Disclosure of Invention
The invention provides a 5G and block chain based financial big data processing method and a system platform thereof, which are used for solving the problems of low transmission efficiency and poor safety of the existing financial big data, and adopt the following technical scheme:
a financial big data processing method based on 5G and a block chain comprises the following steps:
financial data generated by financial data generation nodes in the block chain network are sent to financial data supervision nodes of the block chain network through the 5G communication network;
the financial data supervision node encrypts and trustable stores the financial data;
financial data application side nodes in the block chain network send financial data acquisition requests to the financial data supervision nodes;
and after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node and sends the financial data to the financial data application side node passing the security verification through a 5G communication network.
Further, the financial data generated by the financial data generating node in the blockchain network is sent to the financial data supervising node of the blockchain network through the 5G communication network, and the method comprises the following steps:
the financial data generation node randomly generates a dynamic identifier aiming at the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the dynamic factor is obtained by the following formula:
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
binding the dynamic identifier with the financial data to form a metal data packet to be sent;
and the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
Further, the financial data supervisory node encrypts and trustable stores the financial data, including:
the financial data supervision node divides a data storage area corresponding to the financial data generation node by taking the financial data generation node as a unit;
the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet;
when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt;
when the dynamic identifier is detected to exist in the financial data packet, extracting the dynamic identifier and recording the receiving time stamp of the financial data packet;
combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs.
Further, the sending of a financial data acquisition request to the financial data supervisory node by a financial data application node in the blockchain network includes:
the financial data application side node decrypts the received first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor, wherein the check factor generation model is as follows:
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the financial data application side node encrypts the application factor and the keywords of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
Further, after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node, including:
after receiving the financial data acquisition request and the second ciphertext sent by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode;
comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision node, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factors are consistent;
and when the total times of data transmission completion are judged to be consistent, determining that the financial data application side node passes the security verification.
A financial big data processing system platform based on 5G and a block chain, wherein the financial big data processing method comprises the following steps:
the sending module is used for controlling financial data generated by financial data generating nodes in the blockchain network to be sent to financial data supervision nodes of the blockchain network through the 5G communication network;
the encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a trusted way;
the request module is used for controlling a financial data application side node in the block chain network to send a financial data acquisition request to the financial data supervision node;
and the safety verification module is used for controlling the financial data supervision node to perform safety verification on the financial data application side node after receiving the financial data acquisition request, and transmitting the financial data to the financial data application side node passing the safety verification through the 5G communication network.
Further, the sending module includes:
the dynamic identifier generation module is used for randomly generating a dynamic identifier by the financial data generation node aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the dynamic factor is obtained by the following formula:
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
the binding module is used for binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and the data sending module is used for controlling the financial data generating node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
Further, the encryption storage module comprises:
the region dividing module is used for dividing a data storage region corresponding to the financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
the identification module is used for detecting whether a dynamic identifier exists in the financial data packet or not by the financial data supervision node after the financial data packet is received;
the violation judging module is used for judging the financial data packet as violation data when detecting that no dynamic identifier exists in the financial data packet, and sending data to a financial data generating node which sends the non-dynamic identifier to generate a violation prompt;
the extraction module is used for extracting the dynamic identifier and recording a receiving time stamp of the financial data packet when the dynamic identifier is detected to exist in the financial data packet;
the first ciphertext generation module is used for combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node together with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and the storage module is used for storing the encrypted data packet into the data storage area to which the corresponding financial data generation node belongs.
Further, the request module includes:
the generating module is used for decrypting the first ciphertext after the financial data application side node receives the first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
the verification factor generation module is used for generating a verification factor by using a verification factor generation model and generating an application factor by combining the verification factor and the dynamic factor, wherein the verification factor generation model is as follows:
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the goldThe total days of the financial data acquisition request is sent to the financial data supervision node by the data fusion application side node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the second ciphertext generating module is used for encrypting the application factor and the keywords of the financial data corresponding to the first ciphertext by the financial data application side node to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and the cryptograph sending module is used for sending a second cryptograph corresponding to the financial data and a financial data acquisition request to the financial data supervision node when the financial data application side node needs to call the financial data from the financial data supervision node.
Further, the security authentication module includes:
the acquisition module is used for decrypting the second ciphertext after the financial data supervision node receives the financial data acquisition request and the second ciphertext transmitted by the financial data application side node, acquiring an application factor and a check factor and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode;
the consistency judging module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
the consistency judging module II is used for analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factor contained in the application factor by using a check factor generating model stored in the financial data supervision node after the dynamic factor is determined to be consistent, comparing the total butting times obtained from the check factor with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factor is consistent;
and the determining module is used for determining that the financial data application side node passes the security verification when the total times of data transmission completion are judged to be consistent.
The invention has the beneficial effects that:
according to the financial big data processing method and the system platform thereof based on the 5G and the block chain, the financial data is transmitted through the 5G transmission network, so that the data transmission efficiency is effectively improved; meanwhile, the management intensity and the storage safety of the financial data can be effectively improved through the financial data supervision node and the encryption mode thereof, and on the other hand, the safety performance of data transmission can be effectively improved through the safety authentication mode between the financial data supervision node and the financial data application side node.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
The embodiment of the invention provides a financial big data processing method based on 5G and a block chain, and as shown in FIG. 1, the financial big data processing method comprises the following steps:
s1, sending financial data generated by the financial data generating node in the blockchain network to a financial data supervision node of the blockchain network through the 5G communication network;
s2, the financial data supervision node encrypts and trustfully stores the financial data;
s3, the financial data application side node in the blockchain network sends a financial data acquisition request to the financial data supervision node;
and S4, after receiving the financial data acquisition request, the financial data supervision node performs security verification on the financial data application side node, and sends the financial data to the financial data application side node passing the security verification through the 5G communication network.
The working principle of the technical scheme is as follows: firstly, financial data generated by financial data generation nodes in a blockchain network is sent to financial data supervision nodes of the blockchain network through a 5G communication network; then, the financial data supervision node encrypts and trustinely stores the financial data; then, the financial data application side node in the block chain network sends a financial data acquisition request to the financial data supervision node; and finally, after receiving a financial data acquisition request, the financial data supervision node performs security verification on the financial data application party node and sends the financial data to the financial data application party node passing the security verification through a 5G communication network.
The effect of the above technical scheme is as follows: financial data is transmitted through the 5G transmission network, so that the data transmission efficiency is effectively improved; meanwhile, the management intensity and the storage safety of the financial data can be effectively improved through the financial data supervision node and the encryption mode thereof, and on the other hand, the safety performance of data transmission can be effectively improved through the safety authentication mode between the financial data supervision node and the financial data application side node.
In an embodiment of the present invention, the sending of financial data generated by a financial data generating node in a blockchain network to a financial data supervising node in the blockchain network via a 5G communication network includes:
s101, randomly generating a dynamic identifier by the financial data generation node according to the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the random identifier comprises three random numbers and three random letters, and the random identifier is formed in the following sequence: letters, numbers, letters; the dynamic factor is obtained by the following formula:
where ξ denotes the dynamic factor, TdRepresenting the financial data generationThe time used for generating the current financial data of the node; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the data magnitude corresponding to the ith secondary generation financial data of the financial data generation node; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
s102, binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and S103, the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
The working principle of the technical scheme is as follows: firstly, the financial data generation node randomly generates a dynamic identifier aiming at the financial data generated by the financial data generation node, wherein the dynamic identifier comprises a dynamic factor and a random identifier; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the random identifier comprises three random numbers and three random letters, and the random identifier is formed in the following sequence: letters, numbers, letters; each digit is randomly generated for 0-9 indefinite items and each letter is randomly generated for a-z indefinite items. Then, binding the dynamic identifier and the financial data to form a metal data packet to be sent; and finally, the financial data generation node sends the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
The effect of the above technical scheme is as follows: through the generation and the composition setting of the dynamic identifier, the safety performance of the subsequent financial data supervision and storage can be effectively improved. Meanwhile, the dynamic factors are generated according to the formula, the dynamic factors are determined by effectively combining the random variable elements of the data, the randomness and the variation strength of the dynamic factors can be greatly improved, the regularity of the generation of the dynamic factors is reduced, and the cracking by a malicious third party is effectively prevented. And further improve the privacy protection security of financial data. In the existing metal data storage process, encryption is usually performed only through an encryption algorithm directly, and no dynamic identifier is set, so that encrypted data is easy to crack, and the security of the data cannot be guaranteed.
In an embodiment of the present invention, the financial data supervising node encrypts and trustable stores the financial data, and includes:
s201, dividing a data storage area corresponding to a financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
s203, the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet;
s204, when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt;
s205, when detecting that the dynamic identifier exists in the financial data packet, extracting the dynamic identifier, and recording a receiving time stamp of the financial data packet;
s206, combining the dynamic identifier and the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode; for example, national rice sm23492.
And S207, storing the encrypted data packet into a data storage area to which the corresponding financial data generating node belongs.
The working principle of the technical scheme is as follows: firstly, the financial data supervision node divides a data storage area corresponding to a financial data generation node by taking the financial data generation node as a unit; then, the financial data supervision node detects whether a dynamic identifier exists in the financial data packet after receiving the financial data packet; then, when detecting that no dynamic identifier exists in the financial data packet, judging that the financial data packet is illegal data, and sending data to a financial data generation node which sends no dynamic identifier to generate an illegal prompt; then, when the dynamic identifier is detected to exist in the financial data packet, extracting the dynamic identifier and recording the receiving time stamp of the financial data packet; then, combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node in combination with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode; and finally, storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs.
The effect of the above technical scheme is as follows: by dividing the data storage area and storing the financial data in a partition mode, the financial data can be stored and managed efficiently. The data extraction is convenient to carry out when the financial data application nodes carry out financial data requests subsequently, and the data extraction efficiency is improved. Through the detection of the dynamic identifier, the wrong generated data generated by the financial data generating node can be screened, the data calling failure of the financial data application side node caused by the fact that the dynamic identifier cannot be identified subsequently due to the data generating mistake is avoided, the success rate and the calling efficiency of the data request calling are improved, and meanwhile, the problem that the financial data are lost due to the fact that the financial data lack the dynamic identifier due to the financial data generating mistake can be effectively prevented. In addition, the method provided by the implementation generates the first ciphertext through the dynamic identifier and the timestamp, and the safety performance of the ciphertext can be effectively improved.
In an embodiment of the present invention, the sending, by a financial data application node in the blockchain network, a financial data acquisition request to the financial data supervision node includes:
s301, after the financial data application side node receives a first ciphertext and a keyword of financial data corresponding to the first ciphertext, decrypting the first ciphertext to obtain a dynamic factor in a dynamic identifier;
s302, generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor, wherein the check factor generation model is as follows:
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
s303, the financial data application side node encrypts the application factor and the key words of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node;
s304, when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
The working principle of the technical scheme is as follows: firstly, the financial data application side node decrypts the received first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain a dynamic factor in a dynamic identifier; then, generating a check factor by using a check factor generation model, and combining the check factor and the dynamic factor to generate an application factor; then, the financial data application side node encrypts the application factor and the keywords of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the financial data in the financial data supervision node; and finally, when the financial data application side node needs to call financial data from the financial data supervision node, sending a second ciphertext corresponding to the financial data and a financial data acquisition request to the financial data supervision node.
The effect of the above technical scheme is as follows: by means of the mode, the financial data application side node generates the check factor and the second ciphertext, the safety verification reliability between the subsequent financial data monitoring node and the financial data application side node can be effectively improved, and the safety of the called financial data is further improved. Meanwhile, the check factor is obtained by setting the check factor and the formula, compared with a mode of directly calling financial data in the prior art, the randomness and the variation strength of the check factor can be effectively improved, the uniqueness of each financial data application side node is effectively kept, the identification accuracy of each financial data application side node can be effectively improved, and the problem that the subsequent financial data request fails due to the identification error of the safety verification is avoided.
In an embodiment of the present invention, after receiving a financial data acquisition request, the financial data monitoring node performs security verification on the financial data application node, including:
s401, after receiving a financial data acquisition request and a second ciphertext sent by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode;
s402, comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
s403, after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side nodes and the financial data supervision nodes from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision nodes, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision nodes, and determining whether the dynamic factors are consistent;
s404, when the total times of data transmission completion are judged to be consistent, determining that the financial data application side node passes the security verification.
The working principle of the technical scheme is as follows: firstly, after receiving a financial data acquisition request and a second ciphertext transmitted by the financial data application side node, the financial data supervision node decrypts the second ciphertext to acquire an application factor and a check factor, and ensures that the application factor and the check factor are not tampered by using a block chain accounting mode, so as to ensure the uniqueness of the application factor and the check factor; then, comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent; finally, after the dynamic factors are determined to be consistent, analyzing the total data transmission completion times of the financial data application side nodes and the financial data supervision nodes from the check factors contained in the application factors by using a check factor generation model stored in the financial data supervision nodes, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision nodes, and determining whether the dynamic factors are consistent; and finally, when the judgment of the total times of finishing the data transmission is consistent, determining that the financial data application side node passes the safety verification.
The effect of the above technical scheme is as follows: according to the scheme provided by the embodiment, the financial data application side node is determined to meet the safety verification requirement only under the two conditions that the dynamic factor contained in the application factor is consistent with the dynamic factor in the first ciphertext, the total number of times of butt joint obtained from the verification factor is consistent with the total number of times of data transmission completion recorded in the financial data supervision node, and by means of the method, the safety performance of data transmission can be effectively improved, the financial data are guaranteed not to be randomly called by a third party, the safety protection of the financial data is effectively improved, and the probability of stealing the financial data is effectively reduced.
The embodiment of the invention provides a 5G and block chain based financial big data processing system platform, and as shown in FIG. 2, the financial big data processing method comprises the following steps:
the sending module is used for controlling financial data generated by financial data generating nodes in the blockchain network to be sent to financial data supervision nodes of the blockchain network through the 5G communication network;
the encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a trusted way;
the request module is used for controlling a financial data application side node in the block chain network to send a financial data acquisition request to the financial data supervision node;
and the safety verification module is used for controlling the financial data supervision node to perform safety verification on the financial data application side node after receiving the financial data acquisition request, and transmitting the financial data to the financial data application side node passing the safety verification through the 5G communication network.
The working principle of the technical scheme is as follows: firstly, financial data generated by a financial data generating node in a block chain network is controlled by a sending module to be sent to a financial data supervisory node of the block chain network through a 5G communication network; then, an encryption storage module is used for controlling the financial data supervision node to encrypt and store the financial data in a credible mode aiming at the financial data; then, a financial data application side node in a block chain network is controlled by a request module to send a financial data acquisition request to the financial data supervision node; and finally, controlling the financial data supervision node to perform security verification on the financial data application side node after receiving a financial data acquisition request through a security verification module, and sending the financial data to the financial data application side node passing the security verification through a 5G communication network.
The effect of the above technical scheme is as follows: financial data is transmitted through the 5G transmission network, so that the data transmission efficiency is effectively improved; meanwhile, the management intensity and the storage safety of the financial data can be effectively improved through the financial data supervision node and the encryption mode thereof, and on the other hand, the safety performance of data transmission can be effectively improved through the safety authentication mode between the financial data supervision node and the financial data application side node.
In an embodiment of the present invention, the sending module includes:
the dynamic identifier generation module is used for randomly generating a dynamic identifier by the financial data generation node aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; the method specifically comprises the following steps: the random identifier includes three random numbers and three random letters, and the random identifier is formed in the order of: letters, numbers, letters; the dynamic factor is obtained by the following formula:
where ξ denotes the dynamic factor, TdRepresenting the time taken by the financial data generating node to generate the current financial data; n represents the total number of times the financial data generating node generates financial data; t isiRepresents the time taken by the financial data generating node to generate the financial data of the ith time, TmaxRepresents a maximum time taken for the financial data generating node to generate the financial data; t isminRepresenting a minimum time taken for the financial data generating node to generate the financial data; hdThe data quantity value represents a data quantity value corresponding to the financial data currently generated by the financial data generating node; hiRepresenting the ith secondary generation of the financial data generating nodeThe data magnitude value corresponding to the financial data; hmaxThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node; hminThe data value corresponding to the financial data representing the maximum data amount generated by the financial data generation node;
the binding module is used for binding the dynamic identifier and the financial data to form a metal data packet to be sent;
and the data sending module is used for controlling the financial data generating node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network.
The working principle of the technical scheme is as follows: firstly, a dynamic identifier generation module is used for controlling the financial data generation node to randomly generate a dynamic identifier aiming at the financial data generated by the financial data generation node; wherein the dynamic identifier comprises a dynamic factor and a random identification; the random identification comprises a random number and a plurality of random letters, and the numbers of the number and the letters are the same; then, binding the dynamic identifier and the financial data by using a binding module to form a metal data packet to be sent; and then, controlling the financial data generation node to send the metal data packet to a financial data supervision node of a block chain network through a 5G communication network by a data sending module.
The effect of the above technical scheme is as follows: through the generation and the composition setting of the dynamic identifier, the safety performance of the subsequent financial data supervision and storage can be effectively improved. Meanwhile, the dynamic factors are generated according to the formula, the dynamic factors are determined by effectively combining the random variable elements of the data, the randomness and the variation strength of the dynamic factors can be greatly improved, the regularity of the generation of the dynamic factors is reduced, and the cracking by a malicious third party is effectively prevented. And further improve the privacy protection security of financial data.
In one embodiment of the present invention, the encryption storage module includes:
the region dividing module is used for dividing a data storage region corresponding to the financial data generation node by the financial data supervision node by taking the financial data generation node as a unit;
the identification module is used for detecting whether a dynamic identifier exists in the financial data packet or not by the financial data supervision node after the financial data packet is received;
the violation judging module is used for judging the financial data packet as violation data when detecting that no dynamic identifier exists in the financial data packet, and sending data to a financial data generating node which sends the non-dynamic identifier to generate a violation prompt;
the extraction module is used for extracting the dynamic identifier and recording a receiving time stamp of the financial data packet when the dynamic identifier is detected to exist in the financial data packet;
the first ciphertext generation module is used for combining the dynamic identifier with the receiving timestamp, encrypting the financial data packet through an encryption algorithm to form an encrypted data packet and a first ciphertext, and sending the first ciphertext to each financial data application side node together with the keyword of the financial data corresponding to the first ciphertext; wherein the encryption algorithm comprises a commercial encryption mode;
and the storage module is used for storing the encrypted data packet into the data storage area to which the corresponding financial data generation node belongs.
The working principle of the technical scheme is as follows: firstly, a region division module is used for controlling the financial data supervision node to divide a data storage region corresponding to a financial data generation node by taking the financial data generation node as a unit; then, an identification module is adopted to control the financial data supervision node to detect whether a dynamic identifier exists in the financial data packet after the financial data packet is received; then, when detecting that no dynamic identifier exists in the financial data packet, the violation judging module judges the financial data packet to be violation data and sends data to a financial data generating node which sends no dynamic identifier to generate a violation prompt; then, when detecting that a dynamic identifier exists in the financial data packet, an extraction module is adopted to extract the dynamic identifier and record a receiving time stamp of the financial data packet; then, the dynamic identifier and the receiving time stamp are combined through a first ciphertext generation module, the financial data packet is encrypted through an encryption algorithm to form an encrypted data packet and a first ciphertext, and the first ciphertext is combined with a keyword of financial data corresponding to the first ciphertext and sent to each financial data application side node; wherein the encryption algorithm comprises a commercial encryption mode; and finally, storing the encrypted data packet into a data storage area to which the corresponding financial data generation node belongs by using a storage module.
The effect of the above technical scheme is as follows: by dividing the data storage area and storing the financial data in a partition mode, the financial data can be stored and managed efficiently. The data extraction is convenient to carry out when the financial data application nodes carry out financial data requests subsequently, and the data extraction efficiency is improved. Through the detection of the dynamic identifier, the wrong generated data generated by the financial data generating node can be screened, the data calling failure of the financial data application side node caused by the fact that the dynamic identifier cannot be identified subsequently due to the data generating mistake is avoided, the success rate and the calling efficiency of the data request calling are improved, and meanwhile, the problem that the financial data are lost due to the fact that the financial data lack the dynamic identifier due to the financial data generating mistake can be effectively prevented. In addition, the method provided by the implementation generates the first ciphertext through the dynamic identifier and the timestamp, and the safety performance of the ciphertext can be effectively improved.
In one embodiment of the present invention, the request module includes:
the generating module is used for decrypting the first ciphertext after the financial data application side node receives the first ciphertext and the keyword of the financial data corresponding to the first ciphertext to obtain the dynamic factor in the dynamic identifier;
the verification factor generation module is used for generating a verification factor by using a verification factor generation model and generating an application factor by combining the verification factor and the dynamic factor, wherein the verification factor generation model is as follows:
where ω denotes a check factor, NcRepresenting the total number of data transmission completion times of the financial data application node and the financial data supervision node; n is a radical ofsRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node; m represents the total number of days for the financial data application side node to send a financial data acquisition request to a financial data supervision node; n is a radical ofiRepresenting the total times of sending a financial data acquisition request to a financial data supervision node by the financial data application side node on the ith day;
the second ciphertext generating module is used for encrypting the application factor and the keywords of the financial data corresponding to the first ciphertext by the financial data application side node to form a second ciphertext corresponding to the fused data in the financial data supervision node;
and the cryptograph sending module is used for sending a second cryptograph corresponding to the financial data and a financial data acquisition request to the financial data supervision node when the financial data application side node needs to call the financial data from the financial data supervision node.
The working principle of the technical scheme is as follows: firstly, a generating module is adopted to control the financial data application side node to decrypt a received first ciphertext and a keyword of financial data corresponding to the first ciphertext to obtain a dynamic factor in a dynamic identifier; then, a check factor generating module generates a check factor by using a check factor generating model, and combines the check factor and the dynamic factor to generate an application factor; then, a second ciphertext generation module controls the financial data application side node to encrypt the application factor and the keyword of the financial data corresponding to the first ciphertext to form a second ciphertext corresponding to the fused data in the financial data supervision node; and finally, when the financial data application side node needs to call financial data from the financial data supervision node, a ciphertext sending module is adopted to send a second ciphertext sending and financial data obtaining request corresponding to the financial data supervision node.
The effect of the above technical scheme is as follows: by means of the mode, the financial data application side node generates the check factor and the second ciphertext, the safety verification reliability between the subsequent financial data monitoring node and the financial data application side node can be effectively improved, and the safety of the called financial data is further improved. Meanwhile, the check factor is obtained by setting the check factor and the formula, the randomness and the variation strength of the check factor can be effectively improved, the uniqueness of each financial data application side node is effectively kept, the identification accuracy of each financial data application side node can be effectively improved, and the problem of failure of subsequent financial data requests caused by safety verification identification errors is avoided.
In one embodiment of the present invention, the security authentication module includes:
the acquisition module is used for decrypting the second ciphertext after the financial data supervision node receives the financial data acquisition request and the second ciphertext transmitted by the financial data application side node, acquiring an application factor and a check factor and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode;
the consistency judging module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent;
the consistency judging module II is used for analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factor contained in the application factor by using a check factor generating model stored in the financial data supervision node after the dynamic factor is determined to be consistent, comparing the total butting times obtained from the check factor with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factor is consistent;
and the determining module is used for determining that the financial data application side node passes the security verification when the total times of data transmission completion are judged to be consistent.
The working principle of the technical scheme is as follows: firstly, after the financial data supervision node is controlled by an acquisition module to receive a financial data acquisition request and a second ciphertext transmitted by the financial data application side node, decrypting the second ciphertext to acquire an application factor and a check factor, and ensuring that the application factor and the check factor are not tampered by using a block chain accounting mode; then, a consistency judgment module I is used for comparing the dynamic factors contained in the application factors with the dynamic factors in the first ciphertext to determine whether the dynamic factors are consistent; then, after the consistency of the dynamic factors is determined to be consistent through a consistency judging module II, analyzing the total data transmission completion times of the financial data application side node and the financial data supervision node from the check factors contained in the application factors by using a check factor generating model stored in the financial data supervision node, comparing the total docking times obtained from the check factors with the total data transmission completion times recorded in the financial data supervision node, and determining whether the dynamic factors are consistent; and finally, when the total times of data transmission completion are judged to be consistent by adopting a determining module, determining that the financial data application side node passes the safety verification.
The effect of the above technical scheme is as follows: according to the scheme provided by the embodiment, the financial data application side node is determined to meet the safety verification requirement only under the two conditions that the dynamic factor contained in the application factor is consistent with the dynamic factor in the first ciphertext, the total number of times of butt joint obtained from the verification factor is consistent with the total number of times of data transmission completion recorded in the financial data supervision node, and by means of the method, the safety performance of data transmission can be effectively improved, the financial data are guaranteed not to be randomly called by a third party, the safety protection of the financial data is effectively improved, and the probability of stealing the financial data is effectively reduced.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.