+

CN111680999B - An Internet financial transaction system and method based on big data - Google Patents

An Internet financial transaction system and method based on big data Download PDF

Info

Publication number
CN111680999B
CN111680999B CN202010471212.3A CN202010471212A CN111680999B CN 111680999 B CN111680999 B CN 111680999B CN 202010471212 A CN202010471212 A CN 202010471212A CN 111680999 B CN111680999 B CN 111680999B
Authority
CN
China
Prior art keywords
financial
information
transaction request
financial transaction
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202010471212.3A
Other languages
Chinese (zh)
Other versions
CN111680999A (en
Inventor
韩永辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Foreign Studies
Original Assignee
Guangdong University of Foreign Studies
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Foreign Studies filed Critical Guangdong University of Foreign Studies
Priority to CN202010471212.3A priority Critical patent/CN111680999B/en
Publication of CN111680999A publication Critical patent/CN111680999A/en
Application granted granted Critical
Publication of CN111680999B publication Critical patent/CN111680999B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明公开了一种基于大数据的互联网金融交易系统及方法,所述交易系统包括用户端、安全隔离中心和金融服务器,所述用户端用于向安全隔离分配中心发送金融交易请求,所述金融交易请求包括多张待交易金融卡信息及相应的每张金融卡待交易信息所述安全隔离中心用于接收用户端的金融交易请求并验证金融服务器的金融交易请求的建立结果,所述金融服务器用于建立和执行金融交易请求,所述安全隔离中心包括请求接收模块、请求处理模块和建立结果验证模块。

Figure 202010471212

The invention discloses an Internet financial transaction system and method based on big data. The transaction system includes a user terminal, a security isolation center and a financial server. The user terminal is used to send a financial transaction request to a security isolation distribution center. The financial transaction request includes multiple pieces of financial card information to be traded and the corresponding information to be traded for each financial card. The security isolation center is used to receive the financial transaction request from the client and verify the financial For establishing and executing financial transaction requests, the security isolation center includes a request receiving module, a request processing module and a building result verification module.

Figure 202010471212

Description

Internet financial transaction system and method based on big data
Technical Field
The invention relates to the field of big data, in particular to an internet financial transaction system and method based on big data.
Background
The internet finance is a novel financial business mode for realizing fund integration, payment, investment and information intermediary service by using the internet technology and the information communication technology by traditional financial institutions and internet enterprises. Internet finance is not a simple combination of internet and financial industry, but a new mode and a new service which are generated for adapting to new requirements naturally after being familiar and accepted by users on the level of realizing network technology such as security, mobility and the like. Internet finance is an emerging field in which the traditional financial industry is combined with internet technology. In the prior art, the safety performance is lower when the internet financial transactions are carried out in batches.
Disclosure of Invention
The invention aims to provide an internet financial transaction system and method based on big data, so as to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
the transaction system comprises a user side, a security isolation center and a financial server, wherein the user side is used for sending a financial transaction request to the security isolation distribution center, the financial transaction request comprises a plurality of pieces of financial card information to be transacted and corresponding pieces of financial card information to be transacted, the security isolation center is used for receiving the financial transaction request of the user side and verifying the establishment result of the financial transaction request of the financial server, and the financial server is used for establishing and executing the financial transaction request.
Preferably, the security isolation center comprises a request receiving module, a request processing module and an establishment result verification module, the request receiving module comprises a user address acquisition module, a user address verification module, a biological characteristic information acquisition module and a characteristic information verification module, the user address acquisition module is used for acquiring a user address of a financial transaction request initiated by a user side to the security isolation distribution center, the user address verification module is used for verifying whether the user address in the financial transaction request belongs to the user address of the user side initiated by a historical transaction request of each financial card to be transacted, the biological characteristic information acquisition module is used for acquiring the biological characteristic information of the user side, the characteristic information verification module is used for verifying whether the biological characteristic information of the acquired user is consistent with the pre-stored biological characteristic information of the user, and the request processing module passes the verification at the user address verification module or verifies the communication at the characteristic information verification module If so, randomly sequencing the financial cards to be transacted in the financial transaction request, packaging and encrypting the financial transaction request into a data packet to be processed, and sending the data packet to the financial transaction server; the establishment result verification module is used for verifying the establishment result of the financial transaction request of the financial server and sending information to the financial transaction server to execute the established information to be transacted when the verification is passed.
Preferably, the financial server comprises a decryption module, a primary verification program module, a pending transaction information establishment module, a data packet processing module, a pending transaction information judgment module and a secondary verification program module, wherein the decryption module is used for decrypting the pending data packet to obtain a financial transaction request, the primary verification program module is used for verifying whether the security isolation distribution center is trusted, the pending transaction information establishment module is used for establishing pending transaction information of a financial card according to the financial transaction request and sending a timestamp with a main financial card identifier to the security isolation distribution center after the establishment is completed, the data packet processing module is used for deleting the pending transaction information of the corresponding financial card in the financial transaction request after the pending transaction information establishment module establishes the pending transaction information of a financial card, and the pending transaction information judgment module is used for judging whether the financial transaction request also contains the pending transaction information, and returning to the end identifier of the security isolation distribution center when the information to be transacted does not exist in the financial transaction request, wherein the secondary verification program module is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request before establishing the information to be transacted of the next financial card.
Preferably, the establishment result verification module comprises an ending identifier detection module, a timestamp sorting module, a sorting comparison module and an information sending module, after the ending mark detection module receives the time stamp with the sorted last relay financial card mark at the security isolation distribution center, detecting whether an end identifier sent by the financial server is received or not in a preset time period, transmitting information to the timestamp sorting module when the end identifier sent by the financial server is received, and sorting the timestamps with the financial card identifiers transmitted by the transaction information to be processed establishing module according to the time sequence, the sequencing comparison module is used for comparing whether the sequencing result of the timestamp sequencing module is consistent with the sequencing result of the request processing module, and the information sending module sends a message for canceling or executing the established information to be transacted to the financial server according to the comparison result of the sequencing comparison module.
An internet financial transaction method based on big data, the transaction method comprising the steps of:
step S1: a user side sends a financial transaction request to a security isolation distribution center, wherein the financial transaction request comprises information of a plurality of financial cards to be transacted and corresponding information of each financial card to be transacted;
step S2: the security isolation distribution center verifies the identity information of the user terminal,
if the user side identity information is not verified, refusing to accept the financial transaction request;
if the user side identity information passes the verification, randomly sequencing the financial cards to be traded in the financial trading request;
step S3: the security isolation distribution center packs and encrypts the financial transaction request into a data packet to be processed and sends the data packet to the financial transaction server;
step S4: after receiving the data packet to be processed, the financial transaction server carries out pre-transaction according to the sequence of the step S2, wherein the pre-transaction is used for establishing information to be transacted of each financial card on the financial server and returning the establishment result to the security isolation distribution center;
step S5: the security isolation distribution center verifies the received establishment result, and if the verification is passed, the security isolation distribution center sends information to the financial transaction server to execute the established information to be transacted; if the verification fails, the information is sent to the financial transaction server to cancel the established information to be transacted and feed back the information of the transaction failure of the user.
Preferably, the step S2 of verifying the identity information of the user side by the security isolation distribution center includes:
collecting a user address of a financial transaction request initiated by a user side to a security isolation distribution center;
collecting the user address of the user end initiated by the historical transaction request of each financial card to be transacted in the financial transaction request,
if the user address in the financial transaction request belongs to the user address of the user terminal initiated by the historical transaction request, the user terminal identity information is verified to be passed,
and if the user address in the financial transaction request does not belong to the user address of the user side initiated by the historical transaction request, acquiring the user biological characteristic information of the user side, and if the user biological characteristic information is consistent with the pre-stored user biological characteristic information, passing the verification of the user side identity information, otherwise, failing to pass the verification of the user side identity information.
Preferably, the step S2 further includes: after the financial cards to be transacted in the financial transaction request are randomly sequenced, the financial card to be transacted which is sequenced first is selected as a first main financial card, and the other financial cards to be transacted are selected as relay financial cards.
Preferably, the step S4 further includes:
after receiving the data packet to be processed, the financial transaction server decrypts the data packet to be processed to obtain a financial transaction request, then performs a primary verification program on the data packet to be processed, wherein the primary verification program is used for verifying whether the security isolation distribution center is trusted or not, if the security isolation distribution center is verified to be trusted, the financial transaction server establishes the transaction information to be processed of the main financial card according to the financial transaction request, after the establishment is completed, a timestamp with a main financial card identifier is sent to the security isolation distribution center, and the transaction information to be processed in the main financial card in the financial transaction request is deleted,
judging whether the financial transaction request also contains information to be transacted, if the financial transaction request contains the information to be transacted, continuing to transmit the financial transaction request, establishing the financial card information to be transacted according to the sequence in the step S2, carrying out a secondary verification program on the financial transaction request, wherein the secondary verification program is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request until establishing the information to be transacted in the next financial card,
if the financial transaction request is verified to be modified, canceling the previously established transaction information to be processed, and directly feeding back the transaction information to the user for transaction failure;
if the financial transaction request is not modified, the financial transaction server establishes the transferred financial to-be-processed transaction information, and after the establishment is completed, a timestamp with a corresponding financial card identifier is sent to the security isolation distribution center, and the to-be-transacted information in the corresponding financial card in the financial transaction request is deleted;
and if the financial transaction request does not contain the information to be transacted, stopping transmitting the financial transaction request, deleting the financial transaction request, and returning the financial transaction request to the security isolation distribution center to finish the identification.
Preferably, the step S5 includes:
when the security isolation distribution center receives the time stamp with the last sequenced relay financial card identifier,
if the ending mark sent by the financial server is received in a preset time period, the received timestamps with the financial card marks are sequenced according to the time sequence, if the sequencing result is consistent with the sequence in the step S2, a message allowing the to-be-processed information of the to-be-transacted financial card to be processed is sent to the financial server, if the sequencing result is inconsistent with the sequence in the step S2 or the ending mark sent by the financial server is not received in the preset time period, a message canceling the established to-be-transacted information is sent to the financial server, and the message canceling the established to-be-transacted information is sent to the user transaction failure information.
Preferably, the verifying whether the security isolation distribution center is trusted comprises:
and establishing a temporary communication channel between the financial server and the user side, transmitting the first main financial card information and the corresponding financial card information to be transacted to the financial server by the user side through the temporary channel, comparing whether the first main financial card information and the corresponding financial card information to be transacted, which are transmitted by the user side and decrypted by the financial server, are consistent, and if so, verifying that the security isolation distribution center is trusted.
Compared with the prior art, the invention has the beneficial effects that: the invention firstly establishes each item of transaction information to be processed on the financial server, then sends the information to the security isolation center for checking and verification, and executes each item of transaction information to be processed after the security isolation center passes the checking and verification, thereby increasing the security performance in the internet financial transaction process, and further checking and authenticating the internet transaction process by adopting a primary verification program and a secondary verification program, thereby improving the security performance in the internet financial transaction process.
Drawings
FIG. 1 is a block diagram of a big data based Internet financial transaction system according to the present invention;
fig. 2 is a flow chart illustrating a big data-based internet financial transaction method according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, in an embodiment of the present invention, an internet financial transaction system based on big data includes a user side, a security isolation center, and a financial server, where the user side is configured to send a financial transaction request to a security isolation distribution center, the financial transaction request includes a plurality of pieces of financial card information to be transacted and corresponding pieces of financial card information to be transacted, the security isolation center is configured to receive a financial transaction request from the user side and verify a result of establishing the financial transaction request from the financial server, and the financial server is configured to establish and execute the financial transaction request.
The security isolation center comprises a request receiving module, a request processing module and an establishment result verification module, wherein the request receiving module comprises a user address acquisition module, a user address verification module, a biological characteristic information acquisition module and a characteristic information verification module, the user address acquisition module is used for acquiring a user address of a financial transaction request initiated by a user side to the security isolation distribution center, the user address verification module is used for verifying whether the user address in the financial transaction request belongs to the user address of the user side initiated by a historical transaction request of each financial card to be transacted, the biological characteristic information acquisition module is used for acquiring the biological characteristic information of the user side, the characteristic information verification module is used for verifying whether the biological characteristic information of the acquired user is consistent with the pre-stored biological characteristic information of the user, and the request processing module passes the verification of the user address verification module or passes the verification of the characteristic information verification module Randomly ordering the financial cards to be transacted in the financial transaction request, packaging and encrypting the financial transaction request into a data packet to be processed, and sending the data packet to the financial transaction server; the establishment result verification module is used for verifying the establishment result of the financial transaction request of the financial server and sending information to the financial transaction server to execute the established information to be transacted when the verification is passed.
The financial server comprises a decryption module, a primary verification program module, a to-be-processed transaction information establishing module, a data packet processing module, a to-be-transacted information judging module and a secondary verification program module, wherein the decryption module is used for decrypting a to-be-processed data packet to obtain a financial transaction request, the primary verification program module is used for verifying whether a security isolation distribution center is trusted or not, the to-be-processed transaction information establishing module is used for establishing the to-be-processed transaction information of a financial card according to the financial transaction request and sending a time stamp with a main financial card identifier to the security isolation distribution center after the establishment is completed, the data packet processing module is used for deleting the to-be-transacted information of the corresponding financial card in the financial transaction request after the to-be-processed transaction information establishing module establishes the to-be-processed transaction information of a financial card, and the to-be-transacted information judging module is used for judging whether the to-be-transacted information is also contained in the financial transaction request or not, and returning to the end identifier of the security isolation distribution center when the information to be transacted does not exist in the financial transaction request, wherein the secondary verification program module is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request before establishing the information to be transacted of the next financial card.
The establishment result verification module comprises an ending identifier detection module, a timestamp sorting module, a sorting comparison module and an information sending module, after the ending mark detection module receives the time stamp with the sorted last relay financial card mark at the security isolation distribution center, detecting whether an end identifier sent by the financial server is received or not in a preset time period, transmitting information to the timestamp sorting module when the end identifier sent by the financial server is received, and sorting the timestamps with the financial card identifiers transmitted by the transaction information to be processed establishing module according to the time sequence, the sequencing comparison module is used for comparing whether the sequencing result of the timestamp sequencing module is consistent with the sequencing result of the request processing module, and the information sending module sends a message for canceling or executing the established to-be-processed transaction information to the financial server according to the comparison result of the sequencing comparison module.
An internet financial transaction method based on big data, the transaction method comprising the steps of:
step S1: a user side sends a financial transaction request to a security isolation distribution center, wherein the financial transaction request comprises information of a plurality of financial cards to be transacted and corresponding information of each financial card to be transacted;
step S2: the security isolation distribution center verifies the identity information of the user terminal, and the security isolation distribution center verifies the identity information of the user terminal, including the following steps:
collecting a user address of a financial transaction request initiated by a user side to a security isolation distribution center;
collecting the user address of the user end initiated by the historical transaction request of each financial card to be transacted in the financial transaction request,
if the user address in the financial transaction request belongs to the user address of the user terminal initiated by the historical transaction request, the user terminal identity information is verified to be passed,
if the user address in the financial transaction request does not belong to the user address of the user side initiated by the historical transaction request, acquiring the user biological characteristic information of the user side, if the user biological characteristic information is consistent with the pre-stored user biological characteristic information, the user side identity information passes the verification, otherwise, the user side identity information does not pass the verification;
if the user side identity information is not verified, refusing to accept the financial transaction request; the identity information of the verification user side is collected, and the safety performance in the internet financial transaction process is improved;
if the user side identity information passes the verification, randomly sequencing the financial cards to be traded in the financial transaction request, and selecting the financial card to be traded which is sequenced first as a first main financial card, and the other financial cards to be traded as relay financial cards;
step S3: the security isolation distribution center packs and encrypts the financial transaction request into a data packet to be processed and sends the data packet to the financial transaction server;
step S4: after receiving the data packet to be processed, the financial transaction server decrypts the data packet to be processed to obtain a financial transaction request, then performs a primary verification program on the data packet to be processed, wherein the primary verification program is used for verifying whether the security isolation distribution center is trusted or not, if the security isolation distribution center is verified to be trusted, the financial transaction server establishes the transaction information to be processed of the main financial card according to the financial transaction request, after the establishment is completed, a timestamp with a main financial card identifier is sent to the security isolation distribution center, and the transaction information to be processed in the main financial card in the financial transaction request is deleted,
judging whether the financial transaction request also contains information to be transacted, if the financial transaction request contains the information to be transacted, continuing to transmit the financial transaction request, establishing the financial card information to be transacted according to the sequence in the step S2, carrying out a secondary verification program on the financial transaction request, wherein the secondary verification program is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request until establishing the information to be transacted in the next financial card,
if the financial transaction request is verified to be modified, canceling the previously established transaction information to be processed, and directly feeding back the transaction information to the user for transaction failure;
if the financial transaction request is not modified, the financial transaction server establishes the transferred financial to-be-processed transaction information, and after the establishment is completed, a timestamp with a corresponding financial card identifier is sent to the security isolation distribution center, and the to-be-transacted information in the corresponding financial card in the financial transaction request is deleted;
and if the financial transaction request does not contain the information to be transacted, stopping transmitting the financial transaction request, deleting the financial transaction request, and returning the financial transaction request to the security isolation distribution center to finish the identification.
The verifying whether the security isolation distribution center is trusted comprises:
establishing a temporary communication channel between the financial server and a user side, transmitting the first main financial card information and the corresponding financial card information to be transacted to the financial server by the user side through the temporary channel, comparing whether the first main financial card information and the corresponding financial card information to be transacted, which are transmitted by the user side and decrypted by the financial server, are consistent, and if so, verifying that the security isolation distribution center is trusted;
step S5: when the security isolation distribution center receives the time stamp with the last sequenced relay financial card identifier,
if the ending mark sent by the financial server is received in a preset time period, the received timestamps with the financial card marks are sequenced according to the time sequence, if the sequencing result is consistent with the sequence in the step S2, a message allowing the to-be-processed information of the to-be-transacted financial card to be processed is sent to the financial server, if the sequencing result is inconsistent with the sequence in the step S2 or the ending mark sent by the financial server is not received in the preset time period, a message canceling the established to-be-transacted information is sent to the financial server, and the message canceling the established to-be-transacted information is sent to the user transaction failure information.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (5)

1. An internet financial transaction system based on big data is characterized in that: the transaction system comprises a user side, a security isolation distribution center and a financial server, wherein the user side is used for sending a financial transaction request to the security isolation distribution center, and the financial transaction request comprises information of a plurality of financial cards to be transacted and corresponding information of each financial card to be transacted; the security isolation distribution center is used for receiving a financial transaction request of a user side and verifying an establishment result of the financial transaction request of a financial server, and the financial server is used for establishing and executing the financial transaction request;
the security isolation distribution center comprises a request receiving module, a request processing module and an establishment result verification module, wherein the request receiving module comprises a user address acquisition module, a user address verification module, a biological characteristic information acquisition module and a characteristic information verification module, the user address acquisition module is used for acquiring a user address of a financial transaction request initiated by a user side to the security isolation distribution center, the user address verification module is used for verifying whether the user address in the financial transaction request belongs to the user address of the user side initiated by a historical transaction request of each financial card to be transacted, the biological characteristic information acquisition module is used for acquiring the biological characteristic information of the user side, the characteristic information verification module is used for verifying whether the biological characteristic information of the acquired user is consistent with the pre-stored biological characteristic information of the user, and the request processing module verifies whether the user address verification module passes or the characteristic information verification module passes the verification Randomly sequencing the financial cards to be transacted in the financial transaction request, packaging and encrypting the financial transaction request into a data packet to be processed, and sending the data packet to the financial transaction server; the establishment result verification module is used for verifying the establishment result of the financial transaction request of the financial server and sending information to the financial transaction server to execute the established information to be transacted when the verification is passed;
the financial server comprises a decryption module, a primary verification program module, a to-be-processed transaction information establishing module, a data packet processing module, a to-be-transacted information judging module and a secondary verification program module, wherein the decryption module is used for decrypting a to-be-processed data packet to obtain a financial transaction request, the primary verification program module is used for verifying whether a security isolation distribution center is trusted or not, the to-be-processed transaction information establishing module is used for establishing the to-be-processed transaction information of a financial card according to the financial transaction request and sending a time stamp with a main financial card identifier to the security isolation distribution center after the establishment is completed, the data packet processing module is used for deleting the to-be-transacted information of the corresponding financial card in the financial transaction request after the to-be-processed transaction information establishing module establishes the to-be-processed transaction information of a financial card, and the to-be-transacted information judging module is used for judging whether the to-be-transacted information is also contained in the financial transaction request or not, and returning to the end identifier of the security isolation distribution center when the information to be transacted does not exist in the financial transaction request, wherein the secondary verification program module is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request before establishing the information to be transacted of the next financial card.
2. The big data based internet financial transaction system of claim 1, wherein: the establishment result verification module comprises an ending identifier detection module, a timestamp sorting module, a sorting comparison module and an information sending module, after the ending mark detection module receives the time stamp with the sorted last relay financial card mark at the security isolation distribution center, detecting whether an end identifier sent by the financial server is received or not in a preset time period, transmitting information to the timestamp sorting module when the end identifier sent by the financial server is received, and sorting the timestamps with the financial card identifiers transmitted by the transaction information to be processed establishing module according to the time sequence, the sequencing comparison module is used for comparing whether the sequencing result of the timestamp sequencing module is consistent with the sequencing result of the request processing module, and the information sending module sends a message for canceling or executing the established information to be transacted to the financial server according to the comparison result of the sequencing comparison module.
3. An internet financial transaction method based on big data is characterized in that: the transaction method comprises the following steps:
step S1: a user side sends a financial transaction request to a security isolation distribution center, wherein the financial transaction request comprises information of a plurality of financial cards to be transacted and corresponding information of each financial card to be transacted;
step S2: the security isolation distribution center verifies the identity information of the user terminal,
if the user side identity information is not verified, refusing to accept the financial transaction request;
if the user side identity information passes the verification, randomly sequencing the financial cards to be traded in the financial trading request;
step S3: the security isolation distribution center packs and encrypts the financial transaction request into a data packet to be processed and sends the data packet to the financial transaction server;
step S4: after receiving the data packet to be processed, the financial transaction server carries out pre-transaction according to the sequence of the step S2, wherein the pre-transaction is used for establishing information to be transacted of each financial card on the financial server and returning the establishment result to the security isolation distribution center;
step S5: the security isolation distribution center verifies the received establishment result, and if the verification is passed, the security isolation distribution center sends information to the financial transaction server to execute the established information to be transacted; if the verification fails, sending information to the financial transaction server to cancel the established information to be transacted and feeding back the information of the transaction failure of the user;
the step S2 of verifying the user side identity information by the security isolation distribution center includes:
collecting a user address of a financial transaction request initiated by a user side to a security isolation distribution center;
collecting the user address of the user end initiated by the historical transaction request of each financial card to be transacted in the financial transaction request,
if the user address in the financial transaction request belongs to the user address of the user terminal initiated by the historical transaction request, the user terminal identity information is verified to be passed,
if the user address in the financial transaction request does not belong to the user address of the user side initiated by the historical transaction request, acquiring the user biological characteristic information of the user side, if the user biological characteristic information is consistent with the pre-stored user biological characteristic information, the user side identity information passes the verification, otherwise, the user side identity information does not pass the verification;
the step S2 further includes: after randomly ordering the financial cards to be traded in the financial transaction request, selecting the financial card to be traded which is the first financial card to be traded in the ordering as a first main financial card, and the other financial cards to be traded as relay financial cards;
the step S4 further includes:
after receiving the data packet to be processed, the financial transaction server decrypts the data packet to be processed to obtain a financial transaction request, then performs a primary verification program on the data packet to be processed, wherein the primary verification program is used for verifying whether the security isolation distribution center is trusted, if the security isolation distribution center is trusted, the financial transaction server establishes the transaction information to be processed of the main financial card according to the financial transaction request, after the establishment is completed, a timestamp with a main financial card identifier is sent to the security isolation distribution center, and the transaction information in the main financial card in the financial transaction request is deleted,
judging whether the financial transaction request also contains information to be transacted, if the financial transaction request contains the information to be transacted, continuing to transmit the financial transaction request, establishing the financial card information to be transacted according to the sequence in the step S2, carrying out a secondary verification program on the financial transaction request, wherein the secondary verification program is used for verifying whether the financial transaction request is modified in the process of deleting the information to be transacted in the previous financial card in the financial transaction request until establishing the information to be transacted in the next financial card,
if the financial transaction request is verified to be modified, canceling the previously established transaction information to be processed, and directly feeding back the transaction information to the user for transaction failure;
if the financial transaction request is not modified, the financial transaction server establishes the to-be-processed transaction information of the corresponding relay financial card, and after the establishment is completed, a timestamp with a corresponding financial card identifier is sent to the security isolation distribution center, and the to-be-transacted information in the corresponding financial card in the financial transaction request is deleted;
and if the financial transaction request does not contain the information to be transacted, stopping transmitting the financial transaction request, deleting the financial transaction request, and returning the financial transaction request to the security isolation distribution center to finish the identification.
4. A big data based internet financial transaction method as claimed in claim 3, wherein: the step S5 includes:
when the security isolation distribution center receives the time stamp with the last sequenced relay financial card identifier,
if the ending mark sent by the financial server is received in a preset time period, the received timestamps with the financial card marks are sequenced according to the time sequence, if the sequencing result is consistent with the sequence in the step S2, a message allowing the to-be-processed information of the to-be-transacted financial card to be processed is sent to the financial server, if the sequencing result is inconsistent with the sequence in the step S2 or the ending mark sent by the financial server is not received in the preset time period, a message canceling the established to-be-transacted information is sent to the financial server, and the message canceling the established to-be-transacted information is sent to the user transaction failure information.
5. The big data based internet financial transaction method according to claim 4, wherein: the verifying whether the security isolation distribution center is trusted comprises:
and establishing a temporary communication channel between the financial server and the user side, transmitting the first main financial card information and the corresponding financial card information to be transacted to the financial server by the user side through the temporary channel, comparing whether the first main financial card information and the corresponding financial card information to be transacted, which are transmitted by the user side and decrypted by the financial server, are consistent, and if so, verifying that the security isolation distribution center is trusted.
CN202010471212.3A 2020-05-28 2020-05-28 An Internet financial transaction system and method based on big data Expired - Fee Related CN111680999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010471212.3A CN111680999B (en) 2020-05-28 2020-05-28 An Internet financial transaction system and method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010471212.3A CN111680999B (en) 2020-05-28 2020-05-28 An Internet financial transaction system and method based on big data

Publications (2)

Publication Number Publication Date
CN111680999A CN111680999A (en) 2020-09-18
CN111680999B true CN111680999B (en) 2021-08-03

Family

ID=72434450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010471212.3A Expired - Fee Related CN111680999B (en) 2020-05-28 2020-05-28 An Internet financial transaction system and method based on big data

Country Status (1)

Country Link
CN (1) CN111680999B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101573722A (en) * 2006-11-16 2009-11-04 第一网络Ueps科技公司 Verification of transactor identity
CN102999838A (en) * 2011-09-19 2013-03-27 腾讯科技(深圳)有限公司 Processing method and processing system for order data in internet payment system
CN105681324A (en) * 2016-02-25 2016-06-15 上海诺亚投资管理有限公司 Internet financial transaction system and method
CN106780027A (en) * 2016-12-08 2017-05-31 北京金融资产交易所有限公司 A kind of data handling system and method
CN109493014A (en) * 2018-10-18 2019-03-19 北京瑞卓喜投科技发展有限公司 A kind of token operational approach and operation system based on block chain
CN109598494A (en) * 2018-12-04 2019-04-09 深圳前海微众银行股份有限公司 Transaction request based on open platform executes method, apparatus, equipment and medium
CN109840771A (en) * 2019-04-01 2019-06-04 西安电子科技大学 A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN110610096A (en) * 2019-09-04 2019-12-24 广东外语外贸大学 A method for protecting express delivery information
US10771536B2 (en) * 2009-12-10 2020-09-08 Royal Bank Of Canada Coordinated processing of data by networked computing resources

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120136796A1 (en) * 2010-09-21 2012-05-31 Ayman Hammad Device Enrollment System and Method
WO2017049309A1 (en) * 2015-09-17 2017-03-23 Eoriginal, Inc. System and method for electronic data capture and management for audit, monitoring, reporting and compliance
US20190095995A1 (en) * 2017-12-13 2019-03-28 Dearborn Financial, Inc. Systems and methods for operating exchange controlled network handling digitized asset backed mediums of exchange
CN109272325A (en) * 2018-09-25 2019-01-25 安徽灵图壹智能科技有限公司 A kind of distributed block chain identity card
CN109711836A (en) * 2018-11-15 2019-05-03 远光软件股份有限公司 A kind of storage method of transaction, storage network and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101573722A (en) * 2006-11-16 2009-11-04 第一网络Ueps科技公司 Verification of transactor identity
US10771536B2 (en) * 2009-12-10 2020-09-08 Royal Bank Of Canada Coordinated processing of data by networked computing resources
CN102999838A (en) * 2011-09-19 2013-03-27 腾讯科技(深圳)有限公司 Processing method and processing system for order data in internet payment system
CN105681324A (en) * 2016-02-25 2016-06-15 上海诺亚投资管理有限公司 Internet financial transaction system and method
CN106780027A (en) * 2016-12-08 2017-05-31 北京金融资产交易所有限公司 A kind of data handling system and method
CN109493014A (en) * 2018-10-18 2019-03-19 北京瑞卓喜投科技发展有限公司 A kind of token operational approach and operation system based on block chain
CN109598494A (en) * 2018-12-04 2019-04-09 深圳前海微众银行股份有限公司 Transaction request based on open platform executes method, apparatus, equipment and medium
CN109840771A (en) * 2019-04-01 2019-06-04 西安电子科技大学 A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN110610096A (en) * 2019-09-04 2019-12-24 广东外语外贸大学 A method for protecting express delivery information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的智能物流系统的研究与实现;冯毅;《中国优秀硕士学位论文全文数据库 信息科技辑》;20200115(第01期);第I138-616页,全文 *

Also Published As

Publication number Publication date
CN111680999A (en) 2020-09-18

Similar Documents

Publication Publication Date Title
US10701068B2 (en) Server based biometric authentication
US6078902A (en) System for transaction over communication network
US8306919B2 (en) IC card and authentication method in electronic ticket distribution system
EP1615097A2 (en) Dual-path-pre-approval authentication method
CN110400212A (en) A blockchain financial big data processing system and method
WO2007121631A1 (en) System and method of electronic bank safety certification based on cpk
CN101561956A (en) Method and system for information interaction
CN103903140A (en) O2O safety payment method, system and safety payment background
CN110599322A (en) Data auditing method and device based on block chain network
CN101521576B (en) Method and system for identity authentication of internet user
US20150332361A1 (en) Reputation System and Method
KR100888545B1 (en) Multi-authentication processing system in various electronic payment devices based on smart card
CN111680999B (en) An Internet financial transaction system and method based on big data
CN108833386B (en) Method and terminal for applying for mailing package on line for logistics system
CN106228713B (en) Data processing system and method for multiple POS terminals
JP7024738B2 (en) Server and authentication method
TW201830917A (en) Safety information interaction method and equipment
TW201828134A (en) Ciphertext-based identity verification method
CN103544418B (en) A kind of authentication device based on electronic transaction, system and method
CN206584404U (en) A kind of O2O payment administrative systems
CN105574716A (en) Intelligent electronic network payment interface and method
CN110120870A (en) A kind of key updating method and device
CN115146957A (en) Method and device for judging abnormal modification of information
CN112016063A (en) Bank data encryption method constructed by DES algorithm
CN111338611A (en) Electronic payment interface and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210803

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载