CN111932364A - Puff financial system for protecting business secret - Google Patents
Puff financial system for protecting business secret Download PDFInfo
- Publication number
- CN111932364A CN111932364A CN202010800745.1A CN202010800745A CN111932364A CN 111932364 A CN111932364 A CN 111932364A CN 202010800745 A CN202010800745 A CN 202010800745A CN 111932364 A CN111932364 A CN 111932364A
- Authority
- CN
- China
- Prior art keywords
- module
- user
- amount
- loan
- encryption information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a general financial system for protecting commercial confidentiality, which comprises a user module, a business system module, a plurality of loan institution modules and a joint calculation module; the user module generates a key pair and sends the public key and the user ID to the service system module; the business system module sends the public key and the user ID to the loan institution module; the loan institution module homomorphically encrypts the queried loan amount of the user to obtain first amount encryption information, and sends the first amount encryption information, the user ID and the public key to the joint calculation module; the joint calculation module performs homomorphic encryption on the first amount encryption information to obtain second amount encryption information and sends the second amount encryption information to the service system module; the service system module sends the second amount encryption information to the user module; and the user module decrypts the second amount encryption information to obtain the total loan amount. The invention relates to a general financial system for protecting business confidentiality, which queries the total loan amount of a user in a plurality of loan institutions through a homomorphic encryption algorithm.
Description
Technical Field
The invention relates to a kind of general financial system for protecting business secret.
Background
At present, the mainstream financial system mostly adopts a centralized data hosting and processing mode, and has the following problems:
1. data are managed in a centralized mode at a data provider side, are stored and maintained independently, cannot be transferred and effectively utilized mutually, form data isolated islands, and cannot mine the value of the data.
2. Under some scenes that a plurality of data providers are needed to cooperate, a centralized processing mode is mostly adopted, and the data providers can not cooperate and share effectively due to the worry about the leakage problem of data in the transmission and calculation processes.
3. The centralized data processing mode has the problem of data caching, and one party processing data can cache more and more data, so that the risk of data leakage exists.
4. The centralized mode has the problems of data counterfeiting, opaque supervision and evidence obtaining difficulty.
Disclosure of Invention
The invention provides a general financial system for protecting business confidentiality, which adopts the following technical scheme:
a commercial priory financial system for protecting business secrets comprising: the system comprises a user module, a business system module, a plurality of loan institution modules and a joint calculation module;
the user module generates a disposable key pair for the query, wherein the key pair comprises a public key and a private key, and the user module sends the public key and the user ID to the service system module;
the business system module sends the public key and the user ID to the plurality of loan institution modules;
the loan institution modules inquire the loan amount of the user loaned in the loan institution according to the user ID, homomorphically encrypt the loan amount through the public key to obtain first amount encryption information, and send the first amount encryption information, the user ID and the public key to the joint calculation module;
the joint calculation module performs homomorphic encryption on the received first amount encryption information through a public key to obtain second amount encryption information and sends the second amount encryption information to the service system module;
the service system module sends the second amount encryption information to the user module;
and the user module decrypts the second amount encrypted information through a private key to obtain the total loan amount, wherein the total loan amount is the sum of the amounts of the user loans in all loan institutions.
Further, the user module generates a key pair by the RSA algorithm.
Further, the joint calculation module is an intelligent contract running in the block chain;
the data transmitted to the intelligent contract and the encryption result of the intelligent contract are stored in the block chain.
Furthermore, after the intelligent contract receives the first amount encryption information, the first amount encryption information is multiplied to obtain second amount encryption information.
Further, the system for protecting commercial secrets further comprises:
and the supervision module is used for checking the result of the query according to the query request sent by the user module.
Further, when the user disagrees with the total loan amount decrypted by the user module, the private key is sent to the supervision module through the user module;
the monitoring module acquires first amount encryption information uploaded to the intelligent contract by the plurality of loan institution modules from the block chain, decrypts each first amount encryption information through a private key to obtain the amount of loan of the user in each loan institution, adds the obtained amounts of loan of the user in each loan institution to obtain a query result, and sends the query result to the user module.
Further, the user module transmits the private key to the supervision module through the ECDH algorithm.
Further, the loan institution module comprises a bank end module and a small-amount loan end module.
Further, the user module sends the decrypted loan total to the service system module.
The invention has the advantages that the provided general financial system for protecting the business confidentiality uses a homomorphic encryption algorithm to inquire the total amount of loan of the user at each loan institution through the user module. The total amount can reflect the total loan condition of the user and can also avoid revealing the specific amount of the loan of the user at each loan institution. Under the condition that original data are not leaked, all loan institutions realize multiparty joint calculation, protect business confidentiality and complete circulation of multiparty data.
The beneficial effects of the invention are that the provided popular financial system for protecting business confidentiality carries out joint calculation and data chaining through the intelligent contract, thereby ensuring the open transparency and neutrality of the calculation process and solving the trust problem among multiple parties. The data disclosed by the intelligent contract is encrypted data, and can be decrypted only by the private key of the user module, so that each loan institution in the system cannot recover the real loan amount.
Drawings
FIG. 1 is a schematic diagram of a Puff finance system of the present invention for protecting business secrets.
The system comprises a general financial system 100 for protecting business confidentiality, a user module 10, a business system module 20, a loan institution module 30, a joint calculation module 40 and a supervision module 50.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
FIG. 1 shows a commercial-secret protection financial system 100, which mainly comprises: a user module 10, a business system module 20, a plurality of loan institution modules 30, and a joint calculation module 40. The user module 10, the loan institution module 30 and the joint calculation module 40 are all connected with the service system module 20, and the loan institution module 30 is connected with the joint calculation module 40. The user who needs to loan generates a key pair for the query offline through the user module 10, where the key pair includes a public key and a private key. The key pair is disposable and is used for only one traffic flow and multi-party joint calculation. After the key pair is generated, the public key and the user ID are transmitted to the service system module 20 through the user module 10. The user ID is a user identification ID, which may be a user identification number or the like. The business system module 20 is a public query platform, and workers of the loan institution can log in the platform to query the loan condition of the user who wants to loan. For example, when the user goes to an agricultural bank to make a loan, the staff member of the agricultural bank logs in the service system module 20. After receiving the public key and the user ID sent by the user, the staff of the agricultural bank initiates a joint calculation request through the service system module 20, that is, sends the public key and the user ID to the plurality of loan institution modules 30 respectively. In the invention, the loan institutions are embodied by various large banks and small-amount loan companies. The lending institution module 30 thus includes in particular a bank end module and a low-value lending end module. After receiving the public key and the user ID sent by the service system module 20, the loan institution modules 30 perform query operations. Specifically, the loan institution module 30 queries the loan amount of the user loaned in the loan institution according to the user ID, and after the specific loan amount is queried, performs homomorphic encryption on the loan amount through the public key to obtain first amount encryption information, and sends the first amount encryption information, the user ID and the public key to the joint calculation module 40. The joint calculation module 40 homomorphically encrypts the received first amount encryption information through the public key to obtain second amount encryption information and sends the second amount encryption information to the service system module 20. The service system module 20 transmits the second amount encryption information to the user module 10. The user module 10 decrypts the second amount encrypted information by the private key to obtain the total loan amount, wherein the total loan amount is the sum of the amounts of the user loans in all loan institutions. The user can show the total loan amount to the staff of the agricultural bank, or the user module 10 can send the decrypted total loan amount to the business system module 20, and the staff of the agricultural bank can check the total loan amount from the business system module 20, and further check the user according to the total loan amount of the user, and determine whether to offer the loan to the user.
That is, the final query result obtained by the system 100 for protecting business confidentiality of the present invention is the total amount of loans made by the user at all loan institutions, so that the user who does not want to disclose the amount of loans made by the loan institution will not be obtained by other loan institutions, and the confidentiality of information is ensured.
Further, federated computation module 40 is an intelligent contract running in a blockchain. The data transmitted to the intelligent contract and the encryption result of the intelligent contract are stored in the block chain. The joint calculation module 40 is mainly realized by a block chain intelligent contract, and all interactive input parameters, calculation results and the like of the intelligent contract are permanently stored on the block chain, so that the public transparency and traceability of calculation are ensured.
Further, in the present invention, the user module 10 generates a key pair by the RSA algorithm. And after receiving the plurality of first amount encryption information, the intelligent contract multiplies the plurality of first amount encryption information to obtain second amount encryption information. After the user module 10 receives the second amount encrypted information, the second amount encrypted information can be decrypted through the private key to obtain the total amount of the loan of the user module in all loan institutions.
In a preferred embodiment, the system 100 for protecting commercial secrets further comprises: a supervision module 50.
The supervision module 50 is configured to check the result of the query according to the query request sent by the user module 10.
Specifically, the user knows the loan amount of the user at each loan institution, so that when the user disagrees with the total loan amount decrypted by the user module 10, the private key can be sent to the supervision module 50 through the user module 10, and specifically, the user module 10 transmits the private key to the supervision module 50 through the ECDH algorithm. The supervision module 50 obtains the first amount encryption information uploaded to the intelligent contract by the plurality of loan institution modules 30 from the block chain, decrypts each first amount encryption information by a private key to obtain the amount of loan of the user in each loan institution, adds the obtained amounts of loan of the user in each loan institution to obtain a query result, and sends the query result to the user module 10. The user may compare the query result with the total loan amount to determine whether the previously calculated total loan amount is incorrect.
Alternatively, in real time, the administration module 50 may send the decrypted amount of the user's loan at each lending institution to the user module 10 so that the user can specifically determine which lending institution's data may be in question.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.
Claims (9)
1. A commercial secure boon financial system, comprising: the system comprises a user module, a business system module, a plurality of loan institution modules and a joint calculation module;
the user module generates a disposable key pair for the query, the key pair comprises a public key and a private key, and the user module sends the public key and the user ID to the service system module;
the business system module sends the public key and the user ID to a plurality of loan institution modules;
the plurality of loan institution modules inquire the loan amount of the user loaned in the loan institution according to the user ID, homomorphically encrypt the loan amount through the public key to obtain first amount encryption information, and send the first amount encryption information, the user ID and the public key to the joint calculation module;
the joint calculation module performs homomorphic encryption on the received first amount encryption information through the public key to obtain second amount encryption information and sends the second amount encryption information to the service system module;
the service system module sends the second amount encryption information to the user module;
and the user module decrypts the second amount encryption information through the private key to obtain the total loan amount, wherein the total loan amount is the sum of the amounts of loans of the user in all loan institutions.
2. A commercial secret protecting boomerang financial system in accordance with claim 1,
the user module generates the key pair by an RSA algorithm.
3. A commercial secret protecting boomerang financial system in accordance with claim 2,
the joint calculation module is an intelligent contract running in a block chain;
the data transmitted to the intelligent contract and the encryption result of the intelligent contract are stored in a block chain.
4. A commercial secret protecting boomerang financial system in accordance with claim 3,
and after receiving the plurality of first amount encryption information, the intelligent contract multiplies the plurality of first amount encryption information to obtain the second amount encryption information.
5. A commercial secret protecting boomerang financial system in accordance with claim 4,
the commercial-secret-protecting boon financial system further comprises:
and the supervision module is used for checking the result of the query according to the query request sent by the user module.
6. A commercial secret protecting boomerang financial system in accordance with claim 5,
when the user disagrees with the total loan amount decrypted by the user module, the private key is sent to the supervision module through the user module;
the monitoring module acquires the first amount encryption information uploaded to the intelligent contract by the loan institution modules from the block chain, decrypts the first amount encryption information by the private key to obtain the loan amount of the user in each loan institution, adds the obtained loan amounts of the user in each loan institution to obtain a query result, and sends the query result to the user module.
7. A commercial secret protecting boomerang financial system in accordance with claim 6,
and the user module transmits the private key to the supervision module through an ECDH algorithm.
8. A commercial secret protecting boomerang financial system in accordance with claim 1,
the loan institution module comprises a bank end module and a small-amount loan end module.
9. A commercial secret protecting boomerang financial system in accordance with claim 1,
and the user module sends the decrypted loan total to the service system module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010800745.1A CN111932364A (en) | 2020-08-11 | 2020-08-11 | Puff financial system for protecting business secret |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010800745.1A CN111932364A (en) | 2020-08-11 | 2020-08-11 | Puff financial system for protecting business secret |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111932364A true CN111932364A (en) | 2020-11-13 |
Family
ID=73310246
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010800745.1A Pending CN111932364A (en) | 2020-08-11 | 2020-08-11 | Puff financial system for protecting business secret |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111932364A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726767A (en) * | 2021-08-27 | 2021-11-30 | 交通银行股份有限公司 | Block chain based distributed multi-party privacy computing system and method |
CN116527230A (en) * | 2023-07-03 | 2023-08-01 | 湖南君创融信科技有限公司 | Financial credit information data leakage prevention method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682983A (en) * | 2016-12-29 | 2017-05-17 | 深圳市喜悦智慧实验室有限公司 | Loan management system and method base on smart contract |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN107330678A (en) * | 2017-06-06 | 2017-11-07 | 上海凭安征信服务有限公司 | It is a kind of to hide the method that scattered loan value obtains loan summation based on what additive homomorphism was encrypted |
CN109064309A (en) * | 2018-07-02 | 2018-12-21 | 浙江大学 | A kind of small micro- loan transaction system and method for commerce based on alliance's chain |
CN111127188A (en) * | 2019-12-20 | 2020-05-08 | 江苏荣泽信息科技股份有限公司 | Block chain-based general financial service platform and method |
-
2020
- 2020-08-11 CN CN202010800745.1A patent/CN111932364A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682983A (en) * | 2016-12-29 | 2017-05-17 | 深圳市喜悦智慧实验室有限公司 | Loan management system and method base on smart contract |
CN106845960A (en) * | 2017-01-24 | 2017-06-13 | 上海亿账通区块链科技有限公司 | Method for secure transactions and system based on block chain |
CN107330678A (en) * | 2017-06-06 | 2017-11-07 | 上海凭安征信服务有限公司 | It is a kind of to hide the method that scattered loan value obtains loan summation based on what additive homomorphism was encrypted |
CN109064309A (en) * | 2018-07-02 | 2018-12-21 | 浙江大学 | A kind of small micro- loan transaction system and method for commerce based on alliance's chain |
CN111127188A (en) * | 2019-12-20 | 2020-05-08 | 江苏荣泽信息科技股份有限公司 | Block chain-based general financial service platform and method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726767A (en) * | 2021-08-27 | 2021-11-30 | 交通银行股份有限公司 | Block chain based distributed multi-party privacy computing system and method |
CN113726767B (en) * | 2021-08-27 | 2023-09-12 | 交通银行股份有限公司 | Distributed multi-party privacy computing system and method based on blockchain |
CN116527230A (en) * | 2023-07-03 | 2023-08-01 | 湖南君创融信科技有限公司 | Financial credit information data leakage prevention method and system |
CN116527230B (en) * | 2023-07-03 | 2023-09-15 | 湖南君创融信科技有限公司 | Financial credit information data leakage prevention method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108282459B (en) | Data transmission method and system based on intelligent contract | |
CN111475796B (en) | Anti-quantum computation identity authentication method and system based on secret sharing and quantum communication service station | |
CN108830601A (en) | Smart city information security application method and system based on block chain | |
CN101569132B (en) | Systems and methods for distributing and securing data | |
CN107911216A (en) | A kind of block chain transaction method for secret protection and system | |
WO2019007396A1 (en) | Method and device for conducting encrypted transaction based on smart contract, and blockchain | |
CN110474893A (en) | A kind of isomery is across the close state data safety sharing method of trust domain and system | |
CN106961336A (en) | A kind of key components trustship method and system based on SM2 algorithms | |
CN112367170B (en) | Data hiding query security sharing system and method based on multi-party security calculation | |
CN110807206B (en) | College certificate storage management system based on block chain and attribute password | |
CN111275202A (en) | Machine learning prediction method and system for data privacy protection | |
CN111461712B (en) | Transaction privacy protection and hierarchical supervision in blockchain supply chain financial scenarios | |
KR102656403B1 (en) | Generate keys for use in secure communications | |
CN111932364A (en) | Puff financial system for protecting business secret | |
Esther et al. | Trustworthy cloud storage data protection based on blockchain technology | |
Kroll et al. | Secure protocols for accountable warrant execution | |
CN116915379A (en) | Block chain privacy protection method and system based on homomorphic encryption algorithm and zero knowledge proof protocol | |
CN112910858B (en) | Method and node for determining alliance chain transaction statistical information and transaction processing | |
Wu et al. | The survey on the development of secure multi-party computing in the blockchain | |
CN115549906B (en) | Privacy calculation method, system, device and medium based on block chain | |
CN113965310B (en) | Method for realizing mixed privacy calculation processing based on label capable of being controlled to be de-identified | |
US20230074475A1 (en) | Systems And Methods For Implementing Privacy Layer In CBDC Networks | |
CN111010386B (en) | Privacy protection and data supervision control method based on shared account book | |
KR102475434B1 (en) | Security method and system for crypto currency | |
Joseph et al. | Design a hybrid optimization and homomorphic encryption for securing data in a cloud environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |