CN111090842B - Supply chain financial customer loan information protection method based on zero knowledge certification - Google Patents

Supply chain financial customer loan information protection method based on zero knowledge certification Download PDF

Info

Publication number
CN111090842B
CN111090842B CN201911335682.0A CN201911335682A CN111090842B CN 111090842 B CN111090842 B CN 111090842B CN 201911335682 A CN201911335682 A CN 201911335682A CN 111090842 B CN111090842 B CN 111090842B
Authority
CN
China
Prior art keywords
user
supply chain
information
block chain
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911335682.0A
Other languages
Chinese (zh)
Other versions
CN111090842A (en
Inventor
杨炜祖
李从恺
顾军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yuanlu Jiajia Information Technology Co ltd
Original Assignee
Shanghai Yuanlu Jiajia Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yuanlu Jiajia Information Technology Co ltd filed Critical Shanghai Yuanlu Jiajia Information Technology Co ltd
Priority to CN201911335682.0A priority Critical patent/CN111090842B/en
Publication of CN111090842A publication Critical patent/CN111090842A/en
Application granted granted Critical
Publication of CN111090842B publication Critical patent/CN111090842B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of information protection, and discloses a supply chain financial customer loan information protection method based on zero knowledge proof, which comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when a user writes and/or reads data information into the database of the supply chain financial block chain, the user is provided with the data information
Figure DEST_PATH_IMAGE001
Performing identity verification based on zero-knowledge proof; if the user is
Figure 770436DEST_PATH_IMAGE001
When the identity authentication is legal, the user is allowed

Description

Supply chain financial customer loan information protection method based on zero knowledge certification
Technical Field
The invention relates to the technical field of information protection, in particular to a supply chain financial customer loan information protection method based on zero knowledge proof.
Background
Supply chain financing mainly depends on the credit of the core enterprise by banks, provides financing financial solution for the whole supply chain, and actually converts the financing capacity of the core enterprise into the financing capacity of upstream and downstream small and medium enterprises, thereby improving the credit level of the upstream and downstream small and medium enterprises.
At present, small and medium enterprises on the upstream and downstream of a supply chain cooperate through a block chain, all data are reliable, and thus a bank can ensure the authenticity of a loan condition by acquiring the real historical production condition and the current production condition of the loan enterprise in a block chain database.
However, for loan enterprises in supply chain financing, a series of loan-related business data, such as the confidential transaction stream, frequency, business objects and the like of the enterprise core, are synchronously disclosed among different nodes of the block chain, and once the core business data is known by competitors, the loan enterprises are greatly threatened.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a supply chain financial customer loan information protection method based on zero knowledge proof, which solves the technical problem that the loan information of the financial customers stored in the database of the supply chain financial block chain is illegally written and/or read at present.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a supply chain financial client loan information protection method based on zero knowledge proof comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a user
Figure 100002_DEST_PATH_IMAGE002
When data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data information
Figure DEST_PATH_IMAGE002A
Performing identity verification based on zero-knowledge proof;
if the user is
Figure DEST_PATH_IMAGE002AA
When the identity authentication is legal, the user is allowed
Figure DEST_PATH_IMAGE002AAA
Writing and/or reading data information into a database of a supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE002AAAA
If the authentication is illegal, the user is not allowed
Figure DEST_PATH_IMAGE002_5A
Writing and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication module
Figure 100002_DEST_PATH_IMAGE004
Automatically creating a character string
Figure 100002_DEST_PATH_IMAGE006
Is related to
Figure 100002_DEST_PATH_IMAGE008
And combining the character strings
Figure 100002_DEST_PATH_IMAGE010
Correlation function
Figure 100002_DEST_PATH_IMAGE012
To users within a supply chain financial block chain
Figure DEST_PATH_IMAGE002_6A
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character string
Figure 100002_DEST_PATH_IMAGE014
Performing correlation to obtain correlation number
Figure 100002_DEST_PATH_IMAGE016
Step three: user' s
Figure DEST_PATH_IMAGE002_7A
Randomly selecting a bitA natural number having a number of at least 3
Figure 100002_DEST_PATH_IMAGE018
User identity authentication module calculation
Figure 100002_DEST_PATH_IMAGE020
And will be calculated
Figure 100002_DEST_PATH_IMAGE022
Back to the user
Figure DEST_PATH_IMAGE002_8A
Step four: user' s
Figure 100002_DEST_PATH_IMAGE024
According to
Figure 100002_DEST_PATH_IMAGE026
Figure 100002_DEST_PATH_IMAGE028
Figure 100002_DEST_PATH_IMAGE030
Calculating an integer N; if the user is
Figure DEST_PATH_IMAGE024A
If the calculated N is identical to the integer N randomly selected by the user identity authentication module, the user is proved
Figure DEST_PATH_IMAGE024AA
Legal users belonging to the supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE024AAA
If the calculated N is not the same as the integer N randomly selected by the user identity authentication module, the user is proved
Figure DEST_PATH_IMAGE002_9A
Within supply chain golden melt block chainAn illegal user.
Further, the information protection system is used for users
Figure DEST_PATH_IMAGE002_10A
When loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure DEST_PATH_IMAGE002_11A
Before the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and user
Figure DEST_PATH_IMAGE002_12A
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: user' s
Figure DEST_PATH_IMAGE002_13A
Inputting a numerical value in the dialog box
Figure DEST_PATH_IMAGE026A
Step four: user authentication module random generation
Figure 100002_DEST_PATH_IMAGE032
According to the correlation function
Figure DEST_PATH_IMAGE012A
Calculate out
Figure 100002_DEST_PATH_IMAGE034
Then according to
Figure DEST_PATH_IMAGE020A
Calculate out
Figure 100002_DEST_PATH_IMAGE036
And apply the same
Figure 100002_DEST_PATH_IMAGE038
Returning in the dialog box;
step five: user' s
Figure DEST_PATH_IMAGE002_14A
According to known conditions
Figure 100002_DEST_PATH_IMAGE040
And will be calculated
Figure DEST_PATH_IMAGE040A
Inputting the data into a dialog box;
step six: user identity authentication module logarithm value
Figure DEST_PATH_IMAGE040AA
And a numerical value
Figure DEST_PATH_IMAGE032A
Verifying the consistency of the data; if value of
Figure DEST_PATH_IMAGE040AAA
And a numerical value
Figure 100002_DEST_PATH_IMAGE042
If the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for users
Figure DEST_PATH_IMAGE002_15A
Reading loan information into a database of a supply chain financial block chainThe specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure DEST_PATH_IMAGE002_16A
When the loan information is read from the block database of the supply chain financial block chain network, the loan information search page is locked and popped up and matched with the user
Figure DEST_PATH_IMAGE002_17A
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step two: user' s
Figure DEST_PATH_IMAGE002_18A
Inputting a numerical value in the dialog box
Figure DEST_PATH_IMAGE018A
Step three: user authentication module random generation
Figure DEST_PATH_IMAGE032AA
According to the correlation function
Figure DEST_PATH_IMAGE012AA
Calculate out
Figure 100002_DEST_PATH_IMAGE044
Then according to
Figure DEST_PATH_IMAGE020AA
Calculate out
Figure 100002_DEST_PATH_IMAGE046
And apply the same
Figure 100002_DEST_PATH_IMAGE048
Return in dialog box;
Step four: user' s
Figure DEST_PATH_IMAGE002_19A
According to known conditions
Figure DEST_PATH_IMAGE040AAAA
And will be calculated
Figure DEST_PATH_IMAGE040_5A
Inputting the data into a dialog box;
step five: user identity authentication module logarithm value
Figure DEST_PATH_IMAGE040_6A
And a numerical value
Figure DEST_PATH_IMAGE032AAA
Verifying the consistency of the data; if value of
Figure DEST_PATH_IMAGE040_7A
And a numerical value
Figure DEST_PATH_IMAGE042A
If the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. the invention is characterized in that users are available
Figure DEST_PATH_IMAGE002_20A
When data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data information
Figure DEST_PATH_IMAGE002_21A
Performing identity verification based on zero-knowledge proof; if the user is
Figure DEST_PATH_IMAGE002_22A
When the identity authentication is legal, the user is allowed
Figure DEST_PATH_IMAGE002_23A
Writing and/or reading data information into a database of a supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE002_24A
If the authentication is illegal, the user is not allowed
Figure DEST_PATH_IMAGE002_25A
Data information is written and/or read into the database of the supply chain financial block chain, so that the technical problem that financial customer loan information stored in the database of the supply chain financial block chain is illegally written and/or read at present is solved.
Detailed Description
A supply chain financial client loan information protection method based on zero knowledge proof comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a user
Figure DEST_PATH_IMAGE024AAAA
When data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data information
Figure DEST_PATH_IMAGE002_26A
Performing identity verification based on zero-knowledge proof;
if the user is
Figure DEST_PATH_IMAGE002_27A
When the identity authentication is legal, the user is allowed
Figure DEST_PATH_IMAGE002_28A
Writing and/or reading data information into a database of a supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE002_29A
If the authentication is illegal, the user is not allowed
Figure DEST_PATH_IMAGE002_30A
Writing and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication module
Figure DEST_PATH_IMAGE004A
Automatically creating a character string
Figure 100002_DEST_PATH_IMAGE050
Is related to
Figure DEST_PATH_IMAGE008A
And combining the character strings
Figure 100002_DEST_PATH_IMAGE052
Correlation function
Figure DEST_PATH_IMAGE012AAA
To users within a supply chain financial block chain
Figure DEST_PATH_IMAGE002_31A
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character string
Figure 100002_DEST_PATH_IMAGE054
Performing correlation to obtain correlation number
Figure 100002_DEST_PATH_IMAGE056
Step three: user' s
Figure DEST_PATH_IMAGE002_32A
Randomly selecting a natural number with a digit of at least 3
Figure DEST_PATH_IMAGE026AA
User identity authentication module calculation
Figure DEST_PATH_IMAGE020AAA
And will be calculated
Figure DEST_PATH_IMAGE036A
Back to the user
Figure DEST_PATH_IMAGE002_33A
Step four: user' s
Figure DEST_PATH_IMAGE002_34A
According to
Figure DEST_PATH_IMAGE018AA
Figure DEST_PATH_IMAGE046A
Figure DEST_PATH_IMAGE010A
Calculating an integer
Figure 100002_DEST_PATH_IMAGE058
(ii) a If the user is
Figure DEST_PATH_IMAGE002_35A
Calculated
Figure 100002_DEST_PATH_IMAGE058A
If the integer N is completely the same as the integer N randomly selected by the user identity authentication module, the user is certified
Figure DEST_PATH_IMAGE002_36A
Legal users belonging to the supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE002_37A
If the calculated N is not the same as the integer N randomly selected by the user identity authentication module, the user is proved
Figure DEST_PATH_IMAGE002_38A
Belonging to illegal users in the supply chain financial block chain.
Further, the information protection system is used for users
Figure DEST_PATH_IMAGE002_39A
When loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure DEST_PATH_IMAGE002_40A
Before the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and user
Figure DEST_PATH_IMAGE002_41A
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: user' s
Figure DEST_PATH_IMAGE002_42A
Inputting a numerical value in the dialog box
Figure DEST_PATH_IMAGE018AAA
Step four: user authentication module random generation
Figure DEST_PATH_IMAGE032AAAA
According to the correlation function
Figure DEST_PATH_IMAGE012AAAA
Calculate out
Figure DEST_PATH_IMAGE044A
Then according to
Figure DEST_PATH_IMAGE020AAAA
Calculate out
Figure DEST_PATH_IMAGE046AA
And apply the same
Figure DEST_PATH_IMAGE048A
Returning in the dialog box;
step five: user' s
Figure DEST_PATH_IMAGE002_43A
According to known conditions
Figure DEST_PATH_IMAGE040_8A
And will be calculated
Figure DEST_PATH_IMAGE040_9A
Inputting the data into a dialog box;
step six: user identity authentication module logarithm value
Figure DEST_PATH_IMAGE040_10A
And a numerical value
Figure DEST_PATH_IMAGE032_5A
Verifying the consistency of the data; if value of
Figure DEST_PATH_IMAGE040_11A
And a numerical value
Figure DEST_PATH_IMAGE042AA
If the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for users
Figure DEST_PATH_IMAGE002_44A
When the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure DEST_PATH_IMAGE024_5A
When the loan information is read from the block database of the supply chain financial block chain network, the loan information search page is locked and popped up and matched with the user
Figure DEST_PATH_IMAGE024_6A
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step two: user' s
Figure DEST_PATH_IMAGE002_45A
Inputting a numerical value in the dialog box
Figure DEST_PATH_IMAGE026AAA
Step three: user authentication module random generation
Figure DEST_PATH_IMAGE032_6A
According to the correlation function
Figure DEST_PATH_IMAGE012_5A
Calculate out
Figure 100002_DEST_PATH_IMAGE060
Then according to
Figure DEST_PATH_IMAGE020_5A
Calculate out
Figure 100002_DEST_PATH_IMAGE062
And apply the same
Figure 100002_DEST_PATH_IMAGE064
Returning in the dialog box;
step four: user' s
Figure DEST_PATH_IMAGE002_46A
According to known conditions
Figure DEST_PATH_IMAGE040_12A
And will be calculated
Figure DEST_PATH_IMAGE040_13A
Inputting the data into a dialog box;
step five: user identity authentication module logarithm value
Figure DEST_PATH_IMAGE040_14A
And a numerical value
Figure DEST_PATH_IMAGE032_7A
Verifying the consistency of the data; if value of
Figure DEST_PATH_IMAGE040_15A
And a numerical value
Figure DEST_PATH_IMAGE042AAA
If the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.

Claims (3)

1. A supply chain finance client loan information protection method based on zero knowledge proof is characterized by comprising an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a user
Figure DEST_PATH_IMAGE002
When data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data information
Figure DEST_PATH_IMAGE004
Performing identity verification based on zero-knowledge proof;
if the user is
Figure DEST_PATH_IMAGE006
When the identity authentication is legal, the user is allowed
Figure DEST_PATH_IMAGE006A
Writing and/or reading data information into a database of a supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE006AA
If the authentication is illegal, the user is not allowed
Figure DEST_PATH_IMAGE006AAA
Writing and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication module
Figure DEST_PATH_IMAGE008
Automatically creating a character string
Figure DEST_PATH_IMAGE010
Is related to
Figure DEST_PATH_IMAGE012
And combining the character strings
Figure DEST_PATH_IMAGE014
Correlation function
Figure DEST_PATH_IMAGE016
To users within a supply chain financial block chain
Figure DEST_PATH_IMAGE006AAAA
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character string
Figure DEST_PATH_IMAGE018
Performing correlation to obtain correlation number
Figure DEST_PATH_IMAGE020
Step three: user' s
Figure DEST_PATH_IMAGE006_5A
Randomly selecting a natural number with a digit of at least 3
Figure DEST_PATH_IMAGE022
User identity authentication module calculation
Figure DEST_PATH_IMAGE024
And will be calculated
Figure DEST_PATH_IMAGE026
Back to the user
Figure DEST_PATH_IMAGE006_6A
Step four: user' s
Figure DEST_PATH_IMAGE006_7A
According to
Figure DEST_PATH_IMAGE028
Figure DEST_PATH_IMAGE030
Figure DEST_PATH_IMAGE032
Calculating an integer
Figure DEST_PATH_IMAGE034
(ii) a If the user is
Figure DEST_PATH_IMAGE006_8A
Calculated
Figure DEST_PATH_IMAGE034A
If the integer N is completely the same as the integer N randomly selected by the user identity authentication module, the user is certified
Figure DEST_PATH_IMAGE006_9A
Legal users belonging to the supply chain financial block chain; if the user is
Figure DEST_PATH_IMAGE006_10A
If the calculated N ʹ is not the same as the randomly selected integer N of the user identity authentication module, the user is certified
Figure DEST_PATH_IMAGE006_11A
Belonging to illegal users in the supply chain financial block chain.
2. The method as claimed in claim 1, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chain
Figure DEST_PATH_IMAGE006_12A
When loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure DEST_PATH_IMAGE006_13A
In the zone of melting of gold in the supply chainBefore the loan information is written into the block database of the block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and user
Figure DEST_PATH_IMAGE006_14A
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: user' s
Figure DEST_PATH_IMAGE006_15A
Inputting a numerical value in the dialog box
Figure DEST_PATH_IMAGE036
Step four: user authentication module random generation
Figure DEST_PATH_IMAGE038
According to the correlation function
Figure DEST_PATH_IMAGE040
Calculate out
Figure DEST_PATH_IMAGE042
Then according to
Figure DEST_PATH_IMAGE044
Calculate out
Figure DEST_PATH_IMAGE046
And apply the same
Figure DEST_PATH_IMAGE048
Returning in the dialog box;
step five:user' s
Figure DEST_PATH_IMAGE006_16A
According to known conditions
Figure DEST_PATH_IMAGE050
And will be calculated
Figure DEST_PATH_IMAGE052
Inputting the data into a dialog box;
step six: user identity authentication module logarithm value
Figure DEST_PATH_IMAGE054
And a numerical value
Figure DEST_PATH_IMAGE056
Verifying the consistency of the data; if value of
Figure DEST_PATH_IMAGE058
And a numerical value
Figure DEST_PATH_IMAGE060
If the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
3. The method as claimed in claim 2, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chain
Figure DEST_PATH_IMAGE006_17A
When the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure DEST_PATH_IMAGE006_18A
In the supply chain, the block chain is meltedWhen the loan information is read from the block database of the network, the loan information search page is locked and pops up on the search page and the user
Figure DEST_PATH_IMAGE006_19A
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step two: user' s
Figure DEST_PATH_IMAGE006_20A
Inputting a numerical value in the dialog box
Figure DEST_PATH_IMAGE062
Step three: user authentication module random generation
Figure DEST_PATH_IMAGE064
According to the correlation function
Figure DEST_PATH_IMAGE066
Calculate out
Figure DEST_PATH_IMAGE068
Then according to
Figure DEST_PATH_IMAGE070
Calculate out
Figure DEST_PATH_IMAGE072
And apply the same
Figure DEST_PATH_IMAGE074
Returning in the dialog box;
step four: user' s
Figure DEST_PATH_IMAGE006_21A
According to known conditions
Figure DEST_PATH_IMAGE076
And will be calculated
Figure DEST_PATH_IMAGE054A
Inputting the data into a dialog box;
step five: user identity authentication module logarithm value
Figure DEST_PATH_IMAGE050A
And a numerical value
Figure DEST_PATH_IMAGE078
Verifying the consistency of the data; if value of
Figure DEST_PATH_IMAGE058A
And a numerical value
Figure DEST_PATH_IMAGE064A
If the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.
CN201911335682.0A 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification Active CN111090842B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911335682.0A CN111090842B (en) 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911335682.0A CN111090842B (en) 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification

Publications (2)

Publication Number Publication Date
CN111090842A CN111090842A (en) 2020-05-01
CN111090842B true CN111090842B (en) 2022-04-26

Family

ID=70395154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911335682.0A Active CN111090842B (en) 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification

Country Status (1)

Country Link
CN (1) CN111090842B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732832B (en) * 2021-01-06 2024-02-13 上海泰砥科技有限公司 Block chain supply chain financial supply method and system based on DID and zero knowledge proof
CN113822672B (en) * 2021-11-22 2022-02-18 浙江数秦科技有限公司 Block chain consensus method based on zero knowledge proof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050544A (en) * 2001-08-07 2003-02-21 Nec Corp Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm
CN101080897A (en) * 2005-07-13 2007-11-28 日本电信电话株式会社 Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
CN101175076A (en) * 2007-10-23 2008-05-07 赵运磊 High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation
TW201308969A (en) * 2011-08-12 2013-02-16 Sony Corp Information processing device, information processing method, program, and recording medium
CN106330454A (en) * 2016-08-16 2017-01-11 优云合(北京)科技有限公司 Digital certificate generating method and digital certificate verifying method
CN107392063A (en) * 2017-07-11 2017-11-24 深圳大普微电子科技有限公司 Binding, verification method and the system of storage device and main frame
CN109272631A (en) * 2017-07-17 2019-01-25 卡巴斯基实验室股份制公司 The system and method for determining the ballot paper of the voter collected by electronic voting
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109858852A (en) * 2018-12-26 2019-06-07 上海源庐加佳信息科技有限公司 A kind of warehouse receipt verification method based on block chain and zero-knowledge proof
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160065558A1 (en) * 2013-01-08 2016-03-03 Coursera, Inc. Identity verification for online education

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050544A (en) * 2001-08-07 2003-02-21 Nec Corp Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm
CN101080897A (en) * 2005-07-13 2007-11-28 日本电信电话株式会社 Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
CN101175076A (en) * 2007-10-23 2008-05-07 赵运磊 High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation
TW201308969A (en) * 2011-08-12 2013-02-16 Sony Corp Information processing device, information processing method, program, and recording medium
CN106330454A (en) * 2016-08-16 2017-01-11 优云合(北京)科技有限公司 Digital certificate generating method and digital certificate verifying method
CN107392063A (en) * 2017-07-11 2017-11-24 深圳大普微电子科技有限公司 Binding, verification method and the system of storage device and main frame
CN109272631A (en) * 2017-07-17 2019-01-25 卡巴斯基实验室股份制公司 The system and method for determining the ballot paper of the voter collected by electronic voting
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109858852A (en) * 2018-12-26 2019-06-07 上海源庐加佳信息科技有限公司 A kind of warehouse receipt verification method based on block chain and zero-knowledge proof
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
新的可重置的单轮零知识证明;赵建;《计算机应用》;20130630;全文 *

Also Published As

Publication number Publication date
CN111090842A (en) 2020-05-01

Similar Documents

Publication Publication Date Title
US11562451B1 (en) Apparatus for proportional calculation regarding non-fungible tokens
CN112600810B (en) Ether house phishing fraud detection method and device based on graph classification
US7240363B1 (en) System and method for thwarting identity theft and other identity misrepresentations
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
CN108288157A (en) A kind of supply chain management method based on financial block chain technology
CN106097101A (en) A kind of block chain realizes the management method of financial transaction
JP2004532448A (en) Distributed quantum encrypted pattern generation and scoring
WO2017218440A1 (en) Secure initiation and transfer of a cryptographic database and/or a cryptographic unit
CN108710808A (en) A kind of investigation payment platform based on block chain
Castonguay et al. Digital assets and blockchain: hackable, fraudulent, or just misunderstood?
CN111090842B (en) Supply chain financial customer loan information protection method based on zero knowledge certification
CN110199305A (en) Computer-implemented system and method for determining the state of a machine-executable contract implemented using a blockchain
Katterbauer et al. Financial cybercrime in the Islamic finance metaverse
US11663595B1 (en) Blockchain transactional identity verification
Taskinsoy The famous new bubbles of the 21st century: Cases of irrational exuberance
CN112801778A (en) Federated bad asset blockchain
CN106909852A (en) Intelligent contract encryption method and device based on triple md5 encryption algorithms
Kucheryavenko et al. Cryptocurrencies: development, features and classification
Ingole et al. Credit card fraud detection using Hidden Markov Model and its performance
WO2019177788A1 (en) Detecting alterations of journal data structures
CN114169888B (en) Universal type cryptocurrency custody method supporting multiple signatures
Thakur Blockchain and cryptocurrency frauds: Emerging concern
Tian et al. Generating Large-Scale Synthetic Payment Graphs with Realistic Fraudulent and Money Laundering Patterns
US11989276B2 (en) Intelligent authentication of users in Metaverse leveraging non-fungible tokens and behavior analysis
Garayeva TOP FEATURES OF CRYPTOCURRENCİES AND TYPES

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant