CN112183024B - Identification code generation method and device for partner sub-mechanism - Google Patents

Identification code generation method and device for partner sub-mechanism Download PDF

Info

Publication number
CN112183024B
CN112183024B CN202011063948.3A CN202011063948A CN112183024B CN 112183024 B CN112183024 B CN 112183024B CN 202011063948 A CN202011063948 A CN 202011063948A CN 112183024 B CN112183024 B CN 112183024B
Authority
CN
China
Prior art keywords
field
sub
identification code
generating
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011063948.3A
Other languages
Chinese (zh)
Other versions
CN112183024A (en
Inventor
邵珏鑫
张丹枫
张建荣
俞恒舟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202011063948.3A priority Critical patent/CN112183024B/en
Publication of CN112183024A publication Critical patent/CN112183024A/en
Application granted granted Critical
Publication of CN112183024B publication Critical patent/CN112183024B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/126Character encoding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides an identity identification code generation method and device for a partner sub-mechanism, wherein the method comprises the following steps: acquiring business elements of a cooperation scene with a sub-mechanism; generating a first field of an identity identification code according to the service element; generating a second field of the identity code by using the HKID algorithm and the service element; generating a third field using a random number generator; the identification code consists of the first field, the second field and the third field, by adopting the technical scheme, the service elements of the cooperation scene are extracted in the service handling life cycle, the HKID algorithm is adopted to generate partial fields of the identification code of the sub-mechanism of the cooperation party, the problem of identification codes of other sub-mechanisms in different regional sub-mechanisms under the same cooperation party is solved, and the service data use safety of different sub-mechanisms under the same cooperation party is improved.

Description

Identification code generation method and device for partner sub-mechanism
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for generating an identification code for a partner sub-mechanism.
Background
The online small loan is a mobile fund loan which is issued on line for meeting the requirements by constructing a client screening, line measuring and calculating and risk monitoring model based on multi-dimensional data such as transactions, assets, credits and the like of clients according to different business scenes by applying big data and internet technology. With the development of business, on one hand, the loan variety is cooperated with a high-quality third-party enterprise platform to establish an information interaction channel, and a data model is built together to provide online loans for small and micro enterprises on the platform. On the other hand, on the basis of the credit-increasing measures of the guarantee company guarantee, risk compensation fund compensation or financial special fund subsidy and the like established by the government, online financing service is provided for the enterprises. Therefore, how to verify the identity of a third party is particularly important in the process of interacting with information of the third party (i.e., the partner).
At present, the interaction of the petty loan on the general financial network and the third party information mainly verifies the identity of the partner for each transaction through an API platform, invokes authority authentication, signs and signs, and the transaction response signature, and the partner transaction is accessed into the general financial service system after the identity verification is passed, and the system authenticates the identity of the partner and performs override control through the APPID distributed to the partner through the API platform. If the subordinate sub-mechanism exists in the partner and the subordinate sub-mechanism does not have independent APPID to identify the identity, the service system is required to manage the identity identification of the partner sub-mechanism at the moment. For example, the universal financial services system performs identity recognition and override control on the platform sub-institutions by assigning the sub-institutions an identity code. However, the identification code allocated to the sub-organization of the partner currently consists of the first letter of the name of the partner and simple numbers, and increases in sequence according to the butting sequence of the sub-organizations, there is a risk that sub-organizations in different areas under the same partner guess the identification numbers of sub-organizations in other areas and override access to business data of other sub-organizations.
Disclosure of Invention
In view of the problems in the prior art, the present application provides a method and apparatus for generating an identification code for a partner sub-mechanism, an electronic device, and a computer-readable storage medium, which can at least partially solve the problems in the prior art.
In order to achieve the above purpose, the present application adopts the following technical scheme:
in a first aspect, there is provided a method for generating an identification code for a partner sub-institution, comprising:
acquiring business elements of a cooperation scene with a sub-mechanism;
generating a first field of an identity identification code according to the service element;
generating a second field of the identity code by using the HKID algorithm and the service element;
generating a third field using a random number generator;
the identification code consists of a first field, a second field and a third field.
Further, the identification code generating method for the partner sub-mechanism further comprises the following steps:
setting parameters of the HKID algorithm.
Further, the service element includes: collaborative technology model initials, technology product initials, and docking area codes.
Further, the generating the first field of the identification code according to the service element includes:
and combining and splicing the initial of the cooperation technical model, the initial of the technical product and the butt joint code to obtain a first field of the identity identification code.
Further, the generating the identity code of the sub-organization according to the first field, the second field and the third field includes:
and splicing and combining the first field, the second field and the third field according to a preset splicing rule to obtain the identity identification code of the sub-mechanism.
In a second aspect, there is provided an identification code generating apparatus for a partner sub-institution, comprising:
the business element acquisition module acquires business elements of a cooperation scene with the sub-mechanism;
the first field generation module generates a first field of the identity identification code according to the service element;
the second field generation module is used for generating a second field of the identity identification code by utilizing an HKID algorithm and the service elements;
the random number generation module is used for generating a third field by using a random number generator;
and the identity code generation module is used for generating the identity code of the sub-mechanism according to the first field, the second field and the third field.
Further, the identification code generating device for the partner sub-mechanism further includes:
and the algorithm parameter setting module is used for setting parameters of the HKID algorithm.
Further, the service element includes: collaborative technology model initials, technology product initials, and docking area codes.
In a third aspect, an electronic device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above-described method for generating an identification code for a partner sub-institution when the program is executed.
In a fourth aspect, a computer readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, implements the steps of the above-described identification code generation method for a partner sub-institution.
The application provides an identification code generation method and device for a partner sub-mechanism, wherein the method comprises the following steps: acquiring business elements of a cooperation scene with a sub-mechanism; generating a first field of an identity identification code according to the service element; generating a second field of the identity code by using the HKID algorithm and the service element; generating a third field using a random number generator; the identification code consists of the first field, the second field and the third field, by adopting the technical scheme, the service elements of the cooperation scene are extracted in the service handling life cycle, the HKID algorithm is adopted to generate partial fields of the identification code of the sub-mechanism of the cooperation party, the problem of identification codes of other sub-mechanisms in different regional sub-mechanisms under the same cooperation party is solved, and the service data use safety of different sub-mechanisms under the same cooperation party is improved.
The foregoing and other objects, features and advantages of the application will be apparent from the following more particular description of preferred embodiments, as illustrated in the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. In the drawings:
FIG. 1 is an example interaction of a generalized financial services system with a collaboration sub-institution;
FIG. 2 is a flowchart illustrating a method for generating an identification code for a partner sub-organization according to an embodiment of the present application;
FIG. 3 is a second flowchart of a method for generating an identification code for a partner sub-organization according to an embodiment of the present application;
FIG. 4 illustrates HKID algorithm parameters that characterize a collaboration scenario in an embodiment of the application;
FIG. 5 illustrates the principle of an identification code generation method for a partner sub-institution in an embodiment of the present application;
FIG. 6 is a block diagram of an identity code generation apparatus for a partner sub-institution in accordance with an embodiment of the present application;
fig. 7 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It is noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of the present application and in the foregoing figures, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
When the existing general financial institutions butt joint the sub-institutions in different areas under the same cooperation platform for identity recognition, the current assigned identity recognition codes for the sub-institutions of the cooperators are composed of the initial letters of the names of the cooperators and simple numbers, and are sequentially increased according to the butt joint sequence of the sub-institutions, and the risk exists that the sub-institutions in different areas under the same cooperators guess the identification numbers of the sub-institutions in other areas and override access to business data of the sub-institutions in other areas. Referring to fig. 1, when a service system and a partner system interact, data interaction is generally continued after identity verification through a unified gateway. There may also be scenarios where a partner subordinate sub-organization uses partner system identities for business interfacing due to sharing a set of partner systems. For example, when the universal financial service system is in butt joint with the partners, the identities of the partners are identified through the public API gateway in a unified way, and the APPIDs distributed to each partner based on the API gateway isolate the data of the partners in the service system. When the partner sub-institutions interact with the universal financial service system through the identity of the cooperation platform, the service system can assign a unique identification code to each of the quasi-entrance sub-institutions in advance, and the cooperation data access is isolated in the system through the dimension of APPID plus the unique identification code (as shown in figure 1). It is important how to ensure the non-counterfeitability of the sub-organization identification code in the process.
The embodiment of the application provides a technology suitable for identifying the identities of different sub-institutions of the same partner, which extracts service elements of a cooperation scene in a service handling life cycle and generates unique identity identification codes of the sub-institutions of the partner by adopting an HKID algorithm, solves the problem that the identification codes of other sub-institutions or sub-institution identification codes in different regional sub-institutions under the same partner are imitated, and improves the use safety of service data of different sub-institutions under the same partner.
FIG. 2 is a flowchart illustrating a method for generating an identification code for a partner sub-organization according to an embodiment of the present application; as shown in fig. 2, the method for generating the identification code for the partner sub-organization may include the following:
step S100: acquiring business elements of a cooperation scene with a sub-mechanism;
it is worth to say that different sub-mechanisms under the same platform have different scenes, and different platforms can also have different scenes; such as: a housing loan scene, a second-house loan scene, a logistics transportation scene and the like.
Taking the general financial service docking scenario as an example, service elements of the cooperation scenario, such as the category of cooperation technical model, the category of technical product, docking code and the like, are elements which are closely related to the cooperation scenario but are not exposed to the cooperation party in the service system.
Step S200: generating a first field of an identity identification code according to the service element;
specifically, some portion of the business elements may be extracted or the business elements may be transformed based on simple rules invisible to the partner and combined to form the input code body of the HKID. When the business elements are the types of the cooperative technology models, the types of the technical products and the butt joint region codes, the first letters of the cooperative technology models, the first letters of the technical products and the butt joint region codes are combined and spliced in sequence to obtain a first field of the identity identification code. Referring to fig. 5, the identification code of the universal financial service docking consists of an initial of a cooperation docking technology model, an initial of a technical product in a service system, a 4-bit code extracted from the area network point number interval corresponding to the cooperation docking branch, and a two-bit random number and a check bit which are not present in the stored identification code. The embodiment of the application is not limited to a specific manner.
Step S300: generating a second field of the identity code by using the HKID algorithm and the service element;
specifically, after extracting features from the service elements in a preset manner, inputting the features into the HKID algorithm model to obtain a second field, wherein the second field is used as a check bit or a check code of the identity identification code.
Referring to fig. 5, the affordable financial service assembles a check code to the end of the identification code in a scenario of cooperative docking. In the butt joint scene, the end of the identification code is intercepted to verify the whole scene, the authenticity of the access of the partner sub-mechanism is identified, and data isolation is made according to the authenticity, so that the occurrence of transverse override is prevented.
It is worth noting that the HKID algorithm model may be invoked in Python.
Step S400: generating a third field using a random number generator;
the number of bits of the third field generated by the random number generator is not limited, and may be randomly selected according to needs, and in the example shown in fig. 5, the random number is 2 bits, which is not limited in the embodiment of the present application.
Step S500: and generating the identity identification code of the sub-mechanism according to the first field, the second field and the third field.
Specifically, the first field, the second field and the third field are combined according to a preset sequence or processed according to a preset algorithm, and then the identity identification code of the sub-mechanism is obtained.
Referring to fig. 5, the first field, the second field and the third field are simply combined according to the sequence of the first field, the third field and the second field to obtain the identity code of the sub-mechanism.
By adopting the technical scheme, the service elements of the cooperation scene are extracted in the service handling life cycle, and the HKID algorithm is adopted to generate partial fields of the identification codes of the sub-institutions of the cooperation party, so that the problem of the identification codes of the sub-institutions of other areas in guesses of the sub-institutions of different areas under the same cooperation party is solved, and the service data use safety of the sub-institutions of different areas under the same cooperation party is improved.
In an alternative embodiment, referring to fig. 3, the method for generating an identification code for a partner sub-organization may further include:
step S600: setting parameters of the HKID algorithm.
Specifically, the HKID algorithm of the cooperative scene feature is specified according to the characteristics of the cooperative scene, and the complexity of generating HKID check bits of each scene is increased or decreased, see fig. 4.
In an optional embodiment, the first field, the second field and the third field are spliced and combined according to a preset splicing rule to obtain the identity code of the sub-mechanism.
In summary, the method for generating the identity identification code for the sub-mechanism of the partner provided by the embodiment of the application is suitable for identifying the identities of different sub-mechanisms under the same partner when the business system is in butt joint with the partner system, can effectively solve the problem that the identities of different sub-mechanisms under the same partner are imitated in the cooperation butt joint process, greatly improves the safety of sub-mechanism data access in the butt joint process, has a concise and clear scheme and has no technical dependence; the identification code is transparent to the outside, has business meaning in the pair, and is convenient to manage; the HKID algorithm parameter and scene core element combination double verification provides reliable anti-counterfeiting capability.
Based on the same inventive concept, the embodiment of the present application also provides an identification code generating device for a partner sub-mechanism, which can be used to implement the method described in the above embodiment, as described in the following embodiment. Since the principle of the solution of the identification code generating device for the partner sub-mechanism is similar to that of the above method, the implementation of the identification code generating device for the partner sub-mechanism can be referred to the implementation of the above method, and the repetition is omitted. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements the intended function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 6 is a block diagram of an id generation device for a partner sub-organization in an embodiment of the present application. As shown in fig. 6, the identification code generating device for the partner sub-mechanism specifically includes: the system comprises a business element acquisition module 10, a first field generation module 20, a second field generation module 30, a random number generation module 40 and an identification code generation module 50.
The business element acquisition module 10 acquires business elements of a cooperation scene with the sub-mechanism;
the first field generating module 20 generates a first field of the identification code according to the service element;
the second field generating module 30 generates a second field of the identification code using the HKID algorithm and the service element;
the random number generation module 40 generates a third field using a random number generator;
the id generation module 50 generates the id of the sub-organization according to the first field, the second field and the third field.
By adopting the technical scheme, the service elements of the cooperation scene are extracted in the service handling life cycle, and the HKID algorithm is adopted to generate partial fields of the identification codes of the sub-institutions of the cooperation party, so that the problem of the identification codes of the sub-institutions of other areas in guesses of the sub-institutions of different areas under the same cooperation party is solved, and the service data use safety of the sub-institutions of different areas under the same cooperation party is improved.
In an alternative embodiment, the identification code generating device for the partner sub-organization further includes:
and the algorithm parameter setting module is used for setting parameters of the HKID algorithm.
In an alternative embodiment, the business element includes: collaborative technology model initials, technology product initials, and docking area codes.
The apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. A typical implementation device is an electronic device, which may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
In a typical example the electronic device comprises in particular a memory, a processor and a computer program stored on the memory and executable on the processor, said processor implementing the steps of the above described method for generating an identification code for a partner sub-institution when said program is executed.
Referring now to fig. 7, a schematic diagram of an electronic device 600 suitable for use in implementing embodiments of the present application is shown.
As shown in fig. 7, the electronic apparatus 600 includes a Central Processing Unit (CPU) 601, which can perform various appropriate works and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage section 608 into a Random Access Memory (RAM)) 603. In the RAM603, various programs and data required for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other through a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, mouse, etc.; an output portion 607 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The drive 610 is also connected to the I/O interface 605 as needed. Removable media 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on drive 610 as needed, so that a computer program read therefrom is mounted as needed as storage section 608.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described identification code generation method for a partner sub-institution.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 609, and/or installed from the removable medium 611.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in the same piece or pieces of software and/or hardware when implementing the present application.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (7)

1. An identification code generation method for a partner sub-organization, comprising:
acquiring business elements of a cooperation scene with a sub-organization, wherein the business elements comprise: the first letter of the cooperation technical model, the first letter of the technical product and the docking area code;
combining and splicing the first letter of the cooperation technical model, the first letter of the technical product and the code of the docking area to obtain a first field of the identification code;
after extracting the characteristics of the service elements in a preset mode, inputting the service elements into an HKID algorithm model to obtain a second field, wherein the second field is used as a check bit or a check code of an identity identification code;
generating a third field using a random number generator;
and generating the identity identification code of the sub-mechanism according to the first field, the second field and the third field.
2. The method for generating an identification code for a partner sub-organization of claim 1, further comprising:
setting parameters of the HKID algorithm.
3. The method of claim 1, wherein generating the identity of the sub-organization from the first field, the second field, and the third field comprises:
and splicing and combining the first field, the second field and the third field according to a preset splicing rule to obtain the identity identification code of the sub-mechanism.
4. An identification code generating device for a partner sub-organization, comprising:
the business element acquisition module acquires business elements of a cooperation scene with the sub-mechanism, wherein the business elements comprise: the first letter of the cooperation technical model, the first letter of the technical product and the docking area code;
the first field generation module is used for combining and splicing the initial of the cooperation technical model, the initial of the technical product and the code of the butt joint region to obtain a first field of the identification code;
the second field generation module extracts the characteristics of the service elements according to a preset mode, and inputs the characteristics into an HKID algorithm model to obtain a second field, wherein the second field is used as a check bit or a called check code of the identity identification code;
the random number generation module is used for generating a third field by using a random number generator;
and the identity code generation module is used for generating the identity code of the sub-mechanism according to the first field, the second field and the third field.
5. The identity code generation apparatus for a partner sub-organization of claim 4, further comprising:
and the algorithm parameter setting module is used for setting parameters of the HKID algorithm.
6. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the identification code generation method for a partner sub-mechanism of any of claims 1 to 3 when the program is executed.
7. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the identification code generation method for a partner sub-institution as claimed in any one of claims 1 to 3.
CN202011063948.3A 2020-09-30 2020-09-30 Identification code generation method and device for partner sub-mechanism Active CN112183024B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011063948.3A CN112183024B (en) 2020-09-30 2020-09-30 Identification code generation method and device for partner sub-mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011063948.3A CN112183024B (en) 2020-09-30 2020-09-30 Identification code generation method and device for partner sub-mechanism

Publications (2)

Publication Number Publication Date
CN112183024A CN112183024A (en) 2021-01-05
CN112183024B true CN112183024B (en) 2023-09-26

Family

ID=73948764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011063948.3A Active CN112183024B (en) 2020-09-30 2020-09-30 Identification code generation method and device for partner sub-mechanism

Country Status (1)

Country Link
CN (1) CN112183024B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244810A (en) * 2009-07-16 2011-11-16 北京中传网联数据服务有限公司 Method, device and system for obtaining audience information of digital television
CN102377759A (en) * 2010-08-25 2012-03-14 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102609330A (en) * 2012-02-06 2012-07-25 中国农业银行股份有限公司 Document number generating method and document number generating system
CN106972918A (en) * 2017-03-15 2017-07-21 中国工商银行股份有限公司 A kind of generation method, device and the verification method of electronic code data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040187015A1 (en) * 2003-03-21 2004-09-23 Kenneth J. Geer Generating numbers for use in product identifications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244810A (en) * 2009-07-16 2011-11-16 北京中传网联数据服务有限公司 Method, device and system for obtaining audience information of digital television
CN102377759A (en) * 2010-08-25 2012-03-14 中国移动通信有限公司 Service processing system, user identity identification method and related devices
CN102609330A (en) * 2012-02-06 2012-07-25 中国农业银行股份有限公司 Document number generating method and document number generating system
CN106972918A (en) * 2017-03-15 2017-07-21 中国工商银行股份有限公司 A kind of generation method, device and the verification method of electronic code data

Also Published As

Publication number Publication date
CN112183024A (en) 2021-01-05

Similar Documents

Publication Publication Date Title
US20160140654A1 (en) Automated process workflow for the entire mortgage loan and closing process
US11080425B2 (en) Staged information exchange facilitated by content-addressable records indexed to pseudonymous identifiers by a tamper-evident data structure
CN112184191B (en) Resource transaction method, device and system based on block chain
CN110796269B (en) Method and device for generating model, and method and device for processing information
CN111951052B (en) Method and device for acquiring potential clients based on knowledge graph
CN112613877B (en) Intelligent contract triggering method and device applied to block chain network and related equipment
CN111371673A (en) Notes mail automatic processing method and device
CN106296154B (en) Transaction processing method and system
US20220383222A1 (en) Anonymous distributed consensus regarding the verification of protocols
CN113409134A (en) Enterprise financing trust method and device based on federal learning
US11489842B1 (en) Methods and systems for managing delegates for secure account fund transfers
CN110032846A (en) The anti-misuse method and device of identity data, electronic equipment
CN107729124A (en) Transaction methods and device, electronic equipment
CN112183024B (en) Identification code generation method and device for partner sub-mechanism
CN110544143B (en) Contract establishing method and device for grouping credit project
CN116451280A (en) Asset management method and device based on blockchain
CN113806555B (en) Operation abnormality identification method, system and device for APP and storage medium
US11107068B2 (en) Inline authorization structuring for activity data transmission
CN109146478A (en) For operating the method, apparatus and medium of digital certificate in block chain network
CN114493850A (en) Artificial intelligence-based online notarization method, system and storage medium
US11314848B2 (en) System for dynamically appending and transforming static activity data transmitted to a user device application
CN112101915A (en) Financial service management and control data processing method and device
CN113762939A (en) Asset management method and device based on block chain and electronic equipment
CN111767343A (en) Test data synchronization method and device based on message queue, equipment and medium
CN113538127B (en) Method, system, equipment and medium for supporting simultaneous combined wind control test of multiple partners

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant