CN111090842A - Supply chain financial customer loan information protection method based on zero knowledge certification - Google Patents
Supply chain financial customer loan information protection method based on zero knowledge certification Download PDFInfo
- Publication number
- CN111090842A CN111090842A CN201911335682.0A CN201911335682A CN111090842A CN 111090842 A CN111090842 A CN 111090842A CN 201911335682 A CN201911335682 A CN 201911335682A CN 111090842 A CN111090842 A CN 111090842A
- Authority
- CN
- China
- Prior art keywords
- user
- supply chain
- information
- block chain
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of information protection, and discloses a supply chain financial customer loan information protection method based on zero knowledge proof, which comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when a user writes and/or reads data information into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof; if the user isWhen the identity authentication is legal, the user is allowed
Description
Technical Field
The invention relates to the technical field of information protection, in particular to a supply chain financial customer loan information protection method based on zero knowledge proof.
Background
Supply chain financing mainly depends on the credit of the core enterprise by banks, provides financing financial solution for the whole supply chain, and actually converts the financing capacity of the core enterprise into the financing capacity of upstream and downstream small and medium enterprises, thereby improving the credit level of the upstream and downstream small and medium enterprises.
At present, small and medium enterprises on the upstream and downstream of a supply chain cooperate through a block chain, all data are reliable, and thus a bank can ensure the authenticity of a loan condition by acquiring the real historical production condition and the current production condition of the loan enterprise in a block chain database.
However, for loan enterprises in supply chain financing, a series of loan-related business data, such as the confidential transaction stream, frequency, business objects and the like of the enterprise core, are synchronously disclosed among different nodes of the block chain, and once the core business data is known by competitors, the loan enterprises are greatly threatened.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a supply chain financial customer loan information protection method based on zero knowledge proof, which solves the technical problem that the loan information of the financial customers stored in the database of the supply chain financial block chain is illegally written and/or read at present.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a supply chain financial client loan information protection method based on zero knowledge proof comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a userWhen data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof;
if the user's identity is legal, the user is allowedWriting and/or reading data information into a database of a supply chain financial block chain; if the user identity is not verified to be legal, the user is not allowed to write and/or read data information into the database of the supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: user identity authentication module automatically generates character string and automatically establishes association function of character stringAnd associating the character string with the functionTransmitting to users in a supply chain financial block chain;
step two: the user identity authentication module randomly selects an integer N and combines the N with the character stringPerforming correlation, and calculating to obtain correlation number;
step three: user' sRandomly selecting a natural number with a digit of at least 3User identity authentication module calculationAnd will be calculatedBack to the user;
Step four: user' sAccording to、、Calculating an integer N; if the N calculated by the user is identical to the integer N randomly selected by the user identity authentication module, the user is provedLegal users belonging to the supply chain financial block chain; if the N calculated by the user is different from the integer N randomly selected by the user identity verification module, the user is proved to belong to an illegal user in the supply chain financial block chain.
Further, when the user writes loan information into the database of the supply chain financial block chain, the information protection system specifically protects the loan information by the method comprising the following steps:
the method comprises the following steps: user' sBefore the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up a dialog box for interactive communication with a user on the loan information writing page, wherein the interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step four: user authentication module random generationAccording to the correlation functionCalculate out;
step five: user calculation based on known conditionsAnd inputting the calculated value into a dialog box;
step six: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for usersWhen the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: when the user reads loan information from the block database of the supply chain financial block chain network, the loan information retrieval page is locked and pops up on the retrieval page and the userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step three: user authentication module random generationAccording to the correlation functionCalculating;
Step four: user' sAccording to known conditionsAnd inputting the calculated value into a dialog box;
step five: the user identity verification module verifies the numerical value and the consistency of the numerical value; if the numerical value is completely the same as the numerical value, unlocking a loan information retrieval page of a database of a supply chain financial block chain by the information protection system; otherwise, locking is continued.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. the invention writes and/or reads data information into and/or from a database of a supply chain financial block chain when a user is availablePerforming identity verification based on zero-knowledge proof; if the user isIf the identity authentication is legal, allowing the user to write and/or read data information into the database of the supply chain financial block chain; if the user isIf the user is not allowed to write and/or read data information into the database of the supply chain financial block chain, the technical problem that the financial customer loan information stored in the database of the supply chain financial block chain is illegally written and/or read is solved.
Detailed Description
A supply chain finance client loan information protection method based on zero knowledge certification comprises informationThe information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a userWhen data information is written in and/or read from a database of a supply chain financial block chain, identity verification based on zero knowledge proof is carried out on the user;
if the user identity is legal, allowing the user to write and/or read data information into the database of the supply chain financial block chain; if the user isIf the identity of the user is not verified to be legal, the user is not allowed to write and/or read data information into the database of the supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication moduleAutomatically creating a character stringAnd associating the character string with the other character stringCorrelation functionTransmitting to users in a supply chain financial block chain;
step two: the user identity authentication module randomly selects an integer N and combines the N with the character stringPerforming correlation, and calculating to obtain correlation number;
step three: user' sRandomly selecting a natural number with a digit of at least 3User identity authentication module calculationAnd returns the calculated result to the user;
Step four: user' sAccording to、、Calculating an integer N; if the N calculated by the user is identical to the integer N randomly selected by the user identity authentication module, the user is provedLegal users belonging to the supply chain financial block chain; if the N calculated by the user is different from the integer N randomly selected by the user identity verification module, the user is proved to belong to an illegal user in the supply chain financial block chain.
Further, the information protection system is used for usersWhen loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' sBefore the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step four: the user identity authentication module randomly generates a numerical value and calculates the numerical value according to the correlation function;
step five: user' sAccording to known conditionsAnd inputting the calculated value into a dialog box;
step six: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if and whenIf the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for usersWhen the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: when the user reads loan information from the block database of the supply chain financial block chain network, the loan information retrieval page is locked and pops up on the retrieval page and the userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: user authentication module random generationAccording to the correlation functionCalculate out;
step four: user' sAccording to known conditionsAnd inputting the calculated value into a dialog box;
step five: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if and whenIf the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.
Claims (3)
1. A supply chain finance client loan information protection method based on zero knowledge proof is characterized by comprising an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when a user writes and/or reads data information into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof;
if the user's identity is legal, the user is allowedWriting and/or reading data information into a database of a supply chain financial block chain; if the user's identity is not authenticated, the user is not allowedWriting and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication moduleAutomatically creating a character stringIs related toAnd combining the character stringsThe correlation function is transmitted to the user in the supply chain financial block chain;
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character stringPerforming correlation to obtain correlation number;
Step three: the user randomly selects a natural number with a digit of at least 3User identity authentication module calculationAnd will be calculatedReturning to the user;
step four: user' sAccording to,Calculating an integer N; if the user isIf the calculated N is completely the same as the integer N randomly selected by the user identity verification module, the user is proved to belong to a legal user in the supply chain financial block chain; if the user isIf the calculated N is not the same as the integer N randomly selected by the user identity authentication module, the user is provedBelonging to illegal users in the supply chain financial block chain.
2. The method as claimed in claim 1, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chainWhen loan information is written into a database of a supply chain financial block chain, the loan information is specifiedThe protection method comprises the following steps:
the method comprises the following steps: before a user writes loan information into a block database of a supply chain financial block chain network, the information protection system locks a loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: the user inputs a numerical value in the dialog box;
step four: user authentication module random generationAnd calculating according to the correlation function;
step five: user' sAccording to known conditionsAnd inputting the calculated value into a dialog box;
step six: user identity authentication module logarithm valueVerifying the consistency with the numerical value; if value ofAnd a numerical valueIf the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
3. The method as claimed in claim 2, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chainWhen the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: when the user reads loan information from the block database of the supply chain financial block chain network, the loan information retrieval page is locked and pops up on the retrieval page and the userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step three: user authentication module random generationAccording to the correlation functionCalculating;
step four: user calculation based on known conditionsAnd will be calculatedInputting the data into a dialog box;
step five: user identity authentication module log value and numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; on the contrary, the method can be used for carrying out the following steps,the locking continues.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911335682.0A CN111090842B (en) | 2019-12-23 | 2019-12-23 | Supply chain financial customer loan information protection method based on zero knowledge certification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911335682.0A CN111090842B (en) | 2019-12-23 | 2019-12-23 | Supply chain financial customer loan information protection method based on zero knowledge certification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111090842A true CN111090842A (en) | 2020-05-01 |
CN111090842B CN111090842B (en) | 2022-04-26 |
Family
ID=70395154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911335682.0A Active CN111090842B (en) | 2019-12-23 | 2019-12-23 | Supply chain financial customer loan information protection method based on zero knowledge certification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111090842B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112732832A (en) * | 2021-01-06 | 2021-04-30 | 上海泰砥科技有限公司 | DID and zero knowledge proof based block chain supply chain financial supply method and system |
CN113822672A (en) * | 2021-11-22 | 2021-12-21 | 浙江数秦科技有限公司 | Block chain consensus method based on zero knowledge proof |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003050544A (en) * | 2001-08-07 | 2003-02-21 | Nec Corp | Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm |
CN101080897A (en) * | 2005-07-13 | 2007-11-28 | 日本电信电话株式会社 | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium |
CN101175076A (en) * | 2007-10-23 | 2008-05-07 | 赵运磊 | High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation |
TW201308969A (en) * | 2011-08-12 | 2013-02-16 | Sony Corp | Information processing device, information processing method, program, and recording medium |
US20160065558A1 (en) * | 2013-01-08 | 2016-03-03 | Coursera, Inc. | Identity verification for online education |
CN106330454A (en) * | 2016-08-16 | 2017-01-11 | 优云合(北京)科技有限公司 | Digital certificate generating method and digital certificate verifying method |
CN107392063A (en) * | 2017-07-11 | 2017-11-24 | 深圳大普微电子科技有限公司 | Binding, verification method and the system of storage device and main frame |
CN109274504A (en) * | 2018-11-20 | 2019-01-25 | 桂林电子科技大学 | A kind of multi-user's big data storage sharing method and system based on cloud platform |
CN109272631A (en) * | 2017-07-17 | 2019-01-25 | 卡巴斯基实验室股份制公司 | The system and method for determining the ballot paper of the voter collected by electronic voting |
CN109858852A (en) * | 2018-12-26 | 2019-06-07 | 上海源庐加佳信息科技有限公司 | A kind of warehouse receipt verification method based on block chain and zero-knowledge proof |
CN110555933A (en) * | 2019-07-31 | 2019-12-10 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Electronic voting method, device, equipment and computer storage medium |
-
2019
- 2019-12-23 CN CN201911335682.0A patent/CN111090842B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003050544A (en) * | 2001-08-07 | 2003-02-21 | Nec Corp | Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm |
CN101080897A (en) * | 2005-07-13 | 2007-11-28 | 日本电信电话株式会社 | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium |
CN101175076A (en) * | 2007-10-23 | 2008-05-07 | 赵运磊 | High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation |
TW201308969A (en) * | 2011-08-12 | 2013-02-16 | Sony Corp | Information processing device, information processing method, program, and recording medium |
US20160065558A1 (en) * | 2013-01-08 | 2016-03-03 | Coursera, Inc. | Identity verification for online education |
CN106330454A (en) * | 2016-08-16 | 2017-01-11 | 优云合(北京)科技有限公司 | Digital certificate generating method and digital certificate verifying method |
CN107392063A (en) * | 2017-07-11 | 2017-11-24 | 深圳大普微电子科技有限公司 | Binding, verification method and the system of storage device and main frame |
CN109272631A (en) * | 2017-07-17 | 2019-01-25 | 卡巴斯基实验室股份制公司 | The system and method for determining the ballot paper of the voter collected by electronic voting |
CN109274504A (en) * | 2018-11-20 | 2019-01-25 | 桂林电子科技大学 | A kind of multi-user's big data storage sharing method and system based on cloud platform |
CN109858852A (en) * | 2018-12-26 | 2019-06-07 | 上海源庐加佳信息科技有限公司 | A kind of warehouse receipt verification method based on block chain and zero-knowledge proof |
CN110555933A (en) * | 2019-07-31 | 2019-12-10 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Electronic voting method, device, equipment and computer storage medium |
Non-Patent Citations (1)
Title |
---|
赵建: "新的可重置的单轮零知识证明", 《计算机应用》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112732832A (en) * | 2021-01-06 | 2021-04-30 | 上海泰砥科技有限公司 | DID and zero knowledge proof based block chain supply chain financial supply method and system |
CN112732832B (en) * | 2021-01-06 | 2024-02-13 | 上海泰砥科技有限公司 | Block chain supply chain financial supply method and system based on DID and zero knowledge proof |
CN113822672A (en) * | 2021-11-22 | 2021-12-21 | 浙江数秦科技有限公司 | Block chain consensus method based on zero knowledge proof |
Also Published As
Publication number | Publication date |
---|---|
CN111090842B (en) | 2022-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108229962B (en) | Permission management method and system based on block chain | |
US11562451B1 (en) | Apparatus for proportional calculation regarding non-fungible tokens | |
US7240363B1 (en) | System and method for thwarting identity theft and other identity misrepresentations | |
CN109919756B (en) | Transfer system, checking method and transaction method based on Merkle tree backtracking positioning technology | |
CN108764877B (en) | Digital asset right-confirming trading method based on block chain technology | |
CN109146547A (en) | A kind of method of investigation and study and system based on block chain | |
CN108288157A (en) | A kind of supply chain management method based on financial block chain technology | |
CN109274501A (en) | License block chain method for secret protection based on Proxy Signature | |
US11663595B1 (en) | Blockchain transactional identity verification | |
Castonguay et al. | Digital assets and blockchain: Hackable, fraudulent, or just misunderstood? | |
CN111768296A (en) | Block chain-based small and micro enterprise loan approval method and device | |
CN111090842B (en) | Supply chain financial customer loan information protection method based on zero knowledge certification | |
CN107908932A (en) | A kind of digital cash based on L algorithms is false proof and verification method, system and equipment | |
CN112801778A (en) | Federated bad asset blockchain | |
CN113052594A (en) | Multi-card cooperative payment method and device based on block chain | |
Mamunts et al. | The use of authentication technology blockchain platform for the marine industry | |
Lu et al. | A study on adoption of bitcoin in Taiwan: Using big data analysis of social media | |
US20040133782A1 (en) | Anonymous electronic transactions using auditable membership proofs | |
WO2019177788A1 (en) | Detecting alterations of journal data structures | |
KR102376783B1 (en) | The blockchain-based transaction history confirmation system | |
CN114169888B (en) | Universal type cryptocurrency custody method supporting multiple signatures | |
Kazi et al. | NFT marketplace using blockchain | |
CN114782021A (en) | System and method for managing pre-loan due diligence data based on block chain | |
Shaikh et al. | Applications of Blockchain Technology and Crypto Currencies: Current Practice and Future Trends | |
Sharma et al. | Blockchain Technology: Reinventing the Security and Efficiency posture of the Indian Banking System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |