CN110223159A - Credit data query method, apparatus, computer equipment and storage medium - Google Patents

Credit data query method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN110223159A
CN110223159A CN201910427132.5A CN201910427132A CN110223159A CN 110223159 A CN110223159 A CN 110223159A CN 201910427132 A CN201910427132 A CN 201910427132A CN 110223159 A CN110223159 A CN 110223159A
Authority
CN
China
Prior art keywords
user
credit data
checked
credit
inquiry request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910427132.5A
Other languages
Chinese (zh)
Inventor
姜波
徐鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910427132.5A priority Critical patent/CN110223159A/en
Publication of CN110223159A publication Critical patent/CN110223159A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application involves field of artificial intelligence, are applied to financial industry, more particularly to a kind of credit data query method, apparatus, computer equipment and storage medium.Method in one embodiment includes: the credit customer documentation for obtaining each financial institution that financial institution's node collects;Credit customer documentation is verified, corresponding user's white list is obtained;The received credit data inquiry request of user node is obtained, is matched respectively in every part of user's white list according to the user identifier to be checked carried in credit data inquiry request, obtains the matching result of user identifier to be checked Yu single part of user's white list;Processing is overlapped to the matching result of user identifier to be checked and each single part of user's white list, obtains the corresponding credit data of user identifier to be checked.It by being handled to obtain user's white list to credit customer documentation, then is matched in white list by user to be checked, obtains corresponding credit data, the search efficiency to credit data can be improved.

Description

Credit data query method, apparatus, computer equipment and storage medium
Technical field
This application involves field of artificial intelligence, more particularly to a kind of credit data query method, apparatus, computer Equipment and storage medium.
Background technique
With the development of consumptive credit, the technical level for how improving consumptive credit risk management develops as financial institution Major issue during consumptive credit.Credit refers to that financial institution directly provides with funds support to client, or is having to client Close the behavior that the credit in economic activity is promised to third party.
And risk control is of great significance for the operation of each mechanism, each mechanism is carrying out the related industry of various risks control It during business, needs to collect relevant risk data, constructs Risk Control System, serve related service scene.Carrying out wind During dangerous control business, each mechanism often generates the demand of credit data query.However due to traditional credit data Inquiry needs to expend a large amount of manpower and material resources, leads to low efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of credit data query that can be improved working efficiency Method, apparatus, computer equipment and storage medium.
A kind of credit data query method is applied to block catenary system, and the block catenary system includes financial institution's node And user node, which comprises
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
The received credit data inquiry request of the user node is obtained, is carried according in the credit data inquiry request User identifier to be checked matched respectively in every part of user's white list, obtain the user identifier to be checked and single part of use The matching result of family white list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described The corresponding credit data of user identifier to be checked.
In one embodiment, after the acquisition received credit data inquiry request of user node, further includes:
It is corresponding block-identified to obtain the credit data inquiry request, wherein the credit data inquiry request carries The inquiry request time;
Obtain time shaft according to the inquiry request time, according to the time shaft to it is described it is block-identified be ranked up, Corresponding user identifier to be checked is obtained according to ranking results.
In one embodiment, before the acquisition received credit data inquiry request of user node, further includes:
The initiation credit data inquiry request user that the user node collects is obtained, to the initiation credit data query User is requested to carry out authentication;
Obtain the received credit data inquiry request of the user node, comprising:
When authentication passes through, obtains the received credit data inquiry request of the user node and the initiation is awarded The identity type of letter data inquiry request user;
The matching result to the user identifier to be checked and each single part of user's white list is overlapped processing, obtains After the corresponding credit data of the user identifier to be checked further include:
The credit data are fed back to the user according to the identity type for initiating credit data inquiry request user Node.
In one embodiment, after the acquisition received credit data inquiry request of user node, further includes:
Obtain the corresponding user right of user for initiating the credit data inquiry request;
It is described according to the user identifier to be checked carried in the credit data inquiry request in every part of user's white list It is matched respectively, obtains the matching result of the user identifier to be checked and single part of user's white list, comprising:
It is to be checked according to being carried in the credit data inquiry request when the user right belongs to default access range It askes user identifier to match respectively in every part of user's white list, obtains the user identifier to be checked and the single part of white name of user Single matching result.
In one embodiment, the matching result to the user identifier to be checked and each single part of user's white list into Row superposition processing, after obtaining the corresponding credit data of the user identifier to be checked, comprising:
Random number sequence is generated by random number algorithm;
The credit data are subjected to system conversion, according to the random number sequence from the credit data after system conversion Corresponding character is extracted, using the character of extraction as primary ciphertext;
The primary ciphertext is merged with the random number sequence, final ciphertext is obtained, passes through the final ciphertext The credit data are encrypted, encrypted credit data are obtained.
In one embodiment, described to merge the primary ciphertext with the random number sequence, it obtains final close Text, comprising:
It is separately added into default first connector between the every two character of the primary ciphertext, obtains the first ciphertext sequence Column;
To the random number sequence carry out system conversion, system conversion after random number sequence every two hand over word it Between be separately added into default second connector, obtain the second ciphertext sequence;
The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
In one embodiment, processing is overlapped to the object matching data, obtains the user identifier to be checked After corresponding credit data, further includes:
When the credit data are greater than default credit threshold value, obtain user to be checked and audited by the credit that credit is audited As a result.
A kind of credit data query device is applied to block catenary system, and the block catenary system includes financial institution's node And user node, described device include:
Data obtaining module, for obtaining the credit user's text for each financial institution that financial institution's node collects Shelves;
White list generation module obtains corresponding user's white list for verifying to the credit customer documentation;
Request processing module, for obtaining the received credit data inquiry request of the user node, according to the credit The user identifier to be checked carried in data inquiry request matches respectively in every part of user's white list, obtains described to be checked Ask the matching result of user identifier and single part of user's white list;
Credit data generation module, for the matching result to the user identifier to be checked and each single part of user's white list It is overlapped processing, obtains the corresponding credit data of the user identifier to be checked.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
The received credit data inquiry request of the user node is obtained, is carried according in the credit data inquiry request User identifier to be checked matched respectively in every part of user's white list, obtain the user identifier to be checked and single part of use The matching result of family white list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described The corresponding credit data of user identifier to be checked.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
The received credit data inquiry request of the user node is obtained, is carried according in the credit data inquiry request User identifier to be checked matched respectively in every part of user's white list, obtain the user identifier to be checked and single part of use The matching result of family white list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described The corresponding credit data of user identifier to be checked.
Above-mentioned credit data query method, apparatus, computer equipment and storage medium, pass through block chain technology, Ge Gejin Melt mechanism and upload respective credit customer documentation respectively, is verified based on credit customer documentation, obtain each financial institution pair The user's white list answered obtains the received credit data inquiry request of user node, carries according in credit data inquiry request User identifier to be checked matched in every part of user's white list, obtain user identifier to be checked and single part of user's white list Matching result, the matching result of user identifier to be checked and each single part of user's white list is overlapped processing, obtains to be checked The corresponding credit data of user identifier are matched in each user's white list by user identifier to be checked, then matching result are folded Add to obtain the corresponding credit data of user identifier to be checked, the search efficiency to credit data can be effectively improved in this way.
Detailed description of the invention
Fig. 1 is the applied environment figure of credit data query method in one embodiment;
Fig. 2 is the flow diagram of credit data query method in one embodiment;
Fig. 3 is the flow diagram of credit data query method in another embodiment;
Fig. 4 is the flow diagram of credit data encryption step in one embodiment;
Fig. 5 is the flow diagram of fusion treatment step in one embodiment;
Fig. 6 is the structural block diagram of credit data query device in one embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Credit data query method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, golden Melt mechanism terminal 102 and user terminal 104 to be communicated by network with block catenary system 106 respectively, block catenary system 106 Including financial institution's node 1061, data processing node 1062 and user node 1063.Financial institution staff can pass through Financial institution terminal uploads financial institution's node of respective credit customer documentation to block catenary system respectively.Data processing node The credit customer documentation for obtaining each financial institution, verifies credit customer documentation, obtains corresponding user's white list.With Credit data inquiry request is initiated in user terminal in family, and user identifier to be checked is carried in credit data inquiry request, and user is whole Credit data inquiry request is sent to the user node of block catenary system by end.Data processing node obtains credit data in real time and looks into Request is ask, user identifier to be checked is matched respectively in every part of user's white list, obtains user identifier to be checked and list The matching result of part user's white list is overlapped place to the matching result of user identifier to be checked and each single part of user's white list Reason, obtains the corresponding credit data of user identifier to be checked.Wherein, financial institution terminal 102 and user terminal 104 can with but It is not limited to various personal computers, laptop, smart phone and tablet computer, block catenary system 106 can be with independently The server cluster of server either multiple servers composition realize.Block chain is one kind sequentially in time by data A kind of block linked data structure for being combined into such a way that sequence is connected, and can not distorting of being guaranteed in a manner of cryptography and not The distributed account book that can be forged.Block catenary system is a kind of completely new distributed basis framework, using block linked data structure come Verifying and storing data are known together algorithm using distributed node to generate and more new data, are guaranteed number in the way of cryptography According to the safety of transmission and access, programmed using the intelligent contract being made of automatized script code and operation data.
In one embodiment, as shown in Fig. 2, providing a kind of credit data query method, it is applied in this way For block catenary system in Fig. 1, comprising the following steps:
Step 202, the credit customer documentation for each financial institution that financial institution's node collects is obtained.
Credit customer documentation refers to each financial institution according to the user information for meeting business demand of audit conditional filtering Document.For example A bank audits condition according to loan transaction, using the high-quality enterprise such as enterprise X1, X2, X3 as credit user, by it It is included in credit customer documentation;B bank is according to banking and insurance business business pushing condition, using the high-quality enterprise such as enterprise Y1, Y2, Y3 as awarding Credit household is included in credit customer documentation.
Step 204, credit customer documentation is verified, obtains corresponding user's white list.
User's white list refers to is allowed to log into the user information of row business processing for recording by financial institution.To credit Customer documentation is verified, for example checks whether credit customer documentation meets preset format;Duplicate removal processing is carried out, is removed duplicate User;It is authenticated according to the key word information in credit customer documentation to Third Party Authentication mechanism;The user of verification will be passed through Inventory is as user's white list.
Step 206, the received credit data inquiry request of user node is obtained, is carried according in credit data inquiry request User identifier to be checked matched respectively in every part of user's white list, obtain user identifier to be checked and single part of user be white The matching result of list.
Credit data inquiry request refers to by terminal user's initiation, carries out credit data query to user to be checked and asks It asks.For example user Z initiates credit data inquiry request, user to be checked can be user Z itself, be also possible to other users. For using user Z as user to be checked, carry out searching whether exist respectively in the corresponding user's white list of each financial institution User Z obtains the matching result of user Z Yu every part of user's white list.For example, existing when in user's white list of certain financial institution User Z, then otherwise it is 0 that the corresponding data value of object matching data, which is 1,.
Step 208, processing is overlapped to the matching result of user identifier to be checked and each single part of user's white list, obtained The corresponding credit data of user identifier to be checked.
For using user Z as user to be checked, searched respectively in the corresponding user's white list of each financial institution With the presence or absence of user Z, the matching result of user Z Yu every part of user's white list are obtained.For example, working as the white name of user of certain financial institution There are user Z in list, then otherwise it is 0 that the corresponding data value of matching result, which is 1,.By user to be checked and each financial institution User's white list matches respectively, obtains multiple matching results, matching result is added, and obtains that user to be checked is corresponding to be awarded Letter data.Than there are user Z in user's white list if any 10 financial institutions, then the corresponding credit data of user Z are 10.
Above-mentioned credit data query method, by block chain technology, each financial institution uploads respective credit user text Shelves, are verified based on credit customer documentation, obtain the corresponding user's white list of each financial institution, are obtained user node and are received Credit data inquiry request, according to the user identifier to be checked carried in credit data inquiry request in every part of user's white list In matched, the matching result of user identifier to be checked Yu single part of user's white list is obtained, to user identifier to be checked and each The matching result of single part of user's white list is overlapped processing, obtains the corresponding credit data of user identifier to be checked, by Inquiry user identifier matches in each user's white list, then matching result is superimposed to obtain the corresponding credit of user identifier to be checked Data can effectively improve the search efficiency to credit data.
In one embodiment, as shown in figure 3, also being wrapped after obtaining the received credit data inquiry request of user node It includes: step 303, it is corresponding block-identified to obtain credit data inquiry request, wherein credit data inquiry request carries inquiry and asks Seeking time;Step 304, time shaft is obtained according to the inquiry request time, is ranked up according to time shaft to block-identified, according to row Sequence result obtains corresponding user identifier to be checked.The inquiry request time refers to the time for issuing credit data inquiry request, than If terminal user can be multiple, the inquiry request time of terminal user's first is at 9 points in the morning 10 minutes and 30 seconds on December 25th, 2018, The inquiry request time of terminal user's second is at 9 points in the morning 10 minutes and 35 seconds on December 25th, 2018.It is block-identified to be looked into credit data Asking request has corresponding relationship, block-identified to can be used for identifying corresponding credit data inquiry request, for example, with Arabic number Word identifies different credit data inquiry requests.Specifically, according to chronological order, when forming credit data inquiry request Between axis, be ranked up block-identified on a timeline, obtain ranking results.
For example the inquiry request time of terminal user's first is at 9 points in the morning 10 minutes and 30 seconds on December 25th, 2018, terminal user The inquiry request time of second is at 9 points in the morning 10 minutes and 35 seconds on December 25th, 2018, is looked into according to the inquiry request time credit data It askes request to be ranked up, obtains the credit number that ranking results are the credit data inquiry request of terminal user's first, terminal user's second According to inquiry request.Then further according to the user identifier to be checked in the credit data inquiry request of terminal user's first in the white name of user Matching treatment is carried out in list, obtains the credit data of terminal user's first request inquiry;It is looked into according to the credit data of terminal user's second The user identifier to be checked ask in request carries out matching treatment in user's white list, obtains awarding for terminal user's second request inquiry Letter data.User's white list is that financial institution carries out credit appraisal to user, and wherein credit appraisal meets the user of business demand Inventory.For example in user's white list of block chain Shang You10Jia bank include certain user, illustrate that the user assert in 10 banks Meet credit condition, the corresponding credit data of the user are 10.
In one embodiment, before the acquisition received credit data inquiry request of user node, further includes: obtain user The initiation credit data inquiry request user that node collects carries out authentication to credit data inquiry request user is initiated;It obtains Take the received credit data inquiry request of user node, comprising: when authentication passes through, obtain the received credit of user node Data inquiry request and the identity type for initiating credit data inquiry request user;To user identifier to be checked and each single part of use The matching result of family white list is overlapped processing, after obtaining the corresponding credit data of user identifier to be checked further include: root Credit data are fed back to user node according to the identity type for initiating credit data inquiry request user.It obtains terminal and initiates credit number According to the identity type of inquiry request user, obtain to inquire according to the identity type that terminal initiates credit data inquiry request user Range of information sends credit data inquiry request to data processing node, and data processing node is according to initiation credit data query The corresponding query information range of the identity type of user is requested to feed back credit data to user node.For credit data query Safety can verify the identity of terminal user, and be set according to the terminal user of different identity classification different Query context for example, credit data are divided into two classifications of private data and public data, and sets two categorical datas Personnel query identity category, for example, ordinary enterprises user can only inquire public data, and enterprise supervision user can inquire secret Data and public data.
In one embodiment, after the acquisition received credit data inquiry request of user node, further includes: obtain and initiate The corresponding user right of the user of credit data inquiry request;According to the user to be checked mark carried in credit data inquiry request Knowledge matches respectively in every part of user's white list, obtains the matching knot of user identifier to be checked Yu single part of user's white list Fruit, comprising: when user right belongs to default access range, marked according to the user to be checked carried in credit data inquiry request Knowledge matches respectively in every part of user's white list, obtains the matching knot of user identifier to be checked Yu single part of user's white list Fruit.The user right that terminal initiates credit data inquiry request user is obtained, determines whether to carry out in user according to user right Matching treatment is carried out in white list, the user that only user right meets condition initiates credit data inquiry request and just will do it place Reason can reduce any user in this way and initiate inquiry request bring workload.
In one embodiment, as shown in figure 4, matching result to user identifier to be checked and each single part of user's white list It is overlapped processing, after obtaining the corresponding credit data of user identifier to be checked, comprising: step 402, pass through random number algorithm Generate random number sequence;Step 404, by credit data carry out system conversion, according to random number sequence from system conversion after awarding Corresponding character is extracted in letter data, using the character of extraction as primary ciphertext;Step 406, by primary ciphertext and random number sequence Column are merged, and are obtained final ciphertext, are encrypted by final ciphertext to credit data, obtain encrypted credit data. Wherein, random number algorithm specifically can be and obtained by formula a+rand () %n [a, a+n) random integers in range, Middle a is initial value, and n is the range of integer, and rand () function is a random function for generating random number.By credit data into 10 progress Binary Conversions are obtained 1010 by taking credit data 10 as an example by system of advancing conversion.For example random number sequence is (1,3), Corresponding character is extracted from the credit data after system conversion according to random number sequence, that is, extracts first and third position, obtains Character to extraction is 11, using the character of extraction as primary ciphertext.In order to ensure the safety of data, credit data are carried out Encryption, so that it is guaranteed that only credit data could be decrypted using key.After getting credit data, by credit number According to being stored on the node of block catenary system after encapsulation, in this way, credit data are transmitted and are deposited by block chain network Storage.It is just stored after encryption due to the credit data on block catenary system, it is stored in the node of block catenary system On credit Information Security be protected, one side credit data are not easy to be distorted by third party;On the other hand, unauthorized people Member is not easy to obtain credit data, is also not easy that encrypted credit data are decrypted, avoids leaking data.
In one embodiment, as shown in figure 5, primary ciphertext is merged with random number sequence, final ciphertext is obtained, Include: step 502, default first connector is separately added between the every two character of primary ciphertext, obtains the first ciphertext sequence Column;Step 504, to random number sequence carry out system conversion, system conversion after random number sequence every two hand over word it Between be separately added into default second connector, obtain the second ciphertext sequence;Step 506, the first ciphertext sequence and the second ciphertext are connected Sequence obtains final ciphertext.Default first connector may be the same or different with default second connector, connector tool Body can be "-", "+" etc..By taking credit data 10 as an example, 10 progress Binary Conversions are obtained 1010.Such as random number sequence For (1,3), corresponding character is extracted from the credit data after system conversion according to random number sequence, that is, extracts first and the Three, obtaining primary ciphertext is 11.Connector-is added between two characters of primary ciphertext, obtaining the first ciphertext sequence is 1-1.System conversion is carried out to random number sequence, is divided between two hand over words 1 and 11 of the random number sequence after system conversion Not Jia Ru connector-, obtain the second ciphertext sequence be 1-11.The first ciphertext sequence and the second ciphertext sequence are connected, is obtained final Ciphertext is 1-11-11.
In one embodiment, place is overlapped to the matching result of user identifier to be checked and each single part of user's white list Reason, after obtaining the corresponding credit data of user identifier to be checked, further includes: when credit data are greater than default credit threshold value, Obtain the credit auditing result that user to be checked is audited by credit.For example, user's white list is that bank carries out credit to user Evaluation, wherein credit appraisal meets user's inventory of business demand.Using other banks to the credit appraisal of user Z as certain bank User Z is carried out in credit audit condition, such as user's white list of block chain Shang You10Jia bank including user Z, explanation 10 banks assert that user Z meets credit condition, and credit data are 10.And bank's custom rule is to have 8 bank's letters Ren user, then the user is audited by credit.It therefore can be by inquiring other banks on block chain to the credit of user Evaluation is audited to complete the bank to the credit of user.
In one embodiment, credit customer documentation is verified, obtains user's white list, comprising: extracted credit and use Field information corresponding with default first field in the document of family;The similarity between every two field information is obtained, by similarity Two field informations more than preset threshold carry out duplicate removal processing;Field information after duplicate removal processing is subjected to fusion treatment, is obtained To user's white list of repetition-free word segment information.For example default first field can be User ID, corresponding field information can be with It is User ID value, when there are same subscriber ID record, only retains a record in same subscriber ID, it is identical to delete remaining User ID record, completes duplicate removal process.Data after duplicate removal are merged, the white name of user of repetition-free word segment information is generated Single, fusion can be merged using spatial manipulation tool, faster more stable compared to the speed that each data are written one by one.Meter The similarity between two field informations is calculated, for example two field informations can be converted into vector form, obtains two vectors, Then the cosine similarity of two vectors is calculated again, and cosine similarity is assessed by calculating the included angle cosine value of two vectors The similarity of the two.Cosine value illustrates that two field informations are more similar closer to 1;Closer to 0, then illustrate two fields Information is more dissimilar.When the similarity of two field informations is greater than preset threshold, such as when 90%, by similarity greater than 90% Two field informations regard as Repeating Field information.
In one embodiment, credit customer documentation is verified, obtains user's white list, comprising: extracted credit and use Field information corresponding with default second field in the document of family;Corresponding field information is sent to discrimination authority server;It connects The feedback result of discrimination authority server is received, and user's white list is obtained according to feedback result, wherein feedback result is device for identifying counterfeit The true and false result that structure server is inquired according to corresponding field information.For example default second field can be enterprise's work Quotient registers field, and corresponding field information can be the industrial and commercial registration information of the enterprise, extracts the enterprise in credit customer documentation Industrial and commercial registration information is sent to industrial and commercial bureau's query service device, is inquired by industrial and commercial bureau's query service device, and returns to inquiry knot The user is included in user's white list when confirming true by fruit.
It should be understood that although each step in the flow chart of Fig. 2-5 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-5 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, a kind of credit data query device is provided, block catenary system, block catenary system are applied to Including financial institution's node and user node, as shown in fig. 6, identification authentication system includes data obtaining module 602, white list Generation module 604, request processing module 606 and credit data generation module 608.Wherein, data obtaining module, for obtaining gold Melt the credit customer documentation for each financial institution that agency node collects.White list generation module, for credit customer documentation It is verified, obtains corresponding user's white list.Request processing module, for obtaining the received credit data query of user node Request, the progress respectively in every part of user's white list according to the user identifier to be checked carried in credit data inquiry request Match, obtains the matching result of user identifier to be checked Yu single part of user's white list.Credit data generation module, for to be checked The matching result of user identifier and each single part of user's white list is overlapped processing, obtains the corresponding credit of user identifier to be checked Data.
In one embodiment, it is corresponding block-identified to be also used to obtain credit data inquiry request for request processing module, Wherein, credit data inquiry request carries the inquiry request time;Time shaft is obtained according to the inquiry request time, according to time shaft pair It is block-identified to be ranked up, corresponding user identifier to be checked is obtained according to ranking results.
In one embodiment, the initiation credit data query that request processing module is also used to obtain that user node collects is asked User is asked, carries out authentication to credit data inquiry request user is initiated;When authentication passes through, obtains user node and connect The credit data inquiry request of receipts and the identity type for initiating credit data inquiry request user;Credit data generation module it After further include feedback module, for feeding back credit data to user according to the identity type for initiating credit data inquiry request user Node.
In one embodiment, request processing module be also used to obtain initiate credit data inquiry request user it is corresponding User right;When user right belongs to default access range, according to the user to be checked carried in credit data inquiry request Mark matches respectively in every part of user's white list, obtains the matching knot of user identifier to be checked Yu single part of user's white list Fruit.
It in one embodiment, further include encrypting module after credit data generation module, for passing through random number algorithm Generate random number sequence;Credit data are subjected to system conversion, according to random number sequence from the credit data after system conversion Corresponding character is extracted, using the character of extraction as primary ciphertext;Primary ciphertext is merged with random number sequence, is obtained most Whole ciphertext encrypts credit data by final ciphertext, obtains encrypted credit data.
In one embodiment, encrypting module is also used to be separately added into default between the every two character of primary ciphertext One connector obtains the first ciphertext sequence;System conversion is carried out to random number sequence, the random number sequence after system conversion It is separately added into default second connector between every two hand over word, obtains the second ciphertext sequence;Connect the first ciphertext sequence and Two ciphertext sequences, obtain final ciphertext.
It in one embodiment, further include credit auditing module after credit data generation module, for working as credit data When greater than default credit threshold value, the credit auditing result that user to be checked is audited by credit is obtained.
Specific about credit data query device limits the limit that may refer to above for credit data query method Fixed, details are not described herein.Modules in above-mentioned credit data query device can fully or partially through software, hardware and its Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 7.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing the number such as credit customer documentation, user's white list, credit data inquiry request, credit data According to.The network interface of the computer equipment is used to communicate with external terminal by network connection.The computer program is processed To realize a kind of credit data query method when device executes.
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, which performs the steps of when executing computer program obtains each gold that financial institution's node collects Melt the credit customer documentation of mechanism;Credit customer documentation is verified, corresponding user's white list is obtained;Obtain user node Received credit data inquiry request is white in every part of user according to the user identifier to be checked carried in credit data inquiry request It is matched respectively in list, obtains the matching result of user identifier to be checked Yu single part of user's white list;To user to be checked Mark and the matching result of each single part of user's white list are overlapped processing, obtain the corresponding credit number of user identifier to be checked According to.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains credit data query It requests corresponding block-identified, wherein credit data inquiry request carries the inquiry request time;It is obtained according to the inquiry request time Time shaft is ranked up according to time shaft to block-identified, obtains corresponding user identifier to be checked according to ranking results.
In one embodiment, acquisition user node is also performed the steps of when processor executes computer program to collect Initiation credit data inquiry request user, to initiate credit data inquiry request user carry out authentication;Work as authentication By when, obtain the received credit data inquiry request of user node and initiate the identity class of credit data inquiry request user Type;Credit data are fed back to user node according to the identity type for initiating credit data inquiry request user.
In one embodiment, acquisition is also performed the steps of when processor executes computer program initiates credit data The corresponding user right of the user of inquiry request;When user right belongs to default access range, asked according to credit data query It asks the user identifier to be checked of carrying to match respectively in every part of user's white list, obtains user identifier to be checked and list The matching result of part user's white list.
In one embodiment, it is also performed the steps of when processor executes computer program raw by random number algorithm At random number sequence;Credit data are subjected to system conversion, are mentioned from the credit data after system conversion according to random number sequence Corresponding character is taken, using the character of extraction as primary ciphertext;Primary ciphertext is merged with random number sequence, is obtained final Ciphertext encrypts credit data by final ciphertext, obtains encrypted credit data.
In one embodiment, it also performs the steps of when processor executes computer program every the two of primary ciphertext It is separately added into default first connector between a character, obtains the first ciphertext sequence;System conversion is carried out to random number sequence, It is separately added into default second connector between the every two hand over word of random number sequence after system conversion, obtains the second ciphertext sequence Column;The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
In one embodiment, it is also performed the steps of when processor executes computer program when credit data are greater than in advance If when credit threshold value, obtaining the credit auditing result that user to be checked is audited by credit.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of the credit user for obtaining each financial institution that financial institution's node collects when being executed by processor Document;Credit customer documentation is verified, corresponding user's white list is obtained;The received credit data of user node are obtained to look into Request is ask, the progress respectively in every part of user's white list according to the user identifier to be checked carried in credit data inquiry request Match, obtains the matching result of user identifier to be checked Yu single part of user's white list;To user identifier to be checked and each single part of user The matching result of white list is overlapped processing, obtains the corresponding credit data of user identifier to be checked.
In one embodiment, acquisition credit data are also performed the steps of when computer program is executed by processor to look into It is corresponding block-identified to ask request, wherein credit data inquiry request carries the inquiry request time;It is obtained according to the inquiry request time It to time shaft, is ranked up according to time shaft to block-identified, obtains corresponding user identifier to be checked according to ranking results.
In one embodiment, acquisition user node is also performed the steps of when computer program is executed by processor to return The initiation credit data inquiry request user of collection carries out authentication to credit data inquiry request user is initiated;When identity is recognized When card passes through, obtains the received credit data inquiry request of user node and initiate the identity of credit data inquiry request user Type;Credit data are fed back to user node according to the identity type for initiating credit data inquiry request user.
In one embodiment, acquisition is also performed the steps of when computer program is executed by processor initiates credit number According to the corresponding user right of the user of inquiry request;When user right belongs to default access range, according to credit data query The user identifier to be checked carried in request matches respectively in every part of user's white list, obtain user identifier to be checked with The matching result of single part of user's white list.
In one embodiment, it is also performed the steps of when computer program is executed by processor and passes through random number algorithm Generate random number sequence;Credit data are subjected to system conversion, according to random number sequence from the credit data after system conversion Corresponding character is extracted, using the character of extraction as primary ciphertext;Primary ciphertext is merged with random number sequence, is obtained most Whole ciphertext encrypts credit data by final ciphertext, obtains encrypted credit data.
In one embodiment, it also performs the steps of when computer program is executed by processor in the every of primary ciphertext It is separately added into default first connector between two characters, obtains the first ciphertext sequence;System conversion is carried out to random number sequence, It is separately added into default second connector between the every two hand over word of the random number sequence after system conversion, obtains the second ciphertext Sequence;The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
In one embodiment, it is also performed the steps of when computer program is executed by processor when credit data are greater than When default credit threshold value, the credit auditing result that user to be checked is audited by credit is obtained.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of credit data query method, be applied to block catenary system, the block catenary system include financial institution's node with And user node, which comprises
Obtain the credit customer documentation for each financial institution that financial institution's node collects;
The credit customer documentation is verified, corresponding user's white list is obtained;
Obtain the received credit data inquiry request of the user node, according to carried in the credit data inquiry request to Inquiry user identifier matches respectively in every part of user's white list, obtains the user identifier to be checked and single part of user is white The matching result of list;
Processing is overlapped to the matching result of the user identifier to be checked and each single part of user's white list, is obtained described to be checked Ask the corresponding credit data of user identifier.
2. the method according to claim 1, wherein the acquisition received credit data of user node are looked into It askes after requesting, further includes:
It is corresponding block-identified to obtain the credit data inquiry request, wherein the credit data inquiry request carries inquiry Request time;
Obtain time shaft according to the inquiry request time, according to the time shaft to it is described it is block-identified be ranked up, according to Ranking results obtain corresponding user identifier to be checked.
3. the method according to claim 1, wherein the acquisition received credit data of user node are looked into It askes before requesting, further includes:
The initiation credit data inquiry request user that the user node collects is obtained, to the initiation credit data inquiry request User carries out authentication;
Obtain the received credit data inquiry request of the user node, comprising:
When authentication passes through, the received credit data inquiry request of the user node and the initiation credit number are obtained It is investigated that asking the identity type of user;
The matching result to the user identifier to be checked and each single part of user's white list is overlapped processing, obtains described After the corresponding credit data of user identifier to be checked, further includes:
The credit data are fed back to the user node according to the identity type for initiating credit data inquiry request user.
4. the method according to claim 1, wherein the acquisition received credit data of user node are looked into It askes after requesting, further includes:
Obtain the corresponding user right of user for initiating the credit data inquiry request;
It is described to be distinguished in every part of user's white list according to the user identifier to be checked carried in the credit data inquiry request It is matched, obtains the matching result of the user identifier to be checked and single part of user's white list, comprising:
When the user right belongs to default access range, according to the use to be checked carried in the credit data inquiry request Family mark matches respectively in every part of user's white list, obtains the user identifier to be checked and single part of user's white list Matching result.
5. the method according to claim 1, wherein described to the user identifier to be checked and each single part of user The matching result of white list is overlapped processing, after obtaining the corresponding credit data of the user identifier to be checked, comprising:
Random number sequence is generated by random number algorithm;
The credit data are subjected to system conversion, are extracted from the credit data after system conversion according to the random number sequence Corresponding character, using the character of extraction as primary ciphertext;
The primary ciphertext is merged with the random number sequence, final ciphertext is obtained, by the final ciphertext to institute It states credit data to be encrypted, obtains encrypted credit data.
6. according to the method described in claim 5, it is characterized in that, it is described by the primary ciphertext and the random number sequence into Row fusion, obtains final ciphertext, comprising:
It is separately added into default first connector between the every two character of the primary ciphertext, obtains the first ciphertext sequence;
System conversion is carried out to the random number sequence, is divided between the every two hand over word of the random number sequence after system conversion The second connector Jia Ru not be preset, the second ciphertext sequence is obtained;
The first ciphertext sequence and the second ciphertext sequence are connected, final ciphertext is obtained.
7. the method according to claim 1, wherein to the user identifier to be checked and the white name of each single part of user Single matching result is overlapped processing, after obtaining the corresponding credit data of the user identifier to be checked, further includes:
When the credit data are greater than default credit threshold value, the credit audit knot that user to be checked is audited by credit is obtained Fruit.
8. a kind of credit data query device, be applied to block catenary system, the block catenary system include financial institution's node with And user node, which is characterized in that described device includes:
Data obtaining module, for obtaining the credit customer documentation for each financial institution that financial institution's node collects;
White list generation module obtains corresponding user's white list for verifying to the credit customer documentation;
Request processing module, for obtaining the received credit data inquiry request of the user node, according to the credit data The user identifier to be checked carried in inquiry request matches respectively in every part of user's white list, obtains the use to be checked The matching result of family mark and single part of user's white list;
Credit data generation module is carried out for the matching result to the user identifier to be checked and each single part of user's white list Superposition processing obtains the corresponding credit data of the user identifier to be checked.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910427132.5A 2019-05-22 2019-05-22 Credit data query method, apparatus, computer equipment and storage medium Pending CN110223159A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910427132.5A CN110223159A (en) 2019-05-22 2019-05-22 Credit data query method, apparatus, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910427132.5A CN110223159A (en) 2019-05-22 2019-05-22 Credit data query method, apparatus, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110223159A true CN110223159A (en) 2019-09-10

Family

ID=67821694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910427132.5A Pending CN110223159A (en) 2019-05-22 2019-05-22 Credit data query method, apparatus, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110223159A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369337A (en) * 2020-02-21 2020-07-03 深圳微众信用科技股份有限公司 Credit wind control system, method, equipment and medium based on block chain
CN111767557A (en) * 2020-06-22 2020-10-13 重庆渝抗医药科技有限公司 Data encryption working method based on block chain
CN112100226A (en) * 2020-09-18 2020-12-18 腾讯科技(深圳)有限公司 Data query method and computer-readable storage medium
CN112182107A (en) * 2020-09-29 2021-01-05 中国平安财产保险股份有限公司 Method and device for acquiring list data, computer equipment and storage medium
CN112200578A (en) * 2020-09-23 2021-01-08 裴俊伟 Financial service checking method and financial service checking platform based on block chain
CN113778950A (en) * 2021-08-24 2021-12-10 中国联合网络通信集团有限公司 Credit file obtaining method, index server, query server and medium
CN113836502A (en) * 2021-08-02 2021-12-24 上海盛付通电子支付服务有限公司 Method, apparatus, medium, and program product for re-identifying user information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070012757A1 (en) * 2005-07-14 2007-01-18 First Data Corporation Identity verification switch
CN106611372A (en) * 2016-12-27 2017-05-03 深圳微众税银信息服务有限公司 Credit investigation data query method and credit investigation data query system
CN108932297A (en) * 2018-06-01 2018-12-04 阿里巴巴集团控股有限公司 A kind of data query, data sharing method, device and equipment
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070012757A1 (en) * 2005-07-14 2007-01-18 First Data Corporation Identity verification switch
CN106611372A (en) * 2016-12-27 2017-05-03 深圳微众税银信息服务有限公司 Credit investigation data query method and credit investigation data query system
CN108932297A (en) * 2018-06-01 2018-12-04 阿里巴巴集团控股有限公司 A kind of data query, data sharing method, device and equipment
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369337A (en) * 2020-02-21 2020-07-03 深圳微众信用科技股份有限公司 Credit wind control system, method, equipment and medium based on block chain
CN111369337B (en) * 2020-02-21 2023-12-01 深圳微众信用科技股份有限公司 Block chain-based trust air control system, method, equipment and medium
CN111767557A (en) * 2020-06-22 2020-10-13 重庆渝抗医药科技有限公司 Data encryption working method based on block chain
CN111767557B (en) * 2020-06-22 2021-07-30 王仁义 Data encryption working method based on block chain
CN112100226A (en) * 2020-09-18 2020-12-18 腾讯科技(深圳)有限公司 Data query method and computer-readable storage medium
CN112200578A (en) * 2020-09-23 2021-01-08 裴俊伟 Financial service checking method and financial service checking platform based on block chain
CN112182107A (en) * 2020-09-29 2021-01-05 中国平安财产保险股份有限公司 Method and device for acquiring list data, computer equipment and storage medium
CN112182107B (en) * 2020-09-29 2023-11-03 中国平安财产保险股份有限公司 List data acquisition method, device, computer equipment and storage medium
CN113836502A (en) * 2021-08-02 2021-12-24 上海盛付通电子支付服务有限公司 Method, apparatus, medium, and program product for re-identifying user information
CN113778950A (en) * 2021-08-24 2021-12-10 中国联合网络通信集团有限公司 Credit file obtaining method, index server, query server and medium
CN113778950B (en) * 2021-08-24 2023-07-04 中国联合网络通信集团有限公司 Method for acquiring trusted file, index server, query server and medium

Similar Documents

Publication Publication Date Title
CN110223159A (en) Credit data query method, apparatus, computer equipment and storage medium
US10341123B2 (en) User identification management system and method
Khan et al. A blockchain ethereum technology-enabled digital content: development of trading and sharing economy data
US11876911B2 (en) Blockchain based alias interaction processing
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
CN110599137A (en) Electronic bill data processing method and device and computer equipment
CN112003858B (en) Block chain-based platform docking method, electronic device and storage medium
CN110365670A (en) Blacklist sharing method, device, computer equipment and storage medium
CN108876133A (en) Risk assessment processing method, device, server and medium based on business information
CN113222606B (en) Safe transaction execution method based on intelligent contract
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN111127205B (en) Intelligent contract generation method and device, computer equipment and storage medium
CN109359485A (en) Invoice data shared system and method based on block chain
CN111127150B (en) Intelligent contract demand matching method and device based on block chain and computer equipment
CN110489393A (en) Promise breaking information query method, device, computer equipment and storage medium
CN109587154A (en) Digital identity verification method, device, computer equipment and storage medium
US20210217098A1 (en) Blockchain-based message services for time-sensitive events
US20230006819A1 (en) Systems and methods for homomorphic encryption-based triggering
CN110223075B (en) Identity authentication method and device, computer equipment and storage medium
US20210217100A1 (en) Storage management based on message feedback
CN111444416A (en) Method, system and device for popularizing financial business
CN112199694A (en) Standardized bill processing method and device, electronic device and storage medium
KR20210041980A (en) The block chain private key generation system using smart devices with KYC data and biometric information
CN111861476B (en) Malicious associated transaction monitoring method and device based on blockchain and computer equipment
US20230024789A1 (en) Split Secret Cryptography Based Security in IoT Implemented Payment Transactions or Credentials

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination