CN116861398A - Authentication processing method, authentication processing device, computer equipment and storage medium - Google Patents

Authentication processing method, authentication processing device, computer equipment and storage medium Download PDF

Info

Publication number
CN116861398A
CN116861398A CN202310609269.9A CN202310609269A CN116861398A CN 116861398 A CN116861398 A CN 116861398A CN 202310609269 A CN202310609269 A CN 202310609269A CN 116861398 A CN116861398 A CN 116861398A
Authority
CN
China
Prior art keywords
authenticated
information
authentication
resource
resource provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310609269.9A
Other languages
Chinese (zh)
Inventor
段星辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310609269.9A priority Critical patent/CN116861398A/en
Publication of CN116861398A publication Critical patent/CN116861398A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application relates to an authentication processing method, an authentication processing device, a computer device and a storage medium. The method comprises the following steps: if a qualification authentication request of an object to be authenticated aiming at a target client is received, acquiring full information of the object to be authenticated based on a blockchain; the block chain is used for storing resource provider information of a plurality of resource ends; and authenticating the qualification of the qualified resource provider of the object to be authenticated according to the total information of the object to be authenticated, and obtaining the authentication result of the object to be authenticated. By adopting the method, the authentication efficiency can be improved.

Description

Authentication processing method, authentication processing device, computer equipment and storage medium
Technical Field
The present application relates to the field of blockchain technology, and in particular, to an authentication processing method, an apparatus, a computer device, a storage medium, and a computer program product.
Background
Authentication processing scenarios are often involved in the process of resource exchange. For example, when a resource manager issues a resource exchange product, the resource manager issues a corresponding resource exchange product to a resource provider that is authenticated.
Currently, the authentication method for the resource provider is mainly: the resource provider submits the authentication material first, then the background service personnel extracts the material and carries out manual verification, and under the condition of conforming to the authentication rule, the resource provider is granted with qualified authentication identity.
However, the conventional authentication method or the conventional method has a problem of low authentication efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an authentication processing method, apparatus, computer device, computer-readable storage medium, and computer program product that can improve authentication efficiency.
In a first aspect, the present application provides an authentication processing method, including:
if a qualification authentication request of an object to be authenticated aiming at a target client is received, acquiring full information of the object to be authenticated based on a blockchain; the block chain is used for storing resource provider information of a plurality of resource ends;
and authenticating the qualification of the qualified resource provider of the object to be authenticated according to the total information of the object to be authenticated, and obtaining the authentication result of the object to be authenticated.
In one embodiment, performing qualification authentication of a qualified resource provider on an object to be authenticated according to full-scale information of the object to be authenticated to obtain an authentication result of the object to be authenticated, including:
comparing the total information of the object to be authenticated with the authentication standard of the target client, and authenticating the object to be authenticated as a qualified resource provider aiming at the target client under the condition that the total information of the object to be authenticated meets the authentication standard.
In one embodiment, the method further comprises:
in response to a resource end submitting a request for information of any resource provider, the resource provider information of the resource provider is uploaded to the blockchain.
In one embodiment, the method further comprises:
if the total information of the object to be authenticated does not meet the authentication standard, outputting prompt information aiming at the object to be authenticated; the prompt information is used for indicating an object to be authenticated to submit supplementary information for the target client.
In one embodiment, the method further comprises:
and in response to the obtained supplementary information of the object to be authenticated, packaging and transmitting the full-quantity information of the object to be authenticated and the supplementary information of the object to be authenticated to at least one management terminal of the target client.
In one embodiment, the resource end includes at least one of a resource management end, a resource transfer end, a resource product end, and a business service end.
In a second aspect, the present application provides an authentication processing apparatus, the apparatus comprising:
the block chain information inquiry module is used for acquiring the total information of the object to be authenticated based on the block chain if a qualification authentication request of the object to be authenticated for the target client is received; the block chain is used for storing resource provider information of a plurality of resource ends;
and the qualification resource provider authentication module is used for performing qualification authentication on the object to be authenticated according to the total information of the object to be authenticated to obtain an authentication result of the object to be authenticated.
In a third aspect, the application provides a computer device comprising a memory storing a computer program and a processor implementing the steps of the method described above when the processor executes the computer program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method described above.
In a fifth aspect, the application provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the method described above.
The authentication processing method, the authentication processing device, the computer equipment, the storage medium and the computer program product acquire full information of an object to be authenticated based on a blockchain if a qualification authentication request of the object to be authenticated for a target client is received; the blockchain is used for storing resource provider information of a plurality of resource ends, and can acquire the resource provider information which is stored on the blockchain by each resource end and is related to the object to be authenticated, so that the qualification authentication of the qualified resource provider can be conveniently and rapidly carried out on the object to be authenticated; according to the total information of the object to be authenticated, qualification authentication of the qualified resource provider is carried out on the object to be authenticated, an authentication result of the object to be authenticated is obtained, the qualified resource provider is not required to identify business handling under the line of carrying the object to be authenticated, and the online business handling of the whole process is realized; the full information of the object to be authenticated, which is obtained from the blockchain, can be directly used for automatic auditing, so that the flow of manually auditing materials is avoided, and the authentication efficiency is improved.
Drawings
FIG. 1 is a flow diagram of an authentication processing method in one embodiment;
FIG. 2 is a block diagram of an authentication processing apparatus in one embodiment;
FIG. 3 is an internal block diagram of a computer device in one embodiment;
fig. 4 is an internal structural view of a computer device in another embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
In the related art, a resource provider (e.g., an investor) submits an authentication material to a resource management organization (e.g., a bank) first, and then a background service person of the resource management organization manually checks the authentication material to confirm whether an information element contained in the authentication material meets an authentication rule of a qualified resource provider, so as to grant the resource provider corresponding identity authentication. Particularly for high-end resource products offered by resource management institutions (e.g., private fund, trust program, asset management program, etc.), there is a need for non-public resource recruitment to qualified resource providers. The current certification of qualified resource providers has the following problems: (1) Resource providers need to apply for acquisition of relevant certification materials to different types of institutions (e.g., banks, dealer, tax, business, etc.); (2) The resource provider is required to carry relevant paper version proving materials, such as transaction statement, contract, share certificate, income certificate, wage flow, personal tax payment certificate or asset certificate, and the like, to a banking website for business transaction; (3) Only very individual banks support mobile phone banking to upload the demonstrated materials, but the banks still need to manually audit the materials submitted by the resource provider one by one. The mode of manually extracting the information elements for authentication and auditing is characterized in that a large amount of authentication materials are required to be submitted at one time, the types of the materials are complex and objective factors, the authentication of a resource provider is long in time consumption, and the authentication efficiency is low.
In one embodiment, as shown in fig. 1, there is provided an authentication processing method, including:
step 110, if a qualification authentication request of an object to be authenticated for a target client is received, acquiring full information of the object to be authenticated based on a blockchain; the block chain is used for storing resource provider information of a plurality of resource ends;
specifically, the object to be authenticated can perform qualification authentication on the target client by logging in the target client, for example, after the object to be authenticated logs in the target client, a qualification authentication request on the target client can be triggered by performing corresponding operations (including but not limited to clicking operations, searching operations, voice interactions and the like) on the target client; if a qualification authentication request of an object to be authenticated aiming at a target client is received, acquiring the total information of the object to be authenticated based on a blockchain, wherein the blockchain has the characteristics of data transparency, non-tamper property, real-time synchronism and the like and can be used for storing resource provider information of a plurality of resource ends; the resource end can be a server end or a terminal which holds resources, each resource end stores resource provider information of one or more resource providers in a block chain, and the resource end can be used for carrying out resource exchange; the full amount of information of the object to be authenticated may include identification information of the object to be authenticated uploaded to the blockchain through one or more resource ends. By the method for acquiring the total information of the object to be authenticated based on the blockchain if the qualification authentication request of the object to be authenticated for the target client is received, the resource provider information, which is stored on the blockchain by each resource end and is related to the object to be authenticated, can be acquired, and further, qualification authentication of the qualified resource provider of the object to be authenticated can be conveniently and rapidly carried out.
In some examples, the target client may be a client provided by a target resource management authority, and the object to be authenticated may perform authentication of the eligible resource provider by the target client. Each resource end may store local resource providers (e.g., investors in banks, dealer, tax, business, etc.) in the same blockchain. The object to be authenticated can be a bank user, and based on the blockchain, when the bank user applies for the confirmation of the qualified resource provider through the target client (for example, a mobile phone bank application program), the qualification authentication request of the target client is triggered; the terminal or the server can acquire the total information of the object to be authenticated in the blockchain in response to receiving the qualification authentication request of the object to be authenticated for the target client, wherein the total information of the object to be authenticated can be all relevant information of the object to be authenticated which can be inquired in the blockchain or can be information required by the object to be authenticated which is inquired in the blockchain to identify a qualified resource provider.
And 120, performing qualification authentication of the qualified resource provider on the object to be authenticated according to the total information of the object to be authenticated, and obtaining an authentication result of the object to be authenticated.
Specifically, qualification authentication of the qualified resource provider can be performed on the object to be authenticated according to the full information of the object to be authenticated, wherein the qualified resource provider can include natural persons and legal persons or other organizations which have corresponding risk identification capability and risk bearing capability, invest in a single asset management product not less than a certain amount and meet a plurality of conditions, for example, the condition of the qualified resource provider for the target client can be that the qualified resource provider has an investment experience of more than 2 years and satisfies one of the following conditions: the household financial net asset is not lower than 300 ten thousand yuan, the household financial asset is not lower than 500 ten thousand yuan, or the income of the person in the last 3 years is not lower than 40 ten thousand yuan. Obtaining the authentication result of the object to be authenticated may include the object to be authenticated being authenticated as either a qualified resource provider or the object to be authenticated failing to be authenticated as a qualified resource provider. The qualification authentication of the qualified resource provider is carried out on the object to be authenticated according to the total information of the object to be authenticated, so that the authentication result of the object to be authenticated is obtained, the qualified resource provider is not required to identify the business to be transacted under the stockline of the carrying belt of the object to be authenticated, and the online business transaction of the whole flow is realized; the full information of the object to be authenticated, which is obtained from the blockchain, can be directly used for automatic auditing, so that the flow of manually auditing materials is avoided, and the authentication efficiency is improved.
In some examples, after obtaining the full-scale information of the object to be authenticated shared by the blockchain, the full-scale information of the object to be authenticated may be processed according to the regulatory requirement, and whether the object to be authenticated meets the authentication qualification requirement of the qualified resource provider is determined, so as to obtain the authentication result of the object to be authenticated. If the authentication result of the object to be authenticated is that the authentication object is authenticated as a qualified resource provider, the identification of the object to be authenticated to the qualified resource provider of the target client is completed; if the authentication result of the object to be authenticated is that the object to be authenticated cannot be authenticated as a qualified resource provider, the object to be authenticated can be fed back through the target client to instruct the object to be authenticated to supplement and submit required materials.
According to the embodiment of the application, if the qualification authentication request of the object to be authenticated for the target client is received, the full information of the object to be authenticated is acquired based on the blockchain; the blockchain is used for storing resource provider information of a plurality of resource ends, and can acquire the resource provider information which is stored on the blockchain by each resource end and is related to the object to be authenticated, so that the qualification authentication of the qualified resource provider can be conveniently and rapidly carried out on the object to be authenticated; according to the total information of the object to be authenticated, qualification authentication of the qualified resource provider is carried out on the object to be authenticated, an authentication result of the object to be authenticated is obtained, the qualified resource provider is not required to identify business handling under the line of carrying the object to be authenticated, and the online business handling of the whole process is realized; the full information of the object to be authenticated, which is obtained from the blockchain, can be directly used for automatic auditing, so that the flow of manually auditing materials is avoided, and the authentication efficiency is improved.
In one embodiment, performing qualification authentication of a qualified resource provider on an object to be authenticated according to full-scale information of the object to be authenticated to obtain an authentication result of the object to be authenticated, including:
comparing the total information of the object to be authenticated with the authentication standard of the target client, and authenticating the object to be authenticated as a qualified resource provider aiming at the target client under the condition that the total information of the object to be authenticated meets the authentication standard.
Specifically, the object to be authenticated can log in the target client corresponding to the target resource management mechanism by selecting the target resource management mechanism. The authentication criteria of the target client may be criteria for qualifying for a qualified resource provider formulated by a target resource management authority of the object to be authenticated and stored at the target client. By comparing the total information of the object to be authenticated with the authentication standard of the target client, it is possible to determine whether the object to be authenticated satisfies the authentication standard based on the total information of the object to be authenticated. If the total information of the object to be authenticated meets the authentication standard, the object to be authenticated can be authenticated as a qualified resource provider aiming at the target client. By the mode, qualified resource providers do not need to carry the material line of the object to be authenticated to conduct qualified resource provider identification business transaction, and the business transaction on the whole flow line can be realized; the full information of the object to be authenticated, which is obtained from the blockchain, can be directly used for automatic auditing, so that the flow of manually auditing materials is avoided, and the authentication efficiency is improved.
In some examples, the qualification authentication model of the qualified resource provider for the target client can be obtained by training the neural network model based on the authentication standard of the target client, the full-scale information of the object to be authenticated can be processed based on the qualification authentication model of the qualified resource provider, and the authentication result of the object to be authenticated can be obtained. If the total information of the object to be authenticated meets the authentication standard, the corresponding authentication mark and account authority of the qualified resource provider can be given to the account of the object to be authenticated.
In one embodiment, the method further comprises:
in response to a resource end submitting a request for information of any resource provider, the resource provider information of the resource provider is uploaded to the blockchain.
Specifically, if the resource end obtains the resource provider information of the resource provider, the corresponding information submitting request can be triggered to upload the obtained resource provider information of the resource provider to the blockchain, so that the resource provider information can be shared conveniently, and the efficiency of a plurality of institutions for respectively performing qualification authentication of the qualified resource provider is improved.
In one embodiment, the method further comprises:
if the total information of the object to be authenticated does not meet the authentication standard, outputting prompt information aiming at the object to be authenticated; the prompt information is used for indicating an object to be authenticated to submit supplementary information for the target client.
Specifically, if the total information of the object to be authenticated does not meet the authentication standard, the prompt information of the object to be authenticated may be output, for example, the prompt information of the object to be authenticated is output through the target client, the prompt information may include related prompt information of the object to be authenticated which does not meet the authentication standard, and may further include related prompt information indicating that the object to be authenticated submits the supplemental information for the target client, and the object to be authenticated may further submit the supplemental information through the target client based on the prompt information. Through the mode, on-line transaction can be divided into full-automatic transaction and semi-automatic transaction combined with manual verification, whether the full-quantity information of the object to be authenticated meets the authentication standard or not can be determined, full-automatic transaction or semi-automatic transaction can be carried out on the full-quantity information of the object to be authenticated, and further authentication processing efficiency can be improved.
In some examples, the output prompt information for the object to be authenticated may include a preset form, and further, the supplementary information for the target client input by the object to be authenticated may be obtained through the preset form.
In one embodiment, the method further comprises:
and in response to the obtained supplementary information of the object to be authenticated, packaging and transmitting the full-quantity information of the object to be authenticated and the supplementary information of the object to be authenticated to at least one management terminal of the target client.
Specifically, if the supplementary information submitted by the object to be authenticated for the target client is obtained, the full information of the object to be authenticated and the supplementary information of the object to be authenticated may be packaged and sent to at least one management terminal of the target client, the management terminal may be a terminal in communication with the target client, and may perform corresponding management on the full information of the object to be authenticated and the supplementary information of the object to be authenticated, for example, a management terminal may be configured for a staff member having an audit authority of the target resource management mechanism, and further the obtained packaged full information of the object to be authenticated and the supplementary information of the object to be authenticated may be manually audited, and the audit result may be sent to the target client through the management terminal. The audit result may include any of the object to be authenticated being authenticated as a qualified resource provider or the object to be authenticated failing to be authenticated as a qualified resource provider. The method can acquire the supplementary information of the object to be authenticated, and can realize semi-automatic transaction combined with manual verification on line, thereby improving the authentication processing efficiency and the authentication processing accuracy.
In one embodiment, the resource end includes at least one of a resource management end, a resource transfer end, a resource product end, and a business service end.
Specifically, the resource end may include at least one of a resource management end, a resource transfer end, a resource product end and a service server end, where the resource management end may manage the resource, the resource transfer end may transfer the resource, the resource product end may exchange the product with the resource, and the service server end may obtain the resource by providing a corresponding service; further, the institutions or organizations corresponding to the resource ends may include banks, dealer, tax, enterprise, etc., each resource end may join the blockchain as a reliable node, and store the obtained resource provider information in the blockchain. By uploading the resource provider information of different resource ends to the blockchain, the comprehensiveness of the target client for acquiring the total information of the object to be authenticated can be improved, the success rate of full-automatic online handling is improved, the probability of acquiring the supplementary information of the object to be authenticated for submitting the target client is reduced, and the authentication processing efficiency is further improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides an authentication processing device for realizing the above related authentication processing method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in one or more embodiments of the authentication processing device provided below may refer to the limitation of the authentication processing method hereinabove, and will not be repeated here.
In one embodiment, as shown in fig. 2, there is provided an authentication processing apparatus including:
the blockchain information query module 210 is configured to obtain full information of an object to be authenticated based on a blockchain if a qualification authentication request of the object to be authenticated for a target client is received; the block chain is used for storing resource provider information of a plurality of resource ends;
and the qualified resource provider authentication module 220 is configured to perform qualified resource provider qualification authentication on the object to be authenticated according to the total information of the object to be authenticated, so as to obtain an authentication result of the object to be authenticated.
In one embodiment, the eligible resource provider authentication module 220 is further configured to compare the full-size information of the object to be authenticated with the authentication standard of the target client, and authenticate the object to be authenticated as an eligible resource provider for the target client if the full-size information of the object to be authenticated meets the authentication standard.
In one embodiment, the apparatus further comprises:
and the resource provider information uploading module is used for responding to the information submitting request of the resource end for any resource provider and uploading the resource provider information of the resource provider to the blockchain.
In one embodiment, the apparatus further comprises:
the prompt information output module is used for outputting prompt information aiming at the object to be authenticated if the total information of the object to be authenticated does not meet the authentication standard; the prompt information is used for indicating an object to be authenticated to submit supplementary information for the target client.
In one embodiment, the apparatus further comprises:
and the information forwarding module is used for responding to the obtained supplementary information of the object to be authenticated and packaging and sending the full information of the object to be authenticated and the supplementary information of the object to be authenticated to at least one management terminal of the target client.
The respective modules in the authentication processing apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In an embodiment, a computer device is provided comprising a memory storing a computer program and a processor implementing the steps of the method described above when the processor executes the computer program.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 3. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing authentication processing data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an authentication processing method.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an authentication processing method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by persons skilled in the art that the structures shown in fig. 3 and 4 are merely block diagrams of portions of structures associated with aspects of the application and are not intended to limit the computer apparatus to which aspects of the application may be applied, and that a particular computer apparatus may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer readable storage medium is provided, having stored thereon a computer program which, when executed by a processor, implements the steps of the method described above.
In an embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, implements the steps of the method described above.
It should be noted that, the resource provider information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. An authentication processing method, the method comprising:
if a qualification authentication request of an object to be authenticated aiming at a target client is received, acquiring full information of the object to be authenticated based on a blockchain; the block chain is used for storing resource provider information of a plurality of resource ends;
and performing qualification authentication on the object to be authenticated according to the total information of the object to be authenticated to obtain an authentication result of the object to be authenticated.
2. The method according to claim 1, wherein performing qualification authentication of the object to be authenticated for a qualified resource provider according to the full-scale information of the object to be authenticated to obtain an authentication result of the object to be authenticated, comprises:
comparing the total information of the object to be authenticated with the authentication standard of the target client, and authenticating the object to be authenticated as a qualified resource provider aiming at the target client under the condition that the total information of the object to be authenticated meets the authentication standard.
3. The method according to claim 1, wherein the method further comprises:
and in response to the information submitting request of the resource end for any resource provider, uploading the resource provider information of the resource provider to the blockchain.
4. The method according to claim 2, wherein the method further comprises:
if the total information of the object to be authenticated does not meet the authentication standard, outputting prompt information aiming at the object to be authenticated; the prompt information is used for indicating the object to be authenticated to submit the supplementary information aiming at the target client.
5. The method according to claim 4, wherein the method further comprises:
and responding to the obtained supplementary information of the object to be authenticated, packaging and sending the full information of the object to be authenticated and the supplementary information of the object to be authenticated to at least one management terminal of the target client.
6. The method of claim 1, wherein the resource side comprises at least one of a resource management side, a resource transfer side, a resource product side, and a business service side.
7. An authentication processing apparatus, the apparatus comprising:
the block chain information inquiry module is used for acquiring the full information of the object to be authenticated based on the block chain if a qualification authentication request of the object to be authenticated for the target client is received; the block chain is used for storing resource provider information of a plurality of resource ends;
and the qualification resource provider authentication module is used for performing qualification authentication on the object to be authenticated according to the total information of the object to be authenticated to obtain an authentication result of the object to be authenticated.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202310609269.9A 2023-05-26 2023-05-26 Authentication processing method, authentication processing device, computer equipment and storage medium Pending CN116861398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310609269.9A CN116861398A (en) 2023-05-26 2023-05-26 Authentication processing method, authentication processing device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310609269.9A CN116861398A (en) 2023-05-26 2023-05-26 Authentication processing method, authentication processing device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116861398A true CN116861398A (en) 2023-10-10

Family

ID=88222344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310609269.9A Pending CN116861398A (en) 2023-05-26 2023-05-26 Authentication processing method, authentication processing device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116861398A (en)

Similar Documents

Publication Publication Date Title
WO2019237565A1 (en) Loan service processing method and apparatus, computer device and readable storage medium
CN108876133A (en) Risk assessment processing method, device, server and medium based on business information
US20160328791A1 (en) System and method for electronic consumer debt validation and dispute process
JP6632717B2 (en) Financial transaction management system, financial transaction management method and server
CN109472678A (en) A kind of accounting account book management method, electronic device and readable storage medium storing program for executing based on block chain
US20180342015A1 (en) An electronic security system and method for investment transaction
CN114266640A (en) Auditing method and device, computer equipment and storage medium
CN112702410B (en) Evaluation system, method and related equipment based on blockchain network
TWI814707B (en) Method and system for facilitating financial transactions
US20160012444A1 (en) Dynamic card validation
CN116861398A (en) Authentication processing method, authentication processing device, computer equipment and storage medium
US20220383302A1 (en) Intelligent Distributed Ledger Consent Optimizing Apparatus for Asset Transfer
CN114565443A (en) Data processing method, data processing device, computer equipment and storage medium
US20150127501A1 (en) System and Method for Capturing Exit Transaction Data
US11790336B2 (en) Intelligent distributed ledger consent optimizing apparatus for asset transfer
US11985139B2 (en) Systems, methods, apparatuses and computer program products for executing data verification operations between independent computing resources
CN116308352A (en) Credential generation method, apparatus, computer device, and storage medium
CN114240414A (en) Resource transfer method, device, computer equipment and storage medium
CN117132283A (en) Identification method, apparatus, computer device, storage medium, and program product
CN117151841A (en) Service processing method, device, computer equipment, storage medium and program product
CN116957576A (en) Method, device, equipment and storage medium for processing side citizen inter-market trade data
CN117437008A (en) Bank merchant intelligent registration method, device, computer equipment and storage medium
CN116452214A (en) Block chain-based after-sales information processing method and device and computer equipment
CN117493352A (en) Data updating method, device, computer equipment and storage medium
CN117037295A (en) Identity authentication method, identity authentication device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination