CN113011962A - Resource allocation method and device - Google Patents

Resource allocation method and device Download PDF

Info

Publication number
CN113011962A
CN113011962A CN202110206062.8A CN202110206062A CN113011962A CN 113011962 A CN113011962 A CN 113011962A CN 202110206062 A CN202110206062 A CN 202110206062A CN 113011962 A CN113011962 A CN 113011962A
Authority
CN
China
Prior art keywords
resource
user
information
provider
credential provider
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110206062.8A
Other languages
Chinese (zh)
Other versions
CN113011962B (en
Inventor
管维刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang eCommerce Bank Co Ltd
Original Assignee
Zhejiang eCommerce Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang eCommerce Bank Co Ltd filed Critical Zhejiang eCommerce Bank Co Ltd
Priority to CN202110206062.8A priority Critical patent/CN113011962B/en
Publication of CN113011962A publication Critical patent/CN113011962A/en
Application granted granted Critical
Publication of CN113011962B publication Critical patent/CN113011962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a resource allocation method and a device, wherein the resource allocation method comprises the following steps: receiving a resource acquisition request sent by a user, and determining a resource credential provider corresponding to the user according to first attribute information carried in the resource acquisition request; under the condition that the resource voucher provider is determined to meet a preset compliance condition, second attribute information of the user at the resource voucher provider is obtained; under the condition that the second attribute information is determined to be matched with the first attribute information, acquiring resource credential information of the user at the resource credential provider; and distributing corresponding resources for the user based on the resource credential information.

Description

Resource allocation method and device
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a resource allocation method. One or more embodiments of the present specification also relate to a resource allocation apparatus, a computing device, and a computer-readable storage medium.
Background
With the development of computer technology, more and more technologies are applied to the processing of services, and higher requirements are also put on corresponding technologies according to the requirements on the safety and the real-time performance of the services. In many application scenarios, the user needs to prove that he/she has certain qualification or capability, for example, in the application scenario of loan, the user needs to prove that he/she has repayment capability or income capability, in the application scenario of investment, the investor needs to prove that he/she has a certain number of securities and the like. At present, the on-line solution requires a user to provide corresponding proofed photos, screenshots and the like, so that the efficiency of service processing is low, the credibility of transactions is also low, and the risk service with high credit rating cannot be developed.
Disclosure of Invention
In view of this, the present invention provides a resource allocation method. One or more embodiments of the present invention also relate to a resource allocation apparatus, a computing device, and a computer-readable storage medium to solve the technical problems in the prior art.
According to a first aspect of the embodiments of the present invention, there is provided a resource allocation method, including:
receiving a resource acquisition request sent by a user, and determining a resource credential provider corresponding to the user according to first attribute information carried in the resource acquisition request;
under the condition that the resource voucher provider is determined to meet a preset compliance condition, second attribute information of the user at the resource voucher provider is obtained;
under the condition that the second attribute information is determined to be matched with the first attribute information, acquiring resource credential information of the user at the resource credential provider;
and distributing corresponding resources for the user based on the resource credential information.
According to a second aspect of the embodiments of the present invention, there is provided a resource allocation apparatus, including:
the determining module is configured to receive a resource obtaining request sent by a user, and determine a resource credential provider corresponding to the user according to first attribute information carried in the resource obtaining request;
the first acquisition module is configured to acquire second attribute information of the user at the resource credential provider under the condition that the resource credential provider is determined to meet a preset compliance condition;
a second obtaining module configured to obtain resource credential information of the user at the resource credential provider if it is determined that the second attribute information matches the first attribute information;
an allocation module configured to allocate a corresponding resource for the user based on the resource credential information.
According to a third aspect of embodiments of the present invention, there is provided a computing device comprising:
a memory and a processor;
the memory is configured to store computer-executable instructions and the processor is configured to execute the computer-executable instructions, wherein the processor implements the steps of the resource allocation method when executing the computer-executable instructions.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, implement the steps of any one of the resource allocation methods.
According to the embodiment of the invention, a resource acquisition request sent by a user is received, and a resource credential provider corresponding to the user is determined according to the first attribute information of the user carried in the resource acquisition request; under the condition that the resource voucher provider is determined to meet a preset compliance condition, second attribute information of the user at the resource voucher provider is obtained; under the condition that the second attribute information is determined to be matched with the first attribute information, acquiring resource credential information of the user at the resource credential provider; corresponding resources are distributed for the users based on the resource certificate information, so that corresponding self-certification can be realized without heavy system butt joint with each mechanism, the self-certification efficiency can be improved, the reliability is relatively high through an online software self-certification mode, and more convenient and reliable online user self-certification capability is realized.
Drawings
Fig. 1 is a schematic structural diagram of a system to which a resource allocation method according to an embodiment of the present invention is applied;
fig. 2 is a flowchart of a resource allocation method according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a processing procedure of a resource allocation method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a resource allocation apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram of a computing device according to an embodiment of the present invention.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present invention without departing from the spirit and scope of the present invention.
The terminology used in the one or more embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the invention. As used in one or more embodiments of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present invention refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used herein to describe various information in one or more embodiments of the present invention, such information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first aspect may be termed a second aspect, and, similarly, a second aspect may be termed a first aspect, without departing from the scope of one or more embodiments of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
First, the noun terms to which one or more embodiments of the present invention relate are explained.
Self-certification: the user proves himself to have certain qualifications, assets or data.
Witnessing the results: and the operator proves the authenticity of the user operation process and the result data at the user operation site.
In a large number of application scenarios, a user needs to prove that the user has a certain qualification or capability, for example, in a loan scenario, the user needs to prove that the user has a repayment capability or a income capability, an investor needs to prove that the investor has a corresponding number of security assets, and the like. Based on this, the current off-line method needs to submit income certificates, bank pipelining, asset certificates and the like to the business hall, pays more attention to the business processing mode, and is not suitable for the development of the internet business; for the online method, the user may be required to provide corresponding proofed photographing, screenshot and the like, but the credibility of the photograph is still contradicted, the service with higher risk degree cannot be developed, or the photograph is associated with the system of the relevant mechanism, and the data of the user is acquired through the interface.
At present, in a credit self-certification business scene, in order to realize self-certification of credit data of a user on aspects of resource flow, tax amount, receipt and the like, the user takes resources in software on a terminal as a self-certification scene, and the user proves that the user has the ability of returning resources to an organization as an example, the user needs to print resource proofs on an offline place of the software or perform resource proofs on online screenshots, and uploads the resource proofs to the organization providing the resources to prove that the software has the ability of returning resources, but the operation of the method is inconvenient, and the effectiveness of the uploaded screenshots or photos is difficult to guarantee.
To sum up, the resource allocation method provided by the embodiment of the present invention provides an online self-certification scheme, which replaces manpower to witness resources, data, and the like of a user, and the user can realize the safety level of witness on the spot of an equivalent worker only by terminal operation, so as to be suitable for a high risk service scene, and also does not need to perform heavy system docking with each mechanism, thereby realizing a convenient and reliable online user self-certification scheme.
In the present invention, a resource allocation method is provided, and the present invention relates to a resource allocation apparatus, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments one by one.
Fig. 1 is a schematic structural diagram illustrating a resource allocation method applied to a system according to an embodiment of the present invention.
In fig. 1, a part a is a user terminal, where a part a1 is a resource credential provider, a part a2 is a resource provider, and a part B is a resource provider server, it should be noted that the resource provider includes a resource obtaining module a1, a user personal account checking module a2, a virtual witness module A3, a resource credential provider validity detecting module a4, and a terminal environment trusted detecting module a5, where the resource obtaining module a1 may obtain information such as resource quota and resource period on a resource page of the resource credential provider; the user principal account checking module a2 may confirm that the user principal account is the user principal account by acquiring the user information on the resource credential provider account information page; the virtual witness module a3 can obtain data on the page by means of guiding the user to open the auxiliary function of the system, and the like; the resource certificate provider validity detection module a4 can check by acquiring the content digest signature of the resource certificate provider; the terminal environment credibility detection module a5 can detect whether the terminal has the conditions of prison violation, network agency, system customization and the like.
After acquiring the self-authentication data of the user, the resource provider uploads the self-authentication data to the resource provider server, and the resource provider server gives the corresponding resource rights to the user according to the acquired credible self-authentication data of the user.
According to the resource allocation method provided by the embodiment of the invention, on the premise that the terminal and the resource credential provider are ensured to have safety, the resource data and the like of the user at the resource credential provider are obtained to determine the resource credential information of the user, so that the online self-authentication capability of the user is realized, the online self-authentication efficiency can be improved, the reliability is relatively high through an online software self-authentication mode, and the more convenient and reliable online self-authentication capability of the user is realized.
Referring to fig. 2 in combination, fig. 2 shows a flowchart of a resource allocation method according to an embodiment of the present invention, which specifically includes the following steps.
Step 202: receiving a resource acquisition request sent by a user, and determining a resource credential provider corresponding to the user according to the first attribute information of the user carried in the resource acquisition request.
The resource obtaining request may be understood as a request for obtaining resources provided by a user to a resource provider, and taking a loan scene as an example, the resource obtaining request may be a borrowing request sent by the user to a sender.
The first attribute information can be understood as account information of a resource credential provider where the user is located and resource amount, and the account information can include information such as user identity, personal account number, registration address and the like.
Specifically, the resource provider receives a resource acquisition request initiated by a user through a terminal, and determines a resource credential provider corresponding to the user according to first attribute information of the user carried in the resource acquisition request.
In practical application, a user may correspond to at least one resource credential provider, in order to obtain resources of the resource provider, the user is required to provide self-authentication information to the resource provider, the resource provider issues corresponding resources to the user according to the self-authentication information, the user sends a resource obtaining request to the resource provider, the resource obtaining request carries personal account information of the user logged in the resource credential provider and resource amount required to be obtained by the user, and the resource provider determines the resource credential provider corresponding to the user according to first attribute information carried in the resource obtaining request sent by the user.
For example, taking a user loan scene as an example, a resource provider may be regarded as a lender, for example, a bank 1, a resource credential provider may be regarded as a guarantee party, for example, a bank 2, and the bank 1 receives a loan request sent by a user, where the loan request carries information such as personal identity information (name, date of birth, contact, home address) of the user, an account opening number (account opening number of the bank) and the like, and an amount of loan required by the user (10 ten thousand), and it can be determined that the bank is the bank 2 according to the account opening number of the bank where the user is located, it can be understood that the bank 2 is a resource credential provider, and provides a resource credential for the user, so that the user can obtain a corresponding loan amount from the resource provider.
Step 204: and under the condition that the resource credential provider is determined to meet the preset compliance condition, acquiring second attribute information of the user at the resource credential provider.
Wherein, the preset compliance condition can be understood as that the legality of the resource credential provider meets the compliance condition.
The second attribute information may be understood as account information of the user at the resource credential provider.
Specifically, under the condition that the resource credential provider is determined to meet the preset compliance condition, second attribute information of the user at the resource credential provider is acquired.
Further, the receiving a resource acquisition request sent by a user includes:
receiving a resource acquisition request sent by a user through a client;
accordingly, before the determining that the resource credential provider meets the preset compliance condition, the method further comprises:
and acquiring a security value of a resource acquisition environment of the client, and determining the compliance of the resource credential provider under the condition that the security value meets a preset security condition.
The security value of the resource acquisition environment can be understood as the security value of the terminal environment where the resource credential provider is located, and the preset security condition can be understood as the trusted condition of the terminal environment.
Specifically, the resource provider receives a resource acquisition request sent by a user through a client, and then needs to determine a resource acquisition environment of the client used by the user before determining that the resource credential provider meets a preset compliance condition, and determines compliance of the resource credential provider by acquiring a security value of the resource acquisition environment of the client and when the security value meets the preset security condition.
In practical application, whether the environment of a client used by a user is trusted needs to be judged by a resource provider firstly, if the environment of the client is detected to be untrusted, resource credential information cannot be continuously acquired by the resource credential provider, and a corresponding resource is acquired.
In the above example, if the security value of the client environment used by the user is 5 and the security value of the preset security condition is 3, it may be determined that the security value of the client environment is greater than the security value of the preset security condition, and the client environment compliance of the resource credential provider is determined.
According to the resource allocation method provided by the embodiment of the invention, before the resource credential provider is determined to meet the preset compliance condition, the security of the resource acquisition environment of the client needs to be determined, so that the reliability of the environment of the client of the user is ensured, and the reliability is greatly improved.
Further, the security value of the security of the client resource acquisition environment may be embodied by a plurality of aspects; specifically, the obtaining of the security value of the resource obtaining environment of the client includes:
determining a first security value of the client, a second security value of a network environment, and a third security value of a system environment;
determining a security value for the resource acquisition environment based on the first security value, the second security value, and the third security value.
The first security value can be understood as a security value indicating whether the client is subjected to the breaking authority or not and whether the client is subjected to the prison breaking or not; the second security value of the network environment may be understood as a security value of whether the network is detected by the agent; the third security value of the system environment may be understood as a security value that affects the system, whether the client system is customized, etc.
In practical application, validity detection is carried out on a client environment of a user, a resource credential provider and a resource provider in the client, the safety of the current operating environment of the user can be determined, and if the client has no cracking right and is prison-off, a first safety value can be 2; if the network is not detected by the agent, the second security value may be 1; if the client system is not customized, the third security value may be 1, i.e., the resource acquisition environment security value of the client may be determined to be 4 based on the first security value, the second security value, and the third security value.
According to the resource allocation method provided by the embodiment of the invention, the security value of the client is acquired from a plurality of aspects such as the self environment of the client, the network environment of the client, the system environment of the client and the like, so that the security of the current operating environment of the user is ensured, the security of the user operation is ensured, and the credibility of the client operation is greatly improved.
In the case that the client is determined to have high credibility, the legality of the resource credential provider needs to be determined; specifically, the determining that the resource credential provider meets the preset compliance condition includes:
sending a signature acquisition request to the resource credential provider, and receiving a signature value of the resource credential provider determined by the resource credential provider based on the signature acquisition request;
determining an incidence relation with the resource credential provider under the condition that the signature value meets a preset verification condition;
determining compliance of the resource credential provider based on the signature value and the association.
The signature value of the resource credential provider may be understood as a content digest signature value of the resource credential provider, and may also be understood as a character string that identifies the resource credential provider.
Specifically, the resource provider sends a signature acquisition request to the resource credential provider, receives a signature value of the resource credential provider determined by the resource credential provider based on the signature acquisition request, determines an association relationship with the resource credential provider when the obtained signature value satisfies a preset verification condition, and determines compliance of the resource credential provider based on the signature value and the association relationship.
In practical application, the preset verification condition may be understood as a preset verification requirement for a signature value, for example, the signature value matches with a third-party signature value, and the like, and when the obtained signature value meets the preset verification condition, an association relationship between the resource provider and the resource credential provider may be determined, it should be noted that the association relationship may be understood as an authorization relationship or other association relationship between the resource provider and the resource credential provider, and on the premise that the resource credential provider and the resource provider have an association relationship, compliance of the resource credential provider may be determined.
According to the resource allocation method provided by the embodiment of the invention, the application signature verification means of the application program is determined, so that the application program is ensured to be the application program issued by a third party, the legality of the application program is further determined, and the credibility of user operation is further improved.
Determining the validity of the application program, comparing the signature value of the application program with the signature value issued by a third party, and under the condition of determining that the signature values of the application program and the signature value are matched, continuously determining the incidence relation between the resource provider and the resource credential provider; specifically, the determining the association relationship with the resource credential provider when the signature value meets a preset verification condition includes:
and acquiring a third party signature value of the resource credential provider, and determining an association relation with the resource credential provider under the condition that the signature value determined by the resource credential provider based on the signature acquisition request is matched with the third party signature value.
Specifically, the resource provider needs to acquire a third-party signature value of the resource credential provider, the third party of the resource credential provider has a determined third-party signature value when issuing the application program, and the association relationship between the resource provider and the resource credential provider can be continuously determined under the condition that the signature value determined by the resource credential provider based on the signature acquisition request is matched with the third-party signature value.
For example, if the third party signature value of the resource credential provider is a1 and the signature value of the resource credential provider determined by the resource provider is a2, if a2 is equal to a1, the resource credential provider may be determined to be a third party application, to be legitimate, and not to be tampered with.
According to the resource allocation method provided by the embodiment of the invention, the legality of the resource certificate provider is determined by matching the signature value of the resource certificate provider with the signature value of the resource certificate provider issued by a third party, so that the reliability of user operation is improved.
Under the condition that the legality of the resource credential provider is determined to meet the preset compliance condition, the user can be guided to enter a page where the corresponding resource credential provider is located, and second attribute information of the resource credential provider is obtained; specifically, the obtaining of the second attribute information of the user at the resource credential provider includes:
judging whether an authority opening instruction of the user for the resource credential provider is received;
if yes, determining a user information page of a resource credential provider where the user is located based on the permission opening instruction, and judging whether a confirmation instruction of the user for second attribute information of the user information page is received;
and if so, acquiring second attribute information of a user information page of the resource credential provider, wherein the second attribute information comprises account information.
The permission opening instruction can be understood as a permission instruction for opening the client auxiliary function by the user.
The second attribute information may be understood as account information of the user in the application of the resource credential provider, such as information of personal identity information (name, date of birth, contact, home address), account opening number (account opening number of bank), and the like.
Specifically, the resource provider determines whether an authority opening instruction of the user for the resource credential provider is received, determines a user information page of the resource credential provider where the user is located based on the authority opening instruction in the case of receiving the authority opening instruction, determines whether the resource provider receives a confirmation instruction of the user for second attribute information of the user information page, and can acquire the second attribute information of the user information page of the resource credential provider in the case of receiving the second attribute information, where the second attribute information may include account information.
In practical application, a resource provider needs to guide a user to perform corresponding operation on a resource credential provider, and then a system auxiliary function needs to be started on a system of a client to obtain data of a response of an application program of the resource credential provider, first, the user needs to start the auxiliary function of the client, and when the resource provider receives an authority starting instruction that the user has started the system auxiliary function, the resource provider guides the user to enter a user information page of the resource credential provider, it should be noted that the user information page may include information that the personal account number, account information and the like of the user can verify the identity of the user; after the user enters the user information page of the resource credential provider, the resource provider needs to determine whether a confirmation instruction of the user for the second attribute information of the user information page is received, that is, the user needs to determine whether the second attribute information of the user on the user information page can be acquired through the auxiliary function, and after the confirmation instruction of the user is received, the second attribute information of the user information page of the resource credential provider can be acquired, where the second attribute information includes account information of the user and the like.
Along the above example, after the bank 1 receives the authority opening instruction of the user for the bank 2, the user can be guided to enter the user information page of the bank 2, and after receiving the confirmation instruction of the second attribute information of the user for the user information page, the bank 1 can obtain the account information of the user in the user information page of the bank 2.
It should be noted that, in the resource allocation method provided in the embodiment of the present invention, the user is guided to enter the corresponding page of the resource credential provider, so that the current page where the user is located can be sensed, and the data displayed on the page can be acquired.
According to the resource providing method provided by the embodiment of the invention, the resource provider guides the user to enter the corresponding user information page of the resource credential provider, and obtains the account information of the user in the user information page so as to be matched with the first attribute information sent by the user subsequently, and further checks the information such as the account name of the user, and ensures that the current account logged in the resource credential provider belongs to the user account, so that the operation safety of the user is improved.
Step 206: and under the condition that the second attribute information is determined to be matched with the first attribute information, acquiring the resource credential information of the user at the resource credential provider.
The resource voucher information can be understood as information that the user can prove that the user has the resource returning capability in running amount, deposit period and the like of the resource voucher provider.
Specifically, the resource credential information of the user at the resource credential provider is obtained when the second attribute information obtained by the resource credential provider is matched with the first attribute information sent by the user.
Further, the acquiring resource credential information of the user at the resource credential provider includes:
determining a resource record page of the user at the resource credential provider, wherein the resource record page comprises resource credential information;
judging whether a confirmation obtaining instruction of the user for the resource certificate information is received;
and if so, acquiring the resource credential information of the user.
The resource record page can be understood as a record page of resource running and balance of the user at the resource certificate provider.
Specifically, the resource provider guides the user to enter a resource record page of the resource credential provider, and then the resource provider can sense that the user has entered the resource record page of the resource credential provider through an auxiliary function, wherein the resource record page comprises resource credential information; the resource provider also needs to judge whether a confirmation acquisition instruction of the user for the resource credential information is received, and it needs to be stated that the resource provider also needs to let the user determine whether to approve to directly acquire corresponding information from the resource credential provider through an auxiliary function, under the condition that the user approves, the resource provider can receive the confirmation acquisition instruction of the user for the resource credential information, and then can acquire the resource credential information, under the condition that the user does not approve to acquire the resource credential information, the acquisition of the resource credential information from the resource credential provider fails, and the user cannot realize a self-authentication function.
In practical application, a resource provider can sense a page where a user is located at a resource credential provider and obtain display data on the page, if the page is a resource record page, the display data on the resource record page on the page, such as information of deposit amount, deposit period and the like, can be obtained, but different implementation schemes exist on different platforms, and for example, an android client is taken, the resource provider can achieve the purpose by only guiding the user to open a system permission of an auxiliary function, and the resource provider is authorized to obtain self-authentication data on the page after guiding the user to enter the specified page.
Still taking the loan scenario as an example, after the user agrees that the client starts the system auxiliary function, the bank 1 may guide the user to enter a resource record page of the bank 2, where the resource record page includes a deposit period and a deposit amount, further, the bank 1 needs to determine whether the user agrees in the bank 2, the bank 1 may obtain data on the resource record page of the bank 2, if the user agrees, the bank 1 may obtain data on the resource record page of the user of the bank 2, if the user disagrees, the obtaining fails, the online user self-certification cannot be realized, it needs to be noted that the user may select a self-certification period in the bank 2, for example, the user selects a running list of half-year deadline, calculates a half-year deposit amount, etc., the self-certification data period may be realized by self-defining, and determines credential resource information in the resource record page according to the self-defined period, to prove that the user has refundability.
According to the resource allocation method provided by the embodiment of the invention, the resource provider guides the user to enter the resource recording page through the system auxiliary function, and the resource certificate information in the resource recording page is obtained under the condition that the user agrees to prove the resource returning capability of the user.
Step 208: and distributing corresponding resources for the user based on the resource credential information.
Specifically, after the resource provider acquires the resource credential information, the resource provider can allocate corresponding resources to the user according to the resource credential information.
Furthermore, resources allocated to the user can be evaluated according to the resource credential information, and then corresponding resources are allocated to the user; specifically, the allocating the corresponding resource to the user based on the resource credential information includes:
and acquiring resource information in the resource credential information, and evaluating the resources allocated to the user based on the resource information.
The resource information may be understood as information such as running amount of the resource, balance of the resource, and the like.
Specifically, after acquiring the resource information in the resource credential information, the resource provider may evaluate the resource amount that can be issued for the user according to the content of the resource information, in practical applications, the resource information may be a factor for evaluating the resource amount allocated to the user to prove whether the user has the ability to return resources, after acquiring the resource information of the user at the resource credential provider, the resource provider may confirm a certain issued amount of the resource provider, and in another case, the user has at least one resource credential provider, the resource provider may acquire resource credential data at different resource credential providers respectively to confirm the return resources of the user, and further may acquire a larger resource amount.
Along the above example, if the bank 1 obtains that the running amount of the user in the bank 2 is 10 ten thousand in half a year and the deposit amount of the user in the bank 2 is 5 ten thousand, the bank 1 can evaluate the refund ability of the user according to the resource information, and further determine to allocate a resource limit of 20 ten thousand yuan to the user.
Along the above example, three resource credential providers corresponding to the user are provided, namely, the bank 2, the bank 3 and the bank 4, so that the bank 1 acquires the resource information of the user in the bank 2 and determines to allocate a resource limit of 20 ten thousand yuan to the user; the bank 1 acquires the resource information of the user in the bank 3 and determines to distribute a resource limit of 30 ten thousand yuan to the user; the bank 1 acquires the resource information of the user in the bank 4, determines to allocate the resource limit of 50 ten thousand yuan to the user, and finally the user comprehensively evaluates the resource limit of 100 ten thousand yuan allocated to the user through the multiple self-certification resource returning capability.
According to the resource allocation method provided by the embodiment of the invention, the quota is correspondingly allocated for the user evaluation according to the resource information in the user resource certificate information, so that the requirements of the user can be met, and the online self-certification can be realized more quickly by an online convenient self-certification means.
Further, on the premise of evaluating the resources allocated to the user, it is also required to determine whether the resource information meets the preset resource allocation condition; specifically, the acquiring resource information in the resource credential information and evaluating the resource allocated to the user based on the resource information includes:
and acquiring resource information in the resource voucher information, and evaluating resources allocated to the user based on the resource information under the condition that the resource information meets preset resource allocation conditions.
The preset resource allocation condition may be understood as a condition that the resource is determined according to the resource information according to a preset ratio.
Specifically, after the resource provider acquires the resource information in the resource credential information, under the condition that it is determined that the resource information meets the preset resource allocation condition, the resource provider evaluates the resources allocated to the user based on the resource information.
In practical application, the preset resource allocation condition may be understood as a preset proportion condition, for example, if the balance in the resource information is 1 ten thousand, according to the preset proportion condition, it may be estimated that the resource allocated to the user is 5 ten thousand, and then the proportion of the preset resource allocation condition is 1: 5.
according to the resource allocation method provided by the embodiment of the invention, under the condition that the resource information meets the preset resource allocation condition is judged through the resource information in the acquired resource voucher information, the corresponding resource is allocated to the user according to the resource allocation condition, so that the requirement of the user can be met, and online self-certification can be realized more quickly through an online convenient self-certification means.
In summary, in an embodiment of the present invention, a resource acquisition request sent by a user is received, and a resource credential provider corresponding to the user is determined according to that the resource acquisition request carries first attribute information of the user; under the condition that the resource voucher provider is determined to meet a preset compliance condition, second attribute information of the user at the resource voucher provider is obtained; under the condition that the second attribute information is determined to be matched with the first attribute information, acquiring resource credential information of the user at the resource credential provider; corresponding resources are distributed for the users based on the resource certificate information, so that corresponding self-certification can be realized without heavy system butt joint with each mechanism, the self-certification efficiency can be improved, the reliability is relatively high through an online software self-certification mode, and more convenient and reliable online user self-certification capability is realized.
Referring to fig. 3, the resource allocation method provided by the present invention is further explained by taking the application of the resource allocation method in the loan application of the credit-side banking software as an example. Fig. 3 is a flowchart illustrating a processing procedure of a resource allocation method according to an embodiment of the present invention, and specific steps include step 302 to step 316.
In the resource allocation method provided by the embodiment of the invention, an off-line scene can be analogized, which is equivalent to the witness of a loan institution worker, a user logs in the account of a bank of the user on a credible counter and shows a storage asset page to the witness worker, so that the credentialing capability of the user is proved.
Step 302: the user starts authenticating itself.
Specifically, the user may start the user self-authentication function in an application of the resource provider.
Step 304: the resource provider detects the trustworthiness of the client environment used by the user.
If the client environment is trusted, go to step 306; if the client environment is not trusted, step 316 is performed.
Step 306: the resource provider detects whether the resource credential provider is legitimate.
If yes, go to step 308; if not, step 316 is performed.
Step 308: and the resource provider guides the user to start the auxiliary function authority.
If the user agrees to turn on, go to step 310; if the user does not agree to turn on, step 316 is performed.
Step 310: and the resource provider guides the user to enter a resource credential provider user information page, acquires user account information under the condition of receiving a confirmation acquisition instruction sent by the user, and confirms whether the user account is the personal account.
If the user determines that the account is the principal account, go to step 312; if the user does not agree and does not send a confirmation acquisition instruction, or if the account is not the user's own account, step 316 is executed.
Step 312: and the resource provider guides the user to enter a resource voucher provider deposit asset page, and under the condition of receiving a confirmation acquisition instruction sent by the user, the user deposit information is acquired.
If the user agrees, the resource provider executes step 314 if it receives the confirmation acquisition instruction sent by the user; if the user does not agree, the resource provider does not receive the acknowledgement instruction sent by the user, then step 316 is performed.
It should be noted that, the user implements an online virtual witness process, and when the virtual witness is finished, the user is witnessed to have a corresponding resource returning capability according to the deposit information, so as to obtain a corresponding resource amount; in the process of monitoring the safety of the virtual witness and judging whether the user agrees to acquire the data, failure in any link can cause failure of the whole virtual witness.
According to the resource allocation method provided by the embodiment of the invention, the user has corresponding resource returning capability through online virtual witness, a self-certification process is rapidly and safely provided for the user, the mutual butt joint of a plurality of mechanisms which are complicated offline is not needed, and the reliability of self-certification information is improved through the method so as to be suitable for a high-risk service scene.
Corresponding to the above method embodiment, the present invention further provides a resource allocation apparatus embodiment, and fig. 4 shows a schematic structural diagram of a resource allocation apparatus provided in an embodiment of the present invention. As shown in fig. 4, the apparatus includes:
a determining module 402, configured to receive a resource obtaining request sent by a user, and determine a resource credential provider corresponding to the user according to first attribute information of the user carried in the resource obtaining request;
a first obtaining module 404, configured to, in a case that it is determined that the resource credential provider meets a preset compliance condition, obtain second attribute information of the user at the resource credential provider;
a second obtaining module 406, configured to, in a case that it is determined that the second attribute information matches the first attribute information, obtain resource credential information of the user at the resource credential provider;
an allocating module 408 configured to allocate the corresponding resource for the user based on the resource credential information.
Optionally, the allocating module 408 is further configured to:
and acquiring resource information in the resource credential information, and evaluating the resources allocated to the user based on the resource information.
Optionally, the allocating module 408 is further configured to:
and acquiring resource information in the resource voucher information, and evaluating resources allocated to the user based on the resource information under the condition that the resource information meets preset resource allocation conditions.
Optionally, the apparatus further comprises:
the compliance determining module is configured to obtain a security value of a resource obtaining environment of the client, and determine compliance of the resource credential provider under the condition that the security value is determined to meet a preset security condition.
Optionally, the first obtaining module 404 is further configured to:
sending a signature acquisition request to the resource credential provider, and receiving a signature value of the resource credential provider determined by the resource credential provider based on the signature acquisition request;
determining an incidence relation with the resource credential provider under the condition that the signature value meets a preset verification condition;
determining compliance of the resource credential provider based on the signature value and the association.
Optionally, the first obtaining module 404 is further configured to:
and acquiring a third party signature value of the resource credential provider, and determining an association relation with the resource credential provider under the condition that the signature value determined by the resource credential provider based on the signature acquisition request is matched with the third party signature value.
Optionally, the first obtaining module 404 is further configured to:
judging whether an authority opening instruction of the user for the resource credential provider is received;
if yes, determining a user information page of a resource credential provider where the user is located based on the permission opening instruction, and judging whether a confirmation instruction of the user for second attribute information of the user information page is received;
and if so, acquiring second attribute information of a user information page of the resource credential provider, wherein the second attribute information comprises account information.
Optionally, the second obtaining module 406 is further configured to:
determining a resource record page of the user at the resource credential provider, wherein the resource record page comprises resource credential information;
judging whether a confirmation obtaining instruction of the user for the resource certificate information is received;
and if so, acquiring the resource credential information of the user.
Optionally, the apparatus further comprises:
a compliance determination module further configured to determine a first security value of the client, a second security value of a network environment, and a third security value of a system environment;
determining a security value for the resource acquisition environment based on the first security value, the second security value, and the third security value.
The resource allocation device provided by the embodiment of the invention acquires the resource data and the like of the user at the resource credential provider on the premise of ensuring the security of the terminal and the resource credential provider so as to ensure the resource credential information of the user and further realize the online self-authentication capability of the user, thereby not only improving the self-authentication efficiency, but also ensuring the higher credibility of the resource credential provider by using the online software self-authentication mode, authorizing for many times by the user and verifying the validity of the application program by a third party so as to realize the more convenient and reliable online user self-authentication capability.
The foregoing is a schematic scheme of a resource allocation apparatus of this embodiment. It should be noted that the technical solution of the resource allocation apparatus and the technical solution of the resource allocation method belong to the same concept, and for details that are not described in detail in the technical solution of the resource allocation apparatus, reference may be made to the description of the technical solution of the resource allocation method.
FIG. 5 illustrates a block diagram of a computing device 500 provided in accordance with an embodiment of the present invention. The components of the computing device 500 include, but are not limited to, a memory 510 and a processor 520. Processor 520 is coupled to memory 510 via bus 530, and database 550 is used to store data.
Computing device 500 also includes access device 540, access device 540 enabling computing device 500 to communicate via one or more networks 560. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 540 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the invention, the above-described components of computing device 500, as well as other components not shown in FIG. 5, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 5 is for purposes of example only and is not limiting as to the scope of the invention. Those skilled in the art may add or replace other components as desired.
Computing device 500 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smartphone), wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 500 may also be a mobile or stationary server.
Wherein processor 520 is configured to execute computer-executable instructions that when executed by the processor implement the steps of the resource allocation method.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the technical solution of the resource allocation method belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the description of the technical solution of the resource allocation method.
An embodiment of the present invention further provides a computer readable storage medium, which stores computer instructions, and when the instructions are executed by a processor, the instructions implement the steps of the resource allocation method.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium belongs to the same concept as the technical solution of the resource allocation method, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the resource allocation method.
The foregoing description of specific embodiments of the present invention has been presented. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described acts or sequences, as some steps may be performed in other sequences or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the embodiments of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the embodiments of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (12)

1. A method of resource allocation, comprising:
receiving a resource acquisition request sent by a user, and determining a resource credential provider corresponding to the user according to first attribute information carried in the resource acquisition request;
under the condition that the resource voucher provider is determined to meet a preset compliance condition, second attribute information of the user at the resource voucher provider is obtained;
under the condition that the second attribute information is determined to be matched with the first attribute information, acquiring resource credential information of the user at the resource credential provider;
and distributing corresponding resources for the user based on the resource credential information.
2. The resource allocation method of claim 1, the allocating the corresponding resource for the user based on the resource credential information, comprising:
and acquiring resource information in the resource credential information, and evaluating the resources allocated to the user based on the resource information.
3. The resource allocation method according to claim 2, wherein the obtaining resource information in the resource credential information and evaluating the resource allocated to the user based on the resource information comprises:
and acquiring resource information in the resource voucher information, and evaluating resources allocated to the user based on the resource information under the condition that the resource information meets preset resource allocation conditions.
4. The resource allocation method according to claim 1, wherein the receiving a resource acquisition request sent by a user comprises:
receiving a resource acquisition request sent by a user through a client;
accordingly, before the determining that the resource credential provider meets the preset compliance condition, the method further comprises:
and acquiring a security value of a resource acquisition environment of the client, and determining the compliance of the resource credential provider under the condition that the security value meets a preset security condition.
5. The resource allocation method according to claim 4, wherein the determining that the resource credential provider meets a preset compliance condition comprises:
sending a signature acquisition request to the resource credential provider, and receiving a signature value of the resource credential provider determined by the resource credential provider based on the signature acquisition request;
determining an incidence relation with the resource credential provider under the condition that the signature value meets a preset verification condition;
determining compliance of the resource credential provider based on the signature value and the association.
6. The resource allocation method according to claim 5, wherein the determining the association relationship with the resource credential provider if the signature value satisfies a preset verification condition comprises:
and acquiring a third party signature value of the resource credential provider, and determining an association relation with the resource credential provider under the condition that the signature value determined by the resource credential provider based on the signature acquisition request is matched with the third party signature value.
7. The resource allocation method according to claim 5, wherein the obtaining of the second attribute information of the user at the resource credential provider comprises:
judging whether an authority opening instruction of the user for the resource credential provider is received;
if yes, determining a user information page of a resource credential provider where the user is located based on the permission opening instruction, and judging whether a confirmation instruction of the user for second attribute information of the user information page is received;
and if so, acquiring second attribute information of a user information page of the resource credential provider, wherein the second attribute information comprises account information.
8. The resource allocation method according to claim 7, wherein the acquiring resource credential information of the user at the resource credential provider comprises:
determining a resource record page of the user at the resource credential provider, wherein the resource record page comprises resource credential information;
judging whether a confirmation obtaining instruction of the user for the resource certificate information is received;
and if so, acquiring the resource credential information of the user.
9. The resource allocation method of claim 4, the obtaining a security value of a resource obtaining environment of the client, comprising:
determining a first security value of the client, a second security value of a network environment, and a third security value of a system environment;
determining a security value for the resource acquisition environment based on the first security value, the second security value, and the third security value.
10. A resource allocation apparatus, comprising:
the determining module is configured to receive a resource obtaining request sent by a user, and determine a resource credential provider corresponding to the user according to first attribute information carried in the resource obtaining request;
the first acquisition module is configured to acquire second attribute information of the user at the resource credential provider under the condition that the resource credential provider is determined to meet a preset compliance condition;
a second obtaining module configured to obtain resource credential information of the user at the resource credential provider if it is determined that the second attribute information matches the first attribute information;
an allocation module configured to allocate a corresponding resource for the user based on the resource credential information.
11. A computing device, comprising:
a memory and a processor;
the memory is configured to store computer-executable instructions and the processor is configured to execute the computer-executable instructions, wherein the processor implements the steps of the resource allocation method according to any one of claims 1 to 9 when executing the computer-executable instructions.
12. A computer readable storage medium storing computer instructions which, when executed by a processor, carry out the steps of the resource allocation method of any one of claims 1 to 9.
CN202110206062.8A 2021-02-24 2021-02-24 Resource allocation method and device Active CN113011962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110206062.8A CN113011962B (en) 2021-02-24 2021-02-24 Resource allocation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110206062.8A CN113011962B (en) 2021-02-24 2021-02-24 Resource allocation method and device

Publications (2)

Publication Number Publication Date
CN113011962A true CN113011962A (en) 2021-06-22
CN113011962B CN113011962B (en) 2024-01-05

Family

ID=76385718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110206062.8A Active CN113011962B (en) 2021-02-24 2021-02-24 Resource allocation method and device

Country Status (1)

Country Link
CN (1) CN113011962B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI823572B (en) * 2022-09-16 2023-11-21 國泰世華商業銀行股份有限公司 Online grant application system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005209101A (en) * 2004-01-26 2005-08-04 Hitachi Ltd Business information mutual confirmation support system
US20170359184A1 (en) * 2016-06-09 2017-12-14 International Business Machines Corporation Credential-Based Authorization
CN109670936A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Loan examination & approval processing method, platform, equipment and computer readable storage medium
KR20190046189A (en) * 2017-10-25 2019-05-07 주식회사 핀크 Method and apparatus for providing peer to peer(p2p) loan
CN110096903A (en) * 2019-03-26 2019-08-06 罗克佳华科技集团股份有限公司 Assets verification method and block chain network system based on block chain
CN111222780A (en) * 2019-12-31 2020-06-02 东方微银科技(北京)有限公司 Resource allocation method, device, equipment and storage medium
CN111738844A (en) * 2020-07-17 2020-10-02 浙江网商银行股份有限公司 Resource allocation system, method and device based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005209101A (en) * 2004-01-26 2005-08-04 Hitachi Ltd Business information mutual confirmation support system
US20170359184A1 (en) * 2016-06-09 2017-12-14 International Business Machines Corporation Credential-Based Authorization
KR20190046189A (en) * 2017-10-25 2019-05-07 주식회사 핀크 Method and apparatus for providing peer to peer(p2p) loan
CN109670936A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Loan examination & approval processing method, platform, equipment and computer readable storage medium
CN110096903A (en) * 2019-03-26 2019-08-06 罗克佳华科技集团股份有限公司 Assets verification method and block chain network system based on block chain
CN111222780A (en) * 2019-12-31 2020-06-02 东方微银科技(北京)有限公司 Resource allocation method, device, equipment and storage medium
CN111738844A (en) * 2020-07-17 2020-10-02 浙江网商银行股份有限公司 Resource allocation system, method and device based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI823572B (en) * 2022-09-16 2023-11-21 國泰世華商業銀行股份有限公司 Online grant application system and method

Also Published As

Publication number Publication date
CN113011962B (en) 2024-01-05

Similar Documents

Publication Publication Date Title
US10574643B2 (en) Systems and methods for distribution of selected authentication information for a network of devices
US10565360B2 (en) Verifying a user's identity based on adaptive identity assurance levels
US12022000B2 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
KR101952498B1 (en) Loan service providing method using black chain and system performing the same
WO2020147709A1 (en) Identity authentication method, personal security kernel node, device and medium
CN113312653A (en) Open platform authentication and authorization method, device and storage medium
CN109255619A (en) A kind of identity identifying method and equipment based on block chain
CN110324314A (en) User registering method and device, storage medium, electronic equipment
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN111489175B (en) Online identity authentication method, device, system and storage medium
CN113011962B (en) Resource allocation method and device
US12093427B2 (en) Methods and systems for processing agency-initiated privacy requests
CA2886548A1 (en) Methods and systems relating to real world and virtual world identities
CN115099800A (en) Block chain based method and device for transferring poor asset data
CN114663550A (en) Conference management method, device, conference platform and medium for online signature
US20210168129A1 (en) System and method for persistent authentication of a user for issuing virtual tokens
RU2691830C1 (en) System and method of operation of checking online user data and creating a scoring model using non-personal user data
CN111275506A (en) Bill issuing method and block link point equipment
CN110675170A (en) Credit-based certificate guarantee method and device
US20080127300A1 (en) Method and apparatus for issuing certificate including legal guardian's agreement to ward
CN111626877A (en) Data processing method
CN111324876A (en) Exchange login method and device
CN118569992B (en) Private data transaction method
TWI790985B (en) Data read authority control system based on block chain and zero-knowledge proof mechanism, and related data service system
CN115423627A (en) Transaction processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant