CN117875952A - Cross-border payment method for encrypted link - Google Patents

Cross-border payment method for encrypted link Download PDF

Info

Publication number
CN117875952A
CN117875952A CN202410049206.7A CN202410049206A CN117875952A CN 117875952 A CN117875952 A CN 117875952A CN 202410049206 A CN202410049206 A CN 202410049206A CN 117875952 A CN117875952 A CN 117875952A
Authority
CN
China
Prior art keywords
encryption
link
payment
cross
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410049206.7A
Other languages
Chinese (zh)
Other versions
CN117875952B (en
Inventor
侯振林
陈瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huanxun Technology Shenzhen Co ltd
Original Assignee
Huanxun Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huanxun Technology Shenzhen Co ltd filed Critical Huanxun Technology Shenzhen Co ltd
Priority to CN202410049206.7A priority Critical patent/CN117875952B/en
Publication of CN117875952A publication Critical patent/CN117875952A/en
Application granted granted Critical
Publication of CN117875952B publication Critical patent/CN117875952B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/004Artificial life, i.e. computing arrangements simulating life
    • G06N3/006Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Molecular Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Computational Linguistics (AREA)
  • Marketing (AREA)
  • Biophysics (AREA)
  • Technology Law (AREA)
  • Biomedical Technology (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides an encrypted link cross-border payment method, which responds to a cross-border payment request initiated by a user and obtains a plurality of conventional payment links; acquiring the average node number of a conventional payment link; identifying encryption and decryption protocols used by all nodes in a conventional payment link, and counting the types and the numbers of the encryption and decryption protocols; average node numbers are distributed evenly according to the variety number of the used encryption and decryption protocols, and corresponding nodes are selected according to the node number distributed by each encryption and decryption protocol to be connected into an encryption link; the encryption link is screened by adopting the gray-wolf optimization algorithm to obtain an optimal encryption link, a cross-border payment relation between a user and a payee is established through the optimal encryption link, after nodes are selected from the conventional payment link, the nodes are redetermined based on different encryption and decryption protocols to construct the encryption link, and the encryption link is screened by adopting the gray-wolf optimization algorithm, so that a safer payment link can be obtained, and the cross-border payment safety of the user is ensured.

Description

Cross-border payment method for encrypted link
Technical Field
The invention relates to the technical field of encryption, in particular to an encrypted link cross-border payment method.
Background
The cross-border payment is a transaction realized by constructing a payment link by two payment parties through local payment software, so that the payment link can be encrypted, the conventional payment link can be encrypted through a plurality of node devices, encryption and decryption protocols are installed in the node devices, data are decrypted and then re-encrypted for transmission, and in order to ensure the rapidity of response, most of the conventional payment links only use one to two encryption and decryption protocols, and in the process of carrying out multi-time cross-border payment, the used payment link is easy to invade and has the risk of funds leakage, so that the normal cooperation of the two cross-border payment parties is influenced.
Disclosure of Invention
In view of this, the invention provides an encrypted link cross-border payment method, which can extract nodes from a conventional payment link to reconstruct an encrypted link containing various encrypted and decrypted protocols, thereby improving the security of the cross-border payment.
The technical scheme of the invention is realized as follows:
an encrypted link cross-border payment method comprises the following steps:
step S1, responding to a cross-border payment request initiated by a user, and obtaining a plurality of conventional payment links;
s2, extracting nodes of the conventional payment links, and carrying out average processing on the number of the nodes of all the conventional payment links to obtain the average node number of the conventional payment links;
s3, identifying encryption and decryption protocols used by all nodes in a conventional payment link, and counting the types and the numbers of the encryption and decryption protocols;
step S4, average node numbers are distributed evenly according to the type number of the used encryption and decryption protocols, and corresponding nodes are selected according to the distributed node numbers of each encryption and decryption protocol to be connected into an encryption link;
and S5, screening the encrypted link by adopting a gray wolf optimization algorithm to obtain an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
Preferably, the specific steps of the step S1 are as follows:
step S11, a user initiates a cross-border payment request, and a payee receives the cross-border payment request;
step S12, the payee verifies the real information of the user and the initiated payment information;
and S13, after verification is passed, determining the region where the user is located, and selecting a plurality of conventional payment links based on the difference of the regions of the user.
Preferably, the cross-border payment request includes an IP address of the user, and step S13 determines, according to the IP address of the user, the region where the user is located.
Preferably, the specific steps of the step S2 are as follows:
step S21, obtaining encryption and decryption equipment through which a conventional payment link passes;
step S22, outputting the passed encryption and decryption equipment as nodes, and counting the number of the nodes;
step S23, summing up all node numbers of all conventional payment links, dividing the sum by the number of the conventional payment links, and obtaining the average node number of the conventional payment links.
Preferably, the specific steps of the step S3 are as follows: and sequentially identifying the encryption and decryption protocols used by the encryption and decryption equipment passing through the conventional payment link, and when the encryption and decryption protocols used by the latter encryption and decryption equipment are different from the previously identified encryption and decryption protocols, encrypting one of the number of the encryption and decryption protocols.
Preferably, in the step S4, the specific step of evenly distributing the average node number according to the number of kinds of the decryption protocols used is:
step S41, if the average node number is a multiple of the type number of the encryption and decryption protocols, the average node number is distributed according to the type number of the encryption and decryption protocols;
step S42, if the average node number is not a multiple of the number of the types of the encryption and decryption protocols, the priority of the user on the types of the encryption and decryption protocols is obtained, and the average node number is sequentially allocated according to the priority.
Preferably, in the step S4, the specific step of selecting the corresponding node according to the number of nodes allocated by each encryption and decryption protocol to be connected into the encrypted link is as follows: and after the nodes with the same encryption and decryption protocol are selected to be connected in sequence, the nodes with other encryption and decryption protocols are connected, and an encryption link is obtained.
Preferably, the gray wolf optimization algorithm in the step S5 filters the encrypted link based on the shortest payment link as an index.
Preferably, the specific steps of the step S5 are as follows:
step S51, initializing a gray wolf population and iteration times;
step S52, randomly selecting an encryption link, and calculating the adaptability value of the wolf based on the shortest payment link as an index;
step S53, selecting another encryption link, calculating the fitness value, comparing the calculated fitness value with the previously calculated fitness value, and reserving the encryption link with the maximum fitness value;
and S54, performing iterative computation, outputting the encrypted link with the maximum fitness value as an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
Preferably, the number of iterations is the number of encrypted links.
Compared with the prior art, the invention has the beneficial effects that:
according to the cross-border payment method of the encrypted link, after a user initiates a cross-border payment request, a plurality of conventional payment links commonly used between the user and a payee are obtained, the passed nodes are extracted from the conventional payment links, the average node number is calculated based on the number of the conventional payment links, meanwhile, the number of the types of the encrypted and decrypted protocols used by the nodes in all the conventional payment links is counted, the average node number is distributed evenly for each encrypted and decrypted protocol, the distributed nodes are connected to form the encrypted link, the selected encrypted link contains the maximum number of encrypted and decrypted protocols, the safety of the cross-border payment can be improved, finally, the encrypted link is screened by adopting a gray wolf optimization algorithm, the optimal encrypted link can be obtained, the end user can establish the cross-border payment relationship with the payee through the optimal encrypted link, and the safety of user funds is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only preferred embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an encrypted link cross-border payment method of the present invention;
FIG. 2 is a flowchart of step S1 of an encrypted link cross-border payment method according to the present invention;
FIG. 3 is a flowchart of step S2 of an encrypted link cross-border payment method according to the present invention;
FIG. 4 is a flowchart of step S4 of an encrypted link cross-border payment method according to the present invention;
FIG. 5 is a flowchart of step S5 of an encrypted link cross-border payment method according to the present invention;
Detailed Description
For a better understanding of the technical content of the present invention, a specific example is provided below, and the present invention is further described with reference to the accompanying drawings.
Referring to fig. 1 to 5, the method for cross-border payment of encrypted links provided by the invention comprises the following steps:
step S1, responding to a cross-border payment request initiated by a user and obtaining a plurality of conventional payment links, wherein the specific steps are as follows:
step S11, a user initiates a cross-border payment request, and a payee receives the cross-border payment request;
step S12, the payee verifies the real information of the user and the initiated payment information;
and S13, the cross-border payment request contains the IP address of the user, after verification is passed, the region where the user is located is determined according to the IP address of the user, and a plurality of conventional payment links are selected based on the difference of the regions of the user.
When the user reaches the intention of the cooperation with the partner and needs to deliver funds, the user can initiate a cross-border payment request by using the local payment software, the cross-border payment request can be sent to the payee, the payee also processes the cross-border payment request through the local payment software, after the payee receives the cross-border payment request, basic information of the user can be judged, including whether real information of the user, the fund amount in the initiated cross-border payment request information and the like are correct, the payee is taken as a cross-border cooperation company and is generally cooperated with enterprises in the whole world for a plurality of times, different payment links are established with users in different regions based on policy requirements of different regions and different software using habits, after the user basic information is judged, the IP address of the user is determined from among the cross-border payment requests initiated by the user, the region of the user is judged based on the IP address, a plurality of conventional payment links which can be used for cross-border payment are selected based on the difference of the user region, and the conventional payment links are not used for directly establishing a cross-border relation, and the conventional payment links are only used for making basic characteristics of the cross-border payment links with the payee in the region of the user.
Therefore, in step S2, the nodes of the conventional payment link are extracted, and the average node number of the conventional payment link is obtained by performing an average process on the number of the nodes of all the conventional payment links, which specifically includes the following steps:
step S21, obtaining encryption and decryption equipment through which a conventional payment link passes;
step S22, outputting the passed encryption and decryption equipment as nodes, and counting the number of the nodes;
step S23, summing up all node numbers of all conventional payment links, dividing the sum by the number of the conventional payment links, and obtaining the average node number of the conventional payment links.
Each encryption and decryption device can be regarded as a node of the conventional payment link, the number of nodes passed by each conventional payment link is counted and added to obtain the total number of nodes, the total number of nodes is divided by the number of the conventional payment links to obtain the average number of nodes, the average number of nodes is the average number of nodes of the conventional payment links commonly used in the region where the user is located and the region where the payee is located, and the number of nodes contained in the new payment link is the average number of nodes when the new payment link is constructed, so that the normal operation of cross-border payment is prevented from being influenced by excessive or insufficient number of nodes passed by the new payment link.
Besides extracting the number of nodes of the conventional payment link, in step S3, the encryption and decryption protocols used by all nodes in the conventional payment link are also identified, and the number of types of the encryption and decryption protocols is counted, which specifically includes the steps of: and sequentially identifying the encryption and decryption protocols used by the encryption and decryption equipment passing through the conventional payment link, and when the encryption and decryption protocols used by the latter encryption and decryption equipment are different from the previously identified encryption and decryption protocols, encrypting one of the number of the encryption and decryption protocols.
Each conventional payment link passes through a plurality of encryption and decryption devices, a fixed encryption and decryption protocol is preset in each encryption and decryption device, the types and numbers of the encryption and decryption protocols used by all the conventional payment links can be obtained by identifying the encryption and decryption protocols of all the encryption and decryption devices, and for the conventional payment links commonly used at present, the number of the encryption and decryption protocols used is one to two, and certain potential safety hazards exist in long-term use.
After the average node number and the type number of the encryption and decryption protocols are obtained, in step S4, the average node number is distributed evenly according to the type number of the encryption and decryption protocols used, and corresponding nodes are selected and connected into an encryption link according to the node number distributed by each encryption and decryption protocol, wherein the specific steps of distributing the average node number evenly are as follows:
step S41, if the average node number is a multiple of the type number of the encryption and decryption protocols, the average node number is distributed according to the type number of the encryption and decryption protocols;
step S42, if the average node number is not a multiple of the number of the types of the encryption and decryption protocols, the priority of the user on the types of the encryption and decryption protocols is obtained, and the average node number is sequentially allocated according to the priority.
The average node number is larger than the number of encryption and decryption protocols, when the nodes are allocated, whether the average node number is a multiple of the encryption and decryption protocols needs to be considered, if the average node number is a multiple, average node books can be allocated, and if the average node number is not a multiple, the nodes cannot be allocated evenly, so that the priority of the encryption and decryption protocols for users needs to be acquired at the moment.
After the average node number is distributed to each encryption and decryption protocol, the nodes of the same encryption and decryption protocol are selected to be connected in sequence, then the nodes of other encryption and decryption protocols are connected, and an encryption link is obtained.
S5, adopting a gray wolf optimization algorithm to screen the encrypted link based on the shortest payment link as an index to obtain an optimal encrypted link, and establishing a cross-border payment relationship between a user and a payee through the optimal encrypted link, wherein the method comprises the following specific steps of:
step S51, initializing a gray wolf population and iteration times, wherein the iteration times are the number of encrypted links;
step S52, randomly selecting an encryption link, and calculating the adaptability value of the wolf based on the shortest payment link as an index;
step S53, selecting another encryption link, calculating the fitness value, comparing the calculated fitness value with the previously calculated fitness value, and reserving the encryption link with the maximum fitness value;
and S54, performing iterative computation, outputting the encrypted link with the maximum fitness value as an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
When the gray wolf optimization algorithm screens based on the shortest payment link, the fitness value of each encryption link is calculated, after the fitness value is calculated each time, the fitness value is compared with the fitness value calculated last time, then the encryption link with the larger fitness value is reserved, after the iterative calculation is finished, the encryption link with the largest fitness value can be obtained, the encryption link is the optimal encryption link, a user can establish a cross-border payment relationship through the optimal encryption link and a payee, and funds are transferred.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (10)

1. An encrypted link cross-border payment method is characterized by comprising the following steps:
step S1, responding to a cross-border payment request initiated by a user, and obtaining a plurality of conventional payment links;
s2, extracting nodes of the conventional payment links, and carrying out average processing on the number of the nodes of all the conventional payment links to obtain the average node number of the conventional payment links;
s3, identifying encryption and decryption protocols used by all nodes in a conventional payment link, and counting the types and the numbers of the encryption and decryption protocols;
step S4, average node numbers are distributed evenly according to the type number of the used encryption and decryption protocols, and corresponding nodes are selected according to the distributed node numbers of each encryption and decryption protocol to be connected into an encryption link;
and S5, screening the encrypted link by adopting a gray wolf optimization algorithm to obtain an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
2. The method for cross-border payment by using encrypted links according to claim 1, wherein the specific steps of step S1 are as follows:
step S11, a user initiates a cross-border payment request, and a payee receives the cross-border payment request;
step S12, the payee verifies the real information of the user and the initiated payment information;
and S13, after verification is passed, determining the region where the user is located, and selecting a plurality of conventional payment links based on the difference of the regions of the user.
3. The method according to claim 2, wherein the cross-border payment request includes an IP address of the user, and the step S13 determines the region where the user is located according to the IP address of the user.
4. The method for cross-border payment by using encrypted links according to claim 1, wherein the specific steps of step S2 are as follows:
step S21, obtaining encryption and decryption equipment through which a conventional payment link passes;
step S22, outputting the passed encryption and decryption equipment as nodes, and counting the number of the nodes;
step S23, summing up all node numbers of all conventional payment links, dividing the sum by the number of the conventional payment links, and obtaining the average node number of the conventional payment links.
5. The method for cross-border payment by using encrypted links according to claim 1, wherein the specific steps of step S3 are as follows: and sequentially identifying the encryption and decryption protocols used by the encryption and decryption equipment passing through the conventional payment link, and when the encryption and decryption protocols used by the latter encryption and decryption equipment are different from the previously identified encryption and decryption protocols, encrypting one of the number of the encryption and decryption protocols.
6. The method for cross-border payment according to claim 1, wherein the specific step of evenly distributing the average node number according to the number of kinds of decryption protocols used in step S4 is as follows:
step S41, if the average node number is a multiple of the type number of the encryption and decryption protocols, the average node number is distributed according to the type number of the encryption and decryption protocols;
step S42, if the average node number is not a multiple of the number of the types of the encryption and decryption protocols, the priority of the user on the types of the encryption and decryption protocols is obtained, and the average node number is sequentially allocated according to the priority.
7. The method for cross-border payment of encrypted links according to claim 1, wherein the specific step of selecting the corresponding nodes according to the number of nodes allocated by each encryption and decryption protocol in step S4 to be connected into encrypted links is as follows: and after the nodes with the same encryption and decryption protocol are selected to be connected in sequence, the nodes with other encryption and decryption protocols are connected, and an encryption link is obtained.
8. The method according to claim 1, wherein the gray wolf optimization algorithm in step S5 filters the encrypted links based on the shortest payment link as an index.
9. The method for cross-border payment by using encrypted links according to claim 8, wherein the specific steps of step S5 are as follows:
step S51, initializing a gray wolf population and iteration times;
step S52, randomly selecting an encryption link, and calculating the adaptability value of the wolf based on the shortest payment link as an index;
step S53, selecting another encryption link, calculating the fitness value, comparing the calculated fitness value with the previously calculated fitness value, and reserving the encryption link with the maximum fitness value;
and S54, performing iterative computation, outputting the encrypted link with the maximum fitness value as an optimal encrypted link, and establishing a cross-border payment relationship between the user and the payee through the optimal encrypted link.
10. The method for cross-border payment of encrypted links according to claim 9, wherein the number of iterations is the number of encrypted links.
CN202410049206.7A 2024-01-12 2024-01-12 Cross-border payment method for encrypted link Active CN117875952B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410049206.7A CN117875952B (en) 2024-01-12 2024-01-12 Cross-border payment method for encrypted link

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410049206.7A CN117875952B (en) 2024-01-12 2024-01-12 Cross-border payment method for encrypted link

Publications (2)

Publication Number Publication Date
CN117875952A true CN117875952A (en) 2024-04-12
CN117875952B CN117875952B (en) 2024-08-16

Family

ID=90582628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410049206.7A Active CN117875952B (en) 2024-01-12 2024-01-12 Cross-border payment method for encrypted link

Country Status (1)

Country Link
CN (1) CN117875952B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170093811A1 (en) * 2014-05-20 2017-03-30 Secret Double Octopus Ltd. Method for establishing a secure private interconnection over a multipath network
CN108429633A (en) * 2018-01-18 2018-08-21 西南交通大学 Virtual Network Function Deployment Method Based on Gray Wolf Algorithm
CN111126988A (en) * 2019-12-24 2020-05-08 深圳前海微众银行股份有限公司 Block chain-based transfer method, device, equipment and computer medium
CN114362929A (en) * 2021-11-23 2022-04-15 北京邮电大学 Protection method, device and electronic device based on quantum key distribution network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170093811A1 (en) * 2014-05-20 2017-03-30 Secret Double Octopus Ltd. Method for establishing a secure private interconnection over a multipath network
CN108429633A (en) * 2018-01-18 2018-08-21 西南交通大学 Virtual Network Function Deployment Method Based on Gray Wolf Algorithm
CN111126988A (en) * 2019-12-24 2020-05-08 深圳前海微众银行股份有限公司 Block chain-based transfer method, device, equipment and computer medium
CN114362929A (en) * 2021-11-23 2022-04-15 北京邮电大学 Protection method, device and electronic device based on quantum key distribution network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郑强: "传感器网络密钥管理协议的研究", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》, no. 07, 15 July 2009 (2009-07-15), pages 139 - 141 *

Also Published As

Publication number Publication date
CN117875952B (en) 2024-08-16

Similar Documents

Publication Publication Date Title
US10885128B2 (en) Client application fingerprinting based on analysis of client requests
KR102151862B1 (en) Service processing method and device
KR102050129B1 (en) Block chain supporting multiple one-way functions used for verification of blocks
US20210243153A1 (en) Device identification systems
CN109583215B (en) Method and device for processing credit investigation data and block chain data sharing system
JP6095106B2 (en) System and method for adaptive selection of bank cards for payment
US9756076B2 (en) Dynamically reacting policies and protections for securing mobile financial transactions
CN106034149B (en) A kind of account recognition methods and device
KR102193502B1 (en) Method and device for obtaining a payment threshold
EP3465524B1 (en) Secure transmission of sensitive data
CN109978533B (en) Offline secure payment system and method for resisting two-dimension code theft
CA3147600A1 (en) Secure resource management to prevent fraudulent resource access
CN105227520B (en) A kind of account password setting and the method and system of authenticating user identification
CN106204038A (en) The method and device that a kind of password string generates
CN112184444A (en) Method, apparatus, device and medium for processing information based on information characteristics
CN117875952B (en) Cross-border payment method for encrypted link
CN112950357A (en) Transaction abnormal group partner identification method and device
WO2022095426A1 (en) Blockchain-based joint account creation method, system, device, and storage medium
CN109544158B (en) Block data processing method and computer storage medium
CN110807209A (en) Data processing method, device and storage medium
CN112699136B (en) Cross-link certificate storage method and related device
US11120432B2 (en) Security tool for information exchange
CN117668375A (en) Construction method of user group prediction model and user group prediction method
EP4334874A1 (en) Methods and systems for pre-verification of cryptocurrency transfers using test transactions
US11397948B2 (en) Secure digital safe deposit boxes and methods of use

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant