CN112990940A - Enterprise authentication method and device - Google Patents

Enterprise authentication method and device Download PDF

Info

Publication number
CN112990940A
CN112990940A CN202110187281.6A CN202110187281A CN112990940A CN 112990940 A CN112990940 A CN 112990940A CN 202110187281 A CN202110187281 A CN 202110187281A CN 112990940 A CN112990940 A CN 112990940A
Authority
CN
China
Prior art keywords
enterprise
authentication
authenticated
guarantee
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110187281.6A
Other languages
Chinese (zh)
Other versions
CN112990940B (en
Inventor
孔飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110187281.6A priority Critical patent/CN112990940B/en
Publication of CN112990940A publication Critical patent/CN112990940A/en
Application granted granted Critical
Publication of CN112990940B publication Critical patent/CN112990940B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Abstract

The embodiment of the specification provides an enterprise authentication method and an enterprise authentication device, wherein the enterprise authentication method comprises the following steps: acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data; sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol; judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.

Description

Enterprise authentication method and device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an enterprise authentication method and apparatus.
Background
With the continuous development and popularization of the internet, the service range of the online service provided based on the internet gradually covers most users in most regions, and under the trend, the enterprise side providing the service also concentrates more products or services on the internet, while the enterprise providing the online service through the internet often needs to rely on identity authentication, and in many scenarios, the enterprise identity authentication needs to provide the service to the outside after passing the identity authentication, and on the basis, the influence of the enterprise identity authentication on the development of the online service of the enterprise is more and more important.
Disclosure of Invention
One or more embodiments of the present specification provide an enterprise authentication method. The enterprise authentication method comprises the following steps: the method comprises the steps of obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data. And sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. Judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.
One or more embodiments of the present specification provide an enterprise authentication apparatus, including: the social data acquisition module is configured to acquire social relationship data of the enterprise to be authenticated, and determine an associated enterprise of the enterprise to be authenticated according to the social relationship data. A vouch-for request sending module configured to send an authentication vouch-for request to a selected target one of the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. The certification condition judging module is configured to judge whether a guarantee enterprise triggering the access link and signing a certification guarantee protocol meets certification conditions; if yes, operating the identity authentication processing module. And the identity authentication processing module is configured to perform identity authentication processing on the enterprise to be authenticated.
One or more embodiments of the present specification provide an enterprise authentication device, comprising: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: the method comprises the steps of obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data. And sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. Judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed, implement the following: the method comprises the steps of obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data. And sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises. The authentication vouching request carries an access link of an authentication vouching protocol. Judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not; and if so, performing identity authentication processing on the enterprise to be authenticated.
Drawings
In order to more clearly illustrate one or more embodiments or technical solutions in the prior art in the present specification, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without inventive exercise;
fig. 1 is a flowchart of a processing method for enterprise authentication according to one or more embodiments of the present disclosure;
FIG. 2 is a flowchart of a process of an enterprise authentication method applied to an online business scenario according to one or more embodiments of the present disclosure;
FIG. 3 is a process flow diagram of another enterprise authentication method applied to an online business scenario according to one or more embodiments of the present disclosure;
fig. 4 is a schematic diagram of an enterprise authentication device according to one or more embodiments of the present disclosure;
fig. 5 is a schematic structural diagram of an enterprise authentication device according to one or more embodiments of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
The embodiment of the enterprise authentication method provided by the specification comprises the following steps:
referring to fig. 1, which shows a processing flow chart of an enterprise authentication method provided in this embodiment, referring to fig. 2, which shows a processing flow chart of an enterprise authentication method applied to an online business scenario provided in this embodiment, referring to fig. 3, which shows a processing flow chart of another enterprise authentication method applied to an online business scenario provided in this embodiment;
referring to fig. 1, the enterprise authentication method provided in this embodiment specifically includes steps S102 to S108.
Step S102, obtaining social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data.
In the enterprise authentication method provided by this embodiment, when an enterprise user fails to perform identity authentication through an enterprise name, an enterprise code, a legal name, a legal identity number, or otherwise performs identity authentication through the above elements, an associated enterprise having a social relationship with an enterprise to be authenticated is determined from social relationship data of the enterprise to be authenticated, and the associated enterprise is invited to secure identity authentication of the enterprise to be authenticated, if a sufficient number of associated enterprises submit identity authentication guarantees of the enterprise to be authenticated within a specified time among the invited associated enterprises, the enterprise to be authenticated performs identity authentication based on the guarantees of the associated enterprises to be authenticated, so as to avoid that the enterprise cannot perform identity authentication due to incomplete identity material provision or failure to provide identity material, and provide a new identity authentication channel for the enterprise, the method and the system are favorable for improving the success rate of identity authentication of enterprises, meanwhile, the identity authentication guarantee based on the social relation is also favorable for enhancing the interaction among the enterprises, and the dependence and participation of the enterprises on the platform are improved.
The social relationship data of the embodiment includes enterprise interaction data generated by social activities performed among enterprises; optionally, the social relationship data includes at least one of the following: the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities. The enterprise to be authenticated refers to an enterprise user needing identity authentication, and the associated enterprise refers to an enterprise user related to social relationship data of the enterprise to be authenticated.
For example, for an enterprise a to be subjected to real-name authentication, online exchange of digital business cards occurs between the enterprise a and the enterprise B, and the digital business card exchange records generated by the online exchange of the digital business cards of the enterprise a and the enterprise B are the digital business card exchange records of the enterprise a;
if the enterprise A invites the enterprise C or is invited by the enterprise C to perform real-name identity authentication, the historical guarantee relationship filed after the invitation or the invited to perform real-name authentication fails is the historical guarantee relationship data of the enterprise A;
the website link of the enterprise A and the website link of the enterprise D are friend links, and data for indicating that the website link of the enterprise A and the website link of the enterprise D are friend link data is website associated data of the enterprise A;
if the commodity of the enterprise A serving as an E-commerce merchant on the E-commerce platform and the commodity of the enterprise E serving as the E-commerce merchant are bundled to be sold package commodities, or the enterprise E is a logistics operator for logistics distribution of the commodity sold by the enterprise A, the commodity related data of the package commodities or the distribution related data of the commodity is acquired and used as the social relationship data of the enterprise A.
In specific implementation, in the process of determining the associated enterprise of the enterprise to be authenticated according to the social relationship data, the associated enterprise of the enterprise to be authenticated may be determined according to any one of the social relationship data provided above.
Specifically, if the obtained social relationship data is the identity credential interaction record of the enterprise to be authenticated, determining the enterprise having identity credential interaction with the enterprise to be authenticated as the associated enterprise according to the identity credential interaction record. For example, for enterprise a to be subjected to real-name authentication, online exchange of digital business cards occurs between enterprise a and enterprise B, and according to a digital business card exchange record generated by online exchange of digital business cards between enterprise a and enterprise B, enterprise B is determined to be an associated enterprise of enterprise a.
And if the acquired social relationship data is the historical guarantee relationship data of the enterprise to be authenticated, determining the historical enterprise contained in the historical guarantee relationship data as the associated enterprise. For example, for the enterprise a to be subjected to the real-name authentication, the enterprise a has invited or is invited by the enterprise C to perform the real-name authentication, and based on the history guarantee relationship filed after the invitation or the invited to perform the real-name authentication fails, the enterprise C is determined to be the related enterprise of the enterprise a.
And if the acquired social relationship data is the website association data of the enterprise to be authenticated, determining the enterprise to which the enterprise website which is friendlily linked with the enterprise website of the enterprise to be authenticated belongs as the associated enterprise according to the website association data. For example, for enterprise a to be subjected to real-name authentication, the website link of enterprise a and the website link of enterprise D are friend links, and enterprise D is determined to be related to enterprise a.
And if the acquired social relationship data is the supply relationship data or the selling binding relationship data of the enterprise commodity of the enterprise to be authenticated, determining the enterprise having the supply relationship or the selling binding relationship with the enterprise commodity of the enterprise to be authenticated as the associated enterprise according to the supply relationship data or the selling binding relationship data. For example, for an enterprise a to be subjected to real-name authentication, if a commodity of the enterprise a on an E-commerce platform as an E-commerce merchant and a commodity of an enterprise E as an E-commerce merchant are package commodities sold in a bound manner, or the enterprise E is a logistics operator for performing logistics distribution on the commodity sold by the enterprise a, the enterprise E determines an enterprise related to the enterprise a.
In practical applications, an enterprise may also perform identity authentication through 4 data elements, namely, an enterprise name, an enterprise code, a legal name, and a legal identity, and in order to improve the security of an enterprise identity authentication system and the success rate of the identity authentication, the implementation manner of performing identity authentication guarantee based on social relationship data provided in this embodiment may be combined with the implementation manner of performing enterprise identity authentication according to 4 data elements, for example, the implementation manner of performing identity authentication guarantee based on social relationship data is used as a supplement to the implementation manner of performing enterprise identity authentication according to 4 data elements, and when enterprise identity authentication according to 4 data elements fails, the implementation manner of performing identity authentication guarantee based on social relationship data provided in this embodiment is accessed to enhance the security guarantee of the enterprise identity authentication system, and under the condition that the enterprise to be authenticated fails to authenticate by utilizing the 4 data elements, a convenient and effective authentication mode can be supplemented for enterprise users.
Specifically, in an optional implementation manner provided by this embodiment, before obtaining social relationship data of an enterprise to be authenticated and determining, according to the social relationship data, an enterprise associated with the enterprise to be authenticated, the method further includes:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if so, confirming that the identity authentication of the enterprise to be authenticated is passed;
if not, executing a process of acquiring social relationship data of the enterprise to be authenticated and determining the enterprise associated with the enterprise to be authenticated according to the social relationship data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
On this basis, in order to facilitate switching to an implementation mode for performing identity authentication guarantee based on social relationship data in the process of performing enterprise identity authentication according to 4 data elements, in this embodiment, the authentication data acquisition page is configured with a guarantee authentication trigger control, and if it is detected that the guarantee authentication trigger control is triggered, switching to the implementation mode for performing identity authentication guarantee based on social relationship data, executing to obtain social relationship data of an enterprise to be authenticated, and determining an enterprise association process of the enterprise to be authenticated according to the social relationship data.
In order to enhance the initiative of the enterprise user in selecting the two identity authentication modes and improve the perception degree of the enterprise user in the switching process of the two identity authentication implementation modes, in an optional implementation manner provided by this embodiment, an invitation page for entering guarantee authentication is issued to the enterprise to be authenticated; and under the condition that the to-be-authenticated enterprise is detected to trigger guarantee authentication through the invitation page, entering an implementation mode of identity authentication guarantee based on social relationship data, executing the process of obtaining the social relationship data of the to-be-authenticated enterprise, and determining the enterprise related process of the to-be-authenticated enterprise according to the social relationship data.
For example, when the enterprise A enters the real-name authentication page, the real-name authentication page shows a selection control for performing real-name authentication according to 4 data elements or performing real-name authentication guarantee based on social relationship data, if the enterprise A chooses to carry out real-name authentication according to 4 data elements, an authentication data acquisition page generated after the control is triggered needs to be input into two images, namely an enterprise business license and a legal identity certificate photo, after the two images are recorded, the two images are identified through OCR (Optical Character Recognition), data information of 4 data elements of a business name, a business code, a legal name and/or a legal identity card number is obtained, then detecting whether the data information of the 4 data elements meets preset real-name authentication conditions, and if so, confirming that the real-name authentication of the enterprise A passes; and if not, entering a real-name authentication implementation mode for carrying out real-name authentication guarantee based on the social relationship data.
As described above, by combining the two implementation manners of performing enterprise identity authentication according to 4 data elements and performing identity authentication guarantee based on social relationship data, the security and the success rate of the identity authentication of the enterprise identity authentication are improved, in order to improve the efficiency of the identity authentication of the enterprise user and further improve the success rate of the identity authentication, in this embodiment, for the data elements of the enterprise to be authenticated that fail to be authenticated in the process of performing enterprise identity authentication according to 4 data elements, the implementation manner of performing identity authentication guarantee based on the social relationship data is adopted to further authenticate the data elements that fail to be authenticated,
specifically, in an optional implementation manner provided in this embodiment, an authentication data acquisition page is issued to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the process of obtaining the social relationship data of the enterprise to be authenticated, and determining the enterprise associated with the enterprise to be authenticated according to the social relationship data; in this case, the authentication vouch-for request sent to the associated enterprise as described below includes a vouch-for request to vouch for the data dimension to be authenticated.
Correspondingly, the identity authentication process is carried out on the enterprise to be authenticated subsequently, specifically, the authentication detection is carried out on the dimension of the data to be authenticated; and if the authentication detection result is that the detection is passed, confirming that the enterprise to be authenticated passes the real-name authentication and validating the guarantee relationship.
For example, in the process that the enterprise a performs real-name authentication according to 4 data elements or performs real-name authentication based on social relationship data, two images, namely an enterprise business license and a legal identity photo, are entered in an authentication data acquisition page, after the two images are entered, the two images are identified through Optical Character Recognition (OCR), data information of the 4 data elements, namely an enterprise name, an enterprise code, a legal name and/or a legal identity number, is obtained, and then whether the data information of the 4 data elements meets preset real-name authentication conditions is detected respectively;
if the detection fails, determining that the data elements which fail to be detected are the enterprise name and the enterprise code, wherein the possible reason is that the provided enterprise business license image is wrong or unclear, under the circumstance, entering a real-name authentication implementation mode for carrying out real-name authentication guarantee based on social relationship data, specifically, in the process of carrying out real-name authentication guarantee, only an associated enterprise needs to be invited to guarantee the enterprise name and the enterprise code which are failed in authentication of the enterprise A, and the associated enterprise which has checked the enterprise business license image of the enterprise A in the previous business interaction process can be invited to guarantee the two data elements of the enterprise name and the enterprise code of the enterprise A, so that the success rate of real-name authentication of the enterprise A is favorably improved, and meanwhile, the associated enterprise which has checked the enterprise business license image of the enterprise A in the business interaction process is invited to guarantee the enterprise name and the enterprise code of the enterprise A, The two data elements of the enterprise code are guaranteed, and the authenticity and the effectiveness of real-name authentication are promoted.
In addition, in practical applications, in the interaction activities between the enterprise to be authenticated and other enterprises, the interaction activities performed between the enterprise to be authenticated and different types of enterprises may be different, and meanwhile, the understanding degree of the enterprise to be authenticated in different interaction activities may also be different, in order to maximize the success rate of the authentication of the enterprise to be authenticated in the authentication process and ensure the validity of the authentication under the condition of improving the success rate of the authentication, in this embodiment, 4 data elements required by the enterprise to be authenticated in the authentication process are selected for the different associated enterprises to guarantee according to the understanding degree of the associated enterprises of the enterprise to be authenticated on each data element of the enterprise to be authenticated, so as to guarantee the authentication of the enterprise to be authenticated by the associated enterprises into guarantee of a certain data element, in an optional implementation manner provided in this embodiment, in the process of determining the associated enterprise of the enterprise to be authenticated according to the social relationship data, the associated enterprise corresponding to each authentication data dimension of the enterprise to be authenticated is determined; correspondingly, in the subsequent process of sending the authentication guarantee request to the selected target associated enterprise in the associated enterprises, the single-dimension authentication guarantee request corresponding to the authentication data dimension is sent to the associated enterprises respectively.
Step S104, sending an authentication guarantee request to a selected target related enterprise in the related enterprises.
In this embodiment, after determining the associated enterprises of the enterprise to be authenticated, an enterprise list composed of the associated enterprises may be displayed to the enterprise to be authenticated, and the enterprise to be authenticated selects one or more associated enterprises in the enterprise list as enterprises to invite identity authentication guarantee to the enterprise to be authenticated, where the associated enterprises selected by the enterprise to be authenticated, that is, the associated enterprises selected by the enterprise to be authenticated are referred to as target associated enterprises. In the process of inviting the target associated enterprise to perform identity authentication and guarantee on the enterprise to be authenticated, specifically, the invitation is performed in a manner that the target associated enterprise sends a message request, and the message request is the authentication and guarantee request.
It should be noted that, in the process of inviting the target associated enterprise to perform identity authentication and guaranty by the enterprise to be authenticated, if the invited target associated enterprise agrees to guaranty the identity authentication of the enterprise to be authenticated, a guaranty relationship needs to be established based on the relevant data of the target associated enterprise, which is bound to access and read the data of the target associated enterprise, so as to sufficiently ensure the data privacy of the target associated enterprise, in this embodiment, the authentication and guaranty request carries an access link of an authentication and guaranty protocol, and by setting the access link of the authentication and guaranty protocol in the authentication and guaranty request, the invited target associated enterprise may access the authentication and guaranty protocol by triggering the access link, and only the target associated enterprise signing the authentication and guaranty protocol will be subsequently based on the signed authentication and guaranty protocol, and establishing a guarantee relationship with the enterprise to be authenticated from the data of the target associated enterprise.
Optionally, the guarantee enterprise signing the authentication guarantee agreement has a guarantee relationship with the enterprise to be authenticated, and the guarantee relationship is established in the following manner: writing the identity of the guarantee enterprise signing the authentication guarantee agreement and the identity of the enterprise to be authenticated into a guarantee relation mapping table so as to establish the guarantee relation between the guarantee enterprise and the enterprise to be authenticated.
In an optional implementation manner provided in this embodiment, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
pushing the authentication guarantee request to a representative account of the target associated enterprise in an intra-application message pushing mode; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority; and if the access link carried by the authentication guarantee request is triggered, issuing the authentication guarantee protocol to an access terminal corresponding to the account number of the representative.
In another optional implementation manner provided by this embodiment, sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
sending the authentication guarantee request to an access terminal corresponding to the representative account of the target associated enterprise; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority; and if the access link carried by the authentication guarantee request is triggered, returning the authentication guarantee protocol to the access terminal.
Step S106, judging whether the guarantee enterprise triggering the access link and signing the authentication guarantee agreement meets the authentication condition.
And in the target associated enterprises, the target associated enterprises signing the authentication guarantee agreement indicate that the target associated enterprises confirm to guarantee the identity authentication of the enterprise to be authenticated, and accordingly, the target associated enterprises signing the authentication guarantee agreement in the target associated enterprises are called as guarantee enterprises.
In specific implementation, after an authentication and guarantee request carrying the access link is sent to the target associated enterprise, under the condition that a guaranteed enterprise triggers the access link and signs an authentication and guarantee protocol, whether the signing of the authentication and guarantee protocol by the guaranteed enterprise meets a preset authentication condition needs to be further judged, if yes, the following step is executed, that is, 208, the identity authentication processing is carried out on the enterprise to be authenticated; if not, sending a prompt that the authentication conditions are not satisfied to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
In this embodiment, the authentication condition includes an aging condition and a guarantee enterprise number condition, the aging condition is used to detect whether a signing time for signing the authentication guarantee agreement by the guarantee enterprise meets a preset valid authentication time interval, and the guarantee enterprise number condition is used to detect whether the number of guarantee enterprises performing identity authentication guarantee on the to-be-authenticated enterprise meets a requirement.
Specifically, in an optional implementation manner provided by this embodiment, in the process of determining whether the guaranty enterprise that triggers the access link and signs the authentication guaranty agreement satisfies the authentication condition, the determination may be implemented by determining a number condition of the guaranty enterprise under the aging condition, and specifically includes:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, executing the following step S108 to perform identity authentication processing on the enterprise to be authenticated;
if the signing time of the authentication guarantee agreement is not in the valid authentication time interval, determining the guarantee enterprise of which the signing time is not in the valid authentication time interval as an invalid guarantee enterprise, and filing the guarantee relationship of the invalid guarantee enterprise;
and if the number of the guarantee enterprises signing the authentication guarantee agreement does not meet the preset number threshold, sending a guarantee enterprise number shortage prompt to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
And step S108, performing identity authentication processing on the enterprise to be authenticated.
As described above, for the security enterprises which sign the authentication and security agreement, the security relationship with the enterprise to be authenticated is established, and during the identity authentication process, the security relationship is valid for the enterprise to be authenticated which passes the identity authentication, and subsequently, the security relationship is also checked against the security enterprise which performs the identity authentication in the identity authentication and security manner; however, for an enterprise to be authenticated whose identity authentication fails, the guaranty relationship established with the guaranty enterprise is invalid, and the guaranty relationship may not be used subsequently, in an optional implementation manner provided in this embodiment, performing identity authentication processing on the enterprise to be authenticated specifically includes:
performing real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result;
if the authentication result is that the authentication is passed, the guarantee relationship is validated and the validation state is synchronized to a guarantee relationship mapping table;
if the authentication result is that the authentication is not passed, filing the guarantee relationship, and/or deleting the guarantee relationship from the guarantee relationship mapping table.
In a specific implementation, in order to avoid mutual guarantee for identity authentication among multiple enterprises and to utilize the identity authentication for profit or malicious competition, in an optional implementation manner provided in this embodiment, for an enterprise to be authenticated that performs identity authentication in an identity authentication guarantee manner and passes authentication, an identity authentication result of the enterprise to be authenticated is verified, so as to improve the security of an enterprise identity authentication system, specifically including verifying the identity authentication result obtained after the authentication processing;
if the verification result is that the authentication is valid, the processing is not required;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
The enterprise authentication method provided in this embodiment is further described below by taking an application of the enterprise authentication method provided in this embodiment in an online service scenario as an example, referring to fig. 2, the enterprise authentication method applied in the online service scenario specifically includes steps S202 to S218.
Step S202, an authentication request submitted by an enterprise to be authenticated is obtained.
Step S204, an authentication data acquisition page is issued to the enterprise to be authenticated to respond to the authentication request.
The authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension.
Step S206, detecting whether the data to be authenticated collected based on the authentication data collection page meets the authentication conditions of corresponding authentication data dimensions;
if so, confirming that the identity authentication of the enterprise to be authenticated passes;
if not, the following step S208 is executed.
Step S208, an invitation page entering guarantee authentication is issued to the enterprise to be authenticated.
Step S210, determining the dimension of the data to be authenticated that fails to be detected when it is detected that the enterprise to be authenticated triggers the guarantee authentication through the offer page.
Step S212, social relationship data of the enterprise to be authenticated is obtained, and the associated enterprise of the enterprise to be authenticated is determined according to the social relationship data.
Step S214 is to transmit an authentication guarantee request to a selected target related company among the related companies.
The authentication guarantee request carries an access link of an authentication guarantee protocol, and the authentication guarantee request is a guarantee request aiming at the dimensionality of data to be authenticated.
Step S216, judging whether the guarantee enterprise triggering the access link and signing the authentication guarantee agreement meets the authentication condition;
if yes, go to step S218;
if not, sending a prompt that the authentication conditions are not satisfied to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
Step S218, based on the guarantee relation between the guarantee enterprise and the enterprise to be authenticated, the data dimension to be authenticated is authenticated and detected.
And if the authentication detection result is that the detection is passed, confirming that the real-name authentication of the enterprise to be authenticated is passed.
The following further describes the enterprise authentication method provided in this embodiment by taking an application of the another enterprise authentication method provided in this embodiment in an online service scenario as an example, referring to fig. 3, the enterprise authentication method applied in the online service scenario specifically includes steps S302 to S314.
Step S302, an authentication request submitted by an enterprise to be authenticated is obtained.
Step S304, an authentication data acquisition page is issued to the enterprise to be authenticated to respond to the authentication request.
Step S306, if the guarantee authentication triggering control configured on the authentication data acquisition page is triggered, acquiring social relationship data of the enterprise to be authenticated.
And step S308, determining the related enterprises corresponding to the to-be-authenticated enterprises in each authentication data dimension according to the social relationship data.
Step S310, respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
Step S312, judging whether the guarantee enterprise triggering the access link and signing the authentication guarantee agreement meets the authentication condition;
if yes, go to step S314;
if not, sending a prompt that the authentication conditions are not satisfied to the enterprise to be authenticated, or determining that the identity authentication of the enterprise to be authenticated fails.
Step S314, based on the guarantee relation between the guarantee enterprise and the enterprise to be authenticated, the identity authentication processing is carried out on the enterprise to be authenticated.
An embodiment of an enterprise authentication apparatus provided in this specification is as follows:
in the above embodiments, an enterprise authentication method is provided, and an enterprise authentication apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 4, a schematic diagram of an enterprise authentication device provided in this embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The present embodiment provides an enterprise authentication apparatus, including:
a social data obtaining module 402, configured to obtain social relationship data of an enterprise to be authenticated, and determine an associated enterprise of the enterprise to be authenticated according to the social relationship data;
a vouch-for request sending module 404 configured to send an authentication vouch-for request to a selected target one of the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
an authentication condition determination module 406 configured to determine whether a vouching enterprise that triggered the access link and signed an authentication vouching agreement satisfies an authentication condition;
if yes, the identity authentication processing module 408 is operated; the identity authentication processing module 408 is configured to perform identity authentication processing on the enterprise to be authenticated.
Optionally, the enterprise authentication apparatus further includes:
the authentication request acquisition module is configured to acquire an authentication request submitted by the enterprise to be authenticated;
the authentication data acquisition page issuing module is configured to issue an authentication data acquisition page to the enterprise to be authenticated so as to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the authentication condition detection module is configured to detect whether the data to be authenticated collected based on each data collection interface meets the authentication conditions of corresponding authentication data dimensions;
if not, the social data acquisition module 402 is operated; wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
Optionally, the authentication data collection page is configured with a warranty authentication trigger control, and if it is detected that the warranty authentication trigger control is triggered, the social data obtaining module 402 is operated.
Optionally, the enterprise authentication apparatus further includes:
the invitation page issuing module is configured to issue an invitation page entering guarantee authentication to the enterprise to be authenticated;
and running the social data acquisition module 402 under the condition that the enterprise to be authenticated is detected to trigger guarantee authentication through the invitation page.
Optionally, the guarantee request sending module 404 is specifically configured to push the authentication guarantee request to the representative account of the target associated enterprise in an intra-application message pushing manner; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, issuing the authentication guarantee protocol to an access terminal corresponding to the account number of the representative.
Optionally, the guarantee request sending module 404 is specifically configured to send the authentication guarantee request to an access terminal corresponding to the representative account of the target associated enterprise; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, returning the authentication guarantee protocol to the access terminal.
Optionally, the authentication condition determining module 406 is specifically configured to:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, the identity authentication processing module 408 is executed.
Optionally, the enterprise authentication apparatus further includes:
the verification module is configured to verify the identity authentication result obtained after the authentication processing;
the guarantee enterprise searching module is configured to search the guarantee enterprise of the enterprise to be authenticated in the guarantee relation mapping table if the verification result is that the authentication is invalid;
the penalty processing module is configured to perform penalty processing on the searched guarantee enterprise; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
Optionally, the social relationship data includes at least one of the following:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
The embodiment of the enterprise authentication device provided by the specification is as follows:
corresponding to the above-described enterprise authentication method, based on the same technical concept, one or more embodiments of the present specification further provide an enterprise authentication device, where the enterprise authentication device is configured to execute the above-described enterprise authentication method, and fig. 5 is a schematic structural diagram of an enterprise authentication device provided in one or more embodiments of the present specification.
The embodiment provides an enterprise authentication device, including:
as shown in fig. 5, the enterprise authentication devices may vary greatly due to different configurations or capabilities, and may include one or more processors 501 and memory 502, where the memory 502 may store one or more stored applications or data. Memory 502 may be, among other things, transient or persistent storage. The application program stored in memory 502 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an enterprise authentication device. Still further, processor 501 may be configured to communicate with memory 502 to execute a series of computer-executable instructions in memory 502 on an enterprise authentication device. The enterprise authentication apparatus may also include one or more power supplies 503, one or more wired or wireless network interfaces 504, one or more input-output interfaces 505, one or more keyboards 506, and the like.
In one particular embodiment, an enterprise authentication device includes memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the enterprise authentication device, and the one or more programs configured for execution by the one or more processors include computer-executable instructions for:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, performing identity authentication processing on the enterprise to be authenticated.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining that the enterprise-related instruction of the enterprise to be authenticated is executed according to the social relationship data, the method further includes:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if not, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise instruction of the enterprise to be authenticated according to the social relationship data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
Optionally, the authentication data collection page is configured with a warranty authentication trigger control, and if it is detected that the warranty authentication trigger control is triggered, the social relationship data of the enterprise to be authenticated is obtained, and an enterprise-related instruction of the enterprise to be authenticated is determined according to the social relationship data.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining that the enterprise-related instruction of the enterprise to be authenticated is executed according to the social relationship data, the method further includes:
issuing an invitation page for entering guarantee authentication to the enterprise to be authenticated;
and under the condition that the guarantee authentication is triggered by the enterprise to be authenticated through the invitation page, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise instruction of the enterprise to be authenticated according to the social relationship data.
Optionally, the determining whether the vouching enterprise triggering the access link and signing the authentication vouching agreement meets the authentication condition includes:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, executing the next instruction.
Optionally, after the executing the identity authentication processing instruction to the enterprise to be authenticated, the method further includes:
verifying the identity authentication result obtained after the authentication treatment;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
Optionally, the social relationship data includes at least one of the following:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining that the enterprise-related instruction of the enterprise to be authenticated is executed according to the social relationship data, the method further includes:
issuing an authentication data acquisition page to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the social relationship data of the enterprise to be authenticated, and determining an enterprise association instruction of the enterprise to be authenticated according to the social relationship data;
correspondingly, the authentication guarantee request comprises a guarantee request for guaranteeing the dimension of the data to be authenticated.
Optionally, the performing identity authentication processing on the enterprise to be authenticated includes:
carrying out authentication detection on the dimension of the data to be authenticated;
and if the authentication detection result is that the detection is passed, confirming that the enterprise to be authenticated passes the real-name authentication.
Optionally, the determining, according to the social relationship data, an associated enterprise of the enterprise to be authenticated includes:
determining the related enterprises corresponding to the enterprises to be authenticated in each authentication data dimension;
correspondingly, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
and respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
An embodiment of a storage medium provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described enterprise authentication method.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, performing identity authentication processing on the enterprise to be authenticated.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the associated enterprise process of the enterprise to be authenticated is executed, the computer-executable instruction further implements the following process when executed:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if not, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise process of the enterprise to be authenticated according to the social relationship data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
Optionally, the authentication data collection page is configured with a warranty authentication trigger control, and if it is detected that the warranty authentication trigger control is triggered, the social relationship data of the enterprise to be authenticated is acquired, and an enterprise process associated with the enterprise to be authenticated is determined according to the social relationship data.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the associated enterprise process of the enterprise to be authenticated is executed, the computer-executable instruction further implements the following process when executed:
issuing an invitation page for entering guarantee authentication to the enterprise to be authenticated;
and under the condition that the guarantee authentication is triggered by the enterprise to be authenticated through the invitation page, executing the social relationship data of the enterprise to be authenticated, and determining an associated enterprise process of the enterprise to be authenticated according to the social relationship data.
Optionally, the determining whether the vouching enterprise triggering the access link and signing the authentication vouching agreement meets the authentication condition includes:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, executing the next flow.
Optionally, after the identity authentication processing flow is executed on the enterprise to be authenticated, the computer-executable instructions, when executed, further implement the following flow:
verifying the identity authentication result obtained after the authentication treatment;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
Optionally, the social relationship data includes at least one of the following:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
Optionally, before obtaining the social relationship data of the enterprise to be authenticated and determining, according to the social relationship data, that the associated enterprise process of the enterprise to be authenticated is executed, the computer-executable instruction further implements the following process when executed:
issuing an authentication data acquisition page to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the social relationship data of the enterprise to be authenticated, and determining the enterprise-related process of the enterprise to be authenticated according to the social relationship data;
correspondingly, the authentication guarantee request comprises a guarantee request for guaranteeing the dimension of the data to be authenticated.
Optionally, the performing identity authentication processing on the enterprise to be authenticated includes:
carrying out authentication detection on the dimension of the data to be authenticated;
and if the authentication detection result is that the detection is passed, confirming that the enterprise to be authenticated passes the real-name authentication.
Optionally, the determining, according to the social relationship data, an associated enterprise of the enterprise to be authenticated includes:
determining the related enterprises corresponding to the enterprises to be authenticated in each authentication data dimension;
correspondingly, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
and respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the enterprise authentication method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 30 s of the 20 th century, improvements in a technology could clearly be distinguished between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art from this document. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (18)

1. An enterprise authentication method comprising:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, performing identity authentication processing on the enterprise to be authenticated.
2. The enterprise authentication method of claim 1, wherein before the step of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data is executed, the method further comprises:
acquiring an authentication request submitted by the enterprise to be authenticated;
issuing an authentication data acquisition page to the enterprise to be authenticated to respond to the authentication request; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
detecting whether the data to be authenticated collected based on each data collection interface meets the authentication condition of the corresponding authentication data dimension;
if not, executing the step of acquiring the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data;
wherein the authentication data dimension comprises at least one of: an enterprise name data dimension, an enterprise code data dimension, a corporate name data dimension, and/or a corporate identity data dimension.
3. The enterprise authentication method as claimed in claim 2, wherein the authentication data collection page is configured with a warranty authentication trigger control, and if the warranty authentication trigger control is triggered, the step of obtaining social relationship data of the enterprise to be authenticated is executed, and the step of determining the enterprise associated with the enterprise to be authenticated is executed according to the social relationship data.
4. The enterprise authentication method of claim 1, wherein before the step of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data is executed, the method further comprises:
issuing an invitation page for entering guarantee authentication to the enterprise to be authenticated;
and under the condition that the to-be-authenticated enterprise triggers guarantee authentication through the invitation page, executing the step of acquiring social relationship data of the to-be-authenticated enterprise, and determining the associated enterprise of the to-be-authenticated enterprise according to the social relationship data.
5. The enterprise authentication method of claim 1, wherein sending an authentication vouch-for request to a selected target one of the associated enterprises, comprises:
pushing the authentication guarantee request to a representative account of the target associated enterprise in an intra-application message pushing mode; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, issuing the authentication guarantee protocol to an access terminal corresponding to the account number of the representative.
6. The enterprise authentication method of claim 1, wherein sending an authentication vouch-for request to a selected target one of the associated enterprises, comprises:
sending the authentication guarantee request to an access terminal corresponding to the representative account of the target associated enterprise; the representative account number comprises a legal account number and/or a proxy account number with guarantee authorization authority;
and if the access link carried by the authentication guarantee request is triggered, returning the authentication guarantee protocol to the access terminal.
7. The enterprise authentication method as claimed in claim 1, wherein said vouching enterprise has a vouching relationship with said enterprise to be authenticated, said vouching relationship being established as follows:
writing the identity of the guarantee enterprise signing the authentication guarantee agreement and the identity of the enterprise to be authenticated into a guarantee relation mapping table so as to establish the guarantee relation between the guarantee enterprise and the enterprise to be authenticated.
8. The enterprise authentication method as claimed in claim 7, wherein the identity authentication process for the enterprise to be authenticated comprises:
performing real-name authentication on the enterprise to be authenticated based on the guarantee relationship to obtain an authentication result;
if the authentication result is that the authentication is passed, the guarantee relationship is validated and the validation state is synchronized to a guarantee relationship mapping table;
if the authentication result is that the authentication is not passed, filing the guarantee relationship, and/or deleting the guarantee relationship from the guarantee relationship mapping table.
9. The enterprise authentication method of claim 1, wherein said determining whether a vouching enterprise that triggers the access link and signs an authentication vouching agreement satisfies an authentication condition comprises:
judging whether the signing time of the authentication guarantee agreement is in a valid authentication time interval;
if yes, judging whether the number of the guarantee enterprises signing the authentication guarantee agreement meets a preset number threshold value;
if yes, executing the next step.
10. The enterprise authentication method as claimed in claim 1, further comprising, after the step of performing identity authentication processing on the enterprise to be authenticated is executed:
verifying the identity authentication result obtained after the authentication treatment;
if the verification result is that the authentication is invalid, searching a guarantee enterprise of the enterprise to be authenticated in a guarantee relation mapping table;
performing punishment processing on the searched guarantee enterprises; the penalty processing includes: equity degradation is performed on the vouching enterprise, and/or a credit rating of the vouching enterprise is lowered.
11. The enterprise authentication method of claim 1, the social relationship data comprising at least one of:
the method comprises the steps of carrying out identity certificate interaction recording of identity certificate interaction in an application, carrying out historical guarantee relation data of authentication guarantee, website association data of an enterprise website, supply relation data or selling binding relation data of enterprise commodities.
12. The enterprise authentication method of claim 11, wherein determining the enterprise associated with the enterprise to be authenticated based on the social relationship data comprises:
determining an enterprise with identity certificate interaction with the enterprise to be authenticated as the associated enterprise according to the identity certificate interaction record of the enterprise to be authenticated;
alternatively, the first and second electrodes may be,
determining a historical enterprise contained in the historical guarantee relationship data as the associated enterprise according to the historical guarantee relationship data of the enterprise to be authenticated;
alternatively, the first and second electrodes may be,
determining an enterprise to which an enterprise website linked with the enterprise website of the enterprise to be authenticated is friendlier to serve as the associated enterprise according to the website associated data of the enterprise to be authenticated;
alternatively, the first and second electrodes may be,
and determining an enterprise having a supply relation or a selling binding relation with the enterprise commodity of the enterprise to be authenticated as the associated enterprise according to the supply relation data or the selling binding relation data of the enterprise commodity of the enterprise to be authenticated.
13. The enterprise authentication method of claim 1, wherein before the step of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data is executed, the method further comprises:
issuing an authentication data acquisition page to the enterprise to be authenticated; the authentication data acquisition page is provided with a data acquisition interface of each authentication data dimension;
the data to be authenticated, which are acquired by the enterprise to be authenticated through each data acquisition interface, are authenticated and detected;
if the authentication detection result is that the detection fails, determining the dimension of the data to be authenticated which fails to pass the detection, executing the steps of obtaining the social relationship data of the enterprise to be authenticated and determining the associated enterprise of the enterprise to be authenticated according to the social relationship data;
correspondingly, the authentication guarantee request comprises a guarantee request for guaranteeing the dimension of the data to be authenticated.
14. The enterprise authentication method as claimed in claim 13, wherein said performing identity authentication processing on the enterprise to be authenticated comprises:
carrying out authentication detection on the dimension of the data to be authenticated;
and if the authentication detection result is that the detection is passed, confirming that the enterprise to be authenticated passes the real-name authentication.
15. The enterprise authentication method of claim 1, wherein determining the enterprise associated with the enterprise to be authenticated according to the social relationship data comprises:
determining the related enterprises corresponding to the enterprises to be authenticated in each authentication data dimension;
correspondingly, the sending an authentication guarantee request to a selected target associated enterprise among the associated enterprises includes:
and respectively sending single-dimension authentication guarantee requests corresponding to the authentication data dimensions to the associated enterprises.
16. An enterprise authentication device comprising:
the system comprises a social data acquisition module, a data processing module and a data processing module, wherein the social data acquisition module is configured to acquire social relation data of an enterprise to be authenticated and determine an associated enterprise of the enterprise to be authenticated according to the social relation data;
a vouch-for request sending module configured to send an authentication vouch-for request to a selected target one of the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
the certification condition judging module is configured to judge whether a guarantee enterprise triggering the access link and signing a certification guarantee protocol meets certification conditions;
if yes, operating an identity authentication processing module; and the identity authentication processing module is configured to perform identity authentication processing on the enterprise to be authenticated.
17. An enterprise authentication device comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, performing identity authentication processing on the enterprise to be authenticated.
18. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring social relationship data of an enterprise to be authenticated, and determining an associated enterprise of the enterprise to be authenticated according to the social relationship data;
sending an authentication guarantee request to a selected target associated enterprise in the associated enterprises; the authentication guarantee request carries an access link of an authentication guarantee protocol;
judging whether a guarantee enterprise triggering the access link and signing an authentication guarantee protocol meets authentication conditions or not;
and if so, performing identity authentication processing on the enterprise to be authenticated.
CN202110187281.6A 2021-02-18 2021-02-18 Enterprise authentication method and device Active CN112990940B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110187281.6A CN112990940B (en) 2021-02-18 2021-02-18 Enterprise authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110187281.6A CN112990940B (en) 2021-02-18 2021-02-18 Enterprise authentication method and device

Publications (2)

Publication Number Publication Date
CN112990940A true CN112990940A (en) 2021-06-18
CN112990940B CN112990940B (en) 2023-04-07

Family

ID=76393524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110187281.6A Active CN112990940B (en) 2021-02-18 2021-02-18 Enterprise authentication method and device

Country Status (1)

Country Link
CN (1) CN112990940B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114862428A (en) * 2022-07-07 2022-08-05 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN109509004A (en) * 2018-10-12 2019-03-22 深圳壹账通智能科技有限公司 Enterprise's real name identification method, device, computer equipment and storage medium
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
US20200244649A1 (en) * 2019-06-18 2020-07-30 Alibaba Group Holding Limited Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN112712426A (en) * 2021-01-19 2021-04-27 上海超链信息科技有限公司 Supply chain finance application method based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN109509004A (en) * 2018-10-12 2019-03-22 深圳壹账通智能科技有限公司 Enterprise's real name identification method, device, computer equipment and storage medium
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
US20200244649A1 (en) * 2019-06-18 2020-07-30 Alibaba Group Holding Limited Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN112712426A (en) * 2021-01-19 2021-04-27 上海超链信息科技有限公司 Supply chain finance application method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹盈佳: "担保公司贷款业务信用风险研究", 《新会计》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114862428A (en) * 2022-07-07 2022-08-05 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium
CN114862428B (en) * 2022-07-07 2022-12-16 天津金城银行股份有限公司 Inline enterprise authentication method, terminal device and computer-readable storage medium

Also Published As

Publication number Publication date
CN112990940B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN110336797B (en) Enterprise authentication and authentication tracing method, device and equipment based on block chain
CN107679861B (en) Resource transfer method, fund payment method, device and electronic equipment
CN110795501A (en) Method, device, equipment and system for creating verifiable statement based on block chain
CN111311251B (en) Binding processing method, device and equipment
US11386191B2 (en) Trusted hardware-based identity management methods, apparatuses, and devices
CN110175828B (en) User verification method and device based on bank card quick payment signing
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN110768968A (en) Authorization method, device, equipment and system based on verifiable statement
CN112100594B (en) Service processing method, device and equipment based on block chain
CN110519294B (en) Identity authentication method, device, equipment and system
CN112200585B (en) Service processing method, device, equipment and system
CN112434348B (en) Data verification processing method, device and equipment
CN112990940B (en) Enterprise authentication method and device
CN107026816B (en) Identity authentication method and device
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN113689016A (en) Vehicle reservation processing method and device
CN112286968A (en) Service identification method, equipment, medium and electronic equipment
CN112910896A (en) Account authentication method, device, equipment and medium
CN113114678A (en) Service execution method and device
CN107679865B (en) Identity verification method and device based on touch area
CN112434347B (en) Rental business processing method, device, equipment and system
CN115392889A (en) Service processing method and device
CN115330372A (en) Payment processing method and device based on prepaid voucher
CN113011891A (en) Core body processing method and device applied to associated payment
CN113221080A (en) Account registration processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant