CN108875407A - For the sensitive information processing method and processing device of financial business, client, data framework - Google Patents
For the sensitive information processing method and processing device of financial business, client, data framework Download PDFInfo
- Publication number
- CN108875407A CN108875407A CN201810601874.0A CN201810601874A CN108875407A CN 108875407 A CN108875407 A CN 108875407A CN 201810601874 A CN201810601874 A CN 201810601874A CN 108875407 A CN108875407 A CN 108875407A
- Authority
- CN
- China
- Prior art keywords
- user
- sensitive information
- transaction
- financial
- sensitive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This application discloses a kind of for the sensitive information processing method and processing device of financial business, client, data framework.This method includes the primary block chain the second financial business user being added where the first financial business user;Record the transaction business between the first financial business user and the second financial business user;And obtain the transaction record in the transaction business stored on the primary block chain with sensitive information.Present application addresses lack to sensitive information is effectively treated in financial business the technical issues of.The application realizes the distributed storage to the sensitive information of financial business, and has safety, anti-tamper, retrospective technical effect.
Description
Technical Field
The application relates to the field of internet finance, in particular to a sensitive information processing method and device for financial business, a client and a data architecture.
Background
In a data information storage system in the financial field, sensitive information is generally controlled by an authoritative management center in a unified manner, and data management personnel have centralized control authority.
The inventor finds that necessary constraints are lacked among data managers in the environment nodes, sensitive information is uniformly controlled through a management center, and further the submitted sensitive information data cannot be prevented from being tampered.
Aiming at the problem that sensitive information in financial services is not effectively processed in the related art, an effective solution is not provided at present.
Disclosure of Invention
The main purpose of the present application is to provide a method for processing sensitive information in financial services, so as to solve the problem of lack of effective processing of sensitive information in financial services.
In order to achieve the above object, according to one aspect of the present application, there is provided a sensitive information processing method for financial transactions.
The sensitive information processing method for the financial business comprises the following steps: adding a second financial service user into a native block chain where the first financial service user is located; recording the transaction service between the first financial service user and the second financial service user; and obtaining a transaction record having sensitive information in the transaction traffic stored on the native blockchain.
Further, recording transaction traffic between the first financial transaction user and the second financial transaction user includes: recording first sensitive information between a first financial service user and a second financial service user; judging whether the first sensitive user information contains preset transaction sensitive information or not; and if the first sensitive user information is judged to have the preset transaction sensitive information, storing the preset transaction sensitive information to a user node on the original block chain.
Further, recording transaction traffic between the first financial transaction user and the second financial transaction user includes: recording second sensitive information between the first financial service user and the second financial service user; judging whether the second sensitive user information contains preset user sensitive information or not; and if the second sensitive user information is judged to have the preset user sensitive information, storing the preset transaction sensitive information to a user node on the native block chain.
Further, before obtaining a transaction record having sensitive information in the transaction traffic stored on the native blockchain, the method further comprises: an asymmetric encryption, the asymmetric encryption comprising: transaction data, digital signatures, or login authentication.
Further, still include: recording transaction business between a first financial business user and a second financial business user by adopting a preset client, wherein the first financial business user and the second financial business user at least comprise: presetting user sensitive information, wherein the transaction service at least comprises the following steps: and presetting transaction sensitive information.
In order to achieve the above object, according to another aspect of the present application, there is provided a sensitive information processing apparatus for financial transactions.
The sensitive information processing device for financial business according to the application comprises: the joining module is used for joining the second financial service user into the original block chain where the first financial service user is located; the recording module is used for recording the transaction business between the first financial business user and the second financial business user; and an obtaining module for obtaining a transaction record having sensitive information in the transaction traffic stored on the native blockchain.
Further, the recording module includes: the first recording unit is used for recording first sensitive information between a first financial service user and a second financial service user; the first judging unit is used for judging whether the first sensitive user information contains preset transaction sensitive information or not; and the first storage unit is used for storing the preset transaction sensitive information to the user node on the original block chain when the first sensitive user information is judged to have the preset transaction sensitive information.
Further, the recording module includes: the second recording unit is used for recording second sensitive information between the first financial service user and the second financial service user; the second judging unit is used for judging whether the second sensitive user information contains preset user sensitive information or not; and the second storage unit is used for storing the preset transaction sensitive information to the user node on the original block chain when the second sensitive user information is judged to have the preset user sensitive information.
In the embodiment of the application, a mode that a second financial service user is added into a native block chain where a first financial service user is located is adopted, and the purpose of obtaining the transaction record with sensitive information in the transaction service stored on the native block chain is achieved by recording the transaction service between the first financial service user and the second financial service user, so that the technical effect of the distributed storage record of the sensitive information is achieved, the security of transaction data is guaranteed, the falsification is prevented, and the traceability is realized, and the technical problem that the sensitive information in the financial service is not effectively processed is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a schematic diagram of a sensitive information processing method for financial transactions according to a first embodiment of the present application;
FIG. 2 is a schematic diagram of a sensitive information processing method for financial transactions according to a second embodiment of the present application;
FIG. 3 is a schematic diagram of a sensitive information processing method for financial transactions according to a third embodiment of the present application;
FIG. 4 is a diagram illustrating a sensitive information processing method for financial transactions according to a fourth embodiment of the present application;
FIG. 5 is a schematic diagram of a sensitive information processing apparatus for financial transactions, according to a first embodiment of the present application;
FIG. 6 is a schematic diagram of a sensitive information processing apparatus for financial transactions according to a second embodiment of the present application; and
fig. 7 is a data architecture diagram according to an embodiment of the application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The sensitive information processing method for financial service includes adding a second financial service user to a native block chain where a first financial service user is located; recording the transaction service between the first financial service user and the second financial service user; and obtaining a transaction record having sensitive information in the transaction traffic stored on the native blockchain. And based on an Ethernet open source framework, persistent storage is carried out on the sensitive information of the user in the forms of intelligent contracts and transaction records, and the transaction records with the sensitive information in the transaction service stored on the native block chain are obtained. Meanwhile, by integrating functions of encryption algorithm, account management, state monitoring, data indexing and the like, a uniform calling interface is provided for the outside, and the device is in seamless connection with a financial service platform.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
As shown in fig. 1, the method includes steps S102 to S106 as follows:
step S102, adding a second financial service user into a native block chain where a first financial service user is located;
the native blockchain generally refers to a public chain in which the first financial transaction user originally resides.
And adding the second financial service user to the public chain of the first financial service user, so that the second financial service user is added to the node of the block chain.
Step S104, recording the transaction service between the first financial service user and the second financial service user;
since the first financial service user and the second financial service user are linked, each node on the blockchain can record the transaction between the first financial service user and the second financial service user by broadcasting.
And step S106, obtaining the transaction record with sensitive information in the transaction service stored on the native block chain.
Transaction records with sensitive information in the transaction traffic are stored at each node on the native blockchain. Namely, sensitive information involved in transaction business is stored in a distributed mode through a block chain.
From the above description, it can be seen that the following technical effects are achieved by the present application:
in the embodiment of the application, a mode that a second financial service user is added into a native block chain where a first financial service user is located is adopted, and the purpose of obtaining the transaction record with sensitive information in the transaction service stored on the native block chain is achieved by recording the transaction service between the first financial service user and the second financial service user, so that the technical effect of the distributed storage record of the sensitive information is achieved, the security of transaction data is guaranteed, the falsification is prevented, and the traceability is realized, and the technical problem that the sensitive information in the financial service is not effectively processed is solved.
According to an embodiment of the present application, preferably, as shown in fig. 2, the recording of the transaction between the first financial service user and the second financial service user includes:
step S202, recording first sensitive information between a first financial service user and a second financial service user;
the first sensitive information is used as sensitive information related to transaction information.
The first sensitive information is recorded by each node on the blockchain.
Step S204, judging whether the first sensitive user information contains preset transaction sensitive information;
judging whether the first sensitive user information contains preset transaction sensitive information or not, and judging whether the first sensitive user information contains the preset transaction sensitive information: and (5) recording the borrowing of the user.
For example, the transaction information may relate to the user a borrowing 5 ten thousand dollars from the financial institution B.
For another example, the transaction information relates to the user a borrowing 5 ten thousand yuan from the financial institution B within the term a, and borrowing 2 ten thousand yuan from the financial institution B within the term B.
Judging whether the first sensitive user information contains preset transaction sensitive information or not, and judging whether the first sensitive user information contains the preset transaction sensitive information: the user borrows the record.
For example, the transaction information relates to 5 ten thousand yuan of external loan from the user B, the loan term is 5 months, and the lender is the user C.
For example, the transaction information relates to 5 ten thousand dollars of the user B being lent, the lender is the user C1, the transaction information relates to 6 ten thousand dollars of the user B being lent, and the lender is the user C2.
In step S206, if it is determined that the first sensitive user information includes the preset transaction sensitive information, the preset transaction sensitive information is stored in the user node on the primary block chain.
And if the preset transaction sensitive information, the user loan record or the user loan record is judged to belong to, storing the preset transaction sensitive information to the user node on the native block chain.
The user nodes have different operation viewing permissions, and particularly, the different viewing operation permissions can be set through workload.
According to an embodiment of the present application, preferably, as shown in fig. 3, the recording of the transaction between the first financial service user and the second financial service user includes:
step S302, recording second sensitive information between the first financial service user and the second financial service user;
the second sensitive information is used as sensitive information related to the user-friendly information.
The second sensitive information is recorded by each node on the blockchain.
Step S304, judging whether the second sensitive user information contains preset user sensitive information;
and judging whether the second sensitive user information contains preset user sensitive information, namely the user name.
For example, it may be the name of the user.
Also for example, a company name may be used.
And judging whether the second sensitive user information contains preset user sensitive information or not, wherein the preset user sensitive information can be the user identity.
For example, it may be the user's identification number.
Also for example, it may be an enterprise credit code.
And judging whether the second sensitive user information contains preset user sensitive information or not, wherein the preset user sensitive information can be a user contact way.
For example, the sensitive information that can be used for social contact, such as the user's phone, can be.
For another example, sensitive information such as enterprise credit codes that can be used for social credit may be used.
And judging whether the second sensitive user information contains preset user sensitive information or not, wherein the preset user sensitive information can be a financial payment consumption card bound with a user.
For example, it may be the user's bank card.
For another example, the account number may be an enterprise account number.
Step S306, if it is determined that there is preset user sensitive information in the second sensitive user information, storing the preset transaction sensitive information to a user node on the primary block chain.
And if the second sensitive user information meets the requirement that the second sensitive user information contains preset user sensitive information, storing the preset transaction sensitive information such as a user mobile phone number, a user name, a user bank card number and user identity card information to a user node on the native block chain.
By the block chain technology, safe and reliable data management is facilitated, and the possibility of tampering of user sensitive information and various risks are reduced. In addition, for financial businesses, the credibility of the business is increased, and since the blockchain technology can provide a natural credible distributed data platform, no additional third-party intermediary or credit investigation institution is needed.
By storing the preset user sensitive information to the user nodes on the target blockchain, the blockchain has distributed fault tolerance, the network is extremely robust, and the abnormal state of the nodes around 1/3 is fault-tolerant. Meanwhile, the block chain has non-tamper property: data of user sensitive information once submitted can exist all the time and cannot be destroyed or modified. Further, the blockchain has privacy protectiveness: the key ensures that unauthorized persons have access to the data but cannot resolve it.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
According to an embodiment of the present application, there is also provided an apparatus for implementing the sensitive information processing method for financial transactions, as shown in fig. 4, the apparatus including: the joining module 10 is used for joining the second financial service user to the native block chain where the first financial service user is located; the recording module 20 is used for recording the transaction business between the first financial business user and the second financial business user; and an obtaining module 30, configured to obtain a transaction record having sensitive information in the transaction traffic stored on the native blockchain.
The native block chain in the joining module 10 according to the embodiment of the present application generally refers to the original public chain where the first financial service user is located.
And adding the second financial service user to the public chain of the first financial service user, so that the second financial service user is added to the node of the block chain.
In the recording module 20 of the embodiment of the present application, since the first financial service user and the second financial service user are linked, each node on the blockchain can record the transaction between the first financial service user and the second financial service user by broadcasting.
In the obtaining module 30 of the embodiment of the present application, a transaction record having sensitive information in the transaction service is stored at each node on the native block chain. Namely, sensitive information involved in transaction business is stored in a distributed mode through a block chain.
According to the embodiment of the present application, preferably, as shown in fig. 5, the recording module 20 includes: a first recording unit 201, configured to record first sensitive information between a first financial service user and a second financial service user; a first judging unit 202, configured to judge whether there is preset transaction sensitive information in the first sensitive user information; and a first storage unit 203, configured to store the preset transaction sensitive information to a user node on a native block chain when it is determined that the first sensitive user information includes the preset transaction sensitive information.
The first sensitive information in the first recording unit 201 of the embodiment of the application is used as the sensitive information related to the transaction information.
The first sensitive information is recorded by each node on the blockchain.
In the first determining unit 202 of the embodiment of the application, it is determined whether the first sensitive user information includes the preset transaction sensitive information, and whether the preset transaction sensitive information exists is determined: and (5) recording the borrowing of the user.
For example, the transaction information may relate to the user a borrowing 5 ten thousand dollars from the financial institution B.
For another example, the transaction information relates to the user a borrowing 5 ten thousand yuan from the financial institution B within the term a, and borrowing 2 ten thousand yuan from the financial institution B within the term B.
Judging whether the first sensitive user information contains preset transaction sensitive information or not, and judging whether the first sensitive user information contains the preset transaction sensitive information: the user borrows the record.
For example, the transaction information relates to 5 ten thousand yuan of external loan from the user B, the loan term is 5 months, and the lender is the user C.
For example, the transaction information relates to 5 ten thousand dollars of the user B being lent, the lender is the user C1, the transaction information relates to 6 ten thousand dollars of the user B being lent, and the lender is the user C2.
In the first storage unit 203 of the embodiment of the present application, if it is determined that the predetermined transaction sensitive information, the user loan record or the user loan record belong to the above-mentioned predetermined transaction sensitive information, the predetermined transaction sensitive information is stored in the user node on the native block chain.
The user nodes have different operation viewing permissions, and particularly, the different viewing operation permissions can be set through workload.
According to the embodiment of the present application, preferably, as shown in fig. 6, the recording module 20 includes: the second recording unit 204 is used for recording second sensitive information between the first financial service user and the second financial service user; a second determining unit 205, configured to determine whether there is preset user sensitive information in the second sensitive user information; and a second storage unit 206, configured to store the preset transaction sensitive information to a user node on a native block chain when it is determined that there is preset user sensitive information in the second sensitive user information.
The second sensitive information in the second recording unit 204 of the embodiment of the application is used as the relevant sensitive information related to the user-friendly information.
The second sensitive information is recorded by each node on the blockchain.
In the second determining unit 205 of the embodiment of the application, it is determined whether there is preset user sensitive information in the second sensitive user information, that is, a user name.
For example, it may be the name of the user.
Also for example, a company name may be used.
And judging whether the second sensitive user information contains preset user sensitive information or not, wherein the preset user sensitive information can be the user identity.
For example, it may be the user's identification number.
Also for example, it may be an enterprise credit code.
And judging whether the second sensitive user information contains preset user sensitive information or not, wherein the preset user sensitive information can be a user contact way.
For example, the sensitive information that can be used for social contact, such as the user's phone, can be.
For another example, sensitive information such as enterprise credit codes that can be used for social credit may be used.
And judging whether the second sensitive user information contains preset user sensitive information or not, wherein the preset user sensitive information can be a financial payment consumption card bound with a user.
For example, it may be the user's bank card.
For another example, the account number may be an enterprise account number.
In the second storage unit 206 of the embodiment of the application, if it is determined that the second sensitive user information satisfies the requirement of the preset user sensitive information, the preset transaction sensitive information, such as the user mobile phone number, the user name, the user bank card number, and the user identification card information, is stored in the user node on the native block chain.
According to an embodiment of the present application, there is also provided a sensitive information processing client for financial services, including: the sensitive information processing device. The implementation principle and the beneficial effect of the sensitive information processing device are as described above, and are not described herein again.
Fig. 7 is a schematic diagram of a data architecture according to an embodiment of the present application, where the data architecture in the embodiment of the present application includes: the application interface layer is used for being in butt joint with the service interface and calling the sensitive information in the unified service logic layer; the unified service logic layer is used for storing and reading sensitive information; and the data storage layer is used for providing block chain data storage. The application interface layer includes: the method comprises the steps of presetting a user sensitive information acquisition interface and a transaction sensitive information acquisition interface.
In specific implementation, the data storage layer in the embodiment of the application adopts EthereumGeth which is an EtherFang official client, integrates a Web3J library, and provides a bottom-layer data storage basic service for the whole system.
The application interface layer comprises: a user information interface and a transaction information interface. The application interface layer in the embodiment of the application is the realization of actual business logic, is externally butted with a business system through a standard network service form, and internally calls the uniform business logic layer to complete the actual function.
The unified service logic layer comprises the following steps: the identity verification module can take the address as the identification of the verification identity, and the verifier can not change the address. Such as consensus mechanism related data formats.
The unified service logic layer comprises the following steps: and the certificate management module is used for managing the digital certificate. A digital certificate is a document containing public key owner information and a public key digitally signed by a certificate authority.
The unified service logic layer comprises the following steps: and the private key signature module is used for managing private keys of the private keys.
The unified service logic layer comprises the following steps: the transaction sending module is used for processing the data including the address of the initiator; a receiver address; the amount of business processing; a service processing cost;
the unified service logic layer comprises the following steps: the account management module is used for managing an account public key; an account private key; account assets, digital certificates, the institution to which the account belongs, etc.
The unified service logic layer comprises the following steps: the contract management module is used for managing the contract identification; a contract version number; a contract code; contract storage, etc.
The unified service logic layer in the embodiment of the application comprises functional modules such as identity authentication, private key signature, transaction sending and contract management, and realizes basic functions of information storage and reading through interaction with the block link nodes.
It will be apparent to those skilled in the art that the modules or steps of the present application described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present application is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. A sensitive information processing method for financial transactions, comprising:
adding a second financial service user into a native block chain where the first financial service user is located;
recording the transaction service between the first financial service user and the second financial service user; and
obtaining a transaction record having sensitive information in the transaction traffic stored on the native blockchain.
2. The sensitive information processing method of claim 1, wherein recording transaction traffic between the first financial transaction user and the second financial transaction user comprises:
recording first sensitive information between a first financial service user and a second financial service user;
judging whether the first sensitive user information contains preset transaction sensitive information or not; and
and if the first sensitive user information is judged to have the preset transaction sensitive information, storing the preset transaction sensitive information to a user node on the original block chain.
3. The sensitive information processing method of claim 1, wherein recording transaction traffic between the first financial transaction user and the second financial transaction user comprises:
recording second sensitive information between the first financial service user and the second financial service user;
judging whether the second sensitive user information contains preset user sensitive information or not; and
and if the second sensitive user information is judged to have the preset user sensitive information, storing the preset transaction sensitive information to a user node on the native block chain.
4. The sensitive information processing method of claim 1, wherein obtaining a transaction record having sensitive information in the transaction traffic stored on the native blockchain further comprises: an asymmetric encryption, the asymmetric encryption comprising: transaction data, digital signatures, or login authentication.
5. The sensitive information processing method according to claim 1, further comprising: recording transaction business between a first financial business user and a second financial business user by adopting a preset client, wherein the first financial business user and the second financial business user at least comprise: presetting user sensitive information, wherein the transaction service at least comprises the following steps: and presetting transaction sensitive information.
6. A sensitive information processing device for financial transaction is characterized in that,
the joining module is used for joining the second financial service user into the original block chain where the first financial service user is located;
the recording module is used for recording the transaction business between the first financial business user and the second financial business user; and
an obtaining module, configured to obtain a transaction record with sensitive information in the transaction traffic stored on the native blockchain.
7. The sensitive information processing apparatus of claim 6, wherein the recording module comprises:
the first recording unit is used for recording first sensitive information between a first financial service user and a second financial service user;
the first judging unit is used for judging whether the first sensitive user information contains preset transaction sensitive information or not; and
and the first storage unit is used for storing the preset transaction sensitive information to the user node on the original block chain when the first sensitive user information is judged to have the preset transaction sensitive information.
8. The sensitive information processing apparatus of claim 6, wherein the recording module comprises:
the second recording unit is used for recording second sensitive information between the first financial service user and the second financial service user;
the second judging unit is used for judging whether the second sensitive user information contains preset user sensitive information or not; and
and the second storage unit is used for storing the preset transaction sensitive information to the user node on the original block chain when the second sensitive user information is judged to have the preset user sensitive information.
9. A sensitive information processing client for financial transactions, comprising: the sensitive information processing apparatus of any of claims 6 to 8.
10. A data architecture, comprising:
the application interface layer is used for being in butt joint with the service interface and calling the sensitive information in the unified service logic layer;
the unified service logic layer is used for storing and reading sensitive information;
the data storage layer is used for providing block chain data storage;
wherein,
the application interface layer includes: the method comprises the steps of presetting a user sensitive information acquisition interface and a transaction sensitive information acquisition interface.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810601874.0A CN108875407A (en) | 2018-06-12 | 2018-06-12 | For the sensitive information processing method and processing device of financial business, client, data framework |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810601874.0A CN108875407A (en) | 2018-06-12 | 2018-06-12 | For the sensitive information processing method and processing device of financial business, client, data framework |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN108875407A true CN108875407A (en) | 2018-11-23 |
Family
ID=64338011
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810601874.0A Pending CN108875407A (en) | 2018-06-12 | 2018-06-12 | For the sensitive information processing method and processing device of financial business, client, data framework |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108875407A (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110135175A (en) * | 2019-04-26 | 2019-08-16 | 平安科技(深圳)有限公司 | Blockchain-based information processing, acquisition method, device, equipment and medium |
| CN110598463A (en) * | 2019-04-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
| CN113179324A (en) * | 2021-04-29 | 2021-07-27 | 中国人民银行数字货币研究所 | Block chain node and service processing method executed by same |
| CN117893213A (en) * | 2024-01-16 | 2024-04-16 | 温州城市一卡通服务有限公司 | A terminal communication data processing method for citizen card consumption |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
| CN106503995A (en) * | 2016-11-17 | 2017-03-15 | 中国银行股份有限公司 | A kind of data sharing method, source node, destination node and system |
| CN107180350A (en) * | 2017-03-31 | 2017-09-19 | 唐晓领 | A method, device and system for multi-party sharing of transaction metadata based on blockchain |
| CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
-
2018
- 2018-06-12 CN CN201810601874.0A patent/CN108875407A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
| CN106503995A (en) * | 2016-11-17 | 2017-03-15 | 中国银行股份有限公司 | A kind of data sharing method, source node, destination node and system |
| CN107180350A (en) * | 2017-03-31 | 2017-09-19 | 唐晓领 | A method, device and system for multi-party sharing of transaction metadata based on blockchain |
| CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110598463A (en) * | 2019-04-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
| WO2020211660A1 (en) * | 2019-04-19 | 2020-10-22 | 腾讯科技(深圳)有限公司 | Information processing method and device based on blockchain, and computer-readable storage medium |
| KR20210038658A (en) * | 2019-04-19 | 2021-04-07 | 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 | Blockchain-based information processing method and device and computer-readable storage medium |
| CN110598463B (en) * | 2019-04-19 | 2021-05-14 | 腾讯科技(深圳)有限公司 | Block chain-based information processing method and device and computer-readable storage medium |
| US11442912B2 (en) | 2019-04-19 | 2022-09-13 | Tencent Technology (Shenzhen) Company Limited | Blockchain-based information processing method and apparatus and computer-readable storage medium |
| KR102459318B1 (en) | 2019-04-19 | 2022-10-27 | 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 | Information processing method and device based on block chain and computer readable storage medium |
| CN110135175A (en) * | 2019-04-26 | 2019-08-16 | 平安科技(深圳)有限公司 | Blockchain-based information processing, acquisition method, device, equipment and medium |
| WO2020215685A1 (en) * | 2019-04-26 | 2020-10-29 | 平安科技(深圳)有限公司 | Block chain-based information processing and acquisition methods and apparatus, device, and medium |
| CN113179324A (en) * | 2021-04-29 | 2021-07-27 | 中国人民银行数字货币研究所 | Block chain node and service processing method executed by same |
| CN113179324B (en) * | 2021-04-29 | 2024-03-26 | 中国人民银行数字货币研究所 | Block chain link point and service processing method executed by block chain link point |
| CN117893213A (en) * | 2024-01-16 | 2024-04-16 | 温州城市一卡通服务有限公司 | A terminal communication data processing method for citizen card consumption |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20240104521A1 (en) | System and method for compliance-enabled digitally represented assets | |
| US11645632B2 (en) | System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies | |
| US11676117B2 (en) | Blockchain compliance verification network | |
| US12348642B2 (en) | Token-based identity validation via blockchain | |
| Lemieux | Trusting records: is Blockchain technology the answer? | |
| CN109886026B (en) | Data storage query method, device, computer system and readable storage medium | |
| US11196771B2 (en) | Multi-domain blockchain network with data flow control | |
| KR20010043332A (en) | System and method for electronic transmission, storage and retrieval of authenticated documents | |
| US12182800B2 (en) | API for incremental and periodic crypto asset transfer | |
| US20180308094A1 (en) | Time stamping systems and methods | |
| EP3510551A1 (en) | Multiparty reconciliation systems and methods | |
| CN112804218A (en) | Data processing method, device and equipment based on block chain and storage medium | |
| JPH09507729A (en) | Cryptographic system and method with key escrow function | |
| Erdem et al. | Blockchain for ensuring security, privacy, and trust in IoT environments: the state of the art | |
| US10956204B1 (en) | Free-riding node identification for blockchain | |
| US20230419309A1 (en) | Blockchain-based security token for kyc verification | |
| CN114254269A (en) | System and method for determining rights of biological digital assets based on block chain technology | |
| CN108875407A (en) | For the sensitive information processing method and processing device of financial business, client, data framework | |
| US12192364B1 (en) | Systems and methods for cybersecurity tokenization | |
| CN111177171A (en) | Service data authentication and management method and system based on block chain | |
| CN119271745A (en) | Credit data processing method, device and server based on alliance chain | |
| Basson | The right to privacy: how the proposed POPI Bill will impact data security in a Cloud Computing environment | |
| Goswami et al. | Self-sovereign identity to secure digital identity using blockchain technology | |
| Jondhale et al. | Blockchain in cloud computing: Design challenges | |
| Bhatt et al. | Operational risks in blockchain technology |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |