CN110648218A - Credit wind control system and method based on privacy protection and computer device - Google Patents

Credit wind control system and method based on privacy protection and computer device Download PDF

Info

Publication number
CN110648218A
CN110648218A CN201910863522.7A CN201910863522A CN110648218A CN 110648218 A CN110648218 A CN 110648218A CN 201910863522 A CN201910863522 A CN 201910863522A CN 110648218 A CN110648218 A CN 110648218A
Authority
CN
China
Prior art keywords
encrypted
computer device
default probability
enterprise
wind control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910863522.7A
Other languages
Chinese (zh)
Inventor
吴良顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN201910863522.7A priority Critical patent/CN110648218A/en
Publication of CN110648218A publication Critical patent/CN110648218A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Hardware Design (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a credit wind control method based on privacy protection, which is applied to a computer device of a wind controller and comprises the following steps: receiving encrypted financing party related data sent by a financing party computer device; calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party; and sending the encrypted enterprise default probability to a computer device of the sponsor. The invention further provides a computer device for implementing the credit wind control method based on privacy protection and a credit wind control system based on privacy protection. The invention can effectively maintain the privacy of the private data.

Description

Credit wind control system and method based on privacy protection and computer device
Technical Field
The invention relates to the technical field of computers, in particular to a credit wind control system and method based on privacy protection and a computer device.
Background
In the field of supply chain finance, when a customer needs financial support, a financial technology company (such as a credit plant, migrant wood finance and the like) needs to provide system-level data wind control support, including sampling, analyzing and grading data of a financing customer to complete the preposed wind control business of financing. In the existing wind control system, a client directly provides data for the wind control system, so that the wind control system performs prepositive wind control. However, the provided data is often sensitive data, and therefore, the leakage problem of the sensitive data is easily caused.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a credit wind control system and method based on privacy protection, and a computer device, which can effectively maintain the privacy of private data while implementing credit wind control.
The invention provides a credit wind control method based on privacy protection, which is applied to a computer device of a wind controller and comprises the following steps:
receiving encrypted financing party related data sent by a financing party computer device;
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party; and
and sending the encrypted enterprise default probability to a computer device of the sponsor.
Preferably, the calculating the encrypted enterprise default probability based on the encrypted related data of the financer comprises:
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure BDA0002200550560000021
wherein e (logit p) represents the encrypted enterprise default probability, e (ro e) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
Preferably, the computer device of the sponsor receives the encrypted enterprise default probability, and decrypts the encrypted enterprise default probability by using a decryption private key sent by the computer device of the financier, so as to obtain the decrypted enterprise default probability.
A second aspect of the present invention provides a computer apparatus comprising:
a memory;
a processor;
the memory stores at least one instruction that, when executed by the processor:
receiving encrypted financing party related data sent by a financing party computer device;
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party; and
and sending the encrypted enterprise default probability to a computer device of the sponsor.
Preferably, the calculating the encrypted enterprise default probability based on the encrypted related data of the financer comprises:
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure BDA0002200550560000022
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
Preferably, the computer device of the sponsor receives the encrypted enterprise default probability, and decrypts the encrypted enterprise default probability by using a decryption private key sent by the computer device of the financier, so as to obtain the decrypted enterprise default probability.
The invention provides a credit wind control system based on privacy protection, which comprises a first computer device of a financing party, a second computer device of a wind control party and a third computer device of a sponsor,
the first computer device obtains an encryption key and a decryption key, and encrypts related data of the financial supplier by using the encryption key;
the first computer device sending the encrypted relevant data to the second computer device and sending the decryption key to the third computer device;
the second computer device receives the encrypted related data and calculates and obtains the encrypted enterprise default probability based on the encrypted related data;
the second computer device sending the encrypted enterprise default probability to the third computer device;
the third computer device receives the encrypted enterprise default probability and the decryption private key;
and the third computer device decrypts the encrypted enterprise default probability by using the decryption private key so as to obtain the decrypted enterprise default probability.
Preferably, the calculating the encrypted enterprise default probability based on the encrypted related data includes:
calculating and obtaining the encrypted enterprise default probability based on the encrypted related data according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure BDA0002200550560000031
Figure BDA0002200550560000041
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
The invention provides a credit wind control method based on privacy protection, which is applied to a first computer device of a financing party, a second computer device of a wind control party and a third computer device of a sponsor, and comprises the following steps:
obtaining an encryption key and a decryption key by using the first computer device, and encrypting data related to the financial supplier based on the encryption key;
transmitting, with the first computer device, the encrypted relevant data to the second computer device and the decryption key to the third computer device;
receiving the encrypted related data by using the second computer device, and calculating to obtain the encrypted enterprise default probability based on the encrypted related data;
sending, with the second computer device, the encrypted enterprise default probability to the third computer device;
receiving, with the third computer device, the encrypted enterprise breach probability and the decryption private key;
and decrypting the encrypted enterprise default probability based on the decryption private key by using the third computer device, so as to obtain the decrypted enterprise default probability.
Preferably, the calculating the encrypted enterprise default probability based on the encrypted related data includes:
calculating and obtaining the encrypted enterprise default probability based on the encrypted related data according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure BDA0002200550560000051
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
According to the credit wind control system and method based on privacy protection and the computer device, the encrypted related data of the financing party sent by the computer device of the financing party is received; calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party; and sending the encrypted enterprise default probability to a computer device of a sponsor, so that the privacy of private data can be effectively maintained while credit wind control is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is an architecture diagram of a credit wind control system based on privacy protection according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart of a credit wind control method based on privacy protection according to a preferred embodiment of the present invention.
Fig. 3 is a functional block diagram of a software system for implementing the privacy protection-based credit wind control method according to a preferred embodiment of the present invention.
FIG. 4 is a block diagram of a computer device according to a preferred embodiment of the present invention.
The following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a detailed description of the present invention will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention, and the described embodiments are merely a subset of the embodiments of the present invention, rather than a complete embodiment. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Referring to fig. 1, there is shown an architecture diagram of a credit wind control system based on privacy protection according to a preferred embodiment of the present invention.
In the present embodiment, the privacy protection-based credit wind control system 100 includes a first computer apparatus 1, a second computer apparatus 2, and a third computer apparatus 3.
In one embodiment, the first computer apparatus 1 may be a mobile phone, an electronic device, a personal computer, a server, or the like. The second computer device 2 and the third computer device 3 may be a personal computer, a server, or the like.
In this embodiment, the first computer device 1 is a device of a financing party, the second computer device 2 is a device of a wind control party, and the third computer device 3 is a device of a sponsor.
For convenience of understanding, the financing party in this case refers to a party that needs to borrow money from a lender. The sponsor may also be referred to as an investor. The wind control party can be a bank party, the bank party serves as an intermediate party, and the wind control party can cooperate with the sponsor to carry out preposed wind control on default risks of the financing party.
In one embodiment, the first computer device 1 and the second computer device 2 can be connected in a wired (e.g. Universal Serial Bus (USB) or wireless) manner, and the first computer device 1 and the third computer device 3 can be connected in a wired or wireless manner.
In one embodiment, the Wireless means may be any type of conventional Wireless communication technology, such as radio, Wireless Fidelity (WIFI), cellular, satellite, broadcast, etc. The wireless communication technology may include, but is not limited to, Global System for Mobile Communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), wideband Code Division multiple Access (W-CDMA), CDMA2000, IMT Single Carrier (IMT Single Carrier), Enhanced Data rate GSM Evolution (Enhanced Data rate for GSM Evolution), Long Term Evolution (Long-Term Evolution), LTE, advanced Long Term Evolution (LTE), Time-Division Long Term Evolution (TD-LTE), High Performance Radio Local Area Network (High lan), High Performance Radio Wide Area Network (High-Area Radio Access Network, High-Performance Wide Area Network (wan), Local multi-point Radio Access Network (wan), and Global wireless Access System (Microwave Access System), WiMAX), ZigBee protocol (ZigBee), bluetooth, Orthogonal Frequency Division multiplexing (Flash Orthogonal-Division multiplexing, Flash-OFDM), High Capacity space Division Multiple Access (HC-SDMA), Universal Mobile Telecommunications System (UMTS), Universal Mobile Telecommunications system Time Division duplex (UMTS-Division multiplexing, UMTS-TDD), Evolved High Speed Packet Access (Evolved High Speed Packet Access, HSPA +), Time Division Synchronous Code Division Multiple Access (TD-SCDMA), Evolved Data optimization (EV-Data Optimized, EV-DO), Digital enhanced cordless communication (Digital enhanced cordless Telecommunications and other electronic communications, DECT).
Fig. 2 is a flowchart of a credit wind control method based on privacy protection according to a preferred embodiment of the present invention.
In this embodiment, the privacy protection-based credit wind control method is applied to a first computer device of a financial sponsor, a second computer device of a wind controller, and a third computer device of a financial sponsor, and for the first computer device, the second computer device, and the third computer device that need to execute credit wind control, functions for credit wind control provided by the privacy protection-based credit wind control method of the present invention may be respectively and correspondingly integrated on the first computer device, the second computer device, and the third computer device, or respectively and correspondingly run on the first computer device, the second computer device, and the third computer device in a Software Development Kit (SDK) form.
As shown in fig. 2, the credit wind control method based on privacy protection specifically includes the following steps, and the sequence of the steps in the flowchart can be changed and some steps can be omitted according to different requirements.
In step S1, the first computer device obtains the encryption key and the decryption key, and encrypts the data related to the financial party by using the encryption key.
In this embodiment, the first computer device is a computer device of a financing party.
In this embodiment, the first computer device may obtain the encryption key and the decryption key by using a key generation algorithm of a homomorphic encryption scheme.
Specifically, the obtaining of the encryption key and the decryption key includes:
(a1) two large prime numbers are randomly selected, and gcd (pq, (p-1) (q-1)) -1 is satisfied. Thereby, it is ensured that the two prime numbers selected are of equal length.
(a2) The values of n and λ are calculated, where n ═ pq and λ ═ lcm (p-1, q-1).
(a3) Definition of
Figure BDA0002200550560000081
(a4) Randomly selecting one less than n2And calculating μ ═ L (g) andλmod n2))-1mod n。
(a5) the public key is obtained as (n, g) and the private key is obtained as (λ, μ).
In one embodiment, the data related to the financier includes, but is not limited to:
ROE: net asset profitability, which is the percentage of net profit to average equity, reflects the profit level of equity.
EPS: the income per share refers to the net profit of the enterprise shared by each shareholder or the net loss of the enterprise to be borne, and is generally used for reflecting the operation result of the enterprise and measuring the profit level and the investment risk of the common share.
ARTR: the receivable turnover rate refers to the ratio of credit net income and average receivable balance of the enterprise in a certain period. The method is an index for measuring the turnover speed and the management efficiency of the receivable accounts of the enterprise.
QR: the quick action ratio refers to the ratio of the quick action assets and the flowing liability of the enterprise, and is used for measuring the performance change capability of the enterprise.
OIR: the income increase rate refers to the ratio of the income increase of the enterprise in the current year to the total income of the enterprise in the last year, and measures the development capacity of the enterprise.
TQ: the asset resetting cost of the enterprise stock market value/stock representative refers to the ratio between the asset resetting cost of the enterprise stock market value and the asset resetting cost of the stock representative.
In one embodiment, the first computer device may encrypt the related data of the financer based on the generated encryption key by using an encryption algorithm of a homomorphic encryption scheme, so as to obtain the encrypted related data.
Specifically, the encrypting the relevant data of the financial resource supplier based on the generated encryption key by using the encryption algorithm of the homomorphic encryption scheme to obtain the encrypted relevant data includes:
(b1) random number r is chosen, 0 < r < n, and gcd (r, n) ═ 1.
(b2) Calculating the encryption information c ═ gm·rnmod n2Wherein m is a plaintext, and m is more than 0 and less than n.
For example, the encrypting the related data of the financial resource provider by the first computer device based on the generated encryption key using an encryption algorithm of a homomorphic encryption scheme, and obtaining the encrypted related data includes: e (roe), e (eps), e (artr), e (qr), e (oir), e (tq), wherein e (roe) represents the net asset profitability after encryption, e (eps) represents the per-share income after encryption, e (artr) represents the receivable turnover rate after encryption, e (qr) represents the snap rate after encryption, e (oir) represents the income increase rate after encryption, and e (tq) represents the ratio between the market value of the enterprise after encryption and the asset replacement cost represented by the stocks.
Step S2, the first computer device sends the encrypted related data to a second computer device. The first computer device also sends the decryption key to a third computer device.
In this embodiment, the second computer device is a computer device of a fund wind controller (e.g., a bank). The third computer device is a sponsor's computer device.
It should be noted that, in other embodiments, the first computer device may also send the decryption key to the third computer device before acquiring the encrypted related data. In other words, the first computer device may also send the decryption key to the third computer device prior to encrypting the data associated with the financer.
In one embodiment, the first computer device may provide an operator interface from which the decryption key is sent to the third computer device when a confirmation signal from the user is received. In other words, the first computer device may send the decryption key to the third computer device in response to user input.
And step S3, the second computer device receives the encrypted related data and calculates the encrypted enterprise default probability based on the encrypted related data.
In this embodiment, the second computer device calculates, according to a preset wind control model as follows, the encrypted enterprise default probability based on the encrypted related data.
Specifically, the expression of the wind control model is as follows:
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap rate, e (oir) represents the encrypted revenue growth rate, e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
Step S4, the second computer device sending the encrypted enterprise default probability to the third computer device.
Step S5, the third computer device receives the encrypted enterprise default probability and receives the decryption private key sent by the first computer device.
Step S6, the third computer device decrypts the encrypted enterprise default probability by using the decryption private key, so as to obtain the decrypted enterprise default probability.
Specifically, the third computer device may decrypt the encrypted enterprise default probability based on the decryption private key by using a decryption algorithm of a homomorphic encryption scheme.
Specifically, the decrypted enterprise default probability m ═ L (c)λmod n2) μ mod n, where c represents the encrypted traffic violation probability, i.e. e (logit p) as described above.
In one embodiment, the third computer device further destroys the decryption key after obtaining the decrypted enterprise breach probability.
In summary, in the credit wind control method based on privacy protection of the present invention, the sponsor only holds the private key and does not have the encrypted client data, so that the data cannot be decrypted, and the client data privacy is protected; the wind control party only has the encrypted client data without a private key, so that the data cannot be decrypted, and the privacy of the client data is protected; the model of the wind control party is not leaked, and the safety of the model is protected.
The privacy protection-based credit wind control method of the present invention is described in detail in the above fig. 2, and functional modules of a software system implementing the privacy protection-based credit wind control method and a hardware device architecture implementing the privacy protection-based credit wind control method are described below with reference to fig. 3 and 4.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
Referring to fig. 3, a functional block diagram of a software system for implementing the privacy protection-based credit wind control method according to a preferred embodiment of the present invention is shown.
In some embodiments, the software system 200 for implementing the privacy protection based credit wind control method may include a plurality of functional modules comprised of program code. In this embodiment, the software system 200 may be divided into a plurality of functional modules according to the functions performed by the software system. The plurality of functional modules may include: an encryption module 201, a first sending module 202, a first receiving module 203, a second sending module 204, a second receiving module 205, and a decryption module 206. The module referred to herein is a series of computer program segments capable of being executed by at least one processor and capable of performing a fixed function and is stored in memory. In the present embodiment, the functions of the modules will be described in detail in the following embodiments.
Referring to fig. 4, in the present embodiment, the software system 200 can be stored in the first memory 11 of the first computing device 1, the second memory 21 of the second computing device 2, and the third memory 31 of the third computing device 3 at the same time.
In this embodiment, the encryption module 201 and the first sending module 202 are executed by the first processor 12 of the first computer apparatus 1; the second processor 22 of the second computer device 2 executes the first receiving module 203 and the second sending module 204; the third processor 32 of the third computer apparatus 3 executes the second receiving module 205, and the decryption module 206, thereby implementing (see fig. 2 for details) the functions of the privacy protection-based credit wind control method.
In this embodiment, the encryption module 201 is configured to obtain an encryption key and a decryption key, and encrypt related data of the financial resource using the encryption key.
In this embodiment, the first computer device is a computer device of a financing party.
In this embodiment, the encryption module 201 may obtain the encryption key and the decryption key by using a key generation algorithm of a homomorphic encryption scheme.
Specifically, the obtaining of the encryption key and the decryption key includes:
(a1) two large prime numbers are randomly selected, and gcd (pq, (p-1) (q-1)) -1 is satisfied. Thereby, it is ensured that the two prime numbers selected are of equal length.
(a2) The values of n and λ are calculated, where n ═ pq and λ ═ lcm (p-1, q-1).
(a3) Text setting
Figure BDA0002200550560000121
(a4) Randomly selecting one less than n2And calculating μ ═ L (g) andλmod n2))-1mod n。
(a5) the public key is obtained as (n, g) and the private key is obtained as (λ, μ).
In one embodiment, the data related to the financier includes, but is not limited to:
ROE: net asset profitability, which is the percentage of net profit to average equity, reflects the profit level of equity.
EPS: the income per share refers to the net profit of the enterprise shared by each shareholder or the net loss of the enterprise to be borne, and is generally used for reflecting the operation result of the enterprise and measuring the profit level and the investment risk of the common share.
ARTR: the receivable turnover rate refers to the ratio of credit net income and average receivable balance of the enterprise in a certain period. The method is an index for measuring the turnover speed and the management efficiency of the receivable accounts of the enterprise.
QR: the quick action ratio refers to the ratio of the quick action assets and the flowing liability of the enterprise, and is used for measuring the performance change capability of the enterprise.
OIR: the income increase rate refers to the ratio of the income increase of the enterprise in the current year to the total income of the enterprise in the last year, and measures the development capacity of the enterprise.
TQ: the asset resetting cost of the enterprise stock market value/stock representative refers to the ratio between the asset resetting cost of the enterprise stock market value and the asset resetting cost of the stock representative.
In one embodiment, the encryption module 201 may encrypt the related data of the financer based on the generated encryption key by using an encryption algorithm of a homomorphic encryption scheme, so as to obtain the encrypted related data.
Specifically, the encrypting the relevant data of the financial resource supplier based on the generated encryption key by using the encryption algorithm of the homomorphic encryption scheme to obtain the encrypted relevant data includes:
(b1) random number r is chosen, 0 < r < n, and gcd (r, n) ═ 1.
(b2) Calculating the encryption information c ═ gm·rnmod n2Wherein m is a plaintext, and m is more than 0 and less than n.
For example, the encrypting the related data of the financial resource provider by the first computer device based on the generated encryption key using an encryption algorithm of a homomorphic encryption scheme, and obtaining the encrypted related data includes: e (roe), e (eps), e (artr), e (qr), e (oir), e (tq), wherein e (roe) represents the net asset profitability after encryption, e (eps) represents the per-share income after encryption, e (artr) represents the receivable turnover rate after encryption, e (qr) represents the snap rate after encryption, e (oir) represents the income increase rate after encryption, and e (tq) represents the ratio between the market value of the enterprise after encryption and the asset replacement cost represented by the stocks.
The first sending module 202 is configured to send the encrypted related data to a second computer device. The first sending module 202 is further configured to send the decryption key to a third computer device.
In this embodiment, the second computer device is a computer device of a fund wind controller (e.g., a bank). The third computer device is a sponsor's computer device.
It should be noted that, in other embodiments, the first sending module 202 may also send the decryption key to the third computer device before obtaining the encrypted related data. In other words, the first sending module 202 may also send the decryption key to the third computer device before the encryption module 201 encrypts the relevant data of the financer.
In one embodiment, the first sending module 202 may provide an operation interface, and send the decryption key to the third computer device when receiving a confirmation signal from the operation interface. In other words, the first sending module 202 may send the decryption key to the third computer device in response to a user input.
The first receiving module 203 is configured to receive the encrypted related data, and calculate an encrypted enterprise default probability based on the encrypted related data.
In this embodiment, the first receiving module 203 calculates, according to a preset wind control model as follows, an encrypted enterprise default probability based on the encrypted related data.
Specifically, the expression of the wind control model is as follows:
Figure BDA0002200550560000141
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap rate, e (oir) represents the encrypted revenue growth rate, e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
The second sending module 204 sends the encrypted enterprise default probability to the third computer device.
The second receiving module 205 receives the encrypted enterprise default probability and the decryption private key sent by the first computer device.
The decryption module 206 decrypts the encrypted enterprise default probability by using the decryption private key, so as to obtain the decrypted enterprise default probability.
Specifically, the decryption module 206 may decrypt the encrypted enterprise default probability based on the decryption private key by using a decryption algorithm of a homomorphic encryption scheme.
Specifically, the decrypted enterprise default probability m ═ L (c)λmod n2) μ mod n, where c represents the encrypted traffic violation probability, i.e. e (logit p) as described above.
It should be noted that, in this embodiment, the second receiving module 205 and the decrypting module 206 may be a compiled dynamic link library or a compiled static library (dll/lib), respectively.
It should be further noted that, in this embodiment, the source codes of the second receiving module 205 and the decrypting module 206 may be compiled by a user or compiled by a notary of three parties to obtain trust of the user, and any party may check the integrity of the dll/lib by checking the compiled file MD, and the source codes should be disclosed.
In one embodiment, the decryption module 206 further destroys the decryption key after obtaining the decrypted enterprise default probability.
In summary, the software system for implementing the credit wind control method based on privacy protection of the present invention enables the sponsor to only hold the private key and not to have the encrypted customer data, so that the data cannot be decrypted and the privacy of the customer data is protected; the wind control party only has the encrypted client data without a private key, so that the data cannot be decrypted, and the privacy of the client data is protected; the model of the wind control party is not leaked, and the safety of the model is protected.
Referring to fig. 4, in the preferred embodiment of the present invention, the first computer device 1 further includes at least one communication bus 13. The second computer arrangement 2 further comprises at least one communication bus 23. The third computer arrangement 3 further comprises at least one communication bus 33. It will be understood by those skilled in the art that the configuration of each computer apparatus (i.e. the first computer apparatus 1, the second computer apparatus 2, and the third computer apparatus 3) shown in fig. 4 does not limit the embodiment of the present invention, and may be a bus-type configuration or a star-type configuration, that is, each computer apparatus may further include more or less other hardware or software than those shown in the figures, or different component arrangements.
In some embodiments, the computer devices may respectively include a terminal capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions, and the hardware includes but is not limited to a microprocessor, an application specific integrated circuit, a programmable gate array, a digital processor, an embedded device, and the like.
It should be noted that the computer devices are only examples, and other electronic products that are currently available or may come into existence in the future, such as electronic products that can be adapted to the present invention, should also be included in the scope of the present invention, and are also included herein by reference.
In some embodiments, the first memory 11, the second memory 21, and the third memory 31 are respectively used for storing program codes and various data, for example, respectively storing the software system 200 for implementing the credit wind control method based on privacy protection, and implementing high-speed and automatic access to programs or data during the operation of the computer device. The first Memory 11, the second Memory 21, and the third Memory 31 respectively include a Read-Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), a One-time Programmable Read-Only Memory (OTPROM), an electronically Erasable rewritable Read-Only Memory (EEPROM), a compact disc Read-Only Memory (CD-ROM) or other optical disc Memory, a magnetic disk Memory, a tape Memory, or any other nonvolatile readable storage medium capable of carrying or storing data.
In some embodiments, the first processor 12, the second processor 22, and the third processor 32 may be respectively composed of integrated circuits, for example, may be respectively composed of a single packaged integrated circuit, or may be respectively composed of a plurality of integrated circuits packaged with the same function or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital processing chips, graphics processors, and combinations of various control chips, and the like. The first processor 12, the second processor 22, and the third processor 32 are Control cores (Control units) of the first computer apparatus 1, the second computer apparatus 2, and the third computer apparatus 3, respectively, and implement various functions and process data by running or executing programs or modules stored in the memories, and calling data stored in the memories, for example, implementing the function of the credit wind Control based on privacy protection.
In some embodiments, the communication bus 13 is arranged to enable connection communication between the first memory 11 and the first processor 12, etc. The communication bus 23 is provided to enable connection communication between the second memory 21 and the second processor 22 and the like. The communication bus 33 is provided to enable connection communication between the third memory 31 and the third processor 32 and the like.
Although not shown, the first computer apparatus 1, the second computer apparatus 2, and the third computer apparatus 3 may further include power supplies (for example, batteries) for supplying power to the respective components, so that functions of managing charging, discharging, and power consumption are realized by the power management apparatus. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The first computer device 1, the second computer device 2, and the third computer device 3 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The integrated unit implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module includes instructions for causing a computer device (which may be a server, a personal computer, etc.) or a processor (processor) to perform the parts of the methods according to the embodiments of the present invention.
In a further embodiment, referring to fig. 2, the first processor 12, the second processor 22, and the third processor 32 may respectively execute the operating devices of the first computer device 1, the second computer device 2, and the third computer device 3, and various installed application programs (such as the software system 200), for example, the above modules.
The first memory 11, the second memory 21 and the third memory 31 respectively store program codes, and the first processor 12, the second processor 22 and the third processor 32 can call the program codes stored in the first memory 11, the second memory 21 and the third memory 31 respectively to execute related functions. For example, the modules shown in fig. 2 are program codes stored in the first memory 11, the second memory 21, and the third memory 31, and executed by the first memory 11, the second memory 21, and the third memory 31, so as to implement the functions of the modules for the purpose of credit management based on privacy protection.
In one embodiment of the present invention, the first memory 11, the second memory 21, and the third memory 31 respectively store a plurality of instructions that are executed by the first processor 12, the second processor 22, and the third processor 32 to achieve the purpose of the privacy-based credit wind control. The specific steps are shown in fig. 2, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or that the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A credit wind control method based on privacy protection is applied to a computer device of a wind controller, and is characterized by comprising the following steps:
receiving encrypted financing party related data sent by a financing party computer device;
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party; and
and sending the encrypted enterprise default probability to a computer device of the sponsor.
2. The privacy protection based credit governance method according to claim 1, wherein said calculating an encrypted enterprise default probability based on the encrypted financer-related data comprises:
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure FDA0002200550550000011
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
3. The privacy protection-based credit blast control method of claim 1, wherein the sponsor's computer device receives the encrypted business breach probability, decrypts the encrypted business breach probability using a decryption private key sent by the financer's computer device, thereby obtaining a decrypted business breach probability.
4. A computer device, the computer device comprising:
a memory;
a processor;
the memory stores at least one instruction, execution of which by the processor implements:
receiving encrypted financing party related data sent by a financing party computer device;
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party; and
and sending the encrypted enterprise default probability to a computer device of the sponsor.
5. The computer device of claim 4, wherein the calculating an encrypted probability of breach of business based on the encrypted financer-related data comprises:
calculating to obtain the encrypted enterprise default probability based on the encrypted related data of the financing party according to a preset wind control model, wherein the expression of the wind control model is as follows:
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
6. The computer device of claim 4, wherein the sponsor's computer device receives the encrypted enterprise default probability and decrypts the encrypted enterprise default probability using a decryption private key sent by the financer's computer device to obtain a decrypted enterprise default probability.
7. A credit wind control system based on privacy protection, comprising a first computer device of a financing party, a second computer device of a wind control party, and a third computer device of a sponsor, characterized in that:
the first computer device obtains an encryption key and a decryption key, and encrypts related data of the financial supplier by using the encryption key;
the first computer device sending the encrypted relevant data to the second computer device and sending the decryption key to the third computer device;
the second computer device receives the encrypted related data and calculates and obtains the encrypted enterprise default probability based on the encrypted related data;
the second computer device sending the encrypted enterprise default probability to the third computer device;
the third computer device receives the encrypted enterprise default probability and the decryption private key;
and the third computer device decrypts the encrypted enterprise default probability by using the decryption private key so as to obtain the decrypted enterprise default probability.
8. The privacy protection-based credit wind control system of claim 7, wherein the calculating an encrypted business breach probability based on the encrypted relevant data comprises:
calculating and obtaining the encrypted enterprise default probability based on the encrypted related data according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure FDA0002200550550000031
wherein e (logitp) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio of the encrypted enterprise stock market value to the asset replacement cost represented by the stock.
9. A credit wind control method based on privacy protection is applied to a first computer device of a financing party, a second computer device of a wind control party and a third computer device of a sponsor, and is characterized by comprising the following steps:
obtaining an encryption key and a decryption key by using the first computer device, and encrypting data related to the financial supplier based on the encryption key;
transmitting, with the first computer device, the encrypted relevant data to the second computer device and the decryption key to the third computer device;
receiving the encrypted related data by using the second computer device, and calculating to obtain the encrypted enterprise default probability based on the encrypted related data;
sending, with the second computer device, the encrypted enterprise default probability to the third computer device;
receiving, with the third computer device, the encrypted enterprise breach probability and the decryption private key;
and decrypting the encrypted enterprise default probability based on the decryption private key by using the third computer device, so as to obtain the decrypted enterprise default probability.
10. The privacy protection based credit windmilling method of claim 9, wherein the calculating an encrypted business default probability based on the encrypted relevant data comprises:
calculating and obtaining the encrypted enterprise default probability based on the encrypted related data according to a preset wind control model, wherein the expression of the wind control model is as follows:
Figure FDA0002200550550000041
wherein e (logit p) represents the encrypted enterprise default probability, e (roe) represents the encrypted net asset profitability, e (eps) represents the encrypted earnings per share, e (artr) represents the encrypted receivables turnover rate, e (qr) represents the encrypted snap-action rate, e (oir) represents the encrypted revenue growth rate, and e (tq) represents the ratio between the encrypted enterprise stock market value and the asset replacement cost represented by the stock.
CN201910863522.7A 2019-09-12 2019-09-12 Credit wind control system and method based on privacy protection and computer device Pending CN110648218A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910863522.7A CN110648218A (en) 2019-09-12 2019-09-12 Credit wind control system and method based on privacy protection and computer device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910863522.7A CN110648218A (en) 2019-09-12 2019-09-12 Credit wind control system and method based on privacy protection and computer device

Publications (1)

Publication Number Publication Date
CN110648218A true CN110648218A (en) 2020-01-03

Family

ID=69010520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910863522.7A Pending CN110648218A (en) 2019-09-12 2019-09-12 Credit wind control system and method based on privacy protection and computer device

Country Status (1)

Country Link
CN (1) CN110648218A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114297689A (en) * 2021-12-29 2022-04-08 鲁信科技股份有限公司 Financial wind control method and device based on privacy calculation and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236681A1 (en) * 2003-02-28 2004-11-25 Franco Modigliani Enhanced system for electronic funds transfer and elimination of the payee's need for encryption and privacy
CN105052071A (en) * 2013-03-15 2015-11-11 惠普发展公司,有限责任合伙企业 Sending encrypted data to a service provider
CN109327304A (en) * 2018-12-18 2019-02-12 武汉大学 The lightweight homomorphic cryptography method of secret protection is realized in a kind of cloud computing
CN109636584A (en) * 2018-11-19 2019-04-16 平安科技(深圳)有限公司 Default Probability methods of exhibiting, device, computer equipment and storage medium
CN110008717A (en) * 2019-02-26 2019-07-12 东北大学 Support the decision tree classification service system and method for secret protection
CN110163741A (en) * 2019-04-16 2019-08-23 深圳壹账通智能科技有限公司 Credit decisions method, apparatus, equipment and medium based on credit air control model

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236681A1 (en) * 2003-02-28 2004-11-25 Franco Modigliani Enhanced system for electronic funds transfer and elimination of the payee's need for encryption and privacy
CN105052071A (en) * 2013-03-15 2015-11-11 惠普发展公司,有限责任合伙企业 Sending encrypted data to a service provider
CN109636584A (en) * 2018-11-19 2019-04-16 平安科技(深圳)有限公司 Default Probability methods of exhibiting, device, computer equipment and storage medium
CN109327304A (en) * 2018-12-18 2019-02-12 武汉大学 The lightweight homomorphic cryptography method of secret protection is realized in a kind of cloud computing
CN110008717A (en) * 2019-02-26 2019-07-12 东北大学 Support the decision tree classification service system and method for secret protection
CN110163741A (en) * 2019-04-16 2019-08-23 深圳壹账通智能科技有限公司 Credit decisions method, apparatus, equipment and medium based on credit air control model

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114297689A (en) * 2021-12-29 2022-04-08 鲁信科技股份有限公司 Financial wind control method and device based on privacy calculation and storage medium
CN114297689B (en) * 2021-12-29 2022-09-20 鲁信科技股份有限公司 Financial wind control method and device based on privacy calculation and storage medium

Similar Documents

Publication Publication Date Title
US20210152363A1 (en) Blockchain recording methods and apparatuses, and computer devices
US8418184B2 (en) Use of constraint-based linear programming to optimize hardware system usage
CN109426732B (en) Data processing method and device
US10628610B2 (en) Identifying stolen databases
CN109726563B (en) Data statistics method, device and equipment
CN107579962A (en) A kind of method and device of source code encryption and decryption
CN103634339A (en) Virtual encryptor device, financial encryptor and method of encrypting message
CN112753196B (en) HSM self-destruction method, system and storage medium in hybrid cloud KMS solution
CN112135265B (en) Call bill processing method and device and computer equipment
CN107528912A (en) A kind of automatic method, system and relevant apparatus for realizing distributing real time system
CN113544674A (en) Secure execution client owner control for secure interface controls
US9712500B2 (en) Distributed computing utilizing homomorphic encryption
CN110648218A (en) Credit wind control system and method based on privacy protection and computer device
US10168759B2 (en) Hierarchical prioritized charging for battery backup units on computing data centers
US20220092221A1 (en) Systems and methods for real-time encryption of sensitive data
EP4026083A1 (en) Processing data and programs with mutual security to the data and programs
CN114969832B (en) Private data management method and system based on server-free architecture
CN116048808A (en) Task type-based multi-security chip scheduling method and security chip device
Joshi et al. Era of Cloud Computing
CN110059081A (en) Data output method, device and the computer equipment shown based on data
CN113570373B (en) Responsibility pursuing transaction method and system based on block chain
WO2020211073A1 (en) Blockchain and secure multi-party computation-based transaction method and apparatus, and storage medium
CN107169761B (en) Method and device for generating IC (integrated circuit) card security data
CN111402018A (en) Method and system for reporting resource budget
CN114969211B (en) Civil aviation data processing system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200103

RJ01 Rejection of invention patent application after publication