CN114897527B - Authentication method for realizing commercial warranty claim value based on workload certification - Google Patents

Authentication method for realizing commercial warranty claim value based on workload certification Download PDF

Info

Publication number
CN114897527B
CN114897527B CN202210551810.0A CN202210551810A CN114897527B CN 114897527 B CN114897527 B CN 114897527B CN 202210551810 A CN202210551810 A CN 202210551810A CN 114897527 B CN114897527 B CN 114897527B
Authority
CN
China
Prior art keywords
workload
seller
buyer
contract
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210551810.0A
Other languages
Chinese (zh)
Other versions
CN114897527A (en
Inventor
何娟
李正波
王玺闻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Xijianwen Technology Consulting Co ltd
Original Assignee
Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Jiaotong University filed Critical Southwest Jiaotong University
Priority to CN202210551810.0A priority Critical patent/CN114897527B/en
Publication of CN114897527A publication Critical patent/CN114897527A/en
Application granted granted Critical
Publication of CN114897527B publication Critical patent/CN114897527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an authentication method for realizing the value of the credit of commercial warranty based on workload certification, which comprises the following steps: each participant node registers a blockchain account as required, and a certificate authority provides a public key certificate for each participant node; the seller obtains a verifiable contract certification certificate through the target intelligent contract; the seller obtains the verified workload digital bill which is approved by the third party monitoring organization and the buyer by using the target intelligent contract. Compared with the prior art, the invention has the positive effects that: the invention innovatively utilizes the blockchain technology to provide the seller authentication method based on the workload financing, promotes the whole-chain information sharing of the workload, realizes the visualization of the workload financing, enables the digital bill creditor value of the workload of the seller project in a certain period by virtue of objective credit of a buyer and a third-party management organization, improves the efficiency of capital circulation, and realizes the mutation of enterprise scale.

Description

Authentication method for realizing commercial warranty claim value based on workload certification
Technical Field
The invention relates to the technical field of block chains, in particular to an authentication method for realizing commercial warranty claim value based on workload certification.
Background
Under the background that the country vigorously promotes receivable financing, emphasizes the economy of financial service entities and prevents and controls financial risks, the business guarantee has grown into the fastest-developing industry in supply chain finance, and plays an increasingly important role in promoting credit trade at home and abroad and meeting the financing and service entity economy of small and medium-sized enterprises. However, under the objective condition that short boards still exist in the domestic credit system construction at the present stage, the business warranty business expansion based on the workload certification is limited to a certain extent. On one hand, the insurance management company cannot fully judge the authenticity of conditions such as trade contracts, trade backgrounds, trade data, receivable accounts and the like of the buyer and the seller; on the other hand, the data of the whole trade link has no three-party public trust voucher, and an authentication method based on the creditor value proved by the workload is lacked in the trade process; therefore, the risk control of the insurance company cannot be standardized, and the seller often has difficulty in obtaining the credit of the insurance company based on the work amount insurance financing.
The blockchain is essentially a decentralized database, and as an underlying technology, is a string of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, which is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. In addition, the block chain technique has the following characteristics: firstly, transaction information is recorded by a network temporary node, and the network temporary node has no third party and is not controlled by individuals and organizations; secondly, the data of all nodes are synchronized in real time, and the whole system is not influenced by the failure of an individual node; third, all transactions are signed, and others cannot tamper with the transactions.
Therefore, the invention provides a set of complete authentication, encryption or signature mechanism by applying the technical innovation in the aspects of distributed accounts, asymmetric encryption and authorization technology, intelligent contract and the like in the block chain technology, helps the warranty organization verify the conditions of trade contracts, trade backgrounds, receivable accounts and the like, ensures that public key certificates, contract certification certificates and work amount digital bills on the chain acquire the consensus of all participants, and truly records the generation and circulation of debt so as to ensure the authenticity and reliability of transactions, reduce the operating risk and standardize transaction flows.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a method for realizing the authentication of the creditor value of the commercial insurance policy based on the workload certification, which takes the workload (future receivable accounts) in the time period after the contract is signed and before the invoicing and the posting as the object of the insurance policy financing, and realizes the financing of the transaction progress money item of the seller by the insurance policy based on the public chain, wherein the workload (future receivable accounts) comprises the working value and the asset value of the labor service.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for realizing the authentication of the creditor value of the commercial warranty based on the workload certification comprises the following steps:
step one, each participant node registers a blockchain account as required to obtain a private key and a public key of the participant node, and a certificate management mechanism provides a public key certificate for each participant node;
step two, the sender node and the receiver node obtain a shared session symmetric key through exchanging keys, and encrypt contract information, block chain addresses and identity information by using the session symmetric key, and the seller obtains a verifiable contract certificate through a target intelligent contract;
step three, the seller and the third party supervising agency obtain a shared session symmetric key through exchanging keys, the seller encrypts and signs the workload in a certain period and then sends the workload to the third party supervising agency, and then the third party supervising agency verifies and authenticates the workload of the seller in a certain period;
step four, the third party supervising organization and the buyer obtain a shared session symmetric key through exchanging keys, the third party supervising organization encrypts and signs the workload in a certain period and then sends the encrypted and signed workload to the buyer, and the buyer rechecks the related information sent by the third party supervising organization and finally achieves consensus;
step five, the seller obtains the digital bills of the workload which can be verified and are approved by the third party supervision institution and the buyer by using the target intelligent contract;
and step six, the seller negotiates with a warranty manager on line, signs a warranty agreement, and then writes an intelligent contract according to the warranty agreement and the workload digital bill with the help of the buyer.
Compared with the prior art, the invention has the positive effects that:
the invention innovatively utilizes a blockchain technology to provide a seller authentication method based on workload financing, promotes the full-chain information sharing of workload, realizes the visualization of workload financing, enables the seller project to have the digital bill debt value of the workload in a certain period by relying on the credit of a buyer and a third-party management organization, improves the efficiency of capital circulation, and realizes the mutation of enterprise scale.
All public key certificates, contract certification certificates and workload digital bills generated by the system are safely, completely and permanently recorded in all block chain nodes, so that the rapid confirmation and real-time sharing synchronization of all participants on a system platform are realized, the problem of creditor value of workload financing in a seller project period is solved, meanwhile, a real data source is provided for follow-up credit investigation, risk control and the like of a warranty manager, more accurate enterprise credit investigation can be acquired, and a good financial ecology is formed.
Drawings
The invention will now be described, by way of example, with reference to the accompanying drawings, in which:
FIG. 1 is a timing flow diagram of a method for implementing business warranty claim value authentication based on workload certification, in accordance with an embodiment of the present invention;
fig. 2 is a time stamp and deadline for a method of authenticating a value of a business warranty claim based on a workload certificate according to an embodiment of the present invention.
Detailed Description
An authentication method for realizing commercial warranty claim value based on workload certification comprises the following steps:
1. each participant node registers a blockchain account as required to obtain a private key and a public key of the participant node, and the certificate management mechanism provides a public key certificate for each participant node to prevent a counterfeiter from forging user information, wherein the participant nodes comprise a seller, a buyer, a third party supervision mechanism and a warranty manager; the public key certificate comprises public key information, enterprise identity information, a block chain address, a timestamp and the like;
2. by using the modern cryptography Diffie-Hellman algorithm, a sending party node and a receiving party node can exchange keys safely to obtain a shared session symmetric key, and contract information, block chain addresses, identity information and the like are encrypted by the session symmetric key, so that a seller can obtain a verifiable contract certificate safely through a target intelligent contract; the contract certification certificate comprises transaction main contract information, transaction supplementary contract information, contract term, contract amount, message authentication code and the like;
3. the seller and the third party supervising agency exchange keys safely to obtain a shared session symmetric key, the seller encrypts and signs the workload in a certain period and sends the encrypted and signed workload to the third party supervising agency, and then the third party supervising agency verifies and authenticates the workload in the certain period of the seller;
4. the third party supervising agency and the buyer exchange keys safely to obtain a shared session symmetric key, the third party supervising agency encrypts and signs the workload in a certain period and sends the encrypted and signed workload to the buyer, and the buyer rechecks the related information sent by the third party supervising agency to finally achieve consensus.
5. Through the information disclosed by the network and the message verification code and the calculation coding information returned to the seller, the seller obtains the workload digital bill which is approved and verifiable by the third party supervision institution and the buyer by using the target intelligent contract; the workload digital bill is used as a target object of the insurance financing and comprises workload information, a contract certification certificate, a workload period in the period, workload amount in the period, a message authentication code, contract information and the like;
6. the seller negotiates with a policy holder on line, signs a policy agreement, and then writes an intelligent contract according to information (such as loan amount, term and the like) in the policy agreement and related information of the workload digital bill with the help of the buyer, so that the programmed calculation of the creditor value of the workload digital bill can be completed.
Further, the obtaining of the public key certificate includes the following steps:
(1) The seller S, the buyer B, the insurance manager F and the third party supervision institution 3PS register accounts in the block system;
(2) Certificate authority CA uses its private key SK CA The public key PK, the real identity ID and the block chain address @aredigitally signed, and the public key certificates of a seller S, a buyer B, a policy holder F and a third party supervision institution 3PS are automatically generated by a target intelligent contract in the block chain system:
Figure GDA0003743950210000051
Figure GDA0003743950210000052
Figure GDA0003743950210000053
Figure GDA0003743950210000054
where T is the current timestamp, which may be taken as the expiration date, and the certificate is revoked if it is too old. Enterprises can send own public keys, identity information and block chain addresses to users in need through public key certificates, and receivers can verify the certificates by using the public keys of certificate authorities CA, namely
Figure GDA0003743950210000055
The public key certificate is digitally signed by a certificate authority by using a secret key, so that the whole content of the file is ensured to be correct, and the public key certificate has the characteristics of safety, uniqueness, convenience and the like; the public key certificate is equivalent to the user's identity card, and the public key certificate can prove the user's identity and inquire the encrypted transmission information when the user communicates over the network.
Further, the acquiring of the contract certification certificate comprises the following steps:
(1) The seller S and the buyer B set two same large prime numbers p and n, g is the primitive root of p, and p and g are disclosed to the network;
(2) Seller S selects a large random number x 1 E (1, n), publicly transmit
Figure GDA0003743950210000056
Giving buyer B;
(3) Buyer B selects a large random number x 2 E (1, n), publicly transmit
Figure GDA0003743950210000057
Give seller S and calculate session symmetric key
Figure GDA0003743950210000058
(4) Seller S passes P C Calculating a symmetric key
Figure GDA0003743950210000059
Buyer B calculates message authentication code
Figure GDA0003743950210000061
Wherein
Figure GDA0003743950210000062
Is a public function controlled by a secret key, tx is a contract text, a tx Is the total amount of the contract, d tx Is contract term, and then buyer B publishes it through its own Web service
Figure GDA0003743950210000063
P B
(5) Seller S utilizes a target intelligent contract to generate a contract proof certificate
Figure GDA0003743950210000064
Contract certificate
Figure GDA0003743950210000065
May be provided to interested parties and may verify their true identity with the aid of buyer B, wherein:
Figure GDA0003743950210000066
wherein
Figure GDA0003743950210000067
Is the target intelligent contract blockchain address of the contract proof certificate. Here, only the disclosed multivariate array (P) is needed B ,x 1 ,C S ,tx,a tx ,d tx ) Can be recalculated
Figure GDA0003743950210000068
With respect to the preceding
Figure GDA0003743950210000069
Making comparison, i.e. verifying contract certificate
Figure GDA00037439502100000610
Whether it has been tampered with.
The contract certificate generated by the DH algorithm through the target intelligent contract is unique, transparent, non-tamper-proof and verifiable, and a verifiable and real digital evidence is provided for financing a series of workloads completed by subsequent sellers based on projects.
Further, the acquisition of the workload digital ticket comprises the following steps:
(1) Seller S selects a large random number k 1 E (1, n), workload information WP and public key certificate C S And a contract certificate
Figure GDA00037439502100000611
And the like, and sends a signature request to the third party proctoring authority 3 PS:
Figure GDA00037439502100000612
Figure GDA00037439502100000613
Figure GDA00037439502100000614
(2) Public key PK of seller S for third party supervision agency 3PS S Verifying the digital signature based on the public key certificate C S Before verifying the workload information WPWhether to issue; the third party supervision authority 3PS selects a large random number k 2 E (1, n), and calculating K SP And
Figure GDA00037439502100000615
then the third party supervision agency 3PS publishes the information through the Web service thereof
Figure GDA00037439502100000616
Figure GDA0003743950210000071
Figure GDA0003743950210000072
Figure GDA0003743950210000073
At the same time, the third party supervision authority 3PS selects a large random number l 1 E (1, n), sending a signature request to buyer B and issuing through the Web service
Figure GDA0003743950210000074
Figure GDA0003743950210000075
Figure GDA0003743950210000076
Figure GDA0003743950210000077
(3) Buyer B uses the public key PK of the third party supervision agency 3PS 3PS Verifying the digital signature based on the public key certificate C S And C 3PS It is verified whether the workload information WP has been issued before. Buyer B selects a large random number l 2 E (1, n), and calculating K PB And
Figure GDA0003743950210000078
then the buyer B publishes the information through the Web service thereof
Figure GDA0003743950210000079
Figure GDA00037439502100000710
Figure GDA00037439502100000711
Figure GDA00037439502100000712
(4) Seller S obtains workload digital bills automatically generated according to target intelligent contracts
Figure GDA00037439502100000713
The digital ticket of the workload can be verified for authenticity with the help of the third party proctoring authority 3PS, buyer B:
Figure GDA00037439502100000714
wherein d is WP Is the start time, d 'of the duty cycle' WP Is the deadline for the workload period, which is the time for the seller S to complete the project portion of work; in addition, the first and second substrates are,
Figure GDA00037439502100000715
for target intelligent contract block chain address of work quantity digital bill, total amount of work quantity made
Figure GDA00037439502100000716
Here, only the multi-element array is needed to be passed
Figure GDA00037439502100000717
And
Figure GDA00037439502100000718
can be recalculated
Figure GDA00037439502100000719
And
Figure GDA00037439502100000720
comparing with message verification code in certificate, the workload digital bill can be verified
Figure GDA0003743950210000081
Whether it has been tampered with; thus, the authentication of information such as contract text, workload text, amount, term, etc. can be completed.
The workload digital bill is signed and confirmed by a third party supervising organization and a buyer, namely the credit guarantee of the third party supervising organization and the buyer is obtained, and the digital bill has the characteristics of uniqueness, transparency, no tampering and verifiability; the work amount digital ticket is a future receivable of a seller (creditor) based on a certain period of time work amount, i.e., a buyer (creditor) is required to fulfill a payment obligation for a transaction part of money in the presence of a contracted and validated base contract, and the circulation of the work amount digital ticket means the transfer of a future receivable creditor based on a work amount. The creditor value of the workload digital bill is to be the total amount a of the workload WP Based on the data, the data are estimated by the maintainers from multiple dimensions, and the influence factors comprise the interest structure, borrowing time, amount, application, overdue age, the credit form identification report of the maintainers, credit condition of debtors, property condition of repairable debts, change coefficient and the like.
The cryptography Diffie-Hellman algorithm is used in the invention, but is not limited to the Diffie-Hellman algorithm, and also comprises an elliptic curve cryptography algorithm (EEB algorithm), an elliptic curve Diffie-Hellman algorithm (EBDH algorithm) and the like; in addition, the public DH value generated by the DH algorithm is transmitted by explicit signature or identity authentication so as to prevent a counterfeiter or a middleman from attacking the authentication method. The sender (e.g., seller) authenticates the Web service before sending the request, and the connection can be protected with HTTPS, thus enhancing the privacy and confidentiality of the sender's financial data.
The invention will be described in detail below with reference to the following drawings:
the embodiment provides an authentication method for realizing the creditor value of the business insurance policy based on the workload certification, and a project contractor (seller) authenticates the workload in a project period by using a block chain technology so as to finance the insurance policy and improve the liquidity of enterprise funds.
Fig. 1 is a timing flow chart of a method for implementing authentication of creditor value of a commercial warranty based on workload certification according to an embodiment of the present invention, as shown in fig. 1, the method includes the steps of:
s101, after the project contractor S (seller), the project company B (buyer), the insurance manager F and the supervisor 3PS register the account in the blockchain system, the certificate authority CA uses the private key SK CA Carrying out digital signature on a public key PK, a real identity ID and a block chain address @, and automatically generating public key certificates of a project contractor S, a project company B, a warranty F and a proctor 3PS by a target intelligent contract in a block chain system:
Figure GDA0003743950210000091
Figure GDA0003743950210000092
Figure GDA0003743950210000093
Figure GDA0003743950210000094
where T is the current timestamp, which may be taken as the expiration date, and the certificate is revoked if it is too old. The enterprise can send its own public key, identity information and block chain address to the required user by means of public key certificate, and the receiver can use the public key of certificate authority CA to verify the certificate, i.e. the enterprise can use the public key of certificate authority CA to make verification
Figure GDA0003743950210000095
S102, the project contractor S randomly generates a large random number x through the block chain system 1 E (1, n), send
Figure GDA0003743950210000096
To project company B;
s103, item company B selects a large random number x 2 E (1, n), send
Figure GDA0003743950210000097
Giving the project contractor S and calculating the symmetric key
Figure GDA0003743950210000098
Project company B calculates message authentication code
Figure GDA0003743950210000099
Wherein
Figure GDA00037439502100000910
Is a public function controlled by a secret key, tx is a contract text, a tx Is the total amount of the contract, d tx Is contract term, then project company B publishes through its own Web service
Figure GDA00037439502100000911
S104, the project contractor S passes through P B Calculating a symmetric key
Figure GDA00037439502100000912
The project contractor S verifies the contract certificate generated by the intelligent contract
Figure GDA00037439502100000913
Provided to interested parties and can verify their true identity with the aid of project company B, wherein
Figure GDA0003743950210000101
Here, only pass (P) B ,x 1 ,C S ,tx,a tx ,d tx ) Can be recalculated
Figure GDA0003743950210000102
With respect to the preceding
Figure GDA0003743950210000103
And comparing to verify whether the card is tampered.
S105, the project contractor S selects the large random number k 1 E (1, n), sends a signature request to the third party proctoring company 3 PS:
Figure GDA0003743950210000104
Figure GDA0003743950210000105
Figure GDA0003743950210000106
s106, the third party proctoring organization 3PS uses the public key PK of the project contractor S S Verifying the digital signature based on the public key certificate C S It is verified whether the workload information WP has been issued before. Proctorial 3PS selects a large random number k 2 E (1, n) and calculateK SP And
Figure GDA0003743950210000107
then the proctor company 3PS publishes the information through the Web service thereof
Figure GDA0003743950210000108
Figure GDA0003743950210000109
Figure GDA00037439502100001010
Figure GDA00037439502100001011
At the same time, proctoring company 3PS selects a random number l 1 E (1, n), sending a signature request to a project company B and issuing the signature request through a Web service
Figure GDA00037439502100001012
Figure GDA00037439502100001013
Figure GDA00037439502100001014
Figure GDA00037439502100001015
S107, the project company B uses the public key PK of the project contractor S A Verifying the digital signature based on the public key certificate C S And C 3PS It is verified whether the workload information WP has been issued before. Project company B selects a large random number l 2 E.g. 1, n, andcalculate K PB And
Figure GDA0003743950210000111
then the project company B publishes the information through the Web service thereof
Figure GDA0003743950210000112
Figure GDA0003743950210000113
Figure GDA0003743950210000114
Figure GDA0003743950210000115
S108, the project contractor S obtains the work quantity digital bill automatically generated according to the intelligent contract
Figure GDA0003743950210000116
The digital bill of work amount can be verified for authenticity with the help of proctoring company 3PS, project company B:
Figure GDA0003743950210000117
wherein d is WP Is the start time of a cycle, d' WP Is the deadline time for the period, which is the time for the project contractor S to complete the project part work; in addition, the workload proves the total amount
Figure GDA0003743950210000118
Here, only the multi-element array is needed to be passed
Figure GDA0003743950210000119
And
Figure GDA00037439502100001110
can be recalculated
Figure GDA00037439502100001111
Comparing with message verification code in certificate, the certificate of contract certification can be verified
Figure GDA00037439502100001112
Whether it has been tampered with.
S109, the project contractor negotiates with the warranty manager on line and signs a warranty agreement.
S110, generating a target intelligent contract according to information (such as loan amount, term and the like) in the warranty agreement and related information of the work quantity digital bill, and finishing the programmed calculation of the creditor value of the work quantity digital bill.
The contract information includes a project contract, a project series supplement contract, and the like; the workload information comprises a finished project quantity table, a verified project pricing report, a project price settlement list and other related proving materials. The method for carrying out the work checking and pricing depends on the mode determined in the project contract, the work checking and pricing in quarter and the work checking and pricing in the last time are mainly carried out, the project with the construction period less than three months is carried out, and the work checking and pricing in one time after completion is carried out. Quarter employee identification and pricing are completed before ten days of the first month in the next quarter, and node employee identification and pricing are completed within ten days after the project contractor applies for the node employee identification and pricing; the last time of the test is completed after the first test and before the formal acceptance.
The work amount digital bill is signed and confirmed (i.e. credit guarantee) by a third party proctoring organization and a project company, has the characteristics of uniqueness, transparency, no tampering and verifiability, is future receivable of the project contractor (creditor) based on the work amount in a certain time period, namely, the project company (creditor) is required to fulfill the payment obligation of partial money of a transaction under the condition that a reserved and effective basic contract exists, and the circulation of the work amount digital bill means the transfer of the future receivable credit obligation based on the work amount, namely, if the project contractor and the warrant complete the transfer of the work amount digital bill, the creditor is changed from the project contractor to a warranty. Work byThe creditor value of the digital bill will be in the total amount of the workload a WP Based on the data, the data are estimated by the maintainers from multiple dimensions, and the influence factors comprise the interest structure, borrowing time, amount, application, overdue age, the credit form identification report of the maintainers, credit condition of debtors, property condition of repairable debts, change coefficient and the like.
FIG. 2 is a time stamp and a deadline of an authentication method for implementing a business warranty claim value based on a workload certification, the Δ d WP =d′ WP -d WP ,Δd=d tx -d′ WP . Since verifying the message authentication code MAC requires C S Therefore, the validity period of the public key certificate should be longer than the workload certification deadline, and the timestamp of the public key certificate of the participant node should satisfy T<d WP (ii) a Additionally, workload-based financing is financing after the start of a project and before the completion of the project, so the deadline for the proof of workload should be less than the contract deadline, i.e., d' WP <d tx

Claims (8)

1. An authentication method for realizing commercial warranty claim value based on workload certification is characterized in that: the method comprises the following steps:
step one, each participant node registers a blockchain account as required to obtain a private key and a public key of the participant node, and a certificate management mechanism provides a public key certificate for each participant node;
step two, the sender node and the receiver node obtain a shared session symmetric key through exchanging keys, and encrypt contract information, block chain addresses and identity information by using the session symmetric key, and the seller obtains a verifiable contract certificate through a target intelligent contract; wherein, the acquisition of the contract certification certificate comprises the following steps:
(1) The seller S and the buyer B set two same large prime numbers p and n, g is the primitive root of p, and the p and g are disclosed to the network;
(2) Seller S randomly generates a large random number x through the blockchain system 1 E (1, n), publicly transmit
Figure FDA0004061878890000011
Giving the buyer B;
(3) Buyer B randomly generates a large random number x through the blockchain system 2 E (1, n), publicly transmit
Figure FDA0004061878890000012
Give seller S and calculate session symmetric key
Figure FDA0004061878890000013
(4) Seller S passes P B Calculating a symmetric key
Figure FDA0004061878890000014
(5) Buyer B calculates message authentication code
Figure FDA0004061878890000015
Wherein
Figure FDA0004061878890000016
Is a public function controlled by a secret key, tx is a contract text, a tx Is the total amount of the contract, d tx Is a contract term, and then the buyer B publishes the contract term through the self Web service
Figure FDA0004061878890000017
(5) Seller S utilizes a target intelligent contract to generate a contract proof certificate
Figure FDA0004061878890000018
Figure FDA0004061878890000019
Wherein, C S Is a public key certificate of the seller S,
Figure FDA00040618788900000110
a target intelligent contract blockchain address for a contract certification certificate;
step three, the seller and the third party supervising agency obtain a shared session symmetric key through exchanging keys, the seller encrypts and signs the workload in a certain period and then sends the workload to the third party supervising agency, and then the third party supervising agency verifies and authenticates the workload of the seller in a certain period;
step four, the third party supervising organization and the buyer obtain a shared session symmetric key through exchanging keys, the third party supervising organization encrypts and signs the workload in a certain period and then sends the encrypted and signed workload to the buyer, and the buyer rechecks the related information sent by the third party supervising organization and finally achieves consensus;
step five, the seller obtains the workload digital bill which is approved and verifiable by the third party supervision institution and the buyer by using the target intelligent contract; the acquisition of the workload digital ticket comprises the following steps:
(1) Seller S selects a large random number k 1 E (1, n), for workload information WP, public key certificate C S And certificate of contract certification
Figure FDA0004061878890000021
Encrypts and sends a signature request to the third party authority 3 PS:
Figure FDA0004061878890000022
Figure FDA0004061878890000023
wherein, the first and the second end of the pipe are connected with each other,
Figure FDA0004061878890000024
(2) Public key PK of seller S for third party proctoring organization 3PS S Verifying digital signaturesAccording to public key certificate C S Verifying whether the workload information WP has been issued; the third party supervision authority 3PS selects a large random number k 2 E (1, n), and calculating K SP And
Figure FDA0004061878890000025
then the third party supervision authority 3PS publishes the information through the Web service thereof
Figure FDA0004061878890000026
Figure FDA0004061878890000027
Figure FDA0004061878890000028
Figure FDA0004061878890000029
At the same time, the third party supervision authority 3PS selects a large random number l 1 E (1, n), sends signature request to buyer B and releases through Web service
Figure FDA00040618788900000210
Figure FDA00040618788900000211
Figure FDA00040618788900000212
Wherein
Figure FDA0004061878890000031
(3) Buyer B uses the public key PK of the third party supervision agency 3PS 3PS Verifying the digital signature based on the public key certificate C S And C 3PS Verifying whether the workload information WP has been issued; buyer B selects a large random number l 2 E (1, n), and calculating K PB And
Figure FDA0004061878890000032
then the buyer B publishes the information through the Web service thereof
Figure FDA0004061878890000033
Figure FDA0004061878890000034
Figure FDA0004061878890000035
Figure FDA0004061878890000036
(4) Seller S obtains a workload digital ticket automatically generated according to a target intelligent contract
Figure FDA0004061878890000037
Figure FDA0004061878890000038
Wherein, d WP Is the start time of the duty cycle, d' WP Is the cutoff time for the duty cycle,
Figure FDA0004061878890000039
a target intelligent contract block chain address of a workload digital bill;
and step six, the seller negotiates with a warranty manager on line, signs a warranty agreement, and then writes an intelligent contract according to the warranty agreement and the workload digital bill with the help of the buyer.
2. The method of claim 1, wherein the method comprises the steps of: the public key certificate acquisition method comprises the following steps:
(1) Each participant node registers an account in the blockchain system;
(2) Certificate authority CA uses its private key SK CA The public key, the real identity and the block chain address of each participant node are digitally signed, and the public key certificate of each participant node is automatically generated by a target intelligent contract in a block chain system:
Figure FDA00040618788900000310
Figure FDA00040618788900000311
Figure FDA00040618788900000312
Figure FDA0004061878890000041
wherein, C S 、C B 、C F 、C 3PS Respectively representing public key certificates, T, of the seller S, the buyer B, the policy holder F and the third party proctoring authority 3PS S 、T B 、T F 、T 3PS Respectively represent the time stamps and IDs of the seller S, the buyer B, the insurance provider F and the third party supervision agency 3PS at the time of registration S 、ID B 、ID F 、ID 3PS Respectively representThe real identities of the seller S, the buyer B, the insurance manager F and the third party proctoring agency 3PS are respectively represented by @ S, @ B, @ F and @3PS, the block chain addresses of the seller S, the buyer B, the insurance manager F and the third party proctoring agency 3PS, and PK S 、PK B 、PK F 、PK 3PS Respectively, public keys of the seller S, the buyer B, the policy holder F, and the third party proctoring authority 3 PS.
3. The method of claim 2, wherein the method comprises the steps of: the receiver verifies the public key certificate provided by the sender by using the public key of the certificate authority CA to determine the identity of the sender and to query the encrypted transmission information.
4. The method of claim 1, wherein the method comprises the steps of: the receiver receives the contract certificate provided by the seller S
Figure FDA0004061878890000042
Then, with the help of buyer B, through the published multivariate array (P) B ,x 1 ,C S ,tx,a tx ,d tx ) Recalculate
Figure FDA0004061878890000043
Then prove the certificate with the contract
Figure FDA0004061878890000044
In
Figure FDA0004061878890000045
Making comparison, i.e. verifying contract certificate
Figure FDA0004061878890000046
Whether it has been tampered with.
5. The method of claim 1An authentication method for realizing commercial warranty claim value based on workload certification is characterized in that: the manager receives the work amount digital bill provided by the seller S
Figure FDA0004061878890000047
Then, with the help of the third party proctoring organization 3PS, buyer B, through the multi-element array
Figure FDA0004061878890000048
And
Figure FDA0004061878890000049
can be recalculated
Figure FDA00040618788900000410
And
Figure FDA00040618788900000411
then prove the certificate with the contract
Figure FDA00040618788900000412
Comparing the message authentication codes in (1) to verify the workload digital ticket
Figure FDA00040618788900000413
Whether it has been tampered with; and further, the certification of contract texts, workload texts, money amounts and time limits is completed.
6. The method of claim 1, wherein the method comprises the steps of: the timestamp of the public key certificate of each participant node is less than the start time of the workload cycle.
7. The method of claim 1, wherein the method comprises the steps of: the deadline for the workload period is less than the contract period.
8. The method of claim 1, wherein the method comprises the steps of: the sender node and the receiver node can generate the key by using a Diffie-Hellman algorithm, an EEB algorithm or an EBDH algorithm, wherein the EEB algorithm is an elliptic curve cryptography algorithm, and the EBDH algorithm is an elliptic curve Diffie-Hellman algorithm.
CN202210551810.0A 2022-05-20 2022-05-20 Authentication method for realizing commercial warranty claim value based on workload certification Active CN114897527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210551810.0A CN114897527B (en) 2022-05-20 2022-05-20 Authentication method for realizing commercial warranty claim value based on workload certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210551810.0A CN114897527B (en) 2022-05-20 2022-05-20 Authentication method for realizing commercial warranty claim value based on workload certification

Publications (2)

Publication Number Publication Date
CN114897527A CN114897527A (en) 2022-08-12
CN114897527B true CN114897527B (en) 2023-03-14

Family

ID=82724164

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210551810.0A Active CN114897527B (en) 2022-05-20 2022-05-20 Authentication method for realizing commercial warranty claim value based on workload certification

Country Status (1)

Country Link
CN (1) CN114897527B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115879161B (en) * 2023-02-23 2023-05-23 西南交通大学 Data circulation method, device, equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960825A (en) * 2018-06-26 2018-12-07 阿里巴巴集团控股有限公司 Electric endorsement method and device, electronic equipment based on block chain
CN109242636A (en) * 2018-09-26 2019-01-18 盈盈(杭州)网络技术有限公司 A kind of data transacting system and its implementation based on block chain
CN111178880A (en) * 2019-12-07 2020-05-19 江苏通付盾数字化技术有限公司 Secure data circulation method for zero trust and protecting data privacy
CN112884554A (en) * 2021-03-18 2021-06-01 南通大学 Auction method of Internet of things data auction system based on alliance chain
CN113627901A (en) * 2021-08-04 2021-11-09 湖南大学 Guarantee pool financing method, system, equipment and storage medium based on block chain
CN113850595A (en) * 2021-09-09 2021-12-28 湖南大学 Export back-to-back insurance financing method and device based on block chain and electronic equipment
CN113869894A (en) * 2021-09-07 2021-12-31 湖南大学 Block chain-based domestic trade credit insurance financing method and device
CN113919938A (en) * 2021-09-24 2022-01-11 湖南大学 Domestic buyer's warranty financing method, device, equipment and medium based on block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960B (en) * 2017-01-24 2018-03-20 上海壹账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN109767336A (en) * 2018-12-27 2019-05-17 福建省农村信用社联合社 It is a kind of based on block chain P2P financing platform fund bank deposit pipe management method
US11366910B2 (en) * 2018-12-27 2022-06-21 Eli Talmor Method and system for secure applications using blockchain
CN114511398B (en) * 2022-02-14 2023-04-07 西南交通大学 Railway engineering insurance and financing platform based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960825A (en) * 2018-06-26 2018-12-07 阿里巴巴集团控股有限公司 Electric endorsement method and device, electronic equipment based on block chain
CN109242636A (en) * 2018-09-26 2019-01-18 盈盈(杭州)网络技术有限公司 A kind of data transacting system and its implementation based on block chain
CN111178880A (en) * 2019-12-07 2020-05-19 江苏通付盾数字化技术有限公司 Secure data circulation method for zero trust and protecting data privacy
CN112884554A (en) * 2021-03-18 2021-06-01 南通大学 Auction method of Internet of things data auction system based on alliance chain
CN113627901A (en) * 2021-08-04 2021-11-09 湖南大学 Guarantee pool financing method, system, equipment and storage medium based on block chain
CN113869894A (en) * 2021-09-07 2021-12-31 湖南大学 Block chain-based domestic trade credit insurance financing method and device
CN113850595A (en) * 2021-09-09 2021-12-28 湖南大学 Export back-to-back insurance financing method and device based on block chain and electronic equipment
CN113919938A (en) * 2021-09-24 2022-01-11 湖南大学 Domestic buyer's warranty financing method, device, equipment and medium based on block chain

Also Published As

Publication number Publication date
CN114897527A (en) 2022-08-12

Similar Documents

Publication Publication Date Title
US20200193432A1 (en) Method and system for settling a blockchain transaction
WO2020248603A1 (en) Blockchain-based virtual resource allocation method and device
US20200127813A1 (en) Method and system for creating a user identity
WO2019015474A1 (en) Management method, apparatus and system for increasing security of commercial paper exchange
US8156029B2 (en) Process for verifiably communicating risk characteristics of an investment portfolio
CN113728351A (en) Trusted certification transactions in blockchain systems
US20150356523A1 (en) Decentralized identity verification systems and methods
CN111461870A (en) Supply chain financial credit increasing method based on block chain
CN105681301A (en) Settlement method on block chain
CN110309634A (en) A kind of credible advertisement data management system based on block chain
TW202009841A (en) Least decentralized fund trading system and method thereof
CN115619404B (en) Block chain-based enterprise associated transaction business cooperative processing method
CN112116462B (en) Price inquiring and quoting transaction method and system based on blockchain
CN101510288A (en) Electronic contract operation system based on digital property right certificate
CN110728494A (en) Real estate service handling method, real estate property information system and real estate property information device
CN114511398B (en) Railway engineering insurance and financing platform based on block chain
CN111915349A (en) Cross-platform integral using system and method based on block chain
CN113570350A (en) Bill digital interaction system and method based on block chain
Kalvenes et al. Design of robust business-to-business electronic marketplaces with guaranteed privacy
CN114897527B (en) Authentication method for realizing commercial warranty claim value based on workload certification
CN113919938A (en) Domestic buyer&#39;s warranty financing method, device, equipment and medium based on block chain
CN112232828A (en) Power grid data transaction method and system
CN112801778A (en) Federated bad asset blockchain
CN111491024A (en) Block chain-based bank letter method, system, terminal and storage medium
US20050076218A1 (en) Cryptographic electronic gift certificate cross-reference to related applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240112

Address after: No. 18, 15th Floor, Building 8, No. 88 Shengbang Street, High tech Zone, Chengdu City, Sichuan Province, 610095

Patentee after: Chengdu Xijianwen Technology Consulting Co.,Ltd.

Address before: 610031, No. two, section 111, North Ring Road, Jinniu District, Sichuan, Chengdu

Patentee before: SOUTHWEST JIAOTONG University

TR01 Transfer of patent right