CN112700250A - Identity authentication method, device and system in financial scene - Google Patents

Identity authentication method, device and system in financial scene Download PDF

Info

Publication number
CN112700250A
CN112700250A CN202110027863.8A CN202110027863A CN112700250A CN 112700250 A CN112700250 A CN 112700250A CN 202110027863 A CN202110027863 A CN 202110027863A CN 112700250 A CN112700250 A CN 112700250A
Authority
CN
China
Prior art keywords
target
financial
target object
intelligent contract
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110027863.8A
Other languages
Chinese (zh)
Other versions
CN112700250B (en
Inventor
贺虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN202110027863.8A priority Critical patent/CN112700250B/en
Publication of CN112700250A publication Critical patent/CN112700250A/en
Application granted granted Critical
Publication of CN112700250B publication Critical patent/CN112700250B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Abstract

The invention provides an identity authentication method, device and system in a financial scene, after receiving an identity authentication request sent by a first financial institution, firstly determining a target intelligent contract matched with a target financial service carried in the identity authentication request, and then executing the target intelligent contract on a block chain to authenticate object information of a target object to obtain an authentication result; in the mode, a plurality of intelligent contracts are arranged on the block chain, all kinds of financial services have the matched intelligent contracts, the risk matched KYC service with the financial services can be realized through the matched intelligent contracts, the hierarchical management of the financial services is realized, and the diversified KYC requirements matched with all kinds of financial services can be met.

Description

Identity authentication method, device and system in financial scene
Technical Field
The invention relates to the technical field of block chains, in particular to an identity authentication method, device and system in a financial scene.
Background
KYC (Know Your Customer ) policy is ubiquitous in the financial industry. The KYC policy requires financial institutions to implement real-name systems of accounts, know the actual controller of the account and the actual beneficiary of the transaction, and also require sufficient knowledge of the identity of the customer, the standing address or the business engaged in by the enterprise, and take corresponding measures. In the related art, an identity authentication system realized based on a block chain is usually adopted, the system can meet the general KYC requirements, but due to different risks of financial services, the identity authentication of a user needs to be carried out by adopting a KYC standard matched with the risks of the financial services, and the system is difficult to provide diversified KYC requirements matched with various financial services.
Disclosure of Invention
In view of this, the present invention provides an identity authentication method, apparatus and system in a financial scenario to provide diversified KYC requirements that can be matched with various financial services.
In a first aspect, an embodiment of the present invention provides an identity authentication method in a financial scenario, where the method is applied to a node device on a block chain; the method comprises the following steps: receiving an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object; determining a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
Further, the plurality of intelligent contracts comprise a base level intelligent contract and a plurality of high level intelligent contracts; wherein, in the plurality of high-level intelligent contracts, each level of intelligent contracts except the lowest level comprises contract contents of the intelligent contracts of the next level.
Further, the intelligent contract of the base level is used for verifying the identity card information of the target object; the plurality of high-level smart contracts comprises three levels of smart contracts; the intelligent contract with the lowest level is used for verifying the bank card information of the target object; the intelligent contract of the middle level is used for verifying the bank card information and the face identification information of the target object; and the intelligent contract at the highest level is used for verifying the bank card information, the face identification information and the verification information of the target object.
In a second aspect, an embodiment of the present invention provides an identity authentication method in a financial scenario, where the method is applied to a terminal device of a first financial institution; the method comprises the following steps: receiving object information of a target object to be authenticated and target financial services to be transacted by the target object; generating an identity authentication request based on the object information and the target financial transaction; sending the identity authentication request to a blockchain so as to determine a target intelligent contract matched with the target financial service through node equipment on the blockchain; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
Further, the method further comprises: and if the information of the object information authentication success of the target object returned by the block chain is received, transacting the target financial service for the target object.
In a third aspect, an embodiment of the present invention provides an identity authentication apparatus in a financial scenario, where the apparatus is disposed in a node device on a block chain; the device comprises: the first receiving module is used for receiving an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object; the first determination module is used for determining a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; the execution module is used for executing the target intelligent contract on the block chain so as to authenticate the object information of the target object and obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
In a fourth aspect, an embodiment of the present invention provides an identity authentication apparatus in a financial scenario, where the apparatus is disposed in a terminal device of a first financial institution; the device comprises: the second receiving module is used for receiving the object information of the target object to be authenticated and the target financial business required to be transacted by the target object; generating an identity authentication request based on the object information and the target financial transaction; the second determination module is used for sending the identity authentication request to a blockchain so as to determine a target intelligent contract matched with the target financial service through node equipment on the blockchain; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
In a fifth aspect, an embodiment of the present invention provides an identity authentication system in a financial scenario, where the system includes: a node device on the blockchain, and a terminal device of the first financial institution; the terminal equipment of the first financial institution is used for receiving object information of a target object to be authenticated and target financial services which need to be transacted by the target object; generating an identity authentication request based on the object information and the target financial transaction; sending the identity authentication request to a block chain; the node equipment on the block chain determines a target intelligent contract matched with the target financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
In a sixth aspect, an embodiment of the present invention provides an electronic device, including a processor and a memory, where the memory stores machine executable instructions that can be executed by the processor, and the processor executes the machine executable instructions to implement the identity authentication method in the financial scenario of any one of the first aspect or the second aspect.
In a seventh aspect, an embodiment of the present invention provides a machine-readable storage medium, which stores machine-executable instructions, and when the machine-executable instructions are called and executed by a processor, the machine-executable instructions cause the processor to implement the identity authentication method in the financial scenario according to any one of the first aspect or the second aspect.
According to the identity authentication method, device and system in the financial scene, after an identity authentication request sent by a first financial institution is received, a target intelligent contract matched with a target financial service carried in the identity authentication request is firstly determined, and then the target intelligent contract is executed on a block chain to authenticate the object information of a target object to obtain an authentication result; in the mode, a plurality of intelligent contracts are arranged on the block chain, all kinds of financial services have the matched intelligent contracts, the risk matched KYC service with the financial services can be realized through the matched intelligent contracts, the hierarchical management of the financial services is realized, and the diversified KYC requirements matched with all kinds of financial services can be met.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an identity authentication method in a financial scenario according to an embodiment of the present invention;
FIG. 2 is a flowchart of an identity authentication method in another financial scenario according to an embodiment of the present invention;
FIG. 3 is a flowchart of an identity authentication method in another financial scenario according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of intelligent contract staging in a financial scenario provided by an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an identity authentication apparatus in a financial scenario according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an identity authentication apparatus in another financial scenario according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, a KYC policy generally exists in the financial industry, a customer can be fully known through the KYC policy, the legality of a fund source is known through the strengthened examination of an account holder, real-name authentication is a verification examination and verification on the authenticity of user data, and the KYC is closely connected with the real-name authentication. In the related art, a set of completely open-source entity identification and trusted data solutions is generally adopted, which can bear trusted mapping between the real identity of an entity object (person or thing) and the identity on a chain, and realize secure access authorization and data exchange between the entity objects. This solution currently mainly consists of two major modules: DID (Decentralized identity) and Credential (identity voucher). The DID module realizes a set of identity identification protocol which conforms to the distributed multi-center of the W3C (World Wide Web Consortium) DID specification on the bottom platform of the blockchain, so that the real identities of the entities such as people or things realize the identity identification on the chain; meanwhile, the DID gives an entity such as a person or an object the ability to directly own and control an Identity document (Identity identification number).
The Credential is equivalent to a verifiable digital certificate, and in the real society, various data can be used for representing entity identities and relationships among entities, such as identity cards, driving licenses, deposit certificates, prescriptions, graduation certificates, house property certificates and the like. Credential provides a complete set of solutions based on the W3C VC (VC is a software development tool) specification that can be standardized, electronically generated, and generate verifiable, exchangeable credentials (Credential). The entity identity identification and credible data solution mainly provides a solution for the links of showing and verifying the digital certificates of the clients, only provides a general electronic identity management method, does not specifically support the financial KYC scene, needs to adopt the KYC standard matched with the risk of the financial business to perform identity authentication on the users due to different risks of the financial business, and is difficult to provide diversified KYC requirements matched with various financial businesses.
Based on this, the identity authentication method, device and system provided by the embodiment of the invention in the financial scene can be applied to the application of the financial institution in authenticating the user identity based on the KYC policy.
In order to facilitate understanding of the embodiment, first, the identity authentication method in a financial scenario disclosed in the embodiment of the present invention is described in detail, where the method is applied to a node device on a block chain; the blockchain can be understood as a shared database, and data or information stored in the shared database generally has the characteristics of being unforgeable, having trace in the whole process, being traceable, being publicly transparent, being maintained in a collective way, and the like; in practical implementation, the blockchain may include a plurality of node devices; as shown in fig. 1, the method comprises the steps of:
step S102, receiving an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object.
The first financial institution may be understood as a financial intermediary institution involved in the financial industry, such as a bank, a securities company, an insurance company, a trust investment company, a fund management company, etc.; the identity authentication request can be used for indicating the object information of the target object to be authenticated; the object information may also be referred to as identity information, and may be understood as specific attribute or characteristic data of the target object, and may also be understood as original data of the target object, such as name, gender, identification number, contact phone, picture or various original files of the target object; the target financial transaction may be understood as a specific financial transaction in the plurality of financial transactions of the first financial institution that the target object needs to transact, for example, the target object needs to open a common security transaction account in a security company, or open a security transaction account on a starting board, and the like. In actual implementation, when a target object to be authenticated needs to be confirmed, an identity authentication request sent by a first financial institution, object information of the target object to be authenticated, and target financial services that the target object needs to handle are usually carried into the identity authentication request by a node device on a block chain.
Step S104, determining a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service.
The smart contract is typically a computer protocol that propagates, verifies, or enforces contracts in an informational manner, typically chain code written on a blockchain, that allows trusted transactions to be conducted without a third party, which transactions are traceable and irreversible; the intelligent contract generally comprises a triggering condition and an execution result which is irreversible after the triggering condition is triggered; in practical implementation, a plurality of intelligent contracts are usually set on the block chain, each intelligent contract is matched with a designated financial service, for example, a first intelligent contract is matched with a first financial service, a second intelligent contract is matched with the first financial service, and the like.
Step S106, executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
After determining the target intelligent contract matched with the target financial service, the node equipment on the blockchain executes the target intelligent contract on the blockchain, and the target information can be subjected to content verification through the target intelligent contract so as to obtain an authentication result that the target information passes or fails authentication; if the authentication result is that the authentication is passed, the target object can be confirmed to have the authority to handle the target financial service, and if the authentication result is that the authentication is not passed, the target object can be confirmed to have no authority to handle the target financial service.
After receiving an identity authentication request sent by a first financial institution, the identity authentication method in the financial scenario according to the embodiment of the invention first determines a target intelligent contract matched with a target financial service carried in the identity authentication request, and then executes the target intelligent contract on a block chain to authenticate object information of a target object to obtain an authentication result; in the mode, a plurality of intelligent contracts are arranged on the block chain, all kinds of financial services have the matched intelligent contracts, the risk matched KYC service with the financial services can be realized through the matched intelligent contracts, the hierarchical management of the financial services is realized, and the diversified KYC requirements matched with all kinds of financial services can be met.
The embodiment of the invention also provides another identity authentication method in a financial scene, which is realized on the basis of the method of the embodiment; the method comprises the following steps:
step 202, receiving an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object.
Step 204, determining a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service.
The above-mentioned smart contract is usually set based on the financial KYC policy corresponding to the first financial institution, for example, the trigger condition of the smart contract may include the financial KYC policy, and the financial KYC policy is usually formed by combining one or more rules, for example, the financial KYC policy includes only one rule of bank card four-element verification, or includes two rules of bank card four-element verification and face recognition, and the like. In this embodiment, the plurality of intelligent contracts include a base-level intelligent contract and a plurality of high-level intelligent contracts; in the plurality of high-level intelligent contracts, the intelligent contracts of each level except the lowest level comprise contract contents of the intelligent contracts of the next level, namely the intelligent contracts of each level have clear hierarchical relations, such as progressive relations.
The contract content can also be understood as a trigger condition of the intelligent contract; the intelligent contract of the basic level can also be understood as an intelligent contract of a first level, the intelligent contract of the basic level is used for verifying the identity card information of the target object, and a financial KYC strategy of the first level corresponding to the intelligent contract of the basic level is identity card verification; the plurality of high-level intelligent contracts comprise three levels of intelligent contracts, for example, the plurality of high-level intelligent contracts comprise a second level of intelligent contracts, a third level of intelligent contracts and a fourth level of intelligent contracts; the lowest-level smart contract is used for verifying bank card information of a target object, for example, a financial KYC policy of a second level corresponding to the second-level smart contract is bank card four-element verification, the bank card four-element verification usually comprises four data of a bank card number, a real name, an identification number and a bank reserved mobile phone, and the bank card four-element verification is usually used for verifying and verifying authenticity of the bank card object information so as to establish a perfect and reliable internet credit basis; the intelligent contract of the middle level is used for verifying the bank card information and the face identification information of the target object; for example, the financial KYC strategy of the third level corresponding to the intelligent contract of the third level is bank card four-factor verification and face recognition; the face recognition can be understood as recognizing the identity of a target object by acquiring the face head image of the target object or facial features extracted from a short video and comparing the facial features with known face images; the intelligent contract of the highest level is used for verifying the bank card information, the face recognition information and the verification information of the target object; for example, the financial KYC policy of the fourth level corresponding to the intelligent contract of the fourth level is bank card four-factor verification, face recognition and verification information, where the verification information may be understood as the amount of funds that the account of the target object needs to reach within a preset time, for example, when the target object opens an account in a security company, the amount of funds of the account of the target object is required to reach 50 ten thousand yuan per the last 20 transaction days, or other required amounts of funds.
Step 206, executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
In another identity authentication method in a financial scenario provided in the embodiment of the present invention, after receiving an identity authentication request sent by a first financial institution, a target intelligent contract matched with a target financial service carried in the identity authentication request is first determined, and then the target intelligent contract is executed on a block chain to authenticate object information of a target object, so as to obtain an authentication result; in the mode, a plurality of intelligent contracts are arranged on the block chain, all kinds of financial services have the matched intelligent contracts, the risk matched KYC service with the financial services can be realized through the matched intelligent contracts, the hierarchical management of the financial services is realized, and the diversified KYC requirements matched with all kinds of financial services can be met.
The embodiment of the invention also provides another identity authentication method in a financial scene, which is applied to the terminal equipment of the first financial institution; the terminal equipment can be a computer, a mobile terminal, a palm computer and the like; the number of the terminal equipment can be one or more, and the terminal equipment can be specifically set according to actual application scenes or requirements; as shown in fig. 2, the method comprises the steps of:
step S202, receiving object information of a target object to be authenticated and target financial services to be transacted by the target object; an identity authentication request is generated based on the object information and the target financial transaction.
When the object information of the target object to be confirmed needs to be confirmed, generally, the terminal device of the first financial institution may first receive the object information of the target object to be authenticated and the target financial service that the target object needs to handle, and then carry the object information and the target financial service to the identity authentication request to indicate that the object information of the target object to be authenticated is authenticated.
Step S204, the identity authentication request is sent to the block chain, so that a target intelligent contract matched with the target financial service is determined through the node equipment on the block chain; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service; executing a target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
In another identity authentication method in a financial scenario provided by the embodiment of the present invention, an identity authentication request is generated based on received object information of a target object to be authenticated and a target financial service that the target object needs to transact; sending the identity authentication request to a block chain so as to determine a target intelligent contract matched with the target financial service through node equipment on the block chain; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; in the mode, a plurality of intelligent contracts are arranged on the block chain, all kinds of financial services have the matched intelligent contracts, the risk matched KYC service with the financial services can be realized through the matched intelligent contracts, the hierarchical management of the financial services is realized, and the diversified KYC requirements matched with all kinds of financial services can be met.
The embodiment of the invention also provides another identity authentication method in a financial scene, which is realized on the basis of the method of the embodiment; as shown in fig. 3, the method comprises the steps of:
step S302, receiving object information of a target object to be authenticated and target financial services to be transacted by the target object; an identity authentication request is generated based on the object information and the target financial transaction.
Step S304, the identity authentication request is sent to the block chain, so that a target intelligent contract matched with the target financial service is determined through the node equipment on the block chain; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service; executing a target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
Step S306, if the information of the object information authentication success of the object returned by the block chain is received, transacting the object financial business for the object.
If the information that the object information of the target object returned by the block chain is successfully authenticated is received, the fact that the object information of the target object to be authenticated meets contract conditions of the intelligent contract is shown, which is equivalent to that the real-name confirmation of the target object to be authenticated is completed, and the target financial service can be transacted for the target object to be authenticated.
In another identity authentication method in a financial scenario provided by the embodiment of the present invention, an identity authentication request is generated based on received object information of a target object to be authenticated and a target financial service that the target object needs to transact; sending the identity authentication request to a block chain so as to determine a target intelligent contract matched with the target financial service through node equipment on the block chain; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; and if the information of successful authentication of the object information of the target object returned by the block chain is received, transacting the target financial service for the target object. In the mode, a plurality of intelligent contracts are arranged on the block chain, all kinds of financial services have the matched intelligent contracts, the risk matched KYC service with the financial services can be realized through the matched intelligent contracts, the hierarchical management of the financial services is realized, and the diversified KYC requirements matched with all kinds of financial services can be met.
To further understand the above embodiments, a schematic diagram of smart contract classification in a financial scenario is provided as shown in fig. 4, where fig. 4 includes four levels of smart contracts, that is, a financial KYC-classified smart contract 1 (corresponding to the above-mentioned base-level smart contract), a financial KYC-classified smart contract 2, a financial KYC-classified smart contract 3, and a financial KYC-classified smart contract 4 (corresponding to the above-mentioned multiple high-level smart contracts), where the financial KYC-classified smart contract 1 corresponds to level 1, and the contract content is an authentication check for checking the identity card information of the target object; the financial KYC hierarchical intelligent contract 2 corresponds to level 2, the contract content is bank card four-factor verification, and the method is used for verifying the bank card information of the target object; financial KYC hierarchical intelligent contract 3 corresponds to 3 levels, and the contract content is bank card four-factor verification and face identification and is used for verifying bank card information and face identification information of the target object; the financial KYC hierarchical intelligent contract 4 corresponds to 4 levels, the contract content is bank card four-factor verification, face recognition and verification, and the contract content is used for verifying bank card information, face recognition information and verification information of the target object; it should be noted that the classification principle is generally determined according to the financial service scenario, the classification methods in different scenarios are generally different, and the classification is generally performed by a system operator or a developer, each classified level may be stored in a block chain or a common database, a financial institution may specify an intelligent contract of a required level based on the specific financial service, and generally, the higher the level of the intelligent contract is, the more rules to be checked are, and the more stringent the authentication conditions are.
In a financial KYC scene based on a block chain and DID (distributed IDs), KYC hierarchical management requirements exist, similarly, intelligent contracts corresponding to financial KYC strategies also have requirements for supporting KYC hierarchical intelligent contracts, the KYC hierarchical intelligent contracts can have multiple levels, for example, the first level is identity card verification, the second level is four-element verification such as a bank card, the third level is four-element verification of the bank card and face recognition, the fourth level is four-element verification of the bank card, face recognition and account verification resources reach K yuan, wherein K can be 50 thousands or other specified amount; as can be seen from fig. 4, there is a clear progressive relationship of trigger conditions for the financial KYC hierarchical intelligence contract level 1 to level 4. In addition to the financial KYC hierarchical intelligent contract 1, the financial KYC hierarchical intelligent contract 3 comprises contract contents of the financial KYC hierarchical intelligent contract 2, and the financial KYC hierarchical intelligent contract 4 comprises contract contents of the financial KYC hierarchical intelligent contract 3; the financial institution generally comprises a plurality of financial services, and each financial service has an intelligent contract with a level corresponding to the financial service; the higher the level of the smart contract is, the more contract contents are included, and the stricter the requirement for authenticating the object information of the target object is.
It should be noted that the identity information required to be verified by different financial services is usually different, and some requirements are strict, for example, in the aforementioned four-level financial KYC hierarchical intelligent contract, for all financial services, the level 1 id card verification is not necessarily required, if the financial services need to perform the level 1 id card verification, the level 1 id card verification may be directly performed, and if the financial services need to perform the level 2 intelligent contract, that is, the financial KYC hierarchical intelligent contract 2, the bank card four-element verification may be directly performed.
The following description takes a real-name authentication scene before the opening of a security account as an example, for example, a certain stock company A opens a common security transaction account, and only the requirements of 3-level 'bank card four-element verification + face recognition' are met; when an entrepreneurial security transaction account is opened, the requirements of 4-level 'bank card four-element verification + face recognition + check fund' are met, wherein the check fund information needs to be opened to an account and needs to reach K elements or averagely reach K elements within a certain time, for example, K can be 50 ten thousand, and the like, and when the check fund is needed in actual implementation, a related account fund balance inquiry interface is generally required to be called to prove that 50 ten thousand are opened to a certain account; when the application scenario is designed into a financial KYC strategy based on a block chain, intelligent contracts of corresponding levels are needed. In the block chain system, the intelligent contract of the financial KYC strategy is an intelligent contract which is specially used for undertaking the execution work of the financial KYC strategy, and the intelligent contracts matched with different financial services are usually different.
According to the identity authentication method, an intelligent contract aiming at financial KYC strategy classification is designed aiming at a financial KYC scene, and in a distributed identity system based on a block chain, the financial KYC strategy classification management is realized through the intelligent contract aiming at the financial KYC strategy classification, so that the requirement of the financial KYC strategy classification management based on the block chain is met, and the execution of the distributed automated financial KYC strategy independent of a single center party can be realized.
Explaining part of terms related to a block chain, wherein a group refers to a main body for deploying a distributed identity system in a group, each group has a supervisor of the group, and the supervisor has a super key of the group; the group also belongs to a management organization, which refers to an organization participating in platform operation, and can maintain and use the identity information of personal entities and organization entities in the business field thereof, and can issue and verify identity certificates. The management organization can maintain the authority of the branch organization and the organization user, the management organization is also an organization entity, and the organization user is also a personal entity; the personal entity refers to a person as a DID registration entity, and can maintain personal identity information and perform identity information authorization, and specifically, the maintenance of the personal identity information or the authorization of the identity information can be completed through a C-terminal Client; among other things, DID can be used to represent unique identification of an Entity (Entity) such as a person, organization, or thing, typically in a distributed identity system.
The monitoring party is a monitoring unit, can monitor the industry of the organization deploying the distributed identity system, and usually has monitoring authority for the operation and data of the distributed identity system in the group. Specifically, each financial institution generally has a corresponding supervisor, and the supervisor has the local super key, so that unlimited query operation of data in the system can be performed through the supervision Client.
A blockchain business group composed of a plurality of members may be called a federation, and the federation members may act as participants to jointly construct a blockchain network. A federation cooperative governance structure is a governance rule which is usually obtained by members in a federation according to a consensus agreement and is an organizational structure form capable of completing management of related affairs in the federation. The alliance chain is a permission block chain, and is generally managed by a plurality of organizations, each organization can operate one node or a plurality of nodes, and different organizations in the system can only be allowed to read and write data or send transactions, and record transaction data together; federation chains generally include intra-group federation chains and open federation chains, where federation chains deployed only inside a group are referred to as intra-group federation chains; a federation chain in which authorization data can be interacted between different organizations, institutions, or groups is called an open federation chain.
For further understanding of the above embodiments, a distributed identity system is taken as an example for description below, the distributed identity system provides a solution for association, collection, storage, transmission, and confirmation between entity attribute features of people, objects, and mechanisms in the real world and identity credential identifiers in the virtual world, the distributed identity system stores digital user identification information and object information hash values of target objects to be confirmed on a block chain, and object information may be stored in a distributed storage system. The distributed identity system of financial institution a employs a federation chain for digital voucher data coexistence sharing.
In an alternative embodiment of the present invention, the related specifications may be formulated with reference to the W3C Decentralized Identities (DIDs) v1.0 specification and the W3C standardized creatives Data Model 1.0 specification; wherein the W3C Decentralized IDs (DIDs) v1.0 specification is a distributed ID specification promulgated by the W3C organization; the W3C Verifiable Credentials Data Model 1.0 specification is a Verifiable credential Data Model specification promulgated by the W3C organization.
The embodiment of the invention provides a structural schematic diagram of an identity authentication device in a financial scene, wherein the identity authentication device is arranged on node equipment on a block chain; as shown in fig. 5, the apparatus includes: a first receiving module 50, configured to receive an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object; a first determining module 51, configured to determine a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service; the execution module 52 is configured to execute the target intelligent contract on the block chain to authenticate the object information of the target object, so as to obtain an authentication result; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
After receiving an identity authentication request sent by a first financial institution, an identity authentication device according to an embodiment of the present invention first determines a target intelligent contract matched with a target financial service carried in the identity authentication request, and then executes the target intelligent contract on a block chain to authenticate object information of a target object, so as to obtain an authentication result; in the device, be provided with multiple intelligent contract on the block chain, all kinds of financial service all have its intelligent contract of matching, through assorted intelligent contract, can realize with financial service's risk matching KYC service, realize the hierarchical management to financial service to can satisfy with all kinds of financial service assorted diversified KYC demand.
Further, the plurality of intelligent contracts comprise a base level intelligent contract and a plurality of high level intelligent contracts; wherein, in the plurality of intelligent contracts of the high hierarchy, the intelligent contract of each hierarchy except the lowest hierarchy comprises the contract content of the intelligent contract of the next hierarchy.
Further, the intelligent contract of the basic level is used for verifying the identity card information of the target object; the plurality of high-level intelligent contracts comprise three levels of intelligent contracts; the intelligent contract of the lowest level is used for verifying the bank card information of the target object; the intelligent contract of the middle level is used for verifying the bank card information and the face identification information of the target object; the intelligent contract of the highest level is used for verifying the bank card information, the face recognition information and the verification information of the target object.
The implementation principle and the generated technical effect of the identity authentication device in the financial scenario provided by the embodiment of the present invention are the same as those of the identity authentication method in the financial scenario, and for a brief description, the corresponding contents in the identity authentication method in the financial scenario may be referred to for the part not mentioned in the embodiment of the identity authentication device in the financial scenario.
The embodiment of the invention provides a schematic structural diagram of an identity authentication device in another financial scene, wherein the identity authentication device is arranged on terminal equipment of a first financial institution; as shown in fig. 6, the apparatus includes: a second receiving module 60, configured to receive object information of a target object to be authenticated and target financial services that the target object needs to transact; generating an identity authentication request based on the object information and the target financial service; the second determining module 61 is configured to send the identity authentication request to the blockchain, so as to determine, through the node device on the blockchain, a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service; executing a target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
The identity authentication device in another financial scenario provided by the embodiment of the invention generates an identity authentication request based on the received object information of the target object to be authenticated and the target financial service which needs to be transacted by the target object; sending the identity authentication request to a block chain so as to determine a target intelligent contract matched with the target financial service through node equipment on the block chain; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; in the device, be provided with multiple intelligent contract on the block chain, all kinds of financial service all have its intelligent contract of matching, through assorted intelligent contract, can realize with financial service's risk matching KYC service, realize the hierarchical management to financial service to can satisfy with all kinds of financial service assorted diversified KYC demand.
Further, the apparatus is further configured to: and if the information of successful authentication of the object information of the target object returned by the block chain is received, transacting the target financial service for the target object.
The implementation principle and the generated technical effect of the identity authentication device in the financial scenario provided by the embodiment of the present invention are the same as those of the identity authentication method in the financial scenario, and for a brief description, the corresponding contents in the identity authentication method in the financial scenario may be referred to for the part not mentioned in the embodiment of the identity authentication device in the financial scenario.
The embodiment of the invention provides an identity authentication system in a financial scene, which comprises: a node device on the blockchain, and a terminal device of the first financial institution; the terminal equipment of the first financial institution is used for receiving the object information of the target object to be authenticated and the target financial business to be transacted by the target object; generating an identity authentication request based on the object information and the target financial service; sending an identity authentication request to a block chain; node equipment on the block chain determines a target intelligent contract matched with the target financial service; executing a target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with the designated financial service; the authentication result is used to indicate: whether the target object has the authority to handle the target financial business.
According to the identity authentication system in the financial scene, provided by the embodiment of the invention, aiming at identity authentication in the financial scene, an intelligent contract aiming at financial KYC strategy classification is designed, and the financial KYC strategy is managed through the intelligent contract aiming at financial KYC strategy classification, so that the requirement of realizing block chain-based financial KYC strategy classification management is met, and the distributed automatic financial KYC strategy execution independent of a single central party can be realized.
An embodiment of the present invention further provides an electronic device, as shown in fig. 7, where the electronic device includes a processor 130 and a memory 131, the memory 131 stores machine executable instructions that can be executed by the processor 130, and the processor 130 executes the machine executable instructions to implement the identity authentication method in the financial scenario.
Further, the electronic device shown in fig. 7 further includes a bus 132 and a communication interface 133, and the processor 130, the communication interface 133, and the memory 131 are connected through the bus 132.
The Memory 131 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 133 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used. The bus 132 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 7, but this does not indicate only one bus or one type of bus.
The processor 130 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 130. The Processor 130 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 131, and the processor 130 reads the information in the memory 131 and completes the steps of the method of the foregoing embodiment in combination with the hardware thereof.
The embodiment of the present invention further provides a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions, and when the machine-executable instructions are called and executed by a processor, the machine-executable instructions cause the processor to implement the identity authentication method in the financial scenario, and specific implementation may refer to method embodiments, and is not described herein again.
The computer program product of the identity authentication method, apparatus, and system in a financial scenario provided in the embodiments of the present invention includes a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementation may refer to the method embodiments, and will not be described herein again.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that the following embodiments are merely illustrative of the present invention, and not restrictive, and the scope of the present invention is not limited thereto: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An identity authentication method in a financial scene is characterized in that the method is applied to node equipment on a block chain; the method comprises the following steps:
receiving an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object;
determining a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service;
executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
2. The method of claim 1, wherein the plurality of intelligent contracts comprises a base level of intelligent contracts and a plurality of high level of intelligent contracts;
wherein, in the plurality of high-level intelligent contracts, each level of intelligent contracts except the lowest level comprises contract contents of the intelligent contracts of the next level.
3. The method of claim 2, wherein the base-level smart contract is used to verify identity card information of the target object; the plurality of high-level smart contracts comprises three levels of smart contracts;
the intelligent contract with the lowest level is used for verifying the bank card information of the target object; the intelligent contract of the middle level is used for verifying the bank card information and the face identification information of the target object; and the intelligent contract at the highest level is used for verifying the bank card information, the face identification information and the verification information of the target object.
4. An identity authentication method in a financial scene is characterized in that the method is applied to terminal equipment of a first financial institution; the method comprises the following steps:
receiving object information of a target object to be authenticated and target financial services to be transacted by the target object; generating an identity authentication request based on the object information and the target financial transaction;
sending the identity authentication request to a blockchain so as to determine a target intelligent contract matched with the target financial service through node equipment on the blockchain; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
5. The method of claim 4, further comprising:
and if the information of the object information authentication success of the target object returned by the block chain is received, transacting the target financial service for the target object.
6. An identity authentication device in a financial scene is characterized in that the device is arranged on node equipment on a block chain; the device comprises:
the first receiving module is used for receiving an identity authentication request sent by a first financial institution; the identity authentication request carries object information of a target object to be authenticated and target financial services to be transacted by the target object;
the first determination module is used for determining a target intelligent contract matched with the target financial service; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service;
the execution module is used for executing the target intelligent contract on the block chain so as to authenticate the object information of the target object and obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
7. An identity authentication device in a financial scene is characterized in that the device is arranged on terminal equipment of a first financial institution; the device comprises:
the second receiving module is used for receiving the object information of the target object to be authenticated and the target financial business required to be transacted by the target object; generating an identity authentication request based on the object information and the target financial transaction;
the second determination module is used for sending the identity authentication request to a blockchain so as to determine a target intelligent contract matched with the target financial service through node equipment on the blockchain; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
8. An identity authentication system in a financial scenario, the system comprising: a node device on the blockchain, and a terminal device of the first financial institution;
the terminal equipment of the first financial institution is used for receiving object information of a target object to be authenticated and target financial services which need to be transacted by the target object; generating an identity authentication request based on the object information and the target financial transaction; sending the identity authentication request to a block chain;
the node equipment on the block chain determines a target intelligent contract matched with the target financial service; executing the target intelligent contract on the block chain to authenticate the object information of the target object to obtain an authentication result; the block chain is provided with a plurality of intelligent contracts, and each intelligent contract is matched with a designated financial service; the authentication result is used for indicating that: whether the target object has the authority to handle the target financial service.
9. An electronic device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor, the processor executing the machine executable instructions to implement the method of identity authentication in a financial scenario as claimed in any one of claims 1 to 5.
10. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of identity authentication in a financial scenario as claimed in any one of claims 1 to 5.
CN202110027863.8A 2021-01-08 2021-01-08 Identity authentication method, device and system in financial scene Active CN112700250B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110027863.8A CN112700250B (en) 2021-01-08 2021-01-08 Identity authentication method, device and system in financial scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110027863.8A CN112700250B (en) 2021-01-08 2021-01-08 Identity authentication method, device and system in financial scene

Publications (2)

Publication Number Publication Date
CN112700250A true CN112700250A (en) 2021-04-23
CN112700250B CN112700250B (en) 2024-04-23

Family

ID=75513671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110027863.8A Active CN112700250B (en) 2021-01-08 2021-01-08 Identity authentication method, device and system in financial scene

Country Status (1)

Country Link
CN (1) CN112700250B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536342A (en) * 2021-07-06 2021-10-22 招商银行股份有限公司 Block chain-based evidence storage management method, system, program product and storage medium
CN113849563A (en) * 2021-09-24 2021-12-28 中国农业银行股份有限公司 Information sharing method, device and system
CN116070183A (en) * 2023-03-27 2023-05-05 布比(北京)网络技术有限公司 Method, device, equipment and medium for legal identity management and control based on blockchain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180096360A1 (en) * 2016-10-04 2018-04-05 International Business Machines Corporation Method and apparatus to enforce smart contract execution hierarchy on blockchain
CN109615518A (en) * 2018-12-11 2019-04-12 北京瑞卓喜投科技发展有限公司 A kind of construction method and intelligence contract system of intelligence contract system
CN109886712A (en) * 2019-02-25 2019-06-14 众安信息技术服务有限公司 Data processing method and device based on block chain
CN111429140A (en) * 2020-03-30 2020-07-17 上海简苏网络科技有限公司 Method and device for realizing atomicity of multi-level intelligent contract stack
US20200242595A1 (en) * 2019-01-30 2020-07-30 Salesforce.Com, Inc. Systems, methods, and apparatuses utilizing a blended blockchain ledger in a cloud service to address local storage
CN112100594A (en) * 2020-11-13 2020-12-18 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN112184222A (en) * 2020-05-29 2021-01-05 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180096360A1 (en) * 2016-10-04 2018-04-05 International Business Machines Corporation Method and apparatus to enforce smart contract execution hierarchy on blockchain
CN109615518A (en) * 2018-12-11 2019-04-12 北京瑞卓喜投科技发展有限公司 A kind of construction method and intelligence contract system of intelligence contract system
US20200242595A1 (en) * 2019-01-30 2020-07-30 Salesforce.Com, Inc. Systems, methods, and apparatuses utilizing a blended blockchain ledger in a cloud service to address local storage
CN109886712A (en) * 2019-02-25 2019-06-14 众安信息技术服务有限公司 Data processing method and device based on block chain
CN111429140A (en) * 2020-03-30 2020-07-17 上海简苏网络科技有限公司 Method and device for realizing atomicity of multi-level intelligent contract stack
CN112184222A (en) * 2020-05-29 2021-01-05 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain
CN112100594A (en) * 2020-11-13 2020-12-18 支付宝(杭州)信息技术有限公司 Service processing method, device and equipment based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113536342A (en) * 2021-07-06 2021-10-22 招商银行股份有限公司 Block chain-based evidence storage management method, system, program product and storage medium
CN113536342B (en) * 2021-07-06 2024-03-26 招商银行股份有限公司 Block chain-based certificate management method, system, program product and storage medium
CN113849563A (en) * 2021-09-24 2021-12-28 中国农业银行股份有限公司 Information sharing method, device and system
CN116070183A (en) * 2023-03-27 2023-05-05 布比(北京)网络技术有限公司 Method, device, equipment and medium for legal identity management and control based on blockchain

Also Published As

Publication number Publication date
CN112700250B (en) 2024-04-23

Similar Documents

Publication Publication Date Title
US11880228B2 (en) Systems and methods for verifying data via blockchain
CN112700250B (en) Identity authentication method, device and system in financial scene
CN109768983B (en) Block chain-based multi-dimensional dynamic identity recognition method, device and system
CN109255619A (en) A kind of identity identifying method and equipment based on block chain
CN111159308B (en) Transaction record sharing method and device based on block chain network and electronic equipment
US11663595B1 (en) Blockchain transactional identity verification
CN112700251B (en) Identity confirmation method, device and system in financial scene
KR20210058608A (en) History management method, apparatus and program for preventing fake using blockchain
CN115456773A (en) Payment control method, device, equipment and medium based on block chain
CN114363327A (en) Compliance mechanism in blockchain networks
CN112862589B (en) Authentication method, device and system in financial scene
CN113034275B (en) Management system and method based on block chain network and terminal equipment
US20230092436A1 (en) Framework for demaraction of digital assets
KR102307668B1 (en) Certification system and certification method
CN112700327A (en) User confirmation method, device and system in financial scene
CN112884484A (en) Enterprise identity authentication method and system based on block chain
KR20210058091A (en) Method for providing history management system by assigning authentication mark and blockchain-based fake prevention
KR20210058092A (en) Blockchain-based transaction history management method with transactor authentication using eid
US20240104521A1 (en) System and method for compliance-enabled digitally represented assets
US20240126904A1 (en) Systems and Methods for Managing Access to Confidential Data
CN112837043A (en) Data processing method and device based on block chain and electronic equipment
CN115470527A (en) Block chain based evidence storage method, device and system
KR20210036888A (en) Method for Verifying Monopolizing Relationship or Contraction and System for the Same
CN115510493A (en) Resource data processing method and device based on block chain and server
KR20210058090A (en) Blockchain-based method for authentication and history management using eid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant