CN111461731A - Block chain monitoring system and method applied to financial transactions - Google Patents

Block chain monitoring system and method applied to financial transactions Download PDF

Info

Publication number
CN111461731A
CN111461731A CN202010252791.2A CN202010252791A CN111461731A CN 111461731 A CN111461731 A CN 111461731A CN 202010252791 A CN202010252791 A CN 202010252791A CN 111461731 A CN111461731 A CN 111461731A
Authority
CN
China
Prior art keywords
authentication
information
transaction
user information
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010252791.2A
Other languages
Chinese (zh)
Inventor
孙颐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Dexenzhi Equity Investment Co ltd
Original Assignee
Jiangsu Dexenzhi Equity Investment Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Dexenzhi Equity Investment Co ltd filed Critical Jiangsu Dexenzhi Equity Investment Co ltd
Priority to CN202010252791.2A priority Critical patent/CN111461731A/en
Publication of CN111461731A publication Critical patent/CN111461731A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a block chain supervision system and a supervision method applied to financial transactions. Relates to the technical field of data processing. The block chain supervision system comprises: the receiving unit is connected with the user side and used for receiving user information and transaction information input from the user side; the identification unit is connected with the receiving unit and is used for carrying out first authentication on the user information and carrying out second authentication on the transaction information after the first authentication is passed; and the uploading unit is connected with the identification unit and used for uploading the user information to the block chain when the first authentication is passed and uploading the transaction information to the block chain when the second authentication is passed. The supervision system provided by the invention can improve the authenticity and the safety of the transaction.

Description

Block chain monitoring system and method applied to financial transactions
Technical Field
The invention relates to the technical field of data processing, in particular to a block chain supervision system and a supervision method applied to financial transactions.
Background
With the change of living habits and environmental conditions of people, online transactions become a future trend, however, the financial industry relates to various aspects such as identity confirmation, transaction signing and the like, and the prior art needs to perform transactions on the opposite side by two aspects, which brings obstacles to the online development of financial transactions. The development of the blockchain technology brings a new opportunity for online transaction in the financial transaction industry, but the existing blockchain technology cannot ensure the authenticity and the safety of the online transaction.
Disclosure of Invention
It is an object of a first aspect of the invention to provide a blockchain monitoring system that can improve transaction authenticity and security.
It is a further object of the first aspect of the invention to provide a blockchain monitoring system that can monitor a financial trading market.
It is an object of the second aspect of the invention to provide a blockchain supervision method that can improve transaction authenticity and security.
According to the first aspect, the present invention provides a blockchain monitoring system applied to financial transactions, comprising:
the receiving unit is connected with the user side and used for receiving user information and transaction information input from the user side;
the identification unit is connected with the receiving unit and is used for carrying out first authentication on the user information and carrying out second authentication on the transaction information after the first authentication is passed;
and the uploading unit is connected with the identification unit and used for uploading the user information to the block chain when the first authentication is passed and uploading the transaction information to the block chain when the second authentication is passed.
Optionally, the block chain supervision system further comprises:
the encryption unit is connected with the identification unit and the uploading unit and is used for encrypting the user information when the first authentication is passed and encrypting the transaction information when the second authentication is passed;
the uploading unit is further used for uploading the encrypted user information and the encrypted transaction information to the block chain.
Optionally, the uploading unit is further configured to:
after the receiving unit receives the user information, pre-stored information is called from the block chain according to the user information;
if the pre-stored information is not retrieved successfully, the encryption unit is further used for encrypting the user information to generate the pre-stored information, and the uploading unit uploads the pre-stored information to the block chain.
Optionally, the first authentication comprises identity authentication and credit authentication.
Optionally, the second authentication comprises transaction anomaly identification.
According to the second aspect, the present invention further provides a blockchain supervision method applied to financial transactions, including:
receiving user information and transaction information input from a user side;
performing first authentication on the user information, and performing second authentication on the transaction information after the first authentication is passed;
and uploading the user information to the blockchain when the first authentication is passed and uploading the transaction information to the blockchain when the second authentication is passed.
Optionally, before uploading the user information and the transaction information to the blockchain, the method further includes:
and encrypting the user information when the first authentication is passed, and encrypting the transaction information when the second authentication is passed.
Optionally, after receiving the user information, the method further includes:
calling prestored information from a block chain according to the user information;
and if the pre-stored information is not invoked successfully, encrypting the user information to generate the pre-stored information, and uploading the pre-stored information to the block chain.
Optionally, the first authentication comprises identity authentication and credit authentication.
Optionally, the second authentication comprises transaction anomaly identification.
The invention provides a block chain supervision system applied to financial transactions. The identification unit carries out first authentication on the user information, and carries out second authentication on the transaction information after the first authentication is passed, wherein the second authentication can be triggered by a transaction request sent by the user. The first authentication of the user information can ensure the authenticity and the legality of the user information, and similarly, the second authentication of the transaction information can also ensure the authenticity and the legality of the transaction. Therefore, the information is uploaded to the block chain after two times of authentication of the monitoring system, authenticity and safety of financial transactions can be guaranteed, and only if the monitoring system has authority to upload user information and transaction information to the block chain and download information from the block chain, financial transaction companies and users do not have authority, so that leakage of the user information and the transaction information is avoided.
Further, the first authentication includes identity authentication and credit authentication. The identity authentication can be identified by pre-stored information stored in the blockchain, and the pre-stored information can be formed by an identity card (or a user name, a mobile phone number, a passport and the like) and a password (or a fingerprint, a human face, a signature and the like) which are filled in by a user for logging in the user side for the first time. The pre-stored information may also include crime records, credit records, debt situations, etc. corresponding to the user, and these information may be input into the block chain by other ports, for example, ports of public security department, bank, etc., and the credit authentication may be identified by these information. The identity authentication ensures the account safety of the actual user, avoids the loss of the user caused by number stealing, and the credit authentication can monitor the old dependence of the lost people. The second authentication includes transaction anomaly identification. Transaction anomaly identification includes transaction authenticity and legitimacy identification, such as: whether the unit price of the traded product is abnormally higher or lower than the market price, whether the product involved in the trade is in the operation range of the corresponding financial trading company, whether the trade mark is abnormal, and the like, so that the market fluctuation caused by the abnormal unit price of the traded product can be effectively avoided, illegal persons can be prevented from washing black money through financial trading, and the financial trading market is finally supervised.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. In the drawings:
FIG. 1 is a block-chain monitoring system for financial transactions according to one embodiment of the present invention;
fig. 2 is a block flow diagram of a blockchain administration method applied to financial transactions, according to one embodiment of the present invention.
Detailed Description
Fig. 1 is a schematic structural diagram of a blockchain monitoring system applied to financial transactions according to an embodiment of the present invention. As shown in fig. 1, the blockchain monitoring system applied to financial transactions provided by the present invention generally includes a receiving unit 10, an identifying unit 20, and an uploading unit 30. The receiving unit 10 is connected to the user terminal 50, and is configured to receive user information and transaction information input by the user terminal 50. Regulatory systems are typically set up in or by an organization under the government with authority comparable to that of the government. The user terminal 50 is generally provided at a financial transaction company that accepts a government agency or an organization having authority equivalent to the government agency under the government agency. The financial transaction company can record and store the user information and transaction information inputted from the user terminal 50 as necessary within the company. The identification unit 20 is connected to the receiving unit 10 and is configured to perform a first authentication on the user information and perform a second authentication on the transaction information after the first authentication is passed. The uploading unit 30 is connected to the identification unit 20, and is configured to upload user information to the blockchain 40 when the first authentication is passed, and upload transaction information to the blockchain 40 when the second authentication is passed. Wherein the second authentication may be triggered by a transaction request from the user.
The blockchain monitoring system applied to financial transactions provided by the present embodiment includes a receiving unit 10, an identifying unit 20, and an uploading unit 30. The identification unit 20 performs a first authentication on the user information, and performs a second authentication on the transaction information after the first authentication is passed, wherein the second authentication may be triggered by a transaction request from the user. The first authentication of the user information can ensure the authenticity and the legality of the user information, and similarly, the second authentication of the transaction information can also ensure the authenticity and the legality of the transaction. Therefore, the information is uploaded to the block chain 40 after two times of authentication of the monitoring system, authenticity and safety of financial transactions can be guaranteed, and only if the monitoring system has authority to upload user information and transaction information to the block chain 40 and download information from the block chain 40, financial transaction companies and users do not have authority, so that leakage of the user information and the transaction information is avoided.
As shown in fig. 1, in a specific embodiment, the blockchain monitoring system further includes an encryption unit 60 disposed between the identification unit 20 and the uploading unit 30, for encrypting the user information when the first authentication is passed and encrypting the transaction information when the second authentication is passed. Further, the encryption of the information may be performed by using an existing hash algorithm, or may select another algorithm as needed. After the encryption unit 60 encrypts the user information and the transaction information, the uploading unit 30 is further configured to upload the encrypted user information and the encrypted transaction information to the blockchain 40. The user information and the transaction information are encrypted and then transmitted to the blockchain 40, so that the transaction is carried out anonymously, the safety of the information transmission process and the safety of the information transmitted to the blockchain 40 can be further enhanced, and the user information and the transaction information are prevented from being leaked.
In a further embodiment, the uploading unit 30 is further configured to, after the user information received by the receiving unit 10, retrieve pre-stored information from the blockchain 40 according to the user information, if the pre-stored information does not exist in the blockchain 40, the encrypting unit 60 is further configured to encrypt the user information, and the uploading unit 30 is further configured to upload the encrypted user information to the blockchain 40 as the pre-stored information, where the pre-stored information can be used for the identifying unit 20 to perform the first authentication on the user information. Preferably, the upload unit 30 retrieves the pre-stored information from the blockchain 40 by: the uploading unit 30 generates a calling instruction according to the user information, the block chain 40 calls the corresponding user information according to the calling instruction, if the calling is successful, the pre-stored information is sent to the uploading unit 30, the uploading unit 30 sends the pre-stored information to the identifying unit 20, the identifying unit 20 compares the user information with the pre-stored information, if the user information and the pre-stored information are consistent, the first authentication is passed, otherwise, the first authentication is failed; if the calling fails, a failure instruction is generated and sent to the uploading unit 30, the uploading unit 30 generates an encryption instruction and sends the encryption instruction to the encryption unit 60, and the encryption unit 60 encrypts the user information according to the encryption instruction. Further, the encryption unit 60 is further configured to decrypt the pre-stored information, and the process of the uploading unit 30 sending the pre-stored information to the identification unit 20 may further include: the upload unit 30 transmits the pre-stored information to the encryption unit 60, and the encryption unit 60 decrypts the pre-stored information and transmits the decrypted pre-stored information to the identification unit 20.
In a more specific embodiment, the first authentication includes identity authentication and credit authentication. The identification may be identified by pre-stored information stored in the blockchain 40, and the pre-stored information may include an identification card (or a user name, a mobile phone number, a passport, etc.) and a password (or a fingerprint, a human face, a signature, etc.) filled in by the user who logs in the user terminal 50 for the first time. The pre-stored information may also include crime records, credit records, debt situations, etc. corresponding to the user, and these information may be input into the blockchain 40 through other ports, such as ports of public security departments, banks, etc., and the credit authentication may be identified through these information. The identity authentication ensures the account safety of the actual user, avoids the loss of the user caused by number stealing, and the credit authentication can monitor the old dependence of the lost people.
In a more specific embodiment, the second authentication includes transaction exception identification. Preferably, the transaction anomaly identification includes transaction authenticity and legitimacy identification, such as: whether the unit price of the traded product is abnormally higher or lower than the market price, whether the product involved in the trade is in the operation range of the corresponding financial trading company, whether the trade mark is abnormal, and the like, so that the market fluctuation caused by the abnormal unit price of the traded product can be effectively avoided, illegal persons can be prevented from washing black money through financial trading, and the financial trading market is finally supervised.
Preferably, the transaction information includes: the information of both sides of the transaction (user and financial transaction company), the time address of the transaction, the product of the transaction, the unit price of the product of the transaction, the total price of the transaction and the like, and all the transaction information can be encrypted by adopting an encryption algorithm, so that the information leakage is avoided.
Furthermore, the invention can avoid writing wrong information into the block chain 40 from the source by means of the first authentication and the second authentication, thereby reducing the probability of correcting the error in the block chain 40.
Fig. 2 is a block flow diagram of a blockchain administration method applied to financial transactions, according to one embodiment of the present invention. As shown in fig. 2, the present invention also provides a blockchain supervision method applied to financial transactions, which generally includes:
s10: receiving user information and transaction information input from the user terminal 50;
s20: carrying out first authentication on the user information, and carrying out second authentication on the transaction information after the first authentication is passed;
s30: user information is uploaded to blockchain 40 upon a first authentication pass and transaction information is uploaded to blockchain 40 upon a second authentication pass.
The block chain supervision method provided by this embodiment performs first authentication on user information, and performs second authentication on re-transaction information after the first authentication is passed, where the second authentication may be triggered by a transaction request sent by a user. The first authentication of the user information can ensure the authenticity and the legality of the user information, and similarly, the second authentication of the transaction information can also ensure the authenticity and the legality of the transaction. Therefore, the authenticity and the safety of financial transactions can be guaranteed by uploading the information to the blockchain 40 after two times of authentication of the supervision method, and only if the supervision system has authority to upload the user information and the transaction information to the blockchain 40 and download the information from the blockchain 40, financial transaction companies and users do not have authority, so that the leakage of the user information and the transaction information is avoided.
In a further embodiment, before uploading the user information and the transaction information to the blockchain 40, the method further comprises:
the user information is encrypted when the first authentication is passed, and the transaction information is encrypted when the second authentication is passed.
In this embodiment, the encryption of the information may be performed by using an existing hash algorithm, or may select another algorithm as needed. After the user information and the transaction information are encrypted, the encrypted user information and the encrypted transaction information are uploaded to the block chain 40. The user information and the transaction information are encrypted and then transmitted to the blockchain 40, so that the transaction is carried out anonymously, the safety of the information transmission process and the safety of the information transmitted to the blockchain 40 can be further enhanced, and the user information and the transaction information are prevented from being leaked.
In a specific embodiment, after receiving the user information, the method further includes:
retrieving pre-stored information from the blockchain 40 according to the user information;
if the pre-stored information is not retrieved successfully, the user information is encrypted to generate pre-stored information, and the pre-stored information is uploaded to the block chain 40.
In this embodiment, after the user information received by the receiving unit 10, the pre-stored information is retrieved from the blockchain 40 according to the user information, if the pre-stored information does not exist in the blockchain 40, the user information is encrypted, and the encrypted user information is uploaded to the blockchain 40 as the pre-stored information, which can be used for the identification unit 20 to perform the first authentication on the user information. Preferably, the retrieval of the pre-stored information from the blockchain 40 may be by: generating a calling instruction according to the user information, calling corresponding user information according to the calling instruction by the block chain 40, returning prestored information if the calling is successful, comparing the user information with the prestored information, if the user information and the prestored information are consistent, passing the first authentication, otherwise failing the first authentication; and if the calling fails, generating a failure instruction, generating an encryption instruction according to the failure instruction, and encrypting the user information according to the encryption instruction. Furthermore, the pre-stored information can be decrypted and then authenticated for the first time.
Optionally, the first authentication comprises identity authentication and credit authentication. The identification may be identified by pre-stored information stored in the blockchain 40, and the pre-stored information may include an identification card (or a user name, a mobile phone number, a passport, etc.) and a password (or a fingerprint, a human face, a signature, etc.) filled in by the user who logs in the user terminal 50 for the first time. The pre-stored information may also include crime records, credit records, debt situations, etc. corresponding to the user, and these information may be input into the blockchain 40 through other ports, such as ports of public security departments, banks, etc., and the credit authentication may be identified through these information. The identity authentication ensures the account safety of the actual user, avoids the loss of the user caused by number stealing, and the credit authentication can monitor the old dependence of the lost people.
Optionally, the second authentication comprises transaction anomaly identification. Preferably, the transaction anomaly identification includes transaction authenticity and legitimacy identification, such as: whether the unit price of the traded product is abnormally higher or lower than the market price, whether the product involved in the trade is in the operation range of the corresponding financial trading company, whether the trade mark is abnormal, and the like, so that the market fluctuation caused by the abnormal unit price of the traded product can be effectively avoided, illegal persons can be prevented from washing black money through financial trading, and the financial trading market is finally supervised.
Furthermore, the invention can avoid writing wrong information into the block chain 40 from the source by means of the first authentication and the second authentication, thereby reducing the probability of correcting the error in the block chain 40.
Thus, it should be appreciated by those skilled in the art that while a number of exemplary embodiments of the invention have been illustrated and described in detail herein, many other variations or modifications consistent with the principles of the invention may be directly determined or derived from the disclosure of the present invention without departing from the spirit and scope of the invention. Accordingly, the scope of the invention should be understood and interpreted to cover all such other variations or modifications.

Claims (10)

1. A blockchain monitoring system for use in financial transactions, comprising:
the receiving unit is connected with the user side and used for receiving user information and transaction information input from the user side;
the identification unit is connected with the receiving unit and is used for carrying out first authentication on the user information and carrying out second authentication on the transaction information after the first authentication is passed;
and the uploading unit is connected with the identification unit and used for uploading the user information to the block chain when the first authentication is passed and uploading the transaction information to the block chain when the second authentication is passed.
2. A blockchain monitoring system according to claim 1 further comprising:
the encryption unit is connected with the identification unit and the uploading unit and is used for encrypting the user information when the first authentication is passed and encrypting the transaction information when the second authentication is passed;
the uploading unit is further used for uploading the encrypted user information and the encrypted transaction information to the block chain.
3. A blockchain monitoring system according to claim 2 wherein said uploading unit is further configured to:
after the receiving unit receives the user information, pre-stored information is called from the block chain according to the user information;
if the pre-stored information is not retrieved successfully, the encryption unit is further used for encrypting the user information to generate the pre-stored information, and the uploading unit uploads the pre-stored information to the block chain.
4. The blockchain monitoring system of claim 3, wherein the first authentication includes an identity authentication and a credit authentication.
5. The blockchain monitoring system of claim 4, wherein the second authentication includes a transaction exception identification.
6. A blockchain supervision method applied to financial transactions is characterized by comprising the following steps:
receiving user information and transaction information input from a user side;
performing first authentication on the user information, and performing second authentication on the transaction information after the first authentication is passed;
and uploading the user information to the blockchain when the first authentication is passed and uploading the transaction information to the blockchain when the second authentication is passed.
7. The blockchain supervisory method according to claim 6, further comprising, prior to uploading the user information and the transaction information to the blockchain:
and encrypting the user information when the first authentication is passed, and encrypting the transaction information when the second authentication is passed.
8. A block chain supervision method according to claim 7, further comprising, after receiving the user information:
calling prestored information from a block chain according to the user information;
and if the pre-stored information is not invoked successfully, encrypting the user information to generate the pre-stored information, and uploading the pre-stored information to the block chain.
9. The blockchain supervision method according to claim 8, wherein the first authentication comprises identity authentication and credit authentication.
10. The blockchain supervisory method of claim 9, wherein the second authentication includes a transaction exception identification.
CN202010252791.2A 2020-04-02 2020-04-02 Block chain monitoring system and method applied to financial transactions Pending CN111461731A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010252791.2A CN111461731A (en) 2020-04-02 2020-04-02 Block chain monitoring system and method applied to financial transactions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010252791.2A CN111461731A (en) 2020-04-02 2020-04-02 Block chain monitoring system and method applied to financial transactions

Publications (1)

Publication Number Publication Date
CN111461731A true CN111461731A (en) 2020-07-28

Family

ID=71685807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010252791.2A Pending CN111461731A (en) 2020-04-02 2020-04-02 Block chain monitoring system and method applied to financial transactions

Country Status (1)

Country Link
CN (1) CN111461731A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112015964A (en) * 2020-08-22 2020-12-01 王红建 Business data processing method based on block chain and digital finance and big data platform
CN112016911A (en) * 2020-08-20 2020-12-01 王红根 Information management method based on block chain digital currency finance and digital service platform
CN115018645A (en) * 2022-06-27 2022-09-06 平安银行股份有限公司 Security assessment method and module for deposit applied to transaction system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840771A (en) * 2019-04-01 2019-06-04 西安电子科技大学 A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840771A (en) * 2019-04-01 2019-06-04 西安电子科技大学 A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016911A (en) * 2020-08-20 2020-12-01 王红根 Information management method based on block chain digital currency finance and digital service platform
CN112015964A (en) * 2020-08-22 2020-12-01 王红建 Business data processing method based on block chain and digital finance and big data platform
CN112015964B (en) * 2020-08-22 2021-06-04 上海大象金泰科技有限公司 Business data processing method and system based on block chain and digital finance
CN115018645A (en) * 2022-06-27 2022-09-06 平安银行股份有限公司 Security assessment method and module for deposit applied to transaction system
CN115018645B (en) * 2022-06-27 2024-03-22 平安银行股份有限公司 Security assessment method and module for deposit book applied to transaction system

Similar Documents

Publication Publication Date Title
US10771251B1 (en) Identity management service via virtual passport
US10614244B1 (en) Sensitive data aliasing
US9876646B2 (en) User identification management system and method
CN101751629B (en) Method and system for authenticating multifactor with changing unique values
US20080216172A1 (en) Systems, methods, and apparatus for secure transactions in trusted systems
CA2766491C (en) A method and system for securely and automatically downloading a master key in a bank card payment system
US20070219926A1 (en) Secure method and system of identity authentication
CN111461731A (en) Block chain monitoring system and method applied to financial transactions
JPS6310839A (en) System and method for data communication
CN112232814B (en) Encryption and decryption methods of payment key, payment authentication method and terminal equipment
US11711213B2 (en) Master key escrow process
CN111460525B (en) Block chain-based data processing method, device and storage medium
CN103942896A (en) System for money withdrawing without card on ATM
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
CN111355591A (en) Block chain account safety management method based on real-name authentication technology
CN116057554A (en) Method for managing transaction data sets, participant unit, transaction register and payment system
CN108650214B (en) Dynamic page encryption anti-unauthorized method and device
CN112637172A (en) Novel data security and confidentiality method
CN116720839A (en) Financial information management method based on blockchain technology and supervision system thereof
CN113505358B (en) Method for supervising information processing behaviors
CN114244519A (en) Password verification method and device, computer equipment and storage medium
KR100224756B1 (en) Method of maintaining the password in the financial on-line transaction system
CN113393180A (en) Bin data processing method and device, electronic equipment and computer readable medium
CN101227281A (en) Dynamic anti stealing information and identification authenticating method
US20230153209A1 (en) System and method for database recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200728

RJ01 Rejection of invention patent application after publication