CN112367629A - Financial big data processing method based on 5G and block chain and system platform thereof - Google Patents

Financial big data processing method based on 5G and block chain and system platform thereof Download PDF

Info

Publication number
CN112367629A
CN112367629A CN202011363796.9A CN202011363796A CN112367629A CN 112367629 A CN112367629 A CN 112367629A CN 202011363796 A CN202011363796 A CN 202011363796A CN 112367629 A CN112367629 A CN 112367629A
Authority
CN
China
Prior art keywords
financial data
node
data
financial
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011363796.9A
Other languages
Chinese (zh)
Other versions
CN112367629B (en
Inventor
刘艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Moyun Information Technology Co ltd
Original Assignee
Shenzhen Institute of Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Institute of Information Technology filed Critical Shenzhen Institute of Information Technology
Priority to CN202011363796.9A priority Critical patent/CN112367629B/en
Publication of CN112367629A publication Critical patent/CN112367629A/en
Application granted granted Critical
Publication of CN112367629B publication Critical patent/CN112367629B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention provides a financial big data processing method based on 5G and a block chain and a system platform thereof. The method comprises the following steps: financial data generated by financial data generation nodes in the block chain network are sent to financial data supervision nodes of the block chain network through the 5G communication network; the financial data supervision node encrypts and trustable stores the financial data; financial data application side nodes in the block chain network send financial data acquisition requests to the financial data supervision nodes; and after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node and sends the financial data to the financial data application side node passing the security verification through a 5G communication network. The system platform includes modules corresponding to the method steps.

Description

Financial big data processing method based on 5G and block chain and system platform thereof
Technical Field
The invention provides a financial big data processing method based on 5G and a block chain and a system platform thereof, belonging to the technical field of block chain technology.
Background
The blockchain is a novel decentralized distributed account book technology, can safely store transactions or other data, and is characterized in that information stored on the blockchain cannot be forged and tampered, a blockchain consensus algorithm drives each node on the blockchain to participate in a transaction verification process, it is guaranteed that transactions on the blockchain are confirmed to be credible, each node on the blockchain maintains a public account book, and any node modifies the account book maintained by the node to be not acknowledged by other nodes, so that the public account book cannot be forged and tampered. Finance is an economic activity which takes currency as an operating target and aims at increasing the value of the currency through currency financing, and comprises two forms of indirect investment and financing taking a bank as a center and direct investment and financing taking an investment bank as a center, and the finance is a general term of currency and fund financing. Mainly referring to various activities related to currency circulation and bank credit. The main contents comprise the steps of issuing, releasing, circulating and returning money; the absorption and withdrawal of various deposits; issuing and withdrawing of various loans; bank accounting, cashier, transfer, settlement, insurance, investment, trust, lease, exchange, cash-out, mortgage, securities trading and international trade and non-trade settlement, gold silver trading, export, import, etc. Data transmission in the existing financial industry units is relatively independent, but the problems of low data transmission efficiency and low data transmission safety still exist due to the fact that the existing financial industry units have factors such as large data quantity.
Disclosure of Invention
The invention provides a 5G and block chain based financial big data processing method and a system platform thereof, which are used for solving the problems of low transmission efficiency and poor safety of the existing financial big data, and adopt the following technical scheme:
a financial big data processing method based on 5G and a block chain comprises the following steps:
financial data generated by financial data generation nodes in the block chain network are sent to financial data supervision nodes of the block chain network through the 5G communication network;
the financial data supervision node encrypts and trustable stores the financial data;
financial data application side nodes in the block chain network send financial data acquisition requests to the financial data supervision nodes;
and after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node and sends the financial data to the financial data application side node passing the security verification through a 5G communication network.
Further, the financial data generated by the financial data generating node in the blockchain network is sent to the financial data supervising node of the blockchain network through the 5G communication network, and the method comprises the following steps:
the financial data generation node randomly generates a dynamic identifier aiming at the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the dynamic factor is obtained by the following formula:
Figure BDA0002804819080000021
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
binding the dynamic identifier with the financial data to form a metal data packet to be sent;
and the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
Further, the financial data supervisory node encrypts and trustable stores the financial data, including:
the financial data supervision node divides a data storage area corresponding to the financial data generation node by taking the financial data generation node as a unit;
the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet;
when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt;
when the dynamic identifier is detected to exist in the financial data packet, extracting the dynamic identifier and recording the receiving time stamp of the financial data packet;
combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs.
Further, the sending of a financial data acquisition request to the financial data supervisory node by a financial data application node in the blockchain network includes:
the financial data application side node decrypts the received first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor, wherein the check factor generation model is as follows:
Figure BDA0002804819080000031
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the financial data application side node encrypts the application factor and the keywords of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
Further, after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node, including:
after receiving the financial data acquisition request and the second ciphertext sent by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode;
comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision node, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factors are consistent;
and when the total times of data transmission completion are judged to be consistent, determining that the financial data application side node passes the security verification.
A financial big data processing system platform based on 5G and a block chain, wherein the financial big data processing method comprises the following steps:
the sending module is used for controlling financial data generated by financial data generating nodes in the blockchain network to be sent to financial data supervision nodes of the blockchain network through the 5G communication network;
the encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a trusted way;
the request module is used for controlling a financial data application side node in the block chain network to send a financial data acquisition request to the financial data supervision node;
and the safety verification module is used for controlling the financial data supervision node to perform safety verification on the financial data application side node after receiving the financial data acquisition request, and transmitting the financial data to the financial data application side node passing the safety verification through the 5G communication network.
Further, the sending module includes:
the dynamic identifier generation module is used for randomly generating a dynamic identifier by the financial data generation node aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the dynamic factor is obtained by the following formula:
Figure BDA0002804819080000041
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
the binding module is used for binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and the data sending module is used for controlling the financial data generating node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
Further, the encryption storage module comprises:
the region dividing module is used for dividing a data storage region corresponding to the financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
the identification module is used for detecting whether a dynamic identifier exists in the financial data packet or not by the financial data supervision node after the financial data packet is received;
the violation judging module is used for judging the financial data packet as violation data when detecting that no dynamic identifier exists in the financial data packet, and sending data to a financial data generating node which sends the non-dynamic identifier to generate a violation prompt;
the extraction module is used for extracting the dynamic identifier and recording a receiving time stamp of the financial data packet when the dynamic identifier is detected to exist in the financial data packet;
the first ciphertext generation module is used for combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node together with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and the storage module is used for storing the encrypted data packet into the data storage area to which the corresponding financial data generation node belongs.
Further, the request module includes:
the generating module is used for decrypting the first ciphertext after the financial data application side node receives the first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
the verification factor generation module is used for generating a verification factor by using a verification factor generation model and generating an application factor by combining the verification factor and the dynamic factor, wherein the verification factor generation model is as follows:
Figure BDA0002804819080000051
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the goldThe total days of the financial data acquisition request is sent to the financial data supervision node by the data fusion application side node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the second ciphertext generating module is used for encrypting the application factor and the keywords of the financial data corresponding to the first ciphertext by the financial data application side node to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and the cryptograph sending module is used for sending a second cryptograph corresponding to the financial data and a financial data acquisition request to the financial data supervision node when the financial data application side node needs to call the financial data from the financial data supervision node.
Further, the security authentication module includes:
the acquisition module is used for decrypting the second ciphertext after the financial data supervision node receives the financial data acquisition request and the second ciphertext transmitted by the financial data application side node, acquiring an application factor and a check factor and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode;
the consistency judging module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
the consistency judging module II is used for analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factor contained in the application factor by using a check factor generating model stored in the financial data supervision node after the dynamic factor is determined to be consistent, comparing the total butting times obtained from the check factor with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factor is consistent;
and the determining module is used for determining that the financial data application side node passes the security verification when the total times of data transmission completion are judged to be consistent.
The invention has the beneficial effects that:
according to the financial big data processing method and the system platform thereof based on the 5G and the block chain, the financial data is transmitted through the 5G transmission network, so that the data transmission efficiency is effectively improved; meanwhile, the management intensity and the storage safety of the financial data can be effectively improved through the financial data supervision node and the encryption mode thereof, and on the other hand, the safety performance of data transmission can be effectively improved through the safety authentication mode between the financial data supervision node and the financial data application side node.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
fig. 2 is a block diagram of the system platform according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
The embodiment of the invention provides a financial big data processing method based on 5G and a block chain, and as shown in FIG. 1, the financial big data processing method comprises the following steps:
s1, sending financial data generated by the financial data generating node in the blockchain network to a financial data supervision node of the blockchain network through the 5G communication network;
s2, the financial data supervision node encrypts and trustfully stores the financial data;
s3, the financial data application side node in the blockchain network sends a financial data acquisition request to the financial data supervision node;
and S4, after receiving the financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node, and sends the financial data to the financial data application side node passing the security verification through the 5G communication network.
The working principle of the technical scheme is as follows: firstly, financial data generated by financial data generation nodes in a blockchain network is sent to financial data supervision nodes of the blockchain network through a 5G communication network; then, the financial data supervision node encrypts and trustinely stores the financial data; then, the financial data application side node in the block chain network sends a financial data acquisition request to the financial data supervision node; and finally, after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application party node and sends the financial data to the financial data application party node passing the security verification through a 5G communication network.
The effect of the above technical scheme is as follows: financial data is transmitted through the 5G transmission network, so that the data transmission efficiency is effectively improved; meanwhile, the management intensity and the storage safety of the financial data can be effectively improved through the financial data supervision node and the encryption mode thereof, and on the other hand, the safety performance of data transmission can be effectively improved through the safety authentication mode between the financial data supervision node and the financial data application side node.
In an embodiment of the present invention, the sending of financial data generated by a financial data generating node in a blockchain network to a financial data supervising node in the blockchain network via a 5G communication network includes:
s101, randomly generating a dynamic identifier by the financial data generation node according to the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the random identifier comprises three random numbers and three random letters, and the random identifier is formed in the following sequence: letters, numbers, letters; the dynamic factor is obtained by the following formula:
Figure BDA0002804819080000071
where ξ denotes the dynamic factor, TdRepresenting the financial data generationThe time used for generating the current financial data of the node; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
s102, binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and S103, the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
The working principle of the technical scheme is as follows: firstly, the financial data generation node randomly generates a dynamic identifier aiming at the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the random identifier comprises three random numbers and three random letters, and the random identifier is formed in the following sequence: letters, numbers, letters; each digit is randomly generated for 0-9 indefinite items and each letter is randomly generated for a-z indefinite items. Then, binding the dynamic identifier and the financial data to form a metal data packet to be sent; and finally, the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
The effect of the above technical scheme is as follows: through the generation and the composition setting of the dynamic identifier, the safety performance of the subsequent financial data supervision and storage can be effectively improved. Meanwhile, the dynamic factors are generated according to the formula, the dynamic factors are determined by effectively combining the random variable elements of the data, the randomness and the variation strength of the dynamic factors can be greatly improved, the regularity of the generation of the dynamic factors is reduced, and the cracking by a malicious third party is effectively prevented. And further improve the privacy protection security of financial data. In the existing metal data storage process, encryption is usually performed only through an encryption algorithm directly, and no dynamic identifier is set, so that encrypted data is easy to crack, and the security of the data cannot be guaranteed.
In an embodiment of the present invention, the financial data supervising node encrypts and trustable stores the financial data, and includes:
s201, dividing a data storage area corresponding to a financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
s203, the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet;
s204, when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt;
s205, when detecting that the dynamic identifier exists in the financial data packet, extracting the dynamic identifier, and recording a receiving time stamp of the financial data packet;
s206, combining the dynamic identifier and the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode; for example, national rice sm23492.
And S207, storing the encrypted data packet into a data storage area to which the corresponding financial data generating node belongs.
The working principle of the technical scheme is as follows: firstly, the financial data supervision node divides a data storage area corresponding to a financial data generation node by taking the financial data generation node as a unit; then, the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet; then, when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt; then, when the dynamic identifier is detected to exist in the financial data packet, extracting the dynamic identifier and recording the receiving time stamp of the financial data packet; then, combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode; and finally, storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs.
The effect of the above technical scheme is as follows: by dividing the data storage area and storing the financial data in a partition mode, the financial data can be stored and managed efficiently. The data extraction is convenient to carry out when the financial data application nodes carry out financial data requests subsequently, and the data extraction efficiency is improved. Through the detection of the dynamic identifier, the wrong generated data generated by the financial data generating node can be screened, the data calling failure of the financial data application side node caused by the fact that the dynamic identifier cannot be identified subsequently due to the data generating mistake is avoided, the success rate and the calling efficiency of the data request calling are improved, and meanwhile, the problem that the financial data are lost due to the fact that the financial data lack the dynamic identifier due to the financial data generating mistake can be effectively prevented. In addition, the method provided by the implementation generates the first ciphertext through the dynamic identifier and the timestamp, and the safety performance of the ciphertext can be effectively improved.
In an embodiment of the present invention, the sending, by a financial data application node in the blockchain network, a financial data acquisition request to the financial data supervision node includes:
s301, after the financial data application side node receives a first ciphertext and a keyword of financial data corresponding to the first ciphertext, decrypting the first ciphertext to obtain a dynamic factor in a dynamic identifier;
s302, generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor, wherein the check factor generation model is as follows:
Figure BDA0002804819080000091
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
s303, the financial data application side node encrypts the application factor and the key words of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node;
s304, when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
The working principle of the technical scheme is as follows: firstly, the financial data application side node decrypts the received first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain a dynamic factor in a dynamic identifier; then, generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor; then, the financial data application side node encrypts the application factor and the keywords of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the financial data in the financial data supervision node; and finally, when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
The effect of the above technical scheme is as follows: by means of the mode, the financial data application side node generates the check factor and the second ciphertext, the safety verification reliability between the subsequent financial data monitoring node and the financial data application side node can be effectively improved, and the safety of the called financial data is further improved. Meanwhile, the check factor is obtained by setting the check factor and the formula, compared with a mode of directly calling financial data in the prior art, the randomness and the variation strength of the check factor can be effectively improved, the uniqueness of each financial data application side node is effectively kept, the identification accuracy of each financial data application side node can be effectively improved, and the problem that the subsequent financial data request fails due to the identification error of the safety verification is avoided.
In an embodiment of the present invention, after receiving a financial data acquisition request, the financial data monitoring node performs security verification on the financial data application node, including:
s401, after receiving a financial data acquisition request and a second ciphertext sent by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode;
s402, comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
s403, after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side nodes and the financial data supervision nodes from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision nodes, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision nodes, and determining whether the dynamic factors are consistent;
s404, when the total times of data transmission completion are judged to be consistent, determining that the financial data application side node passes the security verification.
The working principle of the technical scheme is as follows: firstly, after receiving a financial data acquisition request and a second ciphertext transmitted by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode, so as to ensure the uniqueness of the application factor and the check factor; then, comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent; finally, after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side nodes and the financial data supervision nodes from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision nodes, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision nodes, and determining whether the dynamic factors are consistent; and finally, when the judgment of the total times of finishing the data transmission is consistent, determining that the financial data application side node passes the safety verification.
The effect of the above technical scheme is as follows: according to the scheme provided by the embodiment, the financial data application side node is determined to meet the safety verification requirement only under the two conditions that the dynamic factor contained in the application factor is consistent with the dynamic factor in the first ciphertext, the total number of times of butt joint obtained from the verification factor is consistent with the total number of times of data transmission completion recorded in the financial data supervision node, and by means of the method, the safety performance of data transmission can be effectively improved, the financial data are guaranteed not to be randomly called by a third party, the safety protection of the financial data is effectively improved, and the probability of stealing the financial data is effectively reduced.
The embodiment of the invention provides a 5G and block chain based financial big data processing system platform, and as shown in FIG. 2, the financial big data processing method comprises the following steps:
the sending module is used for controlling financial data generated by financial data generating nodes in the blockchain network to be sent to financial data supervision nodes of the blockchain network through the 5G communication network;
the encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a trusted way;
the request module is used for controlling a financial data application side node in the block chain network to send a financial data acquisition request to the financial data supervision node;
and the safety verification module is used for controlling the financial data supervision node to perform safety verification on the financial data application side node after receiving the financial data acquisition request, and transmitting the financial data to the financial data application side node passing the safety verification through the 5G communication network.
The working principle of the technical scheme is as follows: firstly, financial data generated by a financial data generating node in a block chain network is controlled by a sending module to be sent to a financial data supervisory node of the block chain network through a 5G communication network; then, an encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a credible mode aiming at the financial data; then, a financial data application side node in a block chain network is controlled by a request module to send a financial data acquisition request to the financial data supervision node; and finally, controlling the financial data supervision node to perform security verification on the financial data application side node after receiving a financial data acquisition request through a security verification module, and sending the financial data to the financial data application side node passing the security verification through a 5G communication network.
The effect of the above technical scheme is as follows: financial data is transmitted through the 5G transmission network, so that the data transmission efficiency is effectively improved; meanwhile, the management intensity and the storage safety of the financial data can be effectively improved through the financial data supervision node and the encryption mode thereof, and on the other hand, the safety performance of data transmission can be effectively improved through the safety authentication mode between the financial data supervision node and the financial data application side node.
In an embodiment of the present invention, the sending module includes:
the dynamic identifier generation module is used for randomly generating a dynamic identifier by the financial data generation node aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the method specifically comprises the following steps: the random identifier includes three random numbers and three random letters, and the random identifier is formed in the order of: letters, numbers, letters; the dynamic factor is obtained by the following formula:
Figure BDA0002804819080000121
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the ith secondary generation of the financial data generating nodeThe data magnitude value corresponding to the financial data; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
the binding module is used for binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and the data sending module is used for controlling the financial data generating node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
The working principle of the technical scheme is as follows: firstly, a dynamic identifier generation module is used for controlling the financial data generation node to randomly generate a dynamic identifier aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; then, binding the dynamic identifier and the financial data by using a binding module to form a metal data packet to be sent; and then, controlling the financial data generation node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network by a data sending module.
The effect of the above technical scheme is as follows: through the generation and the composition setting of the dynamic identifier, the safety performance of the subsequent financial data supervision and storage can be effectively improved. Meanwhile, the dynamic factors are generated according to the formula, the dynamic factors are determined by effectively combining the random variable elements of the data, the randomness and the variation strength of the dynamic factors can be greatly improved, the regularity of the generation of the dynamic factors is reduced, and the cracking by a malicious third party is effectively prevented. And further improve the privacy protection security of financial data.
In one embodiment of the present invention, the encryption storage module includes:
the region dividing module is used for dividing a data storage region corresponding to the financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
the identification module is used for detecting whether a dynamic identifier exists in the financial data packet or not by the financial data supervision node after the financial data packet is received;
the violation judging module is used for judging the financial data packet as violation data when detecting that no dynamic identifier exists in the financial data packet, and sending data to a financial data generating node which sends the non-dynamic identifier to generate a violation prompt;
the extraction module is used for extracting the dynamic identifier and recording a receiving time stamp of the financial data packet when the dynamic identifier is detected to exist in the financial data packet;
the first ciphertext generation module is used for combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node together with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and the storage module is used for storing the encrypted data packet into the data storage area to which the corresponding financial data generation node belongs.
The working principle of the technical scheme is as follows: firstly, a region division module is used for controlling the financial data supervision node to divide a data storage region corresponding to a financial data generation node by taking the financial data generation node as a unit; then, an identification module is adopted to control the financial data supervision node to detect whether a dynamic identifier exists in the financial data packet after the financial data packet is received; then, when detecting that no dynamic identifier exists in the financial data packet, the violation judging module judges the financial data packet to be violation data and sends data to a financial data generating node which sends no dynamic identifier to generate a violation prompt; then, when detecting that a dynamic identifier exists in the financial data packet, an extraction module is adopted to extract the dynamic identifier and record a receiving time stamp of the financial data packet; then, the dynamic identifier and the receiving time stamp are combined through a first ciphertext generation module, the financial data packet is encrypted through an encryption algorithm to form an encrypted data packet and a first ciphertext, and the first ciphertext is combined with a keyword of financial data corresponding to the first ciphertext and sent to each financial data application side node; wherein the encryption algorithm comprises a commercial encryption mode; and finally, storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs by using a storage module.
The effect of the above technical scheme is as follows: by dividing the data storage area and storing the financial data in a partition mode, the financial data can be stored and managed efficiently. The data extraction is convenient to carry out when the financial data application nodes carry out financial data requests subsequently, and the data extraction efficiency is improved. Through the detection of the dynamic identifier, the wrong generated data generated by the financial data generating node can be screened, the data calling failure of the financial data application side node caused by the fact that the dynamic identifier cannot be identified subsequently due to the data generating mistake is avoided, the success rate and the calling efficiency of the data request calling are improved, and meanwhile, the problem that the financial data are lost due to the fact that the financial data lack the dynamic identifier due to the financial data generating mistake can be effectively prevented. In addition, the method provided by the implementation generates the first ciphertext through the dynamic identifier and the timestamp, and the safety performance of the ciphertext can be effectively improved.
In one embodiment of the present invention, the request module includes:
the generating module is used for decrypting the first ciphertext after the financial data application side node receives the first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
the verification factor generation module is used for generating a verification factor by using a verification factor generation model and generating an application factor by combining the verification factor and the dynamic factor, wherein the verification factor generation model is as follows:
Figure BDA0002804819080000141
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the second ciphertext generating module is used for encrypting the application factor and the keywords of the financial data corresponding to the first ciphertext by the financial data application side node to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and the cryptograph sending module is used for sending a second cryptograph corresponding to the financial data and a financial data acquisition request to the financial data supervision node when the financial data application side node needs to call the financial data from the financial data supervision node.
The working principle of the technical scheme is as follows: firstly, a generating module is adopted to control the financial data application side node to decrypt a received first ciphertext and a keyword of financial data corresponding to the first ciphertext to obtain a dynamic factor in a dynamic identifier; then, a check factor generating module generates a check factor by using a check factor generating model, and combines the check factor and the dynamic factor to generate an application factor; then, a second ciphertext generation module controls the financial data application side node to encrypt the application factor and the keyword of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node; and finally, when the financial data application side node needs to call financial data from the financial data supervision node, a ciphertext sending module is adopted to send a second ciphertext sending and financial data obtaining request corresponding to the financial data supervision node.
The effect of the above technical scheme is as follows: by means of the mode, the financial data application side node generates the check factor and the second ciphertext, the safety verification reliability between the subsequent financial data monitoring node and the financial data application side node can be effectively improved, and the safety of the called financial data is further improved. Meanwhile, the check factor is obtained by setting the check factor and the formula, the randomness and the variation strength of the check factor can be effectively improved, the uniqueness of each financial data application side node is effectively kept, the identification accuracy of each financial data application side node can be effectively improved, and the problem of failure of subsequent financial data requests caused by safety verification identification errors is avoided.
In one embodiment of the present invention, the security authentication module includes:
the acquisition module is used for decrypting the second ciphertext after the financial data supervision node receives the financial data acquisition request and the second ciphertext transmitted by the financial data application side node, acquiring an application factor and a check factor and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode;
the consistency judging module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
the consistency judging module II is used for analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factor contained in the application factor by using a check factor generating model stored in the financial data supervision node after the dynamic factor is determined to be consistent, comparing the total butting times obtained from the check factor with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factor is consistent;
and the determining module is used for determining that the financial data application side node passes the security verification when the total times of data transmission completion are judged to be consistent.
The working principle of the technical scheme is as follows: firstly, after the financial data supervision node is controlled by an acquisition module to receive a financial data acquisition request and a second ciphertext transmitted by the financial data application side node, decrypting the second ciphertext to acquire an application factor and a check factor, and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode; then, a consistency judgment module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent; then, after the consistency of the dynamic factors is determined to be consistent through a consistency judging module II, analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factors contained in the application factors by using a check factor generating model stored in the financial data supervision node, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factors are consistent; and finally, when the total times of data transmission completion are judged to be consistent by adopting a determining module, determining that the financial data application side node passes the safety verification.
The effect of the above technical scheme is as follows: according to the scheme provided by the embodiment, the financial data application side node is determined to meet the safety verification requirement only under the two conditions that the dynamic factor contained in the application factor is consistent with the dynamic factor in the first ciphertext, the total number of times of butt joint obtained from the verification factor is consistent with the total number of times of data transmission completion recorded in the financial data supervision node, and by means of the method, the safety performance of data transmission can be effectively improved, the financial data are guaranteed not to be randomly called by a third party, the safety protection of the financial data is effectively improved, and the probability of stealing the financial data is effectively reduced.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A financial big data processing method based on 5G and a block chain is characterized by comprising the following steps:
financial data generated by financial data generation nodes in the block chain network are sent to financial data supervision nodes of the block chain network through the 5G communication network;
the financial data supervision node encrypts and trustable stores the financial data;
financial data application side nodes in the block chain network send financial data acquisition requests to the financial data supervision nodes;
and after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node and sends the financial data to the financial data application side node passing the security verification through a 5G communication network.
2. The method of claim 1, wherein the financial data generated by the financial data generating node in the blockchain network is transmitted to the financial data supervising node in the blockchain network through a 5G communication network, and the method comprises:
the financial data generation node randomly generates a dynamic identifier aiming at the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the dynamic factor is obtained by the following formula:
Figure FDA0002804819070000011
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresenting the financial data generating nodeTime taken for the ith secondary generation of financial data, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
binding the dynamic identifier with the financial data to form a metal data packet to be sent;
and the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
3. The method of claim 1, wherein the financial data administration node encrypts and trustable stores the financial data with respect to the financial data, comprising:
the financial data supervision node divides a data storage area corresponding to the financial data generation node by taking the financial data generation node as a unit;
the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet;
when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt;
when the dynamic identifier is detected to exist in the financial data packet, extracting the dynamic identifier and recording the receiving time stamp of the financial data packet;
combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs.
4. The method of claim 1, wherein the sending of a financial data acquisition request by a financial data applicator node in the blockchain network to the financial data supervisory node comprises:
the financial data application side node decrypts the received first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor, wherein the check factor generation model is as follows:
Figure FDA0002804819070000021
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the financial data application side node encrypts the application factor and the keywords of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
5. The method of claim 1, wherein the financial data administration node performs security verification on the financial data application node after receiving a financial data acquisition request, and comprises:
after receiving the financial data acquisition request and the second ciphertext sent by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode;
comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision node, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factors are consistent;
and when the total times of data transmission completion are judged to be consistent, determining that the financial data application side node passes the security verification.
6. A financial big data processing system platform based on 5G and a block chain is characterized in that the financial big data processing method comprises the following steps:
the sending module is used for controlling financial data generated by financial data generating nodes in the blockchain network to be sent to financial data supervision nodes of the blockchain network through the 5G communication network;
the encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a trusted way;
the request module is used for controlling a financial data application side node in the block chain network to send a financial data acquisition request to the financial data supervision node;
and the safety verification module is used for controlling the financial data supervision node to perform safety verification on the financial data application side node after receiving the financial data acquisition request, and transmitting the financial data to the financial data application side node passing the safety verification through the 5G communication network.
7. The system platform of claim 6, wherein the sending module comprises:
the dynamic identifier generation module is used for randomly generating a dynamic identifier by the financial data generation node aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the dynamic factor is obtained by the following formula:
Figure FDA0002804819070000031
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiData corresponding to the ith secondary generated financial data of the financial data generation nodeA magnitude; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
the binding module is used for binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and the data sending module is used for controlling the financial data generating node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
8. The system platform of claim 1, wherein the encryption storage module comprises:
the region dividing module is used for dividing a data storage region corresponding to the financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
the identification module is used for detecting whether a dynamic identifier exists in the financial data packet or not by the financial data supervision node after the financial data packet is received;
the violation judging module is used for judging the financial data packet as violation data when detecting that no dynamic identifier exists in the financial data packet, and sending data to a financial data generating node which sends the non-dynamic identifier to generate a violation prompt;
the extraction module is used for extracting the dynamic identifier and recording a receiving time stamp of the financial data packet when the dynamic identifier is detected to exist in the financial data packet;
the first ciphertext generation module is used for combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node together with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and the storage module is used for storing the encrypted data packet into the data storage area to which the corresponding financial data generation node belongs.
9. The system platform of claim 6, wherein the request module comprises:
the generating module is used for decrypting the first ciphertext after the financial data application side node receives the first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
the verification factor generation module is used for generating a verification factor by using a verification factor generation model and generating an application factor by combining the verification factor and the dynamic factor, wherein the verification factor generation model is as follows:
Figure FDA0002804819070000041
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the second ciphertext generating module is used for encrypting the application factor and the keywords of the financial data corresponding to the first ciphertext by the financial data application side node to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and the cryptograph sending module is used for sending a second cryptograph corresponding to the financial data and a financial data acquisition request to the financial data supervision node when the financial data application side node needs to call the financial data from the financial data supervision node.
10. The system platform of claim 6, wherein the security authentication module comprises:
the acquisition module is used for decrypting the second ciphertext after the financial data supervision node receives the financial data acquisition request and the second ciphertext transmitted by the financial data application side node, acquiring an application factor and a check factor and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode;
the consistency judging module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
the consistency judging module II is used for analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factor contained in the application factor by using a check factor generating model stored in the financial data supervision node after the dynamic factor is determined to be consistent, comparing the total butting times obtained from the check factor with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factor is consistent;
and the determining module is used for determining that the financial data application side node passes the security verification when the total times of data transmission completion are judged to be consistent.
CN202011363796.9A 2020-11-27 2020-11-27 Financial big data processing method based on 5G and block chain and system platform thereof Active CN112367629B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011363796.9A CN112367629B (en) 2020-11-27 2020-11-27 Financial big data processing method based on 5G and block chain and system platform thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011363796.9A CN112367629B (en) 2020-11-27 2020-11-27 Financial big data processing method based on 5G and block chain and system platform thereof

Publications (2)

Publication Number Publication Date
CN112367629A true CN112367629A (en) 2021-02-12
CN112367629B CN112367629B (en) 2021-08-31

Family

ID=74535493

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011363796.9A Active CN112367629B (en) 2020-11-27 2020-11-27 Financial big data processing method based on 5G and block chain and system platform thereof

Country Status (1)

Country Link
CN (1) CN112367629B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114154981A (en) * 2021-08-16 2022-03-08 北京天德科技有限公司 Interaction method for block chain and big data platform in real-time settlement and supervision system
CN115203728A (en) * 2022-09-14 2022-10-18 南京紫米网络科技有限公司 Financial data safety storage system and method based on alliance block chain and big data
CN115205041A (en) * 2022-07-15 2022-10-18 山东大学 Financial big data processing system and method based on block chain
CN115829729A (en) * 2023-02-14 2023-03-21 四川华西集采电子商务有限公司 Supply chain financial credit evaluation system and method based on three-chain architecture

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170287068A1 (en) * 2016-03-31 2017-10-05 Thomson Reuters Global Resources Unlimited Company Systems and methods for providing financial data to financial instruments in a distributed ledger system
CN110413649A (en) * 2019-08-01 2019-11-05 宁波富万信息科技有限公司 A kind of financial big data processing method and its system platform based on block chain
US20200005290A1 (en) * 2017-12-04 2020-01-02 Vijay Madisetti System and Method for Processing Payments in Fiat Currency Using Blockchain and Tethered Tokens
CN111429278A (en) * 2020-03-19 2020-07-17 武汉谦屹达管理咨询有限公司 Financial big data processing system and method based on 5G and block chain
CN111865985A (en) * 2020-07-21 2020-10-30 安徽高山科技有限公司 Supply chain financial data maintenance method based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170287068A1 (en) * 2016-03-31 2017-10-05 Thomson Reuters Global Resources Unlimited Company Systems and methods for providing financial data to financial instruments in a distributed ledger system
US20200005290A1 (en) * 2017-12-04 2020-01-02 Vijay Madisetti System and Method for Processing Payments in Fiat Currency Using Blockchain and Tethered Tokens
CN110413649A (en) * 2019-08-01 2019-11-05 宁波富万信息科技有限公司 A kind of financial big data processing method and its system platform based on block chain
CN111429278A (en) * 2020-03-19 2020-07-17 武汉谦屹达管理咨询有限公司 Financial big data processing system and method based on 5G and block chain
CN111865985A (en) * 2020-07-21 2020-10-30 安徽高山科技有限公司 Supply chain financial data maintenance method based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114154981A (en) * 2021-08-16 2022-03-08 北京天德科技有限公司 Interaction method for block chain and big data platform in real-time settlement and supervision system
CN115205041A (en) * 2022-07-15 2022-10-18 山东大学 Financial big data processing system and method based on block chain
CN115203728A (en) * 2022-09-14 2022-10-18 南京紫米网络科技有限公司 Financial data safety storage system and method based on alliance block chain and big data
CN115829729A (en) * 2023-02-14 2023-03-21 四川华西集采电子商务有限公司 Supply chain financial credit evaluation system and method based on three-chain architecture
CN115829729B (en) * 2023-02-14 2023-05-02 四川华西集采电子商务有限公司 Three-chain architecture-based supply chain financial credit evaluation system and method

Also Published As

Publication number Publication date
CN112367629B (en) 2021-08-31

Similar Documents

Publication Publication Date Title
CN112367629B (en) Financial big data processing method based on 5G and block chain and system platform thereof
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
CN108389047B (en) Method for trading between parent chain and child chain in block chain and block chain network
US20210279736A1 (en) Blockchain secure transaction method and device based on biomarker authentication
US7756783B2 (en) Fraud clearinghouse
US20170352031A1 (en) Systems and methods for providing a personal distributed ledger
CN111415163B (en) Block chain-based service processing and verifying method, system and verifying node
CN105900375A (en) Efficient methods for protecting identity in authenticated transmissions
US20170161746A1 (en) Compromised Identity Exchange Systems and Methods
CN103714638A (en) Method and system for quickly locating terminal master key downloading failure
KR102332226B1 (en) Blockchain network system being capable of verifying a blockchain ledger and method for verifying a blockchain ledger
CN114465726B (en) Digital wallet security framework system based on security unit and trusted execution environment
CN103942896A (en) System for money withdrawing without card on ATM
CN111770198A (en) Information sharing method, device and equipment
CN116720839B (en) Financial information management method based on blockchain technology and supervision system thereof
CN113516462A (en) Quantum cash settlement system and method based on block chain
US20210350368A1 (en) Method and system for blockchain intrusion prevention
CN114841684A (en) Digital currency double-off-line transaction method based on security unit and trusted execution environment
CN113159940A (en) Transaction method, system and computer equipment for enhanced bit currency wallet
CN105512936A (en) E-bank system sensitive data processing method and system in multi-legal-person business mode
KR102086234B1 (en) Virtual currency trading system with block chain
US20210125158A1 (en) Blockchain cryptocurrency transmission method using blockchain self-authentication process
KR100224756B1 (en) Method of maintaining the password in the financial on-line transaction system
CN110868412A (en) Block chain financial information processing system and method
RU2795371C1 (en) Method and system of depersonalized assessment of clients of organizations for carrying out operations between organizations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240124

Address after: 230000 B-1015, wo Yuan Garden, 81 Ganquan Road, Shushan District, Hefei, Anhui.

Patentee after: HEFEI MINGLONG ELECTRONIC TECHNOLOGY Co.,Ltd.

Country or region after: China

Address before: 518172 Longxiang Avenue, Longgang District, Shenzhen, Guangdong 2188

Patentee before: SHENZHEN INSTITUTE OF INFORMATION TECHNOLOGY

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240307

Address after: 200120 Pudong New Area, Shanghai, China (Shanghai) free trade trial area, No. 3, 1 1, Fang Chun road.

Patentee after: Shanghai Moyun Information Technology Co.,Ltd.

Country or region after: China

Address before: 230000 B-1015, wo Yuan Garden, 81 Ganquan Road, Shushan District, Hefei, Anhui.

Patentee before: HEFEI MINGLONG ELECTRONIC TECHNOLOGY Co.,Ltd.

Country or region before: China