Instant messaging encryption method and system based on index
CN1316405C (en) Method for obtaining digital siguature and realizing data safety
Kasodhan et al. A new approach of digital signature verification based on BioGamal algorithm
CN111432403A (en) Data auditing method and device based on block chain
CN111800784A (en) Block chain cloud service system based on cloud computing
CN116866029B (en) Random number encryption data transmission method, device, computer equipment and storage medium
CN111683061A (en) Block chain-based Internet of things equipment access control method and device
CN105635114A (en) Password verification method and system
CN111800384A (en) Financial service application management method and device based on block chain
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN111641494A (en) Method and device for realizing global block chain
CN111654854A (en) Remote data optimized transmission method and system based on cloud computing system
CN111654859A (en) Mobile block chain resource allocation method and device
Al-juaifari Secure SMS Mobile Transaction with Peer to Peer Authentication Design for Mobile Government
JP5932709B2 (en) Transmission side device and reception side device
CN111967955A (en) Electronic financial wind-controlled payment system based on block chain and 5G network technology
CN112788046A (en) Method and system for encrypting transmission information
CN111768266A (en) Shopping system for commodities in shopping mall based on block chain and 5G network technology
CN111723405A (en) Decentralized multiple digital signature/electronic signature method
CN111682944A (en) Block chain network-based certificate revocation method and device
CN111698679A (en) Data searching method and device based on block chain as service platform
CN111695890A (en) Charging method and device based on block chain and cloud platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201020

WW01 Invention patent application withdrawn after publication