CN117875952A - Cross-border payment method for encrypted link - Google Patents
Cross-border payment method for encrypted link Download PDFInfo
- Publication number
- CN117875952A CN117875952A CN202410049206.7A CN202410049206A CN117875952A CN 117875952 A CN117875952 A CN 117875952A CN 202410049206 A CN202410049206 A CN 202410049206A CN 117875952 A CN117875952 A CN 117875952A
- Authority
- CN
- China
- Prior art keywords
- encryption
- link
- payment
- cross
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 241000282461 Canis lupus Species 0.000 claims abstract description 15
- 238000005457 optimization Methods 0.000 claims abstract description 9
- 238000012795 verification Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 2
- 238000012216 screening Methods 0.000 claims description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/004—Artificial life, i.e. computing arrangements simulating life
- G06N3/006—Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- Molecular Biology (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Computational Linguistics (AREA)
- Marketing (AREA)
- Biophysics (AREA)
- Technology Law (AREA)
- Biomedical Technology (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides an encrypted link cross-border payment method, which responds to a cross-border payment request initiated by a user and obtains a plurality of conventional payment links; acquiring the average node number of a conventional payment link; identifying encryption and decryption protocols used by all nodes in a conventional payment link, and counting the types and the numbers of the encryption and decryption protocols; average node numbers are distributed evenly according to the variety number of the used encryption and decryption protocols, and corresponding nodes are selected according to the node number distributed by each encryption and decryption protocol to be connected into an encryption link; the encryption link is screened by adopting the gray-wolf optimization algorithm to obtain an optimal encryption link, a cross-border payment relation between a user and a payee is established through the optimal encryption link, after nodes are selected from the conventional payment link, the nodes are redetermined based on different encryption and decryption protocols to construct the encryption link, and the encryption link is screened by adopting the gray-wolf optimization algorithm, so that a safer payment link can be obtained, and the cross-border payment safety of the user is ensured.
Description
Technical Field
The invention relates to the technical field of encryption, in particular to an encrypted link cross-border payment method.
Background
The cross-border payment is a transaction realized by constructing a payment link by two payment parties through local payment software, so that the payment link can be encrypted, the conventional payment link can be encrypted through a plurality of node devices, encryption and decryption protocols are installed in the node devices, data are decrypted and then re-encrypted for transmission, and in order to ensure the rapidity of response, most of the conventional payment links only use one to two encryption and decryption protocols, and in the process of carrying out multi-time cross-border payment, the used payment link is easy to invade and has the risk of funds leakage, so that the normal cooperation of the two cross-border payment parties is influenced.
Disclosure of Invention
In view of this, the invention provides an encrypted link cross-border payment method, which can extract nodes from a conventional payment link to reconstruct an encrypted link containing various encrypted and decrypted protocols, thereby improving the security of the cross-border payment.
The technical scheme of the invention is realized as follows:
an encrypted link cross-border payment method comprises the following steps:
step S1, responding to a cross-border payment request initiated by a user, and obtaining a plurality of conventional payment links;
s2, extracting nodes of the conventional payment links, and carrying out average processing on the number of the nodes of all the conventional payment links to obtain the average node number of the conventional payment links;
s3, identifying encryption and decryption protocols used by all nodes in a conventional payment link, and counting the types and the numbers of the encryption and decryption protocols;
step S4, average node numbers are distributed evenly according to the type number of the used encryption and decryption protocols, and corresponding nodes are selected according to the distributed node numbers of each encryption and decryption protocol to be connected into an encryption link;
and S5, screening the encrypted link by adopting a gray wolf optimization algorithm to obtain an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
Preferably, the specific steps of the step S1 are as follows:
step S11, a user initiates a cross-border payment request, and a payee receives the cross-border payment request;
step S12, the payee verifies the real information of the user and the initiated payment information;
and S13, after verification is passed, determining the region where the user is located, and selecting a plurality of conventional payment links based on the difference of the regions of the user.
Preferably, the cross-border payment request includes an IP address of the user, and step S13 determines, according to the IP address of the user, the region where the user is located.
Preferably, the specific steps of the step S2 are as follows:
step S21, obtaining encryption and decryption equipment through which a conventional payment link passes;
step S22, outputting the passed encryption and decryption equipment as nodes, and counting the number of the nodes;
step S23, summing up all node numbers of all conventional payment links, dividing the sum by the number of the conventional payment links, and obtaining the average node number of the conventional payment links.
Preferably, the specific steps of the step S3 are as follows: and sequentially identifying the encryption and decryption protocols used by the encryption and decryption equipment passing through the conventional payment link, and when the encryption and decryption protocols used by the latter encryption and decryption equipment are different from the previously identified encryption and decryption protocols, encrypting one of the number of the encryption and decryption protocols.
Preferably, in the step S4, the specific step of evenly distributing the average node number according to the number of kinds of the decryption protocols used is:
step S41, if the average node number is a multiple of the type number of the encryption and decryption protocols, the average node number is distributed according to the type number of the encryption and decryption protocols;
step S42, if the average node number is not a multiple of the number of the types of the encryption and decryption protocols, the priority of the user on the types of the encryption and decryption protocols is obtained, and the average node number is sequentially allocated according to the priority.
Preferably, in the step S4, the specific step of selecting the corresponding node according to the number of nodes allocated by each encryption and decryption protocol to be connected into the encrypted link is as follows: and after the nodes with the same encryption and decryption protocol are selected to be connected in sequence, the nodes with other encryption and decryption protocols are connected, and an encryption link is obtained.
Preferably, the gray wolf optimization algorithm in the step S5 filters the encrypted link based on the shortest payment link as an index.
Preferably, the specific steps of the step S5 are as follows:
step S51, initializing a gray wolf population and iteration times;
step S52, randomly selecting an encryption link, and calculating the adaptability value of the wolf based on the shortest payment link as an index;
step S53, selecting another encryption link, calculating the fitness value, comparing the calculated fitness value with the previously calculated fitness value, and reserving the encryption link with the maximum fitness value;
and S54, performing iterative computation, outputting the encrypted link with the maximum fitness value as an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
Preferably, the number of iterations is the number of encrypted links.
Compared with the prior art, the invention has the beneficial effects that:
according to the cross-border payment method of the encrypted link, after a user initiates a cross-border payment request, a plurality of conventional payment links commonly used between the user and a payee are obtained, the passed nodes are extracted from the conventional payment links, the average node number is calculated based on the number of the conventional payment links, meanwhile, the number of the types of the encrypted and decrypted protocols used by the nodes in all the conventional payment links is counted, the average node number is distributed evenly for each encrypted and decrypted protocol, the distributed nodes are connected to form the encrypted link, the selected encrypted link contains the maximum number of encrypted and decrypted protocols, the safety of the cross-border payment can be improved, finally, the encrypted link is screened by adopting a gray wolf optimization algorithm, the optimal encrypted link can be obtained, the end user can establish the cross-border payment relationship with the payee through the optimal encrypted link, and the safety of user funds is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only preferred embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an encrypted link cross-border payment method of the present invention;
FIG. 2 is a flowchart of step S1 of an encrypted link cross-border payment method according to the present invention;
FIG. 3 is a flowchart of step S2 of an encrypted link cross-border payment method according to the present invention;
FIG. 4 is a flowchart of step S4 of an encrypted link cross-border payment method according to the present invention;
FIG. 5 is a flowchart of step S5 of an encrypted link cross-border payment method according to the present invention;
Detailed Description
For a better understanding of the technical content of the present invention, a specific example is provided below, and the present invention is further described with reference to the accompanying drawings.
Referring to fig. 1 to 5, the method for cross-border payment of encrypted links provided by the invention comprises the following steps:
step S1, responding to a cross-border payment request initiated by a user and obtaining a plurality of conventional payment links, wherein the specific steps are as follows:
step S11, a user initiates a cross-border payment request, and a payee receives the cross-border payment request;
step S12, the payee verifies the real information of the user and the initiated payment information;
and S13, the cross-border payment request contains the IP address of the user, after verification is passed, the region where the user is located is determined according to the IP address of the user, and a plurality of conventional payment links are selected based on the difference of the regions of the user.
When the user reaches the intention of the cooperation with the partner and needs to deliver funds, the user can initiate a cross-border payment request by using the local payment software, the cross-border payment request can be sent to the payee, the payee also processes the cross-border payment request through the local payment software, after the payee receives the cross-border payment request, basic information of the user can be judged, including whether real information of the user, the fund amount in the initiated cross-border payment request information and the like are correct, the payee is taken as a cross-border cooperation company and is generally cooperated with enterprises in the whole world for a plurality of times, different payment links are established with users in different regions based on policy requirements of different regions and different software using habits, after the user basic information is judged, the IP address of the user is determined from among the cross-border payment requests initiated by the user, the region of the user is judged based on the IP address, a plurality of conventional payment links which can be used for cross-border payment are selected based on the difference of the user region, and the conventional payment links are not used for directly establishing a cross-border relation, and the conventional payment links are only used for making basic characteristics of the cross-border payment links with the payee in the region of the user.
Therefore, in step S2, the nodes of the conventional payment link are extracted, and the average node number of the conventional payment link is obtained by performing an average process on the number of the nodes of all the conventional payment links, which specifically includes the following steps:
step S21, obtaining encryption and decryption equipment through which a conventional payment link passes;
step S22, outputting the passed encryption and decryption equipment as nodes, and counting the number of the nodes;
step S23, summing up all node numbers of all conventional payment links, dividing the sum by the number of the conventional payment links, and obtaining the average node number of the conventional payment links.
Each encryption and decryption device can be regarded as a node of the conventional payment link, the number of nodes passed by each conventional payment link is counted and added to obtain the total number of nodes, the total number of nodes is divided by the number of the conventional payment links to obtain the average number of nodes, the average number of nodes is the average number of nodes of the conventional payment links commonly used in the region where the user is located and the region where the payee is located, and the number of nodes contained in the new payment link is the average number of nodes when the new payment link is constructed, so that the normal operation of cross-border payment is prevented from being influenced by excessive or insufficient number of nodes passed by the new payment link.
Besides extracting the number of nodes of the conventional payment link, in step S3, the encryption and decryption protocols used by all nodes in the conventional payment link are also identified, and the number of types of the encryption and decryption protocols is counted, which specifically includes the steps of: and sequentially identifying the encryption and decryption protocols used by the encryption and decryption equipment passing through the conventional payment link, and when the encryption and decryption protocols used by the latter encryption and decryption equipment are different from the previously identified encryption and decryption protocols, encrypting one of the number of the encryption and decryption protocols.
Each conventional payment link passes through a plurality of encryption and decryption devices, a fixed encryption and decryption protocol is preset in each encryption and decryption device, the types and numbers of the encryption and decryption protocols used by all the conventional payment links can be obtained by identifying the encryption and decryption protocols of all the encryption and decryption devices, and for the conventional payment links commonly used at present, the number of the encryption and decryption protocols used is one to two, and certain potential safety hazards exist in long-term use.
After the average node number and the type number of the encryption and decryption protocols are obtained, in step S4, the average node number is distributed evenly according to the type number of the encryption and decryption protocols used, and corresponding nodes are selected and connected into an encryption link according to the node number distributed by each encryption and decryption protocol, wherein the specific steps of distributing the average node number evenly are as follows:
step S41, if the average node number is a multiple of the type number of the encryption and decryption protocols, the average node number is distributed according to the type number of the encryption and decryption protocols;
step S42, if the average node number is not a multiple of the number of the types of the encryption and decryption protocols, the priority of the user on the types of the encryption and decryption protocols is obtained, and the average node number is sequentially allocated according to the priority.
The average node number is larger than the number of encryption and decryption protocols, when the nodes are allocated, whether the average node number is a multiple of the encryption and decryption protocols needs to be considered, if the average node number is a multiple, average node books can be allocated, and if the average node number is not a multiple, the nodes cannot be allocated evenly, so that the priority of the encryption and decryption protocols for users needs to be acquired at the moment.
After the average node number is distributed to each encryption and decryption protocol, the nodes of the same encryption and decryption protocol are selected to be connected in sequence, then the nodes of other encryption and decryption protocols are connected, and an encryption link is obtained.
S5, adopting a gray wolf optimization algorithm to screen the encrypted link based on the shortest payment link as an index to obtain an optimal encrypted link, and establishing a cross-border payment relationship between a user and a payee through the optimal encrypted link, wherein the method comprises the following specific steps of:
step S51, initializing a gray wolf population and iteration times, wherein the iteration times are the number of encrypted links;
step S52, randomly selecting an encryption link, and calculating the adaptability value of the wolf based on the shortest payment link as an index;
step S53, selecting another encryption link, calculating the fitness value, comparing the calculated fitness value with the previously calculated fitness value, and reserving the encryption link with the maximum fitness value;
and S54, performing iterative computation, outputting the encrypted link with the maximum fitness value as an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
When the gray wolf optimization algorithm screens based on the shortest payment link, the fitness value of each encryption link is calculated, after the fitness value is calculated each time, the fitness value is compared with the fitness value calculated last time, then the encryption link with the larger fitness value is reserved, after the iterative calculation is finished, the encryption link with the largest fitness value can be obtained, the encryption link is the optimal encryption link, a user can establish a cross-border payment relationship through the optimal encryption link and a payee, and funds are transferred.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (10)
1. An encrypted link cross-border payment method is characterized by comprising the following steps:
step S1, responding to a cross-border payment request initiated by a user, and obtaining a plurality of conventional payment links;
s2, extracting nodes of the conventional payment links, and carrying out average processing on the number of the nodes of all the conventional payment links to obtain the average node number of the conventional payment links;
s3, identifying encryption and decryption protocols used by all nodes in a conventional payment link, and counting the types and the numbers of the encryption and decryption protocols;
step S4, average node numbers are distributed evenly according to the type number of the used encryption and decryption protocols, and corresponding nodes are selected according to the distributed node numbers of each encryption and decryption protocol to be connected into an encryption link;
and S5, screening the encrypted link by adopting a gray wolf optimization algorithm to obtain an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
2. The method for cross-border payment by using encrypted links according to claim 1, wherein the specific steps of step S1 are as follows:
step S11, a user initiates a cross-border payment request, and a payee receives the cross-border payment request;
step S12, the payee verifies the real information of the user and the initiated payment information;
and S13, after verification is passed, determining the region where the user is located, and selecting a plurality of conventional payment links based on the difference of the regions of the user.
3. The method according to claim 2, wherein the cross-border payment request includes an IP address of the user, and the step S13 determines the region where the user is located according to the IP address of the user.
4. The method for cross-border payment by using encrypted links according to claim 1, wherein the specific steps of step S2 are as follows:
step S21, obtaining encryption and decryption equipment through which a conventional payment link passes;
step S22, outputting the passed encryption and decryption equipment as nodes, and counting the number of the nodes;
step S23, summing up all node numbers of all conventional payment links, dividing the sum by the number of the conventional payment links, and obtaining the average node number of the conventional payment links.
5. The method for cross-border payment by using encrypted links according to claim 1, wherein the specific steps of step S3 are as follows: and sequentially identifying the encryption and decryption protocols used by the encryption and decryption equipment passing through the conventional payment link, and when the encryption and decryption protocols used by the latter encryption and decryption equipment are different from the previously identified encryption and decryption protocols, encrypting one of the number of the encryption and decryption protocols.
6. The method for cross-border payment according to claim 1, wherein the specific step of evenly distributing the average node number according to the number of kinds of decryption protocols used in step S4 is as follows:
step S41, if the average node number is a multiple of the type number of the encryption and decryption protocols, the average node number is distributed according to the type number of the encryption and decryption protocols;
step S42, if the average node number is not a multiple of the number of the types of the encryption and decryption protocols, the priority of the user on the types of the encryption and decryption protocols is obtained, and the average node number is sequentially allocated according to the priority.
7. The method for cross-border payment of encrypted links according to claim 1, wherein the specific step of selecting the corresponding nodes according to the number of nodes allocated by each encryption and decryption protocol in step S4 to be connected into encrypted links is as follows: and after the nodes with the same encryption and decryption protocol are selected to be connected in sequence, the nodes with other encryption and decryption protocols are connected, and an encryption link is obtained.
8. The method according to claim 1, wherein the gray wolf optimization algorithm in step S5 filters the encrypted links based on the shortest payment link as an index.
9. The method for cross-border payment by using encrypted links according to claim 8, wherein the specific steps of step S5 are as follows:
step S51, initializing a gray wolf population and iteration times;
step S52, randomly selecting an encryption link, and calculating the adaptability value of the wolf based on the shortest payment link as an index;
step S53, selecting another encryption link, calculating the fitness value, comparing the calculated fitness value with the previously calculated fitness value, and reserving the encryption link with the maximum fitness value;
and S54, performing iterative computation, outputting the encrypted link with the maximum fitness value as an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
10. The method for cross-border payment of encrypted links according to claim 9, wherein the number of iterations is the number of encrypted links.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410049206.7A CN117875952B (en) | 2024-01-12 | 2024-01-12 | Cross-border payment method for encrypted link |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410049206.7A CN117875952B (en) | 2024-01-12 | 2024-01-12 | Cross-border payment method for encrypted link |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117875952A true CN117875952A (en) | 2024-04-12 |
CN117875952B CN117875952B (en) | 2024-08-16 |
Family
ID=90582628
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410049206.7A Active CN117875952B (en) | 2024-01-12 | 2024-01-12 | Cross-border payment method for encrypted link |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117875952B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170093811A1 (en) * | 2014-05-20 | 2017-03-30 | Secret Double Octopus Ltd. | Method for establishing a secure private interconnection over a multipath network |
CN108429633A (en) * | 2018-01-18 | 2018-08-21 | 西南交通大学 | Virtual Network Function Deployment Method Based on Gray Wolf Algorithm |
CN111126988A (en) * | 2019-12-24 | 2020-05-08 | 深圳前海微众银行股份有限公司 | Block chain-based transfer method, device, equipment and computer medium |
CN114362929A (en) * | 2021-11-23 | 2022-04-15 | 北京邮电大学 | Protection method, device and electronic device based on quantum key distribution network |
-
2024
- 2024-01-12 CN CN202410049206.7A patent/CN117875952B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170093811A1 (en) * | 2014-05-20 | 2017-03-30 | Secret Double Octopus Ltd. | Method for establishing a secure private interconnection over a multipath network |
CN108429633A (en) * | 2018-01-18 | 2018-08-21 | 西南交通大学 | Virtual Network Function Deployment Method Based on Gray Wolf Algorithm |
CN111126988A (en) * | 2019-12-24 | 2020-05-08 | 深圳前海微众银行股份有限公司 | Block chain-based transfer method, device, equipment and computer medium |
CN114362929A (en) * | 2021-11-23 | 2022-04-15 | 北京邮电大学 | Protection method, device and electronic device based on quantum key distribution network |
Non-Patent Citations (1)
Title |
---|
郑强: "传感器网络密钥管理协议的研究", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》, no. 07, 15 July 2009 (2009-07-15), pages 139 - 141 * |
Also Published As
Publication number | Publication date |
---|---|
CN117875952B (en) | 2024-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10885128B2 (en) | Client application fingerprinting based on analysis of client requests | |
KR102151862B1 (en) | Service processing method and device | |
KR102050129B1 (en) | Block chain supporting multiple one-way functions used for verification of blocks | |
US20210243153A1 (en) | Device identification systems | |
CN109583215B (en) | Method and device for processing credit investigation data and block chain data sharing system | |
JP6095106B2 (en) | System and method for adaptive selection of bank cards for payment | |
US9756076B2 (en) | Dynamically reacting policies and protections for securing mobile financial transactions | |
CN106034149B (en) | A kind of account recognition methods and device | |
KR102193502B1 (en) | Method and device for obtaining a payment threshold | |
EP3465524B1 (en) | Secure transmission of sensitive data | |
CN109978533B (en) | Offline secure payment system and method for resisting two-dimension code theft | |
CA3147600A1 (en) | Secure resource management to prevent fraudulent resource access | |
CN105227520B (en) | A kind of account password setting and the method and system of authenticating user identification | |
CN106204038A (en) | The method and device that a kind of password string generates | |
CN112184444A (en) | Method, apparatus, device and medium for processing information based on information characteristics | |
CN117875952B (en) | Cross-border payment method for encrypted link | |
CN112950357A (en) | Transaction abnormal group partner identification method and device | |
WO2022095426A1 (en) | Blockchain-based joint account creation method, system, device, and storage medium | |
CN109544158B (en) | Block data processing method and computer storage medium | |
CN110807209A (en) | Data processing method, device and storage medium | |
CN112699136B (en) | Cross-link certificate storage method and related device | |
US11120432B2 (en) | Security tool for information exchange | |
CN117668375A (en) | Construction method of user group prediction model and user group prediction method | |
EP4334874A1 (en) | Methods and systems for pre-verification of cryptocurrency transfers using test transactions | |
US11397948B2 (en) | Secure digital safe deposit boxes and methods of use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |