CN111090842B - Supply chain financial customer loan information protection method based on zero knowledge certification - Google Patents
Supply chain financial customer loan information protection method based on zero knowledge certification Download PDFInfo
- Publication number
- CN111090842B CN111090842B CN201911335682.0A CN201911335682A CN111090842B CN 111090842 B CN111090842 B CN 111090842B CN 201911335682 A CN201911335682 A CN 201911335682A CN 111090842 B CN111090842 B CN 111090842B
- Authority
- CN
- China
- Prior art keywords
- user
- supply chain
- information
- block chain
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of information protection, and discloses a supply chain financial customer loan information protection method based on zero knowledge proof, which comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when a user writes and/or reads data information into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof; if the user isWhen the identity authentication is legal, the user is allowed
Description
Technical Field
The invention relates to the technical field of information protection, in particular to a supply chain financial customer loan information protection method based on zero knowledge proof.
Background
Supply chain financing mainly depends on the credit of the core enterprise by banks, provides financing financial solution for the whole supply chain, and actually converts the financing capacity of the core enterprise into the financing capacity of upstream and downstream small and medium enterprises, thereby improving the credit level of the upstream and downstream small and medium enterprises.
At present, small and medium enterprises on the upstream and downstream of a supply chain cooperate through a block chain, all data are reliable, and thus a bank can ensure the authenticity of a loan condition by acquiring the real historical production condition and the current production condition of the loan enterprise in a block chain database.
However, for loan enterprises in supply chain financing, a series of loan-related business data, such as the confidential transaction stream, frequency, business objects and the like of the enterprise core, are synchronously disclosed among different nodes of the block chain, and once the core business data is known by competitors, the loan enterprises are greatly threatened.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a supply chain financial customer loan information protection method based on zero knowledge proof, which solves the technical problem that the loan information of the financial customers stored in the database of the supply chain financial block chain is illegally written and/or read at present.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a supply chain financial client loan information protection method based on zero knowledge proof comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a userWhen data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof;
if the user isWhen the identity authentication is legal, the user is allowedWriting and/or reading data information into a database of a supply chain financial block chain; if the user isIf the authentication is illegal, the user is not allowedWriting and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication moduleAutomatically creating a character stringIs related toAnd combining the character stringsCorrelation functionTo users within a supply chain financial block chain;
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character stringPerforming correlation to obtain correlation number;
Step three: user' sRandomly selecting a bitA natural number having a number of at least 3User identity authentication module calculationAnd will be calculatedBack to the user;
Step four: user' sAccording to、、Calculating an integer N; if the user isIf the calculated N is identical to the integer N randomly selected by the user identity authentication module, the user is provedLegal users belonging to the supply chain financial block chain; if the user isIf the calculated N is not the same as the integer N randomly selected by the user identity authentication module, the user is provedWithin supply chain golden melt block chainAn illegal user.
Further, the information protection system is used for usersWhen loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' sBefore the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step four: user authentication module random generationAccording to the correlation functionCalculate out;
step five: user' sAccording to known conditionsAnd will be calculatedInputting the data into a dialog box;
step six: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for usersReading loan information into a database of a supply chain financial block chainThe specific protection method comprises the following steps:
the method comprises the following steps: user' sWhen the loan information is read from the block database of the supply chain financial block chain network, the loan information search page is locked and popped up and matched with the userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step three: user authentication module random generationAccording to the correlation functionCalculate out;
Step four: user' sAccording to known conditionsAnd will be calculatedInputting the data into a dialog box;
step five: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. the invention is characterized in that users are availableWhen data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof; if the user isWhen the identity authentication is legal, the user is allowedWriting and/or reading data information into a database of a supply chain financial block chain; if the user isIf the authentication is illegal, the user is not allowedData information is written and/or read into the database of the supply chain financial block chain, so that the technical problem that financial customer loan information stored in the database of the supply chain financial block chain is illegally written and/or read at present is solved.
Detailed Description
A supply chain financial client loan information protection method based on zero knowledge proof comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a userWhen data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof;
if the user isWhen the identity authentication is legal, the user is allowedWriting and/or reading data information into a database of a supply chain financial block chain; if the user isIf the authentication is illegal, the user is not allowedWriting and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication moduleAutomatically creating a character stringIs related toAnd combining the character stringsCorrelation functionTo users within a supply chain financial block chain;
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character stringPerforming correlation to obtain correlation number;
Step three: user' sRandomly selecting a natural number with a digit of at least 3User identity authentication module calculationAnd will be calculatedBack to the user;
Step four: user' sAccording to、、Calculating an integer(ii) a If the user isCalculatedIf the integer N is completely the same as the integer N randomly selected by the user identity authentication module, the user is certifiedLegal users belonging to the supply chain financial block chain; if the user isIf the calculated N is not the same as the integer N randomly selected by the user identity authentication module, the user is provedBelonging to illegal users in the supply chain financial block chain.
Further, the information protection system is used for usersWhen loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' sBefore the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step four: user authentication module random generationAccording to the correlation functionCalculate out;
step five: user' sAccording to known conditionsAnd will be calculatedInputting the data into a dialog box;
step six: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for usersWhen the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' sWhen the loan information is read from the block database of the supply chain financial block chain network, the loan information search page is locked and popped up and matched with the userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step three: user authentication module random generationAccording to the correlation functionCalculate out;
step four: user' sAccording to known conditionsAnd will be calculatedInputting the data into a dialog box;
step five: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.
Claims (3)
1. A supply chain finance client loan information protection method based on zero knowledge proof is characterized by comprising an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a userWhen data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data informationPerforming identity verification based on zero-knowledge proof;
if the user isWhen the identity authentication is legal, the user is allowedWriting and/or reading data information into a database of a supply chain financial block chain; if the user isIf the authentication is illegal, the user is not allowedWriting and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication moduleAutomatically creating a character stringIs related toAnd combining the character stringsCorrelation functionTo users within a supply chain financial block chain;
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character stringPerforming correlation to obtain correlation number;
Step three: user' sRandomly selecting a natural number with a digit of at least 3User identity authentication module calculationAnd will be calculatedBack to the user;
Step four: user' sAccording to、、Calculating an integer(ii) a If the user isCalculatedIf the integer N is completely the same as the integer N randomly selected by the user identity authentication module, the user is certifiedLegal users belonging to the supply chain financial block chain; if the user isIf the calculated N ʹ is not the same as the randomly selected integer N of the user identity authentication module, the user is certifiedBelonging to illegal users in the supply chain financial block chain.
2. The method as claimed in claim 1, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chainWhen loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' sIn the zone of melting of gold in the supply chainBefore the loan information is written into the block database of the block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step four: user authentication module random generationAccording to the correlation functionCalculate out;
step five:user' sAccording to known conditionsAnd will be calculatedInputting the data into a dialog box;
step six: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
3. The method as claimed in claim 2, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chainWhen the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' sIn the supply chain, the block chain is meltedWhen the loan information is read from the block database of the network, the loan information search page is locked and pops up on the search page and the userThe interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
Step three: user authentication module random generationAccording to the correlation functionCalculate out;
step four: user' sAccording to known conditionsAnd will be calculatedInputting the data into a dialog box;
step five: user identity authentication module logarithm valueAnd a numerical valueVerifying the consistency of the data; if value ofAnd a numerical valueIf the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911335682.0A CN111090842B (en) | 2019-12-23 | 2019-12-23 | Supply chain financial customer loan information protection method based on zero knowledge certification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911335682.0A CN111090842B (en) | 2019-12-23 | 2019-12-23 | Supply chain financial customer loan information protection method based on zero knowledge certification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111090842A CN111090842A (en) | 2020-05-01 |
CN111090842B true CN111090842B (en) | 2022-04-26 |
Family
ID=70395154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911335682.0A Active CN111090842B (en) | 2019-12-23 | 2019-12-23 | Supply chain financial customer loan information protection method based on zero knowledge certification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111090842B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112732832B (en) * | 2021-01-06 | 2024-02-13 | 上海泰砥科技有限公司 | Block chain supply chain financial supply method and system based on DID and zero knowledge proof |
CN113822672B (en) * | 2021-11-22 | 2022-02-18 | 浙江数秦科技有限公司 | Block chain consensus method based on zero knowledge proof |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003050544A (en) * | 2001-08-07 | 2003-02-21 | Nec Corp | Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm |
CN101080897A (en) * | 2005-07-13 | 2007-11-28 | 日本电信电话株式会社 | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium |
CN101175076A (en) * | 2007-10-23 | 2008-05-07 | 赵运磊 | High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation |
TW201308969A (en) * | 2011-08-12 | 2013-02-16 | Sony Corp | Information processing device, information processing method, program, and recording medium |
CN106330454A (en) * | 2016-08-16 | 2017-01-11 | 优云合(北京)科技有限公司 | Digital certificate generating method and digital certificate verifying method |
CN107392063A (en) * | 2017-07-11 | 2017-11-24 | 深圳大普微电子科技有限公司 | Binding, verification method and the system of storage device and main frame |
CN109272631A (en) * | 2017-07-17 | 2019-01-25 | 卡巴斯基实验室股份制公司 | The system and method for determining the ballot paper of the voter collected by electronic voting |
CN109274504A (en) * | 2018-11-20 | 2019-01-25 | 桂林电子科技大学 | A kind of multi-user's big data storage sharing method and system based on cloud platform |
CN109858852A (en) * | 2018-12-26 | 2019-06-07 | 上海源庐加佳信息科技有限公司 | A kind of warehouse receipt verification method based on block chain and zero-knowledge proof |
CN110555933A (en) * | 2019-07-31 | 2019-12-10 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Electronic voting method, device, equipment and computer storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160065558A1 (en) * | 2013-01-08 | 2016-03-03 | Coursera, Inc. | Identity verification for online education |
-
2019
- 2019-12-23 CN CN201911335682.0A patent/CN111090842B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003050544A (en) * | 2001-08-07 | 2003-02-21 | Nec Corp | Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm |
CN101080897A (en) * | 2005-07-13 | 2007-11-28 | 日本电信电话株式会社 | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium |
CN101175076A (en) * | 2007-10-23 | 2008-05-07 | 赵运磊 | High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation |
TW201308969A (en) * | 2011-08-12 | 2013-02-16 | Sony Corp | Information processing device, information processing method, program, and recording medium |
CN106330454A (en) * | 2016-08-16 | 2017-01-11 | 优云合(北京)科技有限公司 | Digital certificate generating method and digital certificate verifying method |
CN107392063A (en) * | 2017-07-11 | 2017-11-24 | 深圳大普微电子科技有限公司 | Binding, verification method and the system of storage device and main frame |
CN109272631A (en) * | 2017-07-17 | 2019-01-25 | 卡巴斯基实验室股份制公司 | The system and method for determining the ballot paper of the voter collected by electronic voting |
CN109274504A (en) * | 2018-11-20 | 2019-01-25 | 桂林电子科技大学 | A kind of multi-user's big data storage sharing method and system based on cloud platform |
CN109858852A (en) * | 2018-12-26 | 2019-06-07 | 上海源庐加佳信息科技有限公司 | A kind of warehouse receipt verification method based on block chain and zero-knowledge proof |
CN110555933A (en) * | 2019-07-31 | 2019-12-10 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Electronic voting method, device, equipment and computer storage medium |
Non-Patent Citations (1)
Title |
---|
新的可重置的单轮零知识证明;赵建;《计算机应用》;20130630;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111090842A (en) | 2020-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11562451B1 (en) | Apparatus for proportional calculation regarding non-fungible tokens | |
CN112600810B (en) | Ether house phishing fraud detection method and device based on graph classification | |
US7240363B1 (en) | System and method for thwarting identity theft and other identity misrepresentations | |
CN108764877B (en) | Digital asset right-confirming trading method based on block chain technology | |
CN108288157A (en) | A kind of supply chain management method based on financial block chain technology | |
CN106097101A (en) | A kind of block chain realizes the management method of financial transaction | |
JP2004532448A (en) | Distributed quantum encrypted pattern generation and scoring | |
WO2017218440A1 (en) | Secure initiation and transfer of a cryptographic database and/or a cryptographic unit | |
CN108710808A (en) | A kind of investigation payment platform based on block chain | |
Castonguay et al. | Digital assets and blockchain: hackable, fraudulent, or just misunderstood? | |
CN111090842B (en) | Supply chain financial customer loan information protection method based on zero knowledge certification | |
CN110199305A (en) | Computer-implemented system and method for determining the state of a machine-executable contract implemented using a blockchain | |
Katterbauer et al. | Financial cybercrime in the Islamic finance metaverse | |
US11663595B1 (en) | Blockchain transactional identity verification | |
Taskinsoy | The famous new bubbles of the 21st century: Cases of irrational exuberance | |
CN112801778A (en) | Federated bad asset blockchain | |
CN106909852A (en) | Intelligent contract encryption method and device based on triple md5 encryption algorithms | |
Kucheryavenko et al. | Cryptocurrencies: development, features and classification | |
Ingole et al. | Credit card fraud detection using Hidden Markov Model and its performance | |
WO2019177788A1 (en) | Detecting alterations of journal data structures | |
CN114169888B (en) | Universal type cryptocurrency custody method supporting multiple signatures | |
Thakur | Blockchain and cryptocurrency frauds: Emerging concern | |
Tian et al. | Generating Large-Scale Synthetic Payment Graphs with Realistic Fraudulent and Money Laundering Patterns | |
US11989276B2 (en) | Intelligent authentication of users in Metaverse leveraging non-fungible tokens and behavior analysis | |
Garayeva | TOP FEATURES OF CRYPTOCURRENCİES AND TYPES |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |