CN111985921A - Verification processing method based on block chain offline payment and digital financial service platform - Google Patents

Verification processing method based on block chain offline payment and digital financial service platform Download PDF

Info

Publication number
CN111985921A
CN111985921A CN202010871481.9A CN202010871481A CN111985921A CN 111985921 A CN111985921 A CN 111985921A CN 202010871481 A CN202010871481 A CN 202010871481A CN 111985921 A CN111985921 A CN 111985921A
Authority
CN
China
Prior art keywords
transaction
abnormal response
encryption
decryption
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010871481.9A
Other languages
Chinese (zh)
Other versions
CN111985921B (en
Inventor
冒炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LianBo (Chengdu) Technology Co.,Ltd.
Original Assignee
冒炜
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 冒炜 filed Critical 冒炜
Priority to CN202110051163.2A priority Critical patent/CN112785304A/en
Priority to CN202110051157.7A priority patent/CN112785303A/en
Priority to CN202010871481.9A priority patent/CN111985921B/en
Publication of CN111985921A publication Critical patent/CN111985921A/en
Application granted granted Critical
Publication of CN111985921B publication Critical patent/CN111985921B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The embodiment of the application provides a verification processing method based on blockchain offline payment and a digital financial service platform, appointed encryption and decryption strategy offline token information is respectively sent to a payment transaction service terminal and a digital financial service terminal which finish pre-business security authentication through the digital financial service platform, and offline payment is carried out by taking the appointed encryption and decryption strategy offline token information as the identity security authentication basis of the payment transaction service terminal and the digital transaction service terminal in an offline blockchain network state, so that the security in an offline payment process is improved, the probability of information stealing and information interception is reduced, when the payment transaction service terminal and the digital financial service terminal are switched to the online blockchain network state, the digital financial service platform respectively acquires a first offline payment bill list and a second offline payment bill list and uploads the first offline payment bill list and the second offline payment bill list to a corresponding blockchain system for content updating, thus, offline bill payment can be synchronized in real time.

Description

Verification processing method based on block chain offline payment and digital financial service platform
Technical Field
The application relates to the technical field of block chain offline payment, in particular to a verification processing method based on block chain offline payment and a digital financial service platform.
Background
With the development of mobile internet technology and digital currency operation, digital currency will gradually become a new dominant payment mode in the future, and not only can support online payment, but also can support offline payment in an offline network state as in the current cash transaction.
However, the security of performing offline payment in an offline network state still remains a technical problem to be solved.
Disclosure of Invention
In view of the above, an object of the present application is to provide a verification processing method based on block chain offline payment and a digital financial service platform, which can improve security in an offline payment process and reduce probabilities of information stealing and information interception.
According to a first aspect of the present application, there is provided a verification processing method based on blockchain offline payment, which is applied to a verification processing system based on blockchain offline payment, where the verification processing system based on blockchain offline payment includes a payment transaction service terminal, a digital financial service terminal communicatively connected to the payment transaction service terminal, and a digital financial service platform communicatively connected to the digital financial service terminal, and the method includes:
in an online block chain network state, the digital financial service platform respectively sends appointed encryption and decryption strategy offline token information confirmed by a payment transaction service terminal and a digital financial service terminal to the payment transaction service terminal and the digital financial service terminal which finish pre-business security authentication, wherein the appointed encryption and decryption strategy offline token information comprises encryption and decryption strategies of different transaction elements;
the payment transaction service terminal establishes an offline transaction communication channel with the digital financial service terminal in an offline blockchain network state, encrypts transaction transmission data of a transaction service initiated to the digital financial service terminal this time based on an encryption and decryption strategy corresponding to a current transaction element in the specified encryption and decryption strategy offline token information to obtain encrypted transaction transmission data, and sends the encrypted transaction transmission data to the digital financial service terminal through the offline transaction communication channel, wherein the current transaction element is used for representing a preset transaction element corresponding to the transaction service this time, and the preset transaction element is related to transaction environment information corresponding to the transaction service this time;
the digital financial service terminal acquires the encrypted transaction transmission data through the transaction communication channel, decrypts the encrypted transaction transmission data based on an encryption and decryption strategy corresponding to a current transaction element in the specified encryption and decryption strategy offline token information, acquires decrypted transaction transmission data, performs payment verification processing according to the decrypted transaction transmission data, and sends a payment result to the payment transaction service terminal;
the payment transaction service terminal generates a corresponding payment bill according to the payment result, pre-stores the payment bill to obtain a first offline payment bill list in an offline blockchain network state, and simultaneously sends the payment bill to the digital financial service terminal, so that the digital financial service terminal pre-stores the payment bill to obtain a second offline payment bill list in an offline blockchain network state;
and after the payment transaction service terminal and the digital financial service terminal are switched to an online blockchain network state, the digital financial service platform respectively acquires the first offline payment bill list and the second offline payment bill list, and uploads the first offline payment bill list and the second offline payment bill list to a corresponding blockchain system for content updating.
In a possible implementation manner of the first aspect, the method further includes:
when the digital financial service terminal fails to decrypt the encrypted transaction transmission data based on the encryption and decryption strategy corresponding to the current transaction element in the specified encryption and decryption strategy offline token information, or when the received transaction transmission data does not have the encryption and decryption strategy corresponding to the current transaction element in the specified encryption and decryption strategy offline token information, ending the transaction service; and
and when the payment transaction service terminal does not receive the payment result within a preset time period, ending the transaction service.
In a possible implementation manner of the first aspect, the method further includes:
the digital financial service platform acquires a transaction process record information list of each payment transaction service terminal or each digital financial service terminal in a historical payment process, and acquires a transaction abnormal record list according to the transaction process record information list, wherein the transaction process record information list comprises a continuous preset number of transaction process record information, and the transaction abnormal record list comprises a continuous preset number of transaction abnormal records;
determining a plurality of corresponding different encryption and decryption strategies according to each transaction exception record in the transaction exception record list and exception receiving instruction set information which is recorded in advance and corresponds to each transaction exception record, and distributing the plurality of corresponding different encryption and decryption strategies to different transaction elements of the specified encryption and decryption strategy offline token information.
In a possible implementation manner of the first aspect, the step of determining, according to each transaction exception record in the transaction exception record list and exception receiving instruction set information corresponding to each transaction exception record and recorded in advance, a plurality of corresponding different encryption and decryption policies includes:
acquiring a transaction characteristic label list through a first sub-network included in a transaction characteristic matching network based on the transaction process record information list, wherein the transaction characteristic label list comprises a preset number of transaction characteristic labels;
acquiring a transaction abnormity analysis label list through a second sub-network included in the transaction characteristic matching network based on the transaction abnormity record list, wherein the transaction abnormity analysis label list comprises a preset number of transaction abnormity analysis labels;
and acquiring reinforced encryption elements corresponding to the transaction process record information based on the transaction characteristic tag list and the transaction exception analysis tag list, and determining a plurality of corresponding different encryption and decryption strategies according to the reinforced encryption elements and exception receiving instruction sets which are recorded in advance and correspond to each transaction exception record.
In a possible implementation manner of the first aspect, the step of determining, according to the enhanced encryption element and a pre-recorded exception receiving instruction set corresponding to each transaction exception record, a plurality of corresponding different encryption and decryption policies includes:
acquiring a plurality of abnormal response objects from an abnormal receiving instruction set which is recorded in advance and corresponds to each transaction abnormal record, and extracting corresponding abnormal response analysis vectors from the abnormal response objects respectively, wherein the abnormal response analysis vectors are used for expressing response characteristic vectors corresponding to response protocol components corresponding to the abnormal response objects;
determining abnormal suspicious mapping entities among the abnormal response objects according to the extracted abnormal response analysis vectors, and constructing corresponding encryption and decryption packaging entities according to the calculated abnormal suspicious mapping entities among the abnormal response objects;
respectively determining the encryption and decryption packaging key relation corresponding to each abnormal response object according to the constructed encryption and decryption packaging entity;
and determining a plurality of corresponding different encryption and decryption strategies according to the encryption and decryption packaging key relationship corresponding to each abnormal response object and the element hierarchical relationship among the plurality of strengthened encryption elements.
In a possible implementation manner of the first aspect, the step of extracting corresponding abnormal response analysis vectors from the plurality of abnormal response objects includes:
clustering each historical collected transaction sample information corresponding to the abnormal response objects to obtain a cluster of each historical collected transaction sample information;
determining transaction enabling table items of the clustering clusters obtained by clustering, sequencing all clustering clusters according to corresponding transaction enabling table items, and then selecting the clustering clusters in a set sequence from all clustering clusters obtained by clustering;
according to a preset cluster vector extraction strategy aiming at the cluster, determining the cluster of the abnormal response analysis vector specified by the cluster vector extraction strategy;
when the same historical collected transaction sample information comprises a plurality of clustering clusters belonging to different abnormal response analysis vectors, counting the number of the clustering clusters of each abnormal response analysis vector in the same historical collected transaction sample information;
determining the abnormal response analysis vector with the largest number of the counted clustering clusters, adding an abnormal transaction identification label of the determined abnormal response analysis vector for the same historical collected transaction sample information, and adding an abnormal transaction identification label of a non-abnormal response analysis vector for the historical collected transaction sample information of the clustering clusters not including the abnormal response analysis vector;
fusing collected transaction sample information and the added abnormal transaction identification label according to history to be characterized to obtain a first training network, inputting each cluster into the first training network, and outputting a classification reference parameter of each cluster for each abnormal response analysis vector;
re-determining the cluster with the classification reference parameter of each abnormal response analysis vector larger than or equal to the first classification reference parameter threshold value as the cluster of the abnormal response analysis vector, returning the abnormal transaction identification label of the abnormal response analysis vector added to the same historical collected transaction sample information and continuously processing the abnormal transaction identification label until the iteration stop condition is met to obtain the abnormal transaction identification label of the historical collected transaction sample information to be subjected to feature extraction;
after the iteration stopping condition is met, obtaining the classification reference parameters of the historical collected transaction sample information to be subjected to feature extraction, which is determined by the corresponding training network, for each abnormal response analysis vector, and screening that the classification reference parameters for each abnormal response analysis vector are greater than or equal to a second classification reference parameter threshold;
collecting transaction sample information and corresponding abnormal transaction identification labels according to the screened history for fusion to obtain a second training network;
determining the classification reference parameters of the historical collected transaction sample information to be subjected to feature extraction for each abnormal response analysis vector through the second training network, and updating the abnormal transaction identification labels of the corresponding historical collected transaction sample information according to the classification reference parameters of the historical collected transaction sample information to be subjected to feature extraction for each abnormal response analysis vector;
after the abnormal transaction identification label of the corresponding historical collected transaction sample information is updated for the classification reference parameter of each abnormal response analysis vector according to the historical collected transaction sample information to be subjected to feature extraction, returning to the step of screening the historical collected transaction sample information of which the classification reference parameter is greater than or equal to the second classification reference parameter threshold value for each abnormal response analysis vector to continue execution until the updating stop condition is met, and obtaining the abnormal transaction identification label after the historical collected transaction sample information to be subjected to feature extraction is updated;
obtaining classification reference parameters of the historical collected transaction sample information determined by the second training network and subjected to feature extraction for each abnormal response analysis vector and classification reference parameters belonging to non-abnormal response analysis vectors after updating the abnormal transaction identification label;
selecting historical collected transaction sample information which is determined after the abnormal transaction identification label is updated and has classification reference parameters for each abnormal response analysis vector larger than or equal to a third classification reference parameter threshold value, and fusing the collected transaction sample information and the corresponding abnormal transaction identification label according to the selected historical collected transaction sample information to obtain a third training network;
determining a classification reference parameter of each abnormal response analysis vector of the historical collected transaction sample information to be subjected to feature extraction through the third training network, and determining an abnormal response analysis vector of the corresponding historical collected transaction sample information according to the classification reference parameter of each abnormal response analysis vector determined through the third training network;
acquiring target history collection transaction sample information which is different from the history collection transaction sample information to be subjected to feature extraction, determining classification reference parameters of the target history collection transaction sample information for each abnormal response analysis vector through the third training network, and then determining abnormal response analysis vectors corresponding to the target history collection transaction sample information according to the classification reference parameters of the target history collection transaction sample information for each abnormal response analysis vector;
and summarizing the abnormal response analysis vectors of the historical collected transaction sample information according to the determined abnormal response analysis vectors to obtain abnormal response objects, and extracting the corresponding abnormal response analysis vectors respectively.
In a possible implementation manner of the first aspect, the step of determining an abnormal suspicious mapping entity between each abnormal response object according to the extracted abnormal response analysis vector includes:
obtaining abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects from the extracted abnormal response analysis vectors;
and determining an abnormal suspicious mapping entity between the abnormal response objects according to the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects, wherein the abnormal suspicious mapping entity is an aggregation entity between the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects.
In a possible implementation manner of the first aspect, the step of constructing a corresponding encryption/decryption encapsulation entity according to the calculated abnormal suspicious mapping entity between the abnormal response objects includes:
according to the calculated abnormal suspicious mapping entities among the abnormal response objects, dividing each target abnormal response object covered by the same type of abnormal suspicious mapping entity into an object array, reducing the array hierarchy of the object array with the object density higher than the preset density according to the object density in each object array, and expanding the array hierarchy of the object array with the object density lower than the preset density to obtain each adjusted object array; wherein, all abnormal response objects in each object array form an encryption and decryption element;
calculating key arrangement information between each abnormal response object and other abnormal response objects in the single encryption and decryption element according to the position of each abnormal response object in the single encryption and decryption element;
for a single encryption and decryption element, sorting all abnormal response objects in the single encryption and decryption element according to the sequence of key arrangement information between each abnormal response object and other abnormal response objects to obtain an abnormal response object sorting list;
for a single encryption and decryption element, sequentially executing the following processes on each abnormal response object in the abnormal response object ordered list until determining a target abnormal response object of the single encryption and decryption element:
judging whether a first abnormal response intensity of the abnormal response objects in the abnormal response object ordered list is greater than a first preset intensity, and if so, taking the abnormal response objects with the first preset intensity as target abnormal response objects of a single encryption and decryption element;
for a single encryption and decryption element, determining a target exception response object of the single encryption and decryption element as an exception response object in mapping association with the target exception response object, and determining other exception response objects except the target exception response object of the single encryption and decryption element as sub exception response objects of the single encryption and decryption element, wherein the sub exception response objects of the single encryption and decryption element are exception response objects in mapping association with the target exception response object of the single encryption and decryption element;
and constructing a corresponding encryption and decryption packaging entity according to the determined target abnormal response object and the sub abnormal response object of each encryption and decryption element, wherein the encryption and decryption packaging entity is used for representing a packaging function entity corresponding to an encryption packaging node formed by the target abnormal response object and the sub abnormal response object of each encryption and decryption element.
In a possible implementation manner of the first aspect, the step of determining, according to the constructed encryption and decryption encapsulation entities, encryption and decryption encapsulation key relationships corresponding to the abnormal response objects respectively includes:
acquiring an encryption and decryption packaging key relation distribution map of the target abnormal response object and the sub-abnormal response object according to an abnormal association part between each target abnormal response object and the sub-abnormal response object in the constructed encryption and decryption packaging entity, and taking the encryption and decryption packaging key relation distribution map as a key relation node to enable each target abnormal response object and the sub-abnormal response object to be expressed into a key relation node consisting of the encryption and decryption packaging key relation distribution maps of the target abnormal response object and the sub-abnormal response object;
acquiring all similar key relation nodes from the key relation nodes of each target abnormal response object and each sub abnormal response object according to the scheduling type of the key relation node corresponding to the target abnormal response object and the sub abnormal response object to form a first key relation node list;
carrying out naive Bayes processing on key relation nodes corresponding to the target abnormal response object and the sub abnormal response object in the first key relation node list to obtain a naive Bayes classification result and a naive Bayes attribute probability;
calculating a screening key relation of a key relation node which takes the target abnormal response object and the sub abnormal response object as a reference and does not contain a key relation with a preset probability or more according to the naive Bayes classification result and the naive Bayes attribute probability;
when each target abnormal response object and each sub abnormal response object calculate to obtain a screening key relation that a key relation node taking the target abnormal response object and the sub abnormal response object as a center does not contain a key relation more than a preset probability, obtaining the target abnormal response object and the sub abnormal response object which do not contain the key relation more than the preset probability according to the screening key relation which corresponds to each target abnormal response object and each sub abnormal response object and does not contain the key relation more than the preset probability;
obtaining a second key relation node list according to the target abnormal response object and the sub abnormal response object which do not contain the key relation more than the preset probability, and carrying out naive Bayes processing on the second key relation node list to obtain a naive Bayes classification result sequence corresponding to the second key relation node list;
calculating an opportunity node and a naive Bayes feature vector for the naive Bayes classification result sequence, taking the naive Bayes feature vector as an initial value, and respectively processing the key relation nodes corresponding to the target abnormal response object and the sub-abnormal response object in the second key relation node list according to the opportunity node to obtain corresponding encryption and decryption packaging key contents;
and respectively determining the encryption and decryption packaging key relationship corresponding to each abnormal response object according to the key generation relationship in the encryption and decryption packaging key content.
According to a second aspect of the present application, there is provided a verification processing apparatus for blockchain-based offline payment, which is applied to a digital financial service platform communicatively connected to a payment transaction service terminal and a digital financial service terminal, the apparatus including:
a sending module, configured to send, in an online blockchain network state, specified encryption/decryption policy offline token information confirmed by a payment transaction service terminal and a digital financial service terminal that complete pre-service security authentication, where the specified encryption/decryption policy offline token information includes encryption/decryption policies of different transaction elements, so that the payment transaction service terminal establishes an offline transaction communication channel with the digital financial service terminal in the offline blockchain network state, encrypts transaction transmission data of a transaction service initiated to the digital financial service terminal this time based on an encryption/decryption policy corresponding to a current transaction element in the specified encryption/decryption policy offline token information to obtain encrypted transaction transmission data, and sends the encrypted transaction transmission data to the digital financial service terminal through the offline transaction communication channel, wherein the current transaction element is used for representing a preset transaction element corresponding to the current transaction service, the preset transaction element is related to transaction environment information corresponding to the current transaction service, the digital financial service terminal acquires the encrypted transaction transmission data through the transaction communication channel, decrypts the encrypted transaction transmission data based on an encryption and decryption policy corresponding to the current transaction element in the specified encryption and decryption policy offline token information to acquire decrypted transaction transmission data, performs payment verification processing according to the decrypted transaction transmission data, and then sends a payment result to the payment transaction service terminal, and finally, the payment transaction service terminal generates a corresponding payment bill according to the payment result and prestores the payment bill to acquire a first offline payment bill list in an offline chain network state, simultaneously sending the payment bill to the digital financial service terminal, so that the digital financial service terminal prestores the payment bill to obtain a second offline payment bill list in an offline block chain network state;
and the content updating module is used for respectively acquiring the first offline payment bill list and the second offline payment bill list after the payment transaction service terminal and the digital financial service terminal are switched to an online blockchain network state, and uploading the first offline payment bill list and the second offline payment bill list to a corresponding blockchain system for content updating.
In a third aspect, an embodiment of the present application further provides a verification processing system based on blockchain offline payment, where the verification processing system based on blockchain offline payment includes a digital financial service platform, and a payment transaction service terminal and a digital financial service terminal that are communicatively connected to the digital financial service platform;
in an online block chain network state, the digital financial service platform is used for respectively sending appointed encryption and decryption strategy offline token information confirmed by a payment transaction service terminal and a digital financial service terminal which finish pre-business security authentication, wherein the appointed encryption and decryption strategy offline token information comprises encryption and decryption strategies of different transaction elements;
the payment transaction service terminal is used for establishing an offline transaction communication channel with the digital financial service terminal in an offline blockchain network state, encrypting transaction transmission data of a transaction service initiated to the digital financial service terminal at this time based on an encryption and decryption strategy corresponding to a current transaction element in the specified encryption and decryption strategy offline token information to obtain encrypted transaction transmission data, and sending the encrypted transaction transmission data to the digital financial service terminal through the offline transaction communication channel, wherein the current transaction element is used for representing a preset transaction element corresponding to the transaction service at this time, and the preset transaction element is related to transaction environment information corresponding to the transaction service at this time;
the digital financial service terminal is used for acquiring the encrypted transaction transmission data through the transaction communication channel, decrypting the encrypted transaction transmission data based on an encryption and decryption strategy corresponding to a current transaction element in the appointed encryption and decryption strategy offline token information, acquiring decrypted transaction transmission data, performing payment verification processing according to the decrypted transaction transmission data, and sending a payment result to the payment transaction service terminal;
the payment transaction service terminal is used for generating a corresponding payment bill according to the payment result, pre-storing the payment bill to obtain a first offline payment bill list in an offline blockchain network state, and simultaneously sending the payment bill to the digital financial service terminal, so that the digital financial service terminal pre-stores the payment bill to obtain a second offline payment bill list in the offline blockchain network state;
and after the payment transaction service terminal and the digital financial service terminal are switched to an online blockchain network state, the digital financial service platform is used for respectively obtaining the first offline payment bill list and the second offline payment bill list, and uploading the first offline payment bill list and the second offline payment bill list to a corresponding blockchain system for content updating.
In a fourth aspect, the present invention further provides a digital financial service platform, where the digital financial service platform includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is configured to be communicatively connected to at least one payment transaction service terminal and a digital financial service terminal, the machine-readable storage medium is configured to store a program, instructions, or codes, and the processor is configured to execute the program, instructions, or codes in the machine-readable storage medium to perform the method for processing verification of offline payment based on a blockchain in the first aspect or any one of the possible implementations of the first aspect.
In a fifth aspect, an embodiment of the present application provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are executed, the computer is caused to execute the verification processing method based on blockchain offline payment in the first aspect or any one of the possible designs of the first aspect.
Based on any one of the aspects, the application respectively sends the appointed encryption and decryption strategy offline token information to the payment transaction service terminal and the digital financial service terminal which finish the pre-business security authentication through the digital financial service platform, and the off-line token information is used as the identity security authentication basis of the payment transaction service terminal and the digital transaction service terminal in the off-line block chain network state to carry out off-line payment according to the appointed encryption and decryption strategy, thereby improving the safety in the off-line payment process, reducing the probability of information stealing and information interception, when the payment transaction service terminal and the digital financial service terminal are switched to the online blockchain network state, and the digital financial service platform respectively acquires the first offline payment bill list and the second offline payment bill list and uploads the first offline payment bill list and the second offline payment bill list to the corresponding block chain system for content updating, so that offline payment bills can be synchronized in real time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram illustrating an application scenario of a verification processing system based on blockchain offline payment according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a verification processing method based on blockchain offline payment according to an embodiment of the present disclosure;
fig. 3 is a schematic functional block diagram of a verification processing apparatus based on blockchain offline payment according to an embodiment of the present disclosure;
fig. 4 is a schematic component structural diagram of a digital financial service platform for performing the verification processing method based on the blockchain offline payment according to an embodiment of the present disclosure.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, the present description can also be applied to other similar scenarios on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used in this specification is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Fig. 1 is an interaction diagram of a verification processing system 10 based on blockchain offline payment according to an embodiment of the present application. The verification processing system 10 based on blockchain offline payment can include a digital financial services platform 100, and a payment transaction service terminal 200 and a digital financial services terminal 300 communicatively connected with the digital financial services platform 100. The blockchain offline payment-based verification processing system 10 shown in fig. 1 is only one possible example, and in other possible embodiments, the blockchain offline payment-based verification processing system 10 may also include only one of the components shown in fig. 1 or may also include other components.
In this embodiment, the digital financial service platform 100, the payment transaction service terminal 200, and the digital financial service terminal 300 in the verification processing system 10 based on blockchain offline payment may cooperatively perform the verification processing method based on blockchain offline payment described in the following method embodiments, and for details, the following method embodiments may be referred to for the steps of the digital financial service platform 100, the payment transaction service terminal 200, and the digital financial service terminal 300.
Based on the inventive concept of the technical solution provided by the present application, the digital financial service platform 100 provided by the present application may be applied to scenes such as smart medical, smart city management, smart industrial internet, general service monitoring management, etc. in which a big data technology or a cloud computing technology may be applied, and for example, may also be applied to scenes such as but not limited to new energy automobile system management, smart cloud office, cloud platform data processing, cloud game data processing, cloud live broadcast processing, cloud automobile management platform, block chain financial data service platform, etc., but is not limited thereto.
To solve the technical problem in the foregoing background, fig. 2 is a flowchart illustrating a verification processing method based on blockchain offline payment according to an embodiment of the present invention, where the verification processing method based on blockchain offline payment according to the present embodiment may be executed by the verification processing 10 based on blockchain offline payment shown in fig. 1, and the verification processing method based on blockchain offline payment is described in detail below.
In step S110, in the online blockchain network state, the digital financial service platform 100 sends the specified encryption/decryption policy offline token information confirmed by the payment transaction service terminal 200 and the digital financial service terminal 300 to the payment transaction service terminal 200 and the digital financial service terminal 300, respectively, which complete the pre-service security authentication.
Step S120, the payment transaction service terminal 200 establishes an offline transaction communication channel with the digital financial service terminal 300 in the offline blockchain network state, encrypts transaction transmission data of the transaction service initiated to the digital financial service terminal 300 this time based on the encryption and decryption policy corresponding to the current transaction element in the specified encryption and decryption policy offline token information to obtain encrypted transaction transmission data, and sends the encrypted transaction transmission data to the digital financial service terminal 300 through the offline transaction communication channel.
In step S130, the digital financial service terminal 300 obtains the encrypted transaction transmission data through the transaction communication channel, decrypts the encrypted transaction transmission data based on the encryption/decryption policy corresponding to the current transaction element in the specified encryption/decryption policy offline token information, obtains the decrypted transaction transmission data, performs payment verification processing according to the decrypted transaction transmission data, and sends the payment result to the payment transaction service terminal 200.
In step S140, the payment transaction service terminal 200 generates a corresponding payment bill according to the payment result, and pre-stores the payment bill to obtain a first offline payment bill list in the offline blockchain network state, and simultaneously sends the payment bill to the digital financial service terminal 300, so that the digital financial service terminal 300 pre-stores the payment bill to obtain a second offline payment bill list in the offline blockchain network state.
In step S150, after the payment transaction service terminal 200 and the digital financial service terminal 300 are switched to the online blockchain network state, the digital financial service platform 100 respectively obtains the first offline payment bill list and the second offline payment bill list, and uploads the first offline payment bill list and the second offline payment bill list to the corresponding blockchain system for content update.
In this embodiment, the specified encryption and decryption policy offline token information may include encryption and decryption policies of different transaction elements, and in an actual implementation process, the transaction elements may dynamically change according to a transaction environment in an offline payment transaction process, that is, in an actual offline payment process, the encryption and decryption policies change in real time instead of being fixed, and the change basis of the encryption and decryption policies is related to different transaction environments, so that security in the offline payment process may be improved.
For example, in this embodiment, the current transaction element may be used to represent a preset transaction element corresponding to the current transaction service, and the preset transaction element is related to transaction environment information corresponding to the current transaction service, for example, the transaction environment information may refer to a transaction address identifier (which may be determined by an identification code in the transaction service without being connected to a network), a transaction time identifier, a transaction commodity type identifier, and the like, which may generate a dynamically changing identifier in each offline transaction process, and then the preset transaction element corresponding to the current transaction service is determined based on the transaction environment information and a pre-configured matching rule, so as to facilitate encryption and decryption in a subsequent offline process.
In this embodiment, the transaction communication channel may be, but is not limited to, a transaction communication channel based on NFC, a transaction communication channel based on bluetooth, and the like.
In this embodiment, the digital financial service platform 100 sends the off-line token information of the specified encryption and decryption policy to the payment transaction service terminal 200 and the digital financial service terminal 300 which complete the pre-transaction security authentication, and the off-line token information is used as the identity security authentication basis of the payment transaction service terminal 200 and the digital transaction service terminal in the off-line blockchain network state to perform off-line payment according to the specified encryption and decryption strategy, thereby improving the safety in the off-line payment process, reducing the probability of information stealing and information interception, when the payment transaction service terminal 200 and the digital financial service terminal 300 are switched to the online blockchain network state, the digital financial service platform 100 acquires the first offline payment bill list and the second offline payment bill list respectively, and uploads the first offline payment bill list and the second offline payment bill list to the corresponding blockchain system for content updating, so that the offline payment bills can be synchronized in real time.
In addition, in a possible implementation manner, in order to further improve the security in the offline payment process, when the digital financial service terminal 300 fails to decrypt the encrypted transaction transmission data based on the encryption/decryption policy corresponding to the current transaction element in the specified encryption/decryption policy offline token information, or when the received transaction transmission data does not have the encryption/decryption policy corresponding to the current transaction element in the specified encryption/decryption policy offline token information, the transaction service is ended. For another example, when the payment transaction service terminal 200 does not receive the payment result within the preset time period, the transaction service is ended.
In addition, in a possible implementation manner, the encryption and decryption strategy can be designed specifically based on abnormal situations of a large amount of transaction process record information lists collected in history, so that the safety in the offline payment process can be further improved. For example, before the aforementioned step S110, the following steps can be further implemented.
In step S101, the digital financial service platform 100 may obtain a transaction process record information list of each payment transaction service terminal 200 or each digital financial service terminal 300 in the historical payment process, and obtain a transaction exception record list according to the transaction process record information list.
It should be noted that the transaction process record information list may include a continuous preset number of transaction process record information, and the transaction exception record list includes a continuous preset number of transaction exception records.
Step S102, determining a plurality of corresponding different encryption and decryption strategies according to each transaction exception record in the transaction exception record list and exception receiving instruction set information which is recorded in advance and corresponds to each transaction exception record, and distributing the plurality of corresponding different encryption and decryption strategies to different transaction elements of the specified encryption and decryption strategy offline token information.
As a possible example, in the process of determining a plurality of corresponding different encryption and decryption policies according to each transaction exception record in the transaction exception record list and the exception receiving instruction set information corresponding to each transaction exception record, the following sub-steps may be implemented.
And a substep S1021, based on the transaction process record information list, obtaining a transaction feature tag list through a first sub-network included in the transaction feature matching network, where the transaction feature tag list includes a preset number of transaction feature tags.
In sub-step S1022, based on the transaction exception record list, a transaction exception resolution tag list is obtained through a second sub-network included in the transaction feature matching network, where the transaction exception resolution tag list includes a preset number of transaction exception resolution tags.
And a substep S1023, obtaining the enhanced encryption element corresponding to the transaction process record information based on the transaction feature tag list and the transaction exception resolution tag list, and determining a plurality of corresponding different encryption and decryption strategies according to the enhanced encryption element and the exception receiving instruction set pre-recorded corresponding to each transaction exception record.
For example, in one possible implementation, for sub-step S1023, in determining a corresponding plurality of different encryption/decryption policies according to the enhanced encryption element and the pre-recorded exception receiving instruction set corresponding to each transaction exception record, the following exemplary embodiments may be implemented, which are described in detail below.
(1) And acquiring a plurality of abnormal response objects from the abnormal receiving instruction set which is recorded in advance and corresponds to each transaction abnormal record, and respectively extracting corresponding abnormal response analysis vectors from the plurality of abnormal response objects.
For example, the exception response parsing vector is used to represent a response feature vector corresponding to a response protocol component corresponding to the exception response object.
For example, in this embodiment, clustering may be performed on each piece of history collected transaction sample information corresponding to a plurality of abnormal response objects to obtain cluster clusters of each piece of history collected transaction sample information, then a transaction enabling entry of each cluster obtained through clustering is determined, each cluster is ranked according to a corresponding transaction enabling entry, then a cluster within a set ranking is selected from each cluster obtained through clustering, and a cluster of an abnormal response analysis vector specified by a cluster vector extraction policy is determined according to a preset cluster vector extraction policy for the cluster clusters, so that corresponding abnormal response analysis vectors may be respectively extracted based on the cluster of the abnormal response analysis vector specified by the cluster vector extraction policy.
For example, when the same historically collected transaction sample information includes a plurality of clusters belonging to different abnormal response analysis vectors, the number of clusters of the abnormal response analysis vectors in the same historically collected transaction sample information is counted. Then, an abnormal response analysis vector with the largest number of the counted clustering clusters is determined, an abnormal transaction identification label of the determined abnormal response analysis vector is added to the same historical collected transaction sample information, and an abnormal transaction identification label of a non-abnormal response analysis vector is added to the historical collected transaction sample information of the clustering clusters not including the abnormal response analysis vector.
Furthermore, transaction sample information is collected according to the history of the feature extraction to be fused with the added abnormal transaction identification label to obtain a first training network, each cluster is input into the first training network, and classification reference parameters of each cluster for each abnormal response analysis vector are output. And then, re-determining the cluster with the classification reference parameter of each abnormal response analysis vector being greater than or equal to the first classification reference parameter threshold value as the cluster of the abnormal response analysis vector, returning to the same historical collected transaction sample information, adding the abnormal transaction identification label of the determined abnormal response analysis vector, and continuing to process until the abnormal transaction identification label of the historical collected transaction sample information to be subjected to feature extraction is obtained when the iteration stop condition is met.
Further, after the iteration stop condition is met, the classification reference parameters of the historical collected transaction sample information to be subjected to feature extraction, which is determined through the corresponding training network, for each abnormal response analysis vector are obtained, and the classification reference parameters for each abnormal response analysis vector are screened to be greater than or equal to a second classification reference parameter threshold value. And then, fusing the screened historical collected transaction sample information and the corresponding abnormal transaction identification label to obtain a second training network, determining the classification reference parameters of the historical collected transaction sample information to be subjected to feature extraction for each abnormal response analysis vector through the second training network, and updating the abnormal transaction identification label of the corresponding historical collected transaction sample information according to the classification reference parameters of the historical collected transaction sample information to be subjected to feature extraction for each abnormal response analysis vector.
Further, after the abnormal transaction identification label of the corresponding historical collected transaction sample information is updated according to the classification reference parameter of the historical collected transaction sample information to be subjected to feature extraction for each abnormal response analysis vector, the step of screening the historical collected transaction sample information of which the classification reference parameter is greater than or equal to the second classification reference parameter threshold value for each abnormal response analysis vector is returned to be continuously executed until the updating stop condition is met, and the abnormal transaction identification label of which the historical collected transaction sample information to be subjected to feature extraction is updated is obtained.
Further, after updating the abnormal transaction identification label, the classification reference parameter of the historical collected transaction sample information determined by the second training network and to be subjected to feature extraction for each abnormal response analysis vector and the classification reference parameter belonging to the non-abnormal response analysis vector are obtained.
Further, selecting historical collected transaction sample information which is determined after updating the abnormal transaction identification label and is greater than or equal to a third classification reference parameter threshold value for the classification reference parameter of each abnormal response analysis vector, fusing the selected historical collected transaction sample information and the corresponding abnormal transaction identification label to obtain a third training network, determining the classification reference parameter of each abnormal response analysis vector for the historical collected transaction sample information to be subjected to feature extraction through the third training network, and determining the abnormal response analysis vector of the corresponding historical collected transaction sample information according to the classification reference parameter of each abnormal response analysis vector determined through the third training network.
Further, target historical collected transaction sample information different from the historical collected transaction sample information to be subjected to feature extraction is obtained, the classification reference parameters of the target historical collected transaction sample information to the abnormal response analysis vectors are determined through a third training network, and then the abnormal response analysis vectors corresponding to the target historical collected transaction sample information are determined according to the classification reference parameters of the target historical collected transaction sample information to the abnormal response analysis vectors. Therefore, the abnormal response analysis vectors of the transaction sample information collected according to the determined histories can be summarized to obtain the abnormal response analysis vectors corresponding to the abnormal response objects respectively.
(2) And determining abnormal suspicious mapping entities among the abnormal response objects according to the extracted abnormal response analysis vector, and constructing corresponding encryption and decryption packaging entities according to the calculated abnormal suspicious mapping entities among the abnormal response objects.
For example, the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects may be obtained from the extracted abnormal response analysis vector, and then the abnormal suspicious mapping entities between the abnormal response objects are determined according to the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects, where the abnormal suspicious mapping entities are aggregation entities between the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects.
For example, each target abnormal response object covered by the same type of abnormal suspicious mapping entity may be divided into an object array according to the calculated abnormal suspicious mapping entity between each abnormal response object, and according to the object density in each object array, the array level of the object array with the object density greater than the preset density is reduced, and the array level of the object array with the object density less than the preset density is expanded, so as to obtain each adjusted object array. Wherein all exception response objects in each object array constitute one encryption and decryption element.
Then, according to the positions of the abnormal response objects in the single encryption and decryption element, the key arrangement information between each abnormal response object and other abnormal response objects in the single encryption and decryption element is calculated.
And for the single encryption and decryption element, sorting the abnormal response objects in the single encryption and decryption element according to the sequence of the key arrangement information between each abnormal response object and other abnormal response objects to obtain an abnormal response object sorting list.
For a single encryption and decryption element, the following processes are sequentially executed for each abnormal response object in the abnormal response object ordered list until the target abnormal response object of the single encryption and decryption element is determined:
on the basis, whether the first abnormal response strength of the abnormal response objects in the abnormal response object ordered list is greater than a first preset strength is judged, and if yes, the abnormal response objects greater than the first preset strength are used as the target abnormal response objects of the single encryption and decryption element. Then, for a single encryption and decryption element, determining that the target exception response object of the single encryption and decryption element is the exception response object in mapping association with the target exception response object of the single encryption and decryption element, and determining that other exception response objects except the target exception response object of the single encryption and decryption element are the sub exception response objects of the single encryption and decryption element, wherein the sub exception response objects of the single encryption and decryption element are the exception response objects in mapping association with the target exception response object of the single encryption and decryption element.
Therefore, a corresponding encryption and decryption packaging entity can be constructed according to the determined target exception response object and the sub exception response object of each encryption and decryption element, wherein the encryption and decryption packaging entity is used for representing a packaging function entity corresponding to an encryption packaging node formed by the target exception response object and the sub exception response object of each encryption and decryption element.
(3) And respectively determining the encryption and decryption packaging key relation corresponding to each abnormal response object according to the constructed encryption and decryption packaging entity.
For example, an encryption and decryption encapsulation key relationship distribution map of each target exception response object and the sub exception response object in the constructed encryption and decryption encapsulation entity may be obtained according to an exception association portion between the target exception response object and the sub exception response object, and the encryption and decryption encapsulation key relationship distribution map is used as a key relationship node, so that each target exception response object and the sub exception response object are expressed as a key relationship node composed of the encryption and decryption encapsulation key relationship distribution maps of the target exception response object and the sub exception response object.
Further, all similar key relationship nodes may be obtained from the key relationship node of each target abnormal response object and the sub abnormal response object according to the scheduling type of the key relationship node corresponding to the target abnormal response object and the sub abnormal response object, so as to form a first key relationship node list. Then, the key relation nodes corresponding to the target abnormal response object and the sub abnormal response objects in the first key relation node list are subjected to naive Bayes processing, and a naive Bayes classification result and a naive Bayes attribute probability are obtained.
Further, a screening key relationship in which a key relationship node based on the target abnormal response object and the sub abnormal response object does not contain a key relationship with a preset probability or more can be calculated according to the naive bayes classification result and the naive bayes attribute probability.
When each target abnormal response object and each sub abnormal response object calculate to obtain a screening key relation that a key relation node taking the target abnormal response object and the sub abnormal response object as a center does not contain a key relation more than a preset probability, the target abnormal response object and the sub abnormal response object which do not contain the key relation more than the preset probability are obtained according to the screening key relation which corresponds to each target abnormal response object and each sub abnormal response object and does not contain the key relation more than the preset probability.
Further, a second key relationship node list can be obtained according to the target abnormal response object and the sub abnormal response object which do not contain the key relationship above the preset probability, and naive bayes processing is performed on the second key relationship node list to obtain a naive bayes classification result sequence corresponding to the second key relationship node list.
Further, the chance node and the naive bayes feature vector can be calculated for the naive bayes classification result sequence, and the naive bayes feature vector is used as an initial value to respectively process the key relation nodes corresponding to the target abnormal response object and the sub-abnormal response object in the second key relation node list according to the chance node, so as to obtain the corresponding encryption and decryption packaging key content.
Further, the encryption and decryption package key relationship corresponding to each abnormal response object can be respectively determined according to the key generation relationship in the encryption and decryption package key content.
(4) And determining a plurality of corresponding different encryption and decryption strategies according to the encryption and decryption packaging key relationship corresponding to each abnormal response object and the element hierarchical relationship among the plurality of strengthened encryption elements.
For example, the encryption and decryption package key sequences matching the encryption and decryption package key relationship corresponding to each abnormal response object may be obtained, and then the encryption and decryption package key sequences are respectively mapped to the multiple enhanced encryption elements in a stacked manner according to the element hierarchy relationship among the multiple enhanced encryption elements, so that the corresponding multiple different encryption and decryption strategies may be determined.
Based on the same inventive concept, please refer to fig. 3, which is a schematic diagram illustrating functional modules of the verification processing apparatus 400 based on block chain offline payment according to an embodiment of the present application, and the embodiment can divide the functional modules of the verification processing apparatus 400 based on block chain offline payment according to the method embodiment executed by the digital financial service platform 100. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one processing block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. For example, in the case of dividing each function module by corresponding functions, the verification processing apparatus 400 based on blockchain offline payment shown in fig. 3 is only a schematic apparatus diagram. The verification processing apparatus 400 based on blockchain offline payment may include a sending module 410, a content updating module 420, a third obtaining module 330, and an information generating module 340, where functions of each functional module of the verification processing apparatus 400 based on blockchain offline payment are described in detail below.
A sending module 410, configured to send, in an online blockchain network state, specified encryption/decryption policy offline token information confirmed by the payment transaction service terminal 200 and the digital financial service terminal 300 to the payment transaction service terminal 200 and the digital financial service terminal 300 that complete pre-service security authentication, respectively, where the specified encryption/decryption policy offline token information includes encryption/decryption policies of different transaction elements, so that the payment transaction service terminal 200 establishes an offline transaction communication channel with the digital financial service terminal 300 in the offline blockchain network state, encrypts transaction transmission data of a transaction service initiated to the digital financial service terminal 300 this time based on an encryption/decryption policy corresponding to a current transaction element in the specified encryption/decryption policy offline token information to obtain encrypted transaction transmission data, and sends the encrypted transaction transmission data to the digital financial service terminal 300 through the offline transaction communication channel, wherein the current transaction element is used to represent a preset transaction element corresponding to the current transaction service, the preset transaction element is related to transaction environment information corresponding to the current transaction service, and the digital financial service terminal 300 obtains encrypted transaction transmission data through a transaction communication channel, decrypts the encrypted transaction transmission data based on an encryption/decryption policy corresponding to the current transaction element in the specified encryption/decryption policy offline token information to obtain decrypted transaction transmission data, performs payment verification processing according to the decrypted transaction transmission data, and sends a payment result to the payment transaction service terminal 200, and finally the payment transaction service terminal 200 generates a corresponding payment bill according to the payment result, and prestores the payment bill to obtain a first offline payment bill list in an offline block chain network state, and sends the payment bill to the digital financial service terminal 300, so that the digital financial service terminal 300 prestores the payment bill to obtain a second offline payment bill list in the offline blockchain network state.
The content updating module 420 is configured to, after the payment transaction service terminal 200 and the digital financial service terminal 300 are switched to the online blockchain network state, respectively obtain the first offline payment bill list and the second offline payment bill list, and upload the first offline payment bill list and the second offline payment bill list to the corresponding blockchain system for content updating.
In one possible implementation, the verification processing apparatus 400 based on blockchain offline payment may further include an allocation module 401, for obtaining a transaction process record information list of each payment transaction service terminal 200 or each digital financial service terminal 300 in the historical payment process, and obtaining a transaction abnormal record list according to the transaction process record information list, wherein the transaction process record information list comprises a continuous preset number of transaction process record information, the transaction exception record list comprises a continuous preset number of transaction exception records, then determining a plurality of corresponding different encryption and decryption strategies according to each transaction exception record in the transaction exception record list and exception receiving instruction set information which is pre-recorded and corresponding to each transaction exception record, and distributing a plurality of corresponding different encryption and decryption strategies to different transaction elements of the specified encryption and decryption strategy offline token information.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the sending module 410 may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and the processing element of the apparatus calls and executes the functions of the sending module 410. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 4 is a schematic diagram illustrating a hardware structure of the digital financial services platform 100 for implementing the verification processing method based on the blockchain offline payment according to the embodiment of the present disclosure, and as shown in fig. 4, the digital financial services platform 100 may include a processor 110, a machine-readable storage medium 120, a bus 130, and a transceiver 140.
In a specific implementation process, the at least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120 (for example, the sending module 410 and the content updating module 420 included in the verification processing apparatus 400 based on blockchain offline payment shown in fig. 3), so that the processor 110 may execute the verification processing method based on blockchain offline payment according to the above method embodiment, where the processor 110, the machine-readable storage medium 120, and the transceiver 140 are connected through the bus 130, and the processor 110 may be configured to control the transceiving action of the transceiver 140, so as to perform data transceiving with the payment transaction service terminal 200.
For a specific implementation process of the processor 110, reference may be made to the above-mentioned method embodiments executed by the digital financial services platform 100, which implement similar principles and technical effects, and this embodiment is not described herein again.
In the embodiment shown in fig. 4, it should be understood that the Processor may be a global business interactive matching process (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The machine-readable storage medium 120 may comprise high-speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus 130 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus 130 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
In addition, an embodiment of the present application further provides a readable storage medium, where the readable storage medium stores computer-executable instructions, and when a processor executes the computer-executable instructions, the verification processing method based on the blockchain offline payment is implemented as above.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Such as "one possible implementation," "one possible example," and/or "exemplary" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "one possible implementation," "one possible example," and/or "exemplary" in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of this specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may run entirely on the user's computer, or as a stand-alone software package on the user's computer, partly on the user's computer and partly on a remote computer or entirely on the remote computer or digital financial services terminal. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and lists are processed, the use of alphanumeric characters, or other designations in this specification is not intended to limit the order in which the processes and methods of this specification are performed, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented through interactive services, they may also be implemented through software-only solutions, such as installing the described system on an existing digital financial services terminal or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (10)

1. A verification processing method based on blockchain offline payment is applied to a verification processing system based on blockchain offline payment, and the verification processing system based on blockchain offline payment comprises a payment transaction service terminal, a digital financial service terminal in communication connection with the payment transaction service terminal, and a digital financial service platform in communication connection with the digital financial service terminal, wherein the method comprises the following steps:
in an online block chain network state, the digital financial service platform respectively sends appointed encryption and decryption strategy offline token information confirmed by a payment transaction service terminal and a digital financial service terminal to the payment transaction service terminal and the digital financial service terminal which finish pre-business security authentication, wherein the appointed encryption and decryption strategy offline token information comprises encryption and decryption strategies of different transaction elements;
the payment transaction service terminal establishes an offline transaction communication channel with the digital financial service terminal in an offline blockchain network state, encrypts transaction transmission data of a transaction service initiated to the digital financial service terminal this time based on an encryption and decryption strategy corresponding to a current transaction element in the specified encryption and decryption strategy offline token information to obtain encrypted transaction transmission data, and sends the encrypted transaction transmission data to the digital financial service terminal through the offline transaction communication channel, wherein the current transaction element is used for representing a preset transaction element corresponding to the transaction service this time, and the preset transaction element is related to transaction environment information corresponding to the transaction service this time;
the digital financial service terminal acquires the encrypted transaction transmission data through the transaction communication channel, decrypts the encrypted transaction transmission data based on an encryption and decryption strategy corresponding to a current transaction element in the specified encryption and decryption strategy offline token information, acquires decrypted transaction transmission data, performs payment verification processing according to the decrypted transaction transmission data, and sends a payment result to the payment transaction service terminal;
the payment transaction service terminal generates a corresponding payment bill according to the payment result, pre-stores the payment bill to obtain a first offline payment bill list in an offline blockchain network state, and simultaneously sends the payment bill to the digital financial service terminal, so that the digital financial service terminal pre-stores the payment bill to obtain a second offline payment bill list in an offline blockchain network state;
and after the payment transaction service terminal and the digital financial service terminal are switched to an online blockchain network state, the digital financial service platform respectively acquires the first offline payment bill list and the second offline payment bill list, and uploads the first offline payment bill list and the second offline payment bill list to a corresponding blockchain system for content updating.
2. The method for verification processing based on blockchain offline payment according to claim 1, further comprising:
when the digital financial service terminal fails to decrypt the encrypted transaction transmission data based on the encryption and decryption strategy corresponding to the current transaction element in the specified encryption and decryption strategy offline token information, or when the received transaction transmission data does not have the encryption and decryption strategy corresponding to the current transaction element in the specified encryption and decryption strategy offline token information, ending the transaction service; and
and when the payment transaction service terminal does not receive the payment result within a preset time period, ending the transaction service.
3. The method for verification processing based on blockchain offline payment according to claim 1, further comprising:
the digital financial service platform acquires a transaction process record information list of each payment transaction service terminal or each digital financial service terminal in a historical payment process, and acquires a transaction abnormal record list according to the transaction process record information list, wherein the transaction process record information list comprises a continuous preset number of transaction process record information, and the transaction abnormal record list comprises a continuous preset number of transaction abnormal records;
determining a plurality of corresponding different encryption and decryption strategies according to each transaction exception record in the transaction exception record list and exception receiving instruction set information which is recorded in advance and corresponds to each transaction exception record, and distributing the plurality of corresponding different encryption and decryption strategies to different transaction elements of the specified encryption and decryption strategy offline token information.
4. The verification processing method based on blockchain offline payment according to claim 3, wherein the step of determining a plurality of corresponding different encryption/decryption policies according to each transaction exception record in the transaction exception record list and the exception receiving instruction set information pre-recorded corresponding to each transaction exception record comprises:
acquiring a transaction characteristic label list through a first sub-network included in a transaction characteristic matching network based on the transaction process record information list, wherein the transaction characteristic label list comprises a preset number of transaction characteristic labels;
acquiring a transaction abnormity analysis label list through a second sub-network included in the transaction characteristic matching network based on the transaction abnormity record list, wherein the transaction abnormity analysis label list comprises a preset number of transaction abnormity analysis labels;
and acquiring reinforced encryption elements corresponding to the transaction process record information based on the transaction characteristic tag list and the transaction exception analysis tag list, and determining a plurality of corresponding different encryption and decryption strategies according to the reinforced encryption elements and exception receiving instruction sets which are recorded in advance and correspond to each transaction exception record.
5. The method as claimed in claim 4, wherein the step of determining a plurality of different encryption/decryption policies according to the enhanced encryption element and the pre-recorded exception receiving instruction set corresponding to each transaction exception record comprises:
acquiring a plurality of abnormal response objects from an abnormal receiving instruction set which is recorded in advance and corresponds to each transaction abnormal record, and extracting corresponding abnormal response analysis vectors from the abnormal response objects respectively, wherein the abnormal response analysis vectors are used for expressing response characteristic vectors corresponding to response protocol components corresponding to the abnormal response objects;
determining abnormal suspicious mapping entities among the abnormal response objects according to the extracted abnormal response analysis vectors, and constructing corresponding encryption and decryption packaging entities according to the calculated abnormal suspicious mapping entities among the abnormal response objects;
respectively determining the encryption and decryption packaging key relation corresponding to each abnormal response object according to the constructed encryption and decryption packaging entity;
and determining a plurality of corresponding different encryption and decryption strategies according to the encryption and decryption packaging key relationship corresponding to each abnormal response object and the element hierarchical relationship among the plurality of strengthened encryption elements.
6. The method as claimed in claim 5, wherein the step of extracting the corresponding abnormal response analysis vector from each of the plurality of abnormal response objects comprises:
clustering each historical collected transaction sample information corresponding to the abnormal response objects to obtain a cluster of each historical collected transaction sample information;
determining transaction enabling table items of the clustering clusters obtained by clustering, sequencing all clustering clusters according to corresponding transaction enabling table items, and then selecting the clustering clusters in a set sequence from all clustering clusters obtained by clustering;
according to a preset cluster vector extraction strategy aiming at the cluster, determining the cluster of the abnormal response analysis vector specified by the cluster vector extraction strategy;
and respectively extracting corresponding abnormal response analysis vectors based on the cluster clusters of the abnormal response analysis vectors specified by the cluster vector extraction strategy.
7. The method as claimed in claim 5, wherein the step of determining the abnormal suspicious mapping entity between the abnormal response objects according to the extracted abnormal response analysis vector comprises:
obtaining abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects from the extracted abnormal response analysis vectors;
and determining an abnormal suspicious mapping entity between the abnormal response objects according to the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects, wherein the abnormal suspicious mapping entity is an aggregation entity between the abnormal suspicious elements corresponding to the abnormal response segments of the abnormal response objects.
8. The method for validation processing based on blockchain offline payment according to claim 5, wherein said step of constructing a corresponding encryption/decryption encapsulation entity according to the calculated abnormal suspicious mapping entity between the abnormal response objects comprises:
according to the calculated abnormal suspicious mapping entities among the abnormal response objects, dividing each target abnormal response object covered by the same type of abnormal suspicious mapping entity into an object array, reducing the array hierarchy of the object array with the object density higher than the preset density according to the object density in each object array, and expanding the array hierarchy of the object array with the object density lower than the preset density to obtain each adjusted object array; wherein, all abnormal response objects in each object array form an encryption and decryption element;
calculating key arrangement information between each abnormal response object and other abnormal response objects in the single encryption and decryption element according to the position of each abnormal response object in the single encryption and decryption element;
for a single encryption and decryption element, sorting all abnormal response objects in the single encryption and decryption element according to the sequence of key arrangement information between each abnormal response object and other abnormal response objects to obtain an abnormal response object sorting list;
for a single encryption and decryption element, sequentially executing the following processes on each abnormal response object in the abnormal response object ordered list until determining a target abnormal response object of the single encryption and decryption element:
judging whether a first abnormal response intensity of the abnormal response objects in the abnormal response object ordered list is greater than a first preset intensity, and if so, taking the abnormal response objects with the first preset intensity as target abnormal response objects of a single encryption and decryption element;
for a single encryption and decryption element, determining a target exception response object of the single encryption and decryption element as an exception response object in mapping association with the target exception response object, and determining other exception response objects except the target exception response object of the single encryption and decryption element as sub exception response objects of the single encryption and decryption element, wherein the sub exception response objects of the single encryption and decryption element are exception response objects in mapping association with the target exception response object of the single encryption and decryption element;
and constructing a corresponding encryption and decryption packaging entity according to the determined target abnormal response object and the sub abnormal response object of each encryption and decryption element, wherein the encryption and decryption packaging entity is used for representing a packaging function entity corresponding to an encryption packaging node formed by the target abnormal response object and the sub abnormal response object of each encryption and decryption element.
9. The method for verification processing based on blockchain offline payment according to claim 8, wherein said step of determining the encryption/decryption package key relationship corresponding to each abnormal response object according to the constructed encryption/decryption package entity respectively comprises:
acquiring an encryption and decryption packaging key relation distribution map of the target abnormal response object and the sub-abnormal response object according to an abnormal association part between each target abnormal response object and the sub-abnormal response object in the constructed encryption and decryption packaging entity, and taking the encryption and decryption packaging key relation distribution map as a key relation node to enable each target abnormal response object and the sub-abnormal response object to be expressed into a key relation node consisting of the encryption and decryption packaging key relation distribution maps of the target abnormal response object and the sub-abnormal response object;
acquiring all similar key relation nodes from the key relation nodes of each target abnormal response object and each sub abnormal response object according to the scheduling type of the key relation node corresponding to the target abnormal response object and the sub abnormal response object to form a first key relation node list;
carrying out naive Bayes processing on key relation nodes corresponding to the target abnormal response object and the sub abnormal response object in the first key relation node list to obtain a naive Bayes classification result and a naive Bayes attribute probability;
calculating a screening key relation of a key relation node which takes the target abnormal response object and the sub abnormal response object as a reference and does not contain a key relation with a preset probability or more according to the naive Bayes classification result and the naive Bayes attribute probability;
when each target abnormal response object and each sub abnormal response object calculate to obtain a screening key relation that a key relation node taking the target abnormal response object and the sub abnormal response object as a center does not contain a key relation more than a preset probability, obtaining the target abnormal response object and the sub abnormal response object which do not contain the key relation more than the preset probability according to the screening key relation which corresponds to each target abnormal response object and each sub abnormal response object and does not contain the key relation more than the preset probability;
obtaining a second key relation node list according to the target abnormal response object and the sub abnormal response object which do not contain the key relation more than the preset probability, and carrying out naive Bayes processing on the second key relation node list to obtain a naive Bayes classification result sequence corresponding to the second key relation node list;
calculating an opportunity node and a naive Bayes feature vector for the naive Bayes classification result sequence, taking the naive Bayes feature vector as an initial value, and respectively processing the key relation nodes corresponding to the target abnormal response object and the sub-abnormal response object in the second key relation node list according to the opportunity node to obtain corresponding encryption and decryption packaging key contents;
and respectively determining the encryption and decryption packaging key relationship corresponding to each abnormal response object according to the key generation relationship in the encryption and decryption packaging key content.
10. A digital financial services platform, comprising a processor, a machine-readable storage medium, and a network interface, wherein the machine-readable storage medium, the network interface, and the processor are connected via a bus system, the network interface is configured to be communicatively connected to at least one payment transaction service terminal and a digital financial services terminal, the machine-readable storage medium is configured to store a program, instructions, or code, and the processor is configured to execute the program, instructions, or code in the machine-readable storage medium to perform the method for processing validation of offline payment based on blockchain according to any one of claims 1 to 9.
CN202010871481.9A 2020-08-26 2020-08-26 Verification processing method based on block chain offline payment and digital financial service platform Active CN111985921B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110051163.2A CN112785304A (en) 2020-08-26 2020-08-26 Verification processing method, system and service platform based on block chain offline payment
CN202110051157.7A CN112785303A (en) 2020-08-26 2020-08-26 Verification processing method and verification processing system based on block chain offline payment
CN202010871481.9A CN111985921B (en) 2020-08-26 2020-08-26 Verification processing method based on block chain offline payment and digital financial service platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010871481.9A CN111985921B (en) 2020-08-26 2020-08-26 Verification processing method based on block chain offline payment and digital financial service platform

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202110051157.7A Division CN112785303A (en) 2020-08-26 2020-08-26 Verification processing method and verification processing system based on block chain offline payment
CN202110051163.2A Division CN112785304A (en) 2020-08-26 2020-08-26 Verification processing method, system and service platform based on block chain offline payment

Publications (2)

Publication Number Publication Date
CN111985921A true CN111985921A (en) 2020-11-24
CN111985921B CN111985921B (en) 2021-03-16

Family

ID=73441383

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202110051157.7A Withdrawn CN112785303A (en) 2020-08-26 2020-08-26 Verification processing method and verification processing system based on block chain offline payment
CN202110051163.2A Withdrawn CN112785304A (en) 2020-08-26 2020-08-26 Verification processing method, system and service platform based on block chain offline payment
CN202010871481.9A Active CN111985921B (en) 2020-08-26 2020-08-26 Verification processing method based on block chain offline payment and digital financial service platform

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN202110051157.7A Withdrawn CN112785303A (en) 2020-08-26 2020-08-26 Verification processing method and verification processing system based on block chain offline payment
CN202110051163.2A Withdrawn CN112785304A (en) 2020-08-26 2020-08-26 Verification processing method, system and service platform based on block chain offline payment

Country Status (1)

Country Link
CN (3) CN112785303A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113723957B (en) * 2021-08-20 2023-10-27 上海浦东发展银行股份有限公司 Block chain account information confirmation method, device, computer equipment and storage medium
CN116703403B (en) * 2023-07-31 2023-10-20 成都创一博通科技有限公司 Offline transaction method and financial service platform based on blockchain network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537536A (en) * 2018-06-21 2018-09-14 咪付(广西)网络技术有限公司 A kind of method for secure transactions and system based on strategy mark
CN109120412A (en) * 2018-10-29 2019-01-01 马晶瑶 A kind of preservation of block chain key and exchange system based on smart card
CN109389377A (en) * 2018-09-27 2019-02-26 杭州秘猿科技有限公司 A kind of contactless static signature method, apparatus, electronic equipment and system
CN109472588A (en) * 2018-10-29 2019-03-15 平安科技(深圳)有限公司 A kind of offline electronic payment method, apparatus, equipment and storage medium based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537536A (en) * 2018-06-21 2018-09-14 咪付(广西)网络技术有限公司 A kind of method for secure transactions and system based on strategy mark
CN109389377A (en) * 2018-09-27 2019-02-26 杭州秘猿科技有限公司 A kind of contactless static signature method, apparatus, electronic equipment and system
CN109120412A (en) * 2018-10-29 2019-01-01 马晶瑶 A kind of preservation of block chain key and exchange system based on smart card
CN109472588A (en) * 2018-10-29 2019-03-15 平安科技(深圳)有限公司 A kind of offline electronic payment method, apparatus, equipment and storage medium based on block chain

Also Published As

Publication number Publication date
CN111985921B (en) 2021-03-16
CN112785303A (en) 2021-05-11
CN112785304A (en) 2021-05-11

Similar Documents

Publication Publication Date Title
CN110084377B (en) Method and device for constructing decision tree
US11888892B2 (en) Cryptocurrency based malware and ransomware detection systems and methods
US11855971B2 (en) Offline authorization of interactions and controlled tasks
CN109558748A (en) Data processing method, device, electronic equipment and storage medium
US20200160344A1 (en) Blockchain Transaction Analysis and Anti-Money Laundering Compliance Systems and Methods
CN104885099A (en) Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors
CN112199581B (en) Cloud computing and information security oriented cloud service management method and artificial intelligence platform
CN111985921B (en) Verification processing method based on block chain offline payment and digital financial service platform
CN110197541A (en) A kind of shared automobile management method based on block chain
CN111753324B (en) Private data processing method, private data computing method and applicable equipment
CN112214781A (en) Remote sensing image big data processing method and system based on block chain
CN116304228A (en) Block chain-based data storage method, device, equipment and medium
US11164163B1 (en) Performance optimized automated processing and routing system
CN114780932B (en) Cross-block chain data interaction verification method, system and equipment for management three-mode platform
CN111985922B (en) Information distribution method based on block chain offline payment and digital financial service platform
CN115422557A (en) User information grading protection method and system
CN112053159A (en) Transaction data verification method and device, risk control server and business server
CN111291065A (en) Asset data change method and device executed by computing equipment and computing equipment
CN110390516A (en) Method, apparatus and computer program product for data processing
CN115174589B (en) Selection method and device of blockchain virtual machine, electronic equipment and storage medium
Lohani et al. Fog Computing and Machine Learning
US20230028823A1 (en) Access management for cancelled requests in a distributed environment
CN116611107A (en) Data processing method, device and equipment, chip, board card and medium
CN116389612A (en) Data acquisition method, device, computer equipment and storage medium
CN117151856A (en) Resource borrowing service handling method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Zhu Qing

Inventor after: Li Zhengguang

Inventor after: Mao Wei

Inventor before: Mao Wei

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210222

Address after: No. 304, building 7, No. 599, shijicheng South Road, hi tech Zone, Chengdu, Sichuan 610000

Applicant after: LianBo (Chengdu) Technology Co.,Ltd.

Address before: Room 504, 12th floor, Hecheng building, high tech Zone, Kunming, Yunnan 650000

Applicant before: Mao Wei

GR01 Patent grant
GR01 Patent grant