Internet finance safety link realization method based on block chaining encryption technology

A security link and implementation method technology, applied in the field of Internet financial security link implementation based on block chain encryption technology, can solve the problem of ensuring high-level business security, unable to prevent misappropriation of distributed denial of service attacks, unable to prevent intrusive operations, etc. problem, to achieve the effect of ensuring link security

Inactive Publication Date: 2017-02-22
广州爱电牛互联网科技有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) Distributed Denial of service (distributed denial of service attack) after embezzlement of public key certificate cannot be prevented;
[0010] (2) It cannot prevent intrusive operations initiated by hotlinking technology after stealing public key certificates;
[0011] (3) It cannot be identified in combination with the network environment used by the user;
[0012] (4) Cannot combine user personal information to ensure high-level business security;
[0013] (5) The operation security screening of the time axis cannot be performed in combination with historical login and current operation time;
[0014] (6) It is impossible to guarantee the correct sequence of handshakes for multiple Internet transactions within a transaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet finance safety link realization method based on block chaining encryption technology
  • Internet finance safety link realization method based on block chaining encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0032] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0033] Such as figure 1 and figure 2 As shown, firstly, the encrypted key block of the message header generated by the independent authentication and authorization method is combined with the message body, and the message is sent to the next link;

[0034] Secondly, the HTTPS protocol processing of self-authentication credentials uses the message identity system and dynamic link vector with sequence check before the TLS link is established ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an internet finance safety link realization method based on a block chaining encryption technology. The method is characterized in that a message head block encryption secret key provided by autonomous authentication service can be used in the process of a user buying financing products on the Internet; a TLS tunnel technology of HTTPS is put into service to ensure the link safety of the user; and the link-level safety certification is intensified through a dynamic link vector record verified under a vector protocol and a user identity system, thereby when a user buys lottery tickets at a web portal, personnel identify information, link vector information and authentication strategies are combined to ensure the reliability and stability of day-to-day business such as lottery ticket buying and payment in the network transmission in terms of security mechanism.

Description

technical field [0001] The invention relates to the technical field of Internet financial systems, in particular to a method for realizing a secure Internet financial link based on block link encryption technology. Background technique [0002] HTTP is an object-oriented protocol belonging to the application layer. It is suitable for distributed hypermedia information systems due to its simple and fast method. It was proposed in 1990, and after several years of use and development, it has been continuously improved and expanded. The sixth edition of HTTP / 1.0 is currently used in the WWW. The standardization of HTTP / 1.1 is in progress, and the proposal of HTTP-NG (Next Generation of HTTP) has been proposed. The HTTP protocol is based on the request / response paradigm. [0003] After a client establishes a connection with the server, it sends a request to the server. The format of the request is Uniform Resource Identifier, protocol version number, followed by MIME informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/083H04L63/029H04L63/0428H04L67/02H04L67/14
Inventor 周振于藜铭谭腾飞刘慧平鲁文凯
Owner 广州爱电牛互联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products