Internet financial transaction system and method based on big data
Technical Field
The invention relates to the field of big data, in particular to an internet financial transaction system and method based on big data.
Background
The internet finance is a novel financial business mode for realizing fund integration, payment, investment and information intermediary service by using the internet technology and the information communication technology by traditional financial institutions and internet enterprises. Internet finance is not a simple combination of internet and financial industry, but a new mode and a new service which are generated for adapting to new requirements naturally after being familiar and accepted by users on the level of realizing network technology such as security, mobility and the like. Internet finance is an emerging field in which the traditional financial industry is combined with internet technology. In the prior art, the safety performance is lower when the internet financial transactions are carried out in batches.
Disclosure of Invention
The invention aims to provide an internet financial transaction system and method based on big data, so as to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
the transaction system comprises a user side, a security isolation center and a financial server, wherein the user side is used for sending a financial transaction request to the security isolation distribution center, the financial transaction request comprises a plurality of pieces of financial card information to be transacted and corresponding pieces of financial card information to be transacted, the security isolation center is used for receiving the financial transaction request of the user side and verifying the establishment result of the financial transaction request of the financial server, and the financial server is used for establishing and executing the financial transaction request.
Preferably, the security isolation center comprises a request receiving module, a request processing module and an establishment result verification module, the request receiving module comprises a user address acquisition module, a user address verification module, a biological characteristic information acquisition module and a characteristic information verification module, the user address acquisition module is used for acquiring a user address of a financial transaction request initiated by a user side to the security isolation distribution center, the user address verification module is used for verifying whether the user address in the financial transaction request belongs to the user address of the user side initiated by a historical transaction request of each financial card to be transacted, the biological characteristic information acquisition module is used for acquiring the biological characteristic information of the user side, the characteristic information verification module is used for verifying whether the biological characteristic information of the acquired user is consistent with the pre-stored biological characteristic information of the user, and the request processing module passes the verification at the user address verification module or verifies the communication at the characteristic information verification module If so, randomly sequencing the financial cards to be transacted in the financial transaction request, packaging and encrypting the financial transaction request into a data packet to be processed, and sending the data packet to the financial transaction server; the establishment result verification module is used for verifying the establishment result of the financial transaction request of the financial server and sending information to the financial transaction server to execute the established information to be transacted when the verification is passed.
Preferably, the financial server comprises a decryption module, a primary verification program module, a pending transaction information establishment module, a data packet processing module, a pending transaction information judgment module and a secondary verification program module, wherein the decryption module is used for decrypting the pending data packet to obtain a financial transaction request, the primary verification program module is used for verifying whether the security isolation distribution center is trusted, the pending transaction information establishment module is used for establishing pending transaction information of a financial card according to the financial transaction request and sending a timestamp with a main financial card identifier to the security isolation distribution center after the establishment is completed, the data packet processing module is used for deleting the pending transaction information of the corresponding financial card in the financial transaction request after the pending transaction information establishment module establishes the pending transaction information of a financial card, and the pending transaction information judgment module is used for judging whether the financial transaction request also contains the pending transaction information, and returning to the end identifier of the security isolation distribution center when the information to be transacted does not exist in the financial transaction request, wherein the secondary verification program module is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request before establishing the information to be transacted of the next financial card.
Preferably, the establishment result verification module comprises an ending identifier detection module, a timestamp sorting module, a sorting comparison module and an information sending module, after the ending mark detection module receives the time stamp with the sorted last relay financial card mark at the security isolation distribution center, detecting whether an end identifier sent by the financial server is received or not in a preset time period, transmitting information to the timestamp sorting module when the end identifier sent by the financial server is received, and sorting the timestamps with the financial card identifiers transmitted by the transaction information to be processed establishing module according to the time sequence, the sequencing comparison module is used for comparing whether the sequencing result of the timestamp sequencing module is consistent with the sequencing result of the request processing module, and the information sending module sends a message for canceling or executing the established information to be transacted to the financial server according to the comparison result of the sequencing comparison module.
An internet financial transaction method based on big data, the transaction method comprising the steps of:
step S1: a user side sends a financial transaction request to a security isolation distribution center, wherein the financial transaction request comprises information of a plurality of financial cards to be transacted and corresponding information of each financial card to be transacted;
step S2: the security isolation distribution center verifies the identity information of the user terminal,
if the user side identity information is not verified, refusing to accept the financial transaction request;
if the user side identity information passes the verification, randomly sequencing the financial cards to be traded in the financial trading request;
step S3: the security isolation distribution center packs and encrypts the financial transaction request into a data packet to be processed and sends the data packet to the financial transaction server;
step S4: after receiving the data packet to be processed, the financial transaction server carries out pre-transaction according to the sequence of the step S2, wherein the pre-transaction is used for establishing information to be transacted of each financial card on the financial server and returning the establishment result to the security isolation distribution center;
step S5: the security isolation distribution center verifies the received establishment result, and if the verification is passed, the security isolation distribution center sends information to the financial transaction server to execute the established information to be transacted; if the verification fails, the information is sent to the financial transaction server to cancel the established information to be transacted and feed back the information of the transaction failure of the user.
Preferably, the step S2 of verifying the identity information of the user side by the security isolation distribution center includes:
collecting a user address of a financial transaction request initiated by a user side to a security isolation distribution center;
collecting the user address of the user end initiated by the historical transaction request of each financial card to be transacted in the financial transaction request,
if the user address in the financial transaction request belongs to the user address of the user terminal initiated by the historical transaction request, the user terminal identity information is verified to be passed,
and if the user address in the financial transaction request does not belong to the user address of the user side initiated by the historical transaction request, acquiring the user biological characteristic information of the user side, and if the user biological characteristic information is consistent with the pre-stored user biological characteristic information, passing the verification of the user side identity information, otherwise, failing to pass the verification of the user side identity information.
Preferably, the step S2 further includes: after the financial cards to be transacted in the financial transaction request are randomly sequenced, the financial card to be transacted which is sequenced first is selected as a first main financial card, and the other financial cards to be transacted are selected as relay financial cards.
Preferably, the step S4 further includes:
after receiving the data packet to be processed, the financial transaction server decrypts the data packet to be processed to obtain a financial transaction request, then performs a primary verification program on the data packet to be processed, wherein the primary verification program is used for verifying whether the security isolation distribution center is trusted or not, if the security isolation distribution center is verified to be trusted, the financial transaction server establishes the transaction information to be processed of the main financial card according to the financial transaction request, after the establishment is completed, a timestamp with a main financial card identifier is sent to the security isolation distribution center, and the transaction information to be processed in the main financial card in the financial transaction request is deleted,
judging whether the financial transaction request also contains information to be transacted, if the financial transaction request contains the information to be transacted, continuing to transmit the financial transaction request, establishing the financial card information to be transacted according to the sequence in the step S2, carrying out a secondary verification program on the financial transaction request, wherein the secondary verification program is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request until establishing the information to be transacted in the next financial card,
if the financial transaction request is verified to be modified, canceling the previously established transaction information to be processed, and directly feeding back the transaction information to the user for transaction failure;
if the financial transaction request is not modified, the financial transaction server establishes the transferred financial to-be-processed transaction information, and after the establishment is completed, a timestamp with a corresponding financial card identifier is sent to the security isolation distribution center, and the to-be-transacted information in the corresponding financial card in the financial transaction request is deleted;
and if the financial transaction request does not contain the information to be transacted, stopping transmitting the financial transaction request, deleting the financial transaction request, and returning the financial transaction request to the security isolation distribution center to finish the identification.
Preferably, the step S5 includes:
when the security isolation distribution center receives the time stamp with the last sequenced relay financial card identifier,
if the ending mark sent by the financial server is received in a preset time period, the received timestamps with the financial card marks are sequenced according to the time sequence, if the sequencing result is consistent with the sequence in the step S2, a message allowing the to-be-processed information of the to-be-transacted financial card to be processed is sent to the financial server, if the sequencing result is inconsistent with the sequence in the step S2 or the ending mark sent by the financial server is not received in the preset time period, a message canceling the established to-be-transacted information is sent to the financial server, and the message canceling the established to-be-transacted information is sent to the user transaction failure information.
Preferably, the verifying whether the security isolation distribution center is trusted comprises:
and establishing a temporary communication channel between the financial server and the user side, transmitting the first main financial card information and the corresponding financial card information to be transacted to the financial server by the user side through the temporary channel, comparing whether the first main financial card information and the corresponding financial card information to be transacted, which are transmitted by the user side and decrypted by the financial server, are consistent, and if so, verifying that the security isolation distribution center is trusted.
Compared with the prior art, the invention has the beneficial effects that: the invention firstly establishes each item of transaction information to be processed on the financial server, then sends the information to the security isolation center for checking and verification, and executes each item of transaction information to be processed after the security isolation center passes the checking and verification, thereby increasing the security performance in the internet financial transaction process, and further checking and authenticating the internet transaction process by adopting a primary verification program and a secondary verification program, thereby improving the security performance in the internet financial transaction process.
Drawings
FIG. 1 is a block diagram of a big data based Internet financial transaction system according to the present invention;
fig. 2 is a flow chart illustrating a big data-based internet financial transaction method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, in an embodiment of the present invention, an internet financial transaction system based on big data includes a user side, a security isolation center, and a financial server, where the user side is configured to send a financial transaction request to a security isolation distribution center, the financial transaction request includes a plurality of pieces of financial card information to be transacted and corresponding pieces of financial card information to be transacted, the security isolation center is configured to receive a financial transaction request from the user side and verify a result of establishing the financial transaction request from the financial server, and the financial server is configured to establish and execute the financial transaction request.
The security isolation center comprises a request receiving module, a request processing module and an establishment result verification module, wherein the request receiving module comprises a user address acquisition module, a user address verification module, a biological characteristic information acquisition module and a characteristic information verification module, the user address acquisition module is used for acquiring a user address of a financial transaction request initiated by a user side to the security isolation distribution center, the user address verification module is used for verifying whether the user address in the financial transaction request belongs to the user address of the user side initiated by a historical transaction request of each financial card to be transacted, the biological characteristic information acquisition module is used for acquiring the biological characteristic information of the user side, the characteristic information verification module is used for verifying whether the biological characteristic information of the acquired user is consistent with the pre-stored biological characteristic information of the user, and the request processing module passes the verification of the user address verification module or passes the verification of the characteristic information verification module Randomly ordering the financial cards to be transacted in the financial transaction request, packaging and encrypting the financial transaction request into a data packet to be processed, and sending the data packet to the financial transaction server; the establishment result verification module is used for verifying the establishment result of the financial transaction request of the financial server and sending information to the financial transaction server to execute the established information to be transacted when the verification is passed.
The financial server comprises a decryption module, a primary verification program module, a to-be-processed transaction information establishing module, a data packet processing module, a to-be-transacted information judging module and a secondary verification program module, wherein the decryption module is used for decrypting a to-be-processed data packet to obtain a financial transaction request, the primary verification program module is used for verifying whether a security isolation distribution center is trusted or not, the to-be-processed transaction information establishing module is used for establishing the to-be-processed transaction information of a financial card according to the financial transaction request and sending a time stamp with a main financial card identifier to the security isolation distribution center after the establishment is completed, the data packet processing module is used for deleting the to-be-transacted information of the corresponding financial card in the financial transaction request after the to-be-processed transaction information establishing module establishes the to-be-processed transaction information of a financial card, and the to-be-transacted information judging module is used for judging whether the to-be-transacted information is also contained in the financial transaction request or not, and returning to the end identifier of the security isolation distribution center when the information to be transacted does not exist in the financial transaction request, wherein the secondary verification program module is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request before establishing the information to be transacted of the next financial card.
The establishment result verification module comprises an ending identifier detection module, a timestamp sorting module, a sorting comparison module and an information sending module, after the ending mark detection module receives the time stamp with the sorted last relay financial card mark at the security isolation distribution center, detecting whether an end identifier sent by the financial server is received or not in a preset time period, transmitting information to the timestamp sorting module when the end identifier sent by the financial server is received, and sorting the timestamps with the financial card identifiers transmitted by the transaction information to be processed establishing module according to the time sequence, the sequencing comparison module is used for comparing whether the sequencing result of the timestamp sequencing module is consistent with the sequencing result of the request processing module, and the information sending module sends a message for canceling or executing the established to-be-processed transaction information to the financial server according to the comparison result of the sequencing comparison module.
An internet financial transaction method based on big data, the transaction method comprising the steps of:
step S1: a user side sends a financial transaction request to a security isolation distribution center, wherein the financial transaction request comprises information of a plurality of financial cards to be transacted and corresponding information of each financial card to be transacted;
step S2: the security isolation distribution center verifies the identity information of the user terminal, and the security isolation distribution center verifies the identity information of the user terminal, including the following steps:
collecting a user address of a financial transaction request initiated by a user side to a security isolation distribution center;
collecting the user address of the user end initiated by the historical transaction request of each financial card to be transacted in the financial transaction request,
if the user address in the financial transaction request belongs to the user address of the user terminal initiated by the historical transaction request, the user terminal identity information is verified to be passed,
if the user address in the financial transaction request does not belong to the user address of the user side initiated by the historical transaction request, acquiring the user biological characteristic information of the user side, if the user biological characteristic information is consistent with the pre-stored user biological characteristic information, the user side identity information passes the verification, otherwise, the user side identity information does not pass the verification;
if the user side identity information is not verified, refusing to accept the financial transaction request; the identity information of the verification user side is collected, and the safety performance in the internet financial transaction process is improved;
if the user side identity information passes the verification, randomly sequencing the financial cards to be traded in the financial transaction request, and selecting the financial card to be traded which is sequenced first as a first main financial card, and the other financial cards to be traded as relay financial cards;
step S3: the security isolation distribution center packs and encrypts the financial transaction request into a data packet to be processed and sends the data packet to the financial transaction server;
step S4: after receiving the data packet to be processed, the financial transaction server decrypts the data packet to be processed to obtain a financial transaction request, then performs a primary verification program on the data packet to be processed, wherein the primary verification program is used for verifying whether the security isolation distribution center is trusted or not, if the security isolation distribution center is verified to be trusted, the financial transaction server establishes the transaction information to be processed of the main financial card according to the financial transaction request, after the establishment is completed, a timestamp with a main financial card identifier is sent to the security isolation distribution center, and the transaction information to be processed in the main financial card in the financial transaction request is deleted,
judging whether the financial transaction request also contains information to be transacted, if the financial transaction request contains the information to be transacted, continuing to transmit the financial transaction request, establishing the financial card information to be transacted according to the sequence in the step S2, carrying out a secondary verification program on the financial transaction request, wherein the secondary verification program is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request until establishing the information to be transacted in the next financial card,
if the financial transaction request is verified to be modified, canceling the previously established transaction information to be processed, and directly feeding back the transaction information to the user for transaction failure;
if the financial transaction request is not modified, the financial transaction server establishes the transferred financial to-be-processed transaction information, and after the establishment is completed, a timestamp with a corresponding financial card identifier is sent to the security isolation distribution center, and the to-be-transacted information in the corresponding financial card in the financial transaction request is deleted;
and if the financial transaction request does not contain the information to be transacted, stopping transmitting the financial transaction request, deleting the financial transaction request, and returning the financial transaction request to the security isolation distribution center to finish the identification.
The verifying whether the security isolation distribution center is trusted comprises:
establishing a temporary communication channel between the financial server and a user side, transmitting the first main financial card information and the corresponding financial card information to be transacted to the financial server by the user side through the temporary channel, comparing whether the first main financial card information and the corresponding financial card information to be transacted, which are transmitted by the user side and decrypted by the financial server, are consistent, and if so, verifying that the security isolation distribution center is trusted;
step S5: when the security isolation distribution center receives the time stamp with the last sequenced relay financial card identifier,
if the ending mark sent by the financial server is received in a preset time period, the received timestamps with the financial card marks are sequenced according to the time sequence, if the sequencing result is consistent with the sequence in the step S2, a message allowing the to-be-processed information of the to-be-transacted financial card to be processed is sent to the financial server, if the sequencing result is inconsistent with the sequence in the step S2 or the ending mark sent by the financial server is not received in the preset time period, a message canceling the established to-be-transacted information is sent to the financial server, and the message canceling the established to-be-transacted information is sent to the user transaction failure information.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.