CN110868412A - Block chain financial information processing system and method - Google Patents
Block chain financial information processing system and method Download PDFInfo
- Publication number
- CN110868412A CN110868412A CN201911097392.7A CN201911097392A CN110868412A CN 110868412 A CN110868412 A CN 110868412A CN 201911097392 A CN201911097392 A CN 201911097392A CN 110868412 A CN110868412 A CN 110868412A
- Authority
- CN
- China
- Prior art keywords
- financial information
- layer
- key
- abnormal behavior
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a block chain financial information processing system, which comprises an application service layer, an intermediate protocol layer and a basic network layer, wherein the basic network layer comprises a data layer, the data layer comprises at least one abnormal behavior detection mechanism, the abnormal behavior detection mechanism is used for detecting a key generation process and a key distribution process of a Hash algorithm and a transmission process of financial information carrying the key, and a financial information destruction mechanism is arranged in the abnormal behavior detection mechanism to ensure the availability, integrity and safety of quantum key data; the abnormal behavior detection is carried out by adding an abnormal behavior detection mechanism to the key distribution process and the financial information transmission process, so that a lawbreaker is prevented from illegally acquiring the financial information by utilizing a leak, and after the abnormal behavior is detected, information destruction is realized by a software or program mode to destroy the financial information and the key so as to ensure the safety of important information.
Description
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a block chain financial information processing system and a block chain financial information processing method.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The block chain (Blockchain) is an important concept of the bitcoin, is essentially a decentralized database, and is used as a bottom-layer technology of the bitcoin, namely a series of data blocks which are generated by correlation by using a cryptographic method, wherein each data block contains information of a batch of bitcoin network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating a next block;
the blockchain originates from the bit currency, 11.1.2008, and a person who calls the traditional Chinese medicine (Satoshi Nakamoto) lists the bit currency, namely a point-to-point electronic cash system, describes the architecture concept of the electronic cash system based on the P2P network technology, encryption technology, timestamp technology, blockchain technology and the like, and marks the birth of the bit currency. Two-month later theories step into practice, and a first creation block with the serial number of 0 is born on 1 month and 3 days in 2009. The block with the number 1 appears in 2009 at 1/9, and is connected with the created block with the number 0 to form a chain, which marks the birth of the block chain.
In recent years, the attitude of bitcoin in the world has fallen, but a blockchain technique, which is one of bitcoin underlying techniques, has been increasingly emphasized. In the process of forming the bitcoin, the blocks are storage units one by one, and all communication information of each block node within a certain time is recorded. The blocks are linked through random hashing (also called hashing algorithm), the next block contains the hash value of the previous block, one block is connected with one block successively along with the expansion of information exchange, and the formed result is called a block chain.
The existing block chain basic network layer comprises a data layer and a network layer and is responsible for information transmission, but in the key distribution process, part of lawbreakers still utilize bugs to carry out violation detection on the key distribution process and financial information transmission carrying keys and try to acquire key information, and therefore a block chain financial information processing system and a block chain financial information processing method are provided.
Disclosure of Invention
The present invention is directed to a system and method for processing block chain financial information to solve the above problems.
In order to achieve the purpose, the invention provides the following technical scheme: a block chain financial information processing system comprises an application service layer, an intermediate protocol layer and a basic network layer, wherein the basic network layer comprises a data layer, the data layer comprises at least one abnormal behavior detection mechanism, and the abnormal behavior detection mechanism is used for detecting a key generation process, a key distribution process and a key-carrying financial information transmission process of a Hash algorithm;
a financial information destruction mechanism is arranged in the abnormal behavior detection mechanism to ensure the usability, integrity and safety of the quantum key data;
preferably, the abnormal behavior detection mechanism may be one of a single photon detector and a photodiode detector.
Preferably, the base network layer comprises a network layer;
the data layer comprises data blocks, a time stamp and a hash algorithm key generation mechanism, the data blocks are used for recording financial information which needs to be stored actually, the financial information is permanently recorded on a block chain through data block packaging, and each data block is composed of a block head and a block body.
Preferably, the intermediate protocol layer comprises a consensus layer, a stimulus layer and a contract layer;
the consensus layer is responsible for allocating the task load of the accounting nodes, and can enable the highly dispersed nodes to efficiently achieve consensus on the effectiveness of the block data in the decentralized system;
the incentive layer is a reward system for formulating accounting nodes, provides certain incentive measures and encourages the nodes to participate in the safety verification work of the block chain;
the contract layer includes references to various scripting code, algorithmic mechanisms, and contracts.
Preferably, the application service layer comprises a programmable financial layer;
the programmable financial layer refers to a plurality of applications of the blockchain in the field of wide finance, and the contracts are added into the blockchain system to form programmable finance.
Preferably, the financial information destruction mechanism implements information destruction in a software or program mode.
Preferably, the operation method of the block chain financial information processing system is as follows:
A. the basic network layer comprises a data layer and a network layer, before the financial information is transmitted, a key is generated by a key generation mechanism with a Hash algorithm and distributed to the corresponding financial information, and in the key generation and distribution processes, an abnormal behavior detection mechanism detects abnormal detection behaviors;
B. when the financial information with the key is transmitted to a target application service layer, an abnormal behavior detection mechanism detects abnormal detection behaviors;
C. when the abnormal behavior detection mechanism detects the key in the detection process, the financial information and the key are destroyed through a financial information destruction mechanism.
Compared with the prior art, the invention has the beneficial effects that:
the abnormal behavior detection is carried out by adding an abnormal behavior detection mechanism to the key distribution process and the financial information transmission process, so that a lawbreaker is prevented from illegally acquiring the financial information by utilizing a leak, and after the abnormal behavior is detected, information destruction is realized by a software or program mode to destroy the financial information and the key so as to ensure the safety of important information.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is a schematic structural view of the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "vertical", "upper", "lower", "horizontal", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; either directly or indirectly through intervening media, or through the communication between two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
Referring to fig. 1, the present invention provides a technical solution: a block chain financial information processing system comprises an application service layer, an intermediate protocol layer and a basic network layer, wherein the basic network layer comprises a data layer and a network layer, the data layer comprises data blocks, a timestamp and a Hash algorithm key generation mechanism, the data blocks are used for recording financial information which needs to be stored actually, the financial information can be permanently recorded on a block chain through data block packaging, each data block consists of a block head and a block main body, the data layer comprises at least one abnormal behavior detection mechanism, and the abnormal behavior detection mechanism is used for detecting a key generation process and a distribution process of the Hash algorithm and a transmission process of the financial information carrying the key;
a financial information destruction mechanism is arranged in the abnormal behavior detection mechanism to ensure the usability, integrity and safety of the quantum key data;
in this embodiment, preferably, the abnormal behavior detection mechanism may be a single photon detector.
In this embodiment, preferably, the intermediate protocol layer includes a consensus layer, an excitation layer, and a contract layer;
the consensus layer is responsible for allocating the task load of the accounting nodes, and can enable the highly dispersed nodes to efficiently achieve consensus on the effectiveness of the block data in the decentralized system;
the incentive layer is a reward system for formulating accounting nodes, provides certain incentive measures and encourages the nodes to participate in the safety verification work of the block chain;
the contract layer includes references to various scripting code, algorithmic mechanisms, and contracts.
In this embodiment, preferably, the application service layer includes a programmable financial layer;
the programmable financial layer refers to a plurality of applications of the blockchain in the field of wide finance, and the contracts are added into the blockchain system to form programmable finance.
In this embodiment, preferably, the financial information destruction mechanism destroys information by software or program.
The working principle and the using process of the invention are as follows:
firstly, the basic network layer comprises a data layer and a network layer, before the financial information is transmitted, a key is generated by a key generation mechanism with a hash algorithm and is distributed to the corresponding financial information, in the key generation and distribution process, the abnormal behavior detection mechanism detects abnormal detection behaviors, and then when the financial information with the key is transmitted to the target application service layer, the abnormal behavior detection mechanism detects the abnormal detection behaviors;
when the abnormal behavior detection mechanism detects the detection key in the detection process, the financial information and the key are destroyed through a financial information destruction mechanism.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. A block chain financial information processing system comprises an application service layer, an intermediate protocol layer and a basic network layer, and is characterized in that: the basic network layer comprises a data layer, the data layer comprises at least one abnormal behavior detection mechanism, and the abnormal behavior detection mechanism is used for detecting a key generation process, a key distribution process and a key-carrying financial information transmission process of a Hash algorithm;
and a financial information destruction mechanism is arranged in the abnormal behavior detection mechanism to ensure the usability, integrity and safety of the quantum key data.
2. The system of claim 1, wherein: the abnormal behavior detection mechanism may be one of a single photon detector and a photodiode detector.
3. The system of claim 1, wherein: the base network layer comprises a network layer;
the data layer comprises data blocks, a time stamp and a hash algorithm key generation mechanism, the data blocks are used for recording financial information which needs to be stored actually, the financial information is permanently recorded on a block chain through data block packaging, and each data block is composed of a block head and a block body.
4. The system of claim 1, wherein: the intermediate protocol layer comprises a consensus layer, an excitation layer and a contract layer;
the consensus layer is responsible for allocating the task load of the accounting nodes, and can enable the highly dispersed nodes to efficiently achieve consensus on the effectiveness of the block data in the decentralized system;
the incentive layer is a reward system for formulating accounting nodes, provides certain incentive measures and encourages the nodes to participate in the safety verification work of the block chain;
the contract layer includes references to various scripting code, algorithmic mechanisms, and contracts.
5. The system of claim 1, wherein: the application service layer comprises a programmable gold layer;
the programmable financial layer refers to a plurality of applications of the blockchain in the field of wide finance, and the contracts are added into the blockchain system to form programmable finance.
6. The system of claim 1, wherein: the financial information destruction mechanism realizes information destruction in a software or program mode.
7. The system of any of claims 1-6, wherein the method of operation is as follows:
A. the basic network layer comprises a data layer and a network layer, before the financial information is transmitted, a key is generated by a key generation mechanism with a Hash algorithm and distributed to the corresponding financial information, and in the key generation and distribution processes, an abnormal behavior detection mechanism detects abnormal detection behaviors;
B. when the financial information with the key is transmitted to a target application service layer, an abnormal behavior detection mechanism detects abnormal detection behaviors;
C. when the abnormal behavior detection mechanism detects the key in the detection process, the financial information and the key are destroyed through a financial information destruction mechanism.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911097392.7A CN110868412A (en) | 2019-11-11 | 2019-11-11 | Block chain financial information processing system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911097392.7A CN110868412A (en) | 2019-11-11 | 2019-11-11 | Block chain financial information processing system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110868412A true CN110868412A (en) | 2020-03-06 |
Family
ID=69653557
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911097392.7A Pending CN110868412A (en) | 2019-11-11 | 2019-11-11 | Block chain financial information processing system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110868412A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111404958A (en) * | 2020-03-26 | 2020-07-10 | 国金公用通链(海南)信息科技有限公司 | Universal block chain block compression technology |
CN115225651A (en) * | 2022-06-13 | 2022-10-21 | 许亦雄 | Information security protection method and device applied to block chain financial fusion and online payment |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820343A (en) * | 2010-02-05 | 2010-09-01 | 北京邮电大学 | Method and system for quantum communication security |
CN105245329A (en) * | 2015-09-14 | 2016-01-13 | 清华大学 | Quantum communication-based trusted industrial control network realizing method |
CN106330440A (en) * | 2016-11-23 | 2017-01-11 | 长春大学 | Mobile network quantum key distribution system based on near-field communication and distribution method thereof |
CN106941403A (en) * | 2017-04-17 | 2017-07-11 | 江苏亨通问天量子信息研究院有限公司 | Secrecy GSM and method based on quantum key |
CN108712255A (en) * | 2018-06-29 | 2018-10-26 | 清华大学 | A kind of quantum key distribution system and method |
CN109286443A (en) * | 2017-07-20 | 2019-01-29 | 中国科学技术大学 | A kind of quantum communications method and network based on credible relay node |
CN208707654U (en) * | 2018-06-29 | 2019-04-05 | 清华大学 | A kind of quantum key distribution system |
CN109859046A (en) * | 2019-01-30 | 2019-06-07 | 威海华智数字经济研究院有限公司 | One kind being based on block chain technology big data wisdom operation management system |
US20190260761A1 (en) * | 2008-04-25 | 2019-08-22 | Kelce S. Wilson | Registering received email documents in a blockchain |
CN110430053A (en) * | 2019-08-08 | 2019-11-08 | 国网安徽省电力有限公司信息通信分公司 | A kind of distribution method of quantum key, apparatus and system |
-
2019
- 2019-11-11 CN CN201911097392.7A patent/CN110868412A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190260761A1 (en) * | 2008-04-25 | 2019-08-22 | Kelce S. Wilson | Registering received email documents in a blockchain |
CN101820343A (en) * | 2010-02-05 | 2010-09-01 | 北京邮电大学 | Method and system for quantum communication security |
CN105245329A (en) * | 2015-09-14 | 2016-01-13 | 清华大学 | Quantum communication-based trusted industrial control network realizing method |
CN106330440A (en) * | 2016-11-23 | 2017-01-11 | 长春大学 | Mobile network quantum key distribution system based on near-field communication and distribution method thereof |
CN106941403A (en) * | 2017-04-17 | 2017-07-11 | 江苏亨通问天量子信息研究院有限公司 | Secrecy GSM and method based on quantum key |
CN109286443A (en) * | 2017-07-20 | 2019-01-29 | 中国科学技术大学 | A kind of quantum communications method and network based on credible relay node |
CN108712255A (en) * | 2018-06-29 | 2018-10-26 | 清华大学 | A kind of quantum key distribution system and method |
CN208707654U (en) * | 2018-06-29 | 2019-04-05 | 清华大学 | A kind of quantum key distribution system |
CN109859046A (en) * | 2019-01-30 | 2019-06-07 | 威海华智数字经济研究院有限公司 | One kind being based on block chain technology big data wisdom operation management system |
CN110430053A (en) * | 2019-08-08 | 2019-11-08 | 国网安徽省电力有限公司信息通信分公司 | A kind of distribution method of quantum key, apparatus and system |
Non-Patent Citations (1)
Title |
---|
刘文杰等: "基于互认证的三维单光子量子安全直接通信", 《中南大学学报(自然科学版)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111404958A (en) * | 2020-03-26 | 2020-07-10 | 国金公用通链(海南)信息科技有限公司 | Universal block chain block compression technology |
CN115225651A (en) * | 2022-06-13 | 2022-10-21 | 许亦雄 | Information security protection method and device applied to block chain financial fusion and online payment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818269B2 (en) | Computer-implemented system and method providing a decentralised protocol for the recovery of cryptographic assets | |
US11716617B2 (en) | Systems and methods for cryptographic authorization of wireless communications | |
CN110321721B (en) | Block chain-based electronic medical record access control method | |
US11601272B2 (en) | Methods and systems for efficient cryptographic third-party authentication of asset transfers using trusted computing | |
US11575517B2 (en) | Methods and systems for utilizing hardware-secured receptacle devices | |
CN1161922C (en) | Document authentication system and method | |
CN109074579A (en) | Method and system for protecting computer software using distributed hash tables and blockchains | |
JP2022549581A (en) | Computing system, method, non-transitory computer-readable medium and computer program product for determining the sequential order of blocks in a DAG-structured blockchain | |
CN112166578A (en) | Improved system and method for storage, generation and verification of tokens for controlling access to resources | |
WO2020165111A1 (en) | Methods and systems for token-based anchoring of a physical object in a distributed ledger environment | |
CN112367629B (en) | Financial big data processing method based on 5G and block chain and system platform thereof | |
CN109003192A (en) | A kind of insurance underwriting method and relevant device based on block chain | |
US20190188404A1 (en) | A Method For Inhibiting Mass Credential Theft | |
CN110298180A (en) | A kind of notarization management system based on block chain | |
US20230259899A1 (en) | Method, participant unit, transaction register and payment system for managing transaction data sets | |
CN110868412A (en) | Block chain financial information processing system and method | |
CN103023657A (en) | Security verification system based on distributed network transaction | |
CN109847365A (en) | A kind of anti-cheating method and system towards the application of block chain | |
Hartung et al. | Practical and robust secure logging from fault-tolerant sequential aggregate signatures | |
JPWO2019234850A1 (en) | Security system and data processing device | |
CN109934579A (en) | For the key generation method of block chain network, endorsement method, storage medium, calculate equipment | |
Zhao et al. | Research on a shared bicycle deposit management system based on blockchain technology | |
Yang et al. | A Hybrid Blockchain-Based Authentication Scheme for Smart Home | |
CN112001714A (en) | Digital currency implementation method based on block chain technology | |
Rezaeighaleh | Improving security of crypto wallets in blockchain technologies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200306 |
|
RJ01 | Rejection of invention patent application after publication |