CN113452679B - Method and system for realizing supporting enterprise financial service authentication - Google Patents
Method and system for realizing supporting enterprise financial service authentication Download PDFInfo
- Publication number
- CN113452679B CN113452679B CN202110604850.2A CN202110604850A CN113452679B CN 113452679 B CN113452679 B CN 113452679B CN 202110604850 A CN202110604850 A CN 202110604850A CN 113452679 B CN113452679 B CN 113452679B
- Authority
- CN
- China
- Prior art keywords
- node
- enterprise
- scene
- information
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method and a system for realizing support of enterprise financial service authentication, which relate to the technical field of block chains and comprise the following steps: establishing a alliance link network node; acquiring a submitted service opening application through a scene application inlet end; acquiring submitted enterprise writing information to a first scene node of a alliance chain corresponding to a scene application inlet end; synchronizing enterprise information between first scene nodes of the alliance chain to other scene nodes in the alliance chain; the first scene node and the Nth scene node calculate the real effectiveness of the enterprise submitted information; synchronizing enterprise information between the Nth scene nodes of the alliance chain to the first scene nodes of the alliance chain; after a first scene node of a alliance chain has a complete enterprise information authentication real and effective result, acquiring a digital identity identifier of an enterprise; and processing the result of whether the enterprise application service is successfully opened or not and informing the scene end of the result of whether the enterprise application service is successfully opened or not. The invention enables the bank to open the business according to the digital certificate, provides better service and protects the information security of enterprise users.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a system for realizing support of enterprise financial service authentication.
Background
At present, medium and small-sized micro enterprises face the problem of repeatedly submitting materials when handling supply chain public business of different banks, and the efficiency of wind control auditing of each bank is different, thereby influencing the use experience of the enterprises and needing to have a uniform standard; meanwhile, the traditional centralized architecture mode is not beneficial to information privacy protection of an enterprise authentication link, and potential data safety hazards caused by the traditional centralized architecture mode cannot be ignored.
The Chinese patent with publication number CN110060037B discloses a distributed digital identity system based on a block chain, which comprises a digital identity establishing platform and a digital identity using platform; the digital identity creation platform comprises: a user module; the authentication module is used for verifying the authenticity of the identity information and the identity authentication material; and the storage module is used for storing the identity information and the identity authentication material of the user who succeeds in authentication, and the user identity information is encrypted by an asymmetric public key and then stored in the public chain.
The method of the distributed identity system constructed in the public chain manner can play a certain role in protecting personal information, but is not suitable for protecting the privacy of small and medium-sized micro-enterprises. Meanwhile, the method is realized in a public chain mode, compared with a union chain, the controllability of the nodes is weak, consensus is not easy to achieve, and the transaction performance is not high. In addition, for the distributed digital identity theory, the prior art does not originally design the distributed digital identity theory, but simply realizes the distributed digital identity theory.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a method and a system for realizing support of enterprise financial service authentication.
According to the implementation method and the system for supporting the enterprise financial service authentication provided by the invention, the scheme is as follows:
in a first aspect, an implementation method for supporting enterprise financial service authentication is provided, where the method includes:
step S1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
step S2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
and step S3: the scene application inlet end submits the enterprise writing information in the step S1 to a first scene node of a federation chain corresponding to the scene application inlet end;
and step S4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain field;
step S5: the first scene node calculates the actual condition of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
step S6: the Nth scene node calculates the actual situation of the self computing power and calculates the actual validity of the enterprise self authenticity information, the user authenticity information, the bank account authenticity information, the user and enterprise affiliated relationship information and the four information of the enterprise self authenticity information, the user authenticity information, the bank account authenticity information and the enterprise affiliated relationship information;
step S7: synchronizing enterprise information to a alliance chain scene node 1 through a specific consensus algorithm among the N scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: and the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not.
Preferably, the step S1 includes:
step S1.1: the organization member can deploy and call contracts after registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
step S1.2: when a node is manually and newly added, the addition of the new node firstly configures a firewall of the existing node and opens the network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
Preferably, the step S4 includes: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the step S7 includes: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the ledger file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the step S8 includes:
step S8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
step S8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
step S8.3: the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
In a second aspect, an implementation system supporting enterprise financial service authentication is provided, the system including:
a module M1: establishing alliance chain network nodes, wherein the node service types comprise scene nodes and bank nodes;
a module M2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
a module M3: an enterprise in the scene application inlet end submitting module M1 writes information into a first scene node of a federation chain corresponding to the scene application inlet end;
a module M4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain field;
a module M5: the first scene node calculates the actual condition of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
a module M6: the Nth scene node calculates the actual condition of the enterprise to submit the self-authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the affiliated relationship between the user and the enterprise and the actual validity of the four information through the self-computing power actual condition;
a module M7: synchronizing enterprise information to a alliance chain scene node 1 through a specific consensus algorithm among the N scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: and the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not.
Preferably, the module M1 comprises:
module M1.1: the organization members can deploy and call contracts through registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
module M1.2: when a new node is manually added, the new node is added by firstly configuring a firewall of the existing node and opening a network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
Preferably, the module M4 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the module M7 comprises: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the module M8 comprises:
module M8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
module M8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
module M8.3: the bank requests to acquire the digital identity identifier of the enterprise corresponding to the service to be opened on the chain through the SDK.
Compared with the prior art, the invention has the following beneficial effects:
1. by adopting a distributed digital identity technology based on a block chain alliance chain, the problems of medium and small enterprises in various scenes of a supply chain that authentication materials are linked up and the authentication is prevented from being tampered after the chain is linked up are solved, the authentication submitting material standard of a chain-linked bank is unified, a client only needs to submit once, the client experience is optimized, an alliance is formed by a plurality of organizations to digitize and control the authentication result of the user, the sharing property and the transferring property can be endowed, and the bank performs service opening according to a digitized certificate to provide high-quality service;
2. the data sharing mode is changed through the block chain distributed account book, and compared with the traditional API calling mode, the full life cycle safety management of data sharing is achieved;
3. through the mode of the block chain alliance chain, the controllability and the high performance of the node authority are ensured, the transparent auditing of the whole data sharing process is ensured, and the legal compliance of data use is ensured.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is an overall schematic view of the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will aid those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any manner. It should be noted that variations and modifications can be made by persons skilled in the art without departing from the concept of the invention. All falling within the scope of the present invention.
The embodiment of the invention provides an implementation method for supporting enterprise financial service authentication, which is shown in figure 1 and comprises the following steps:
step S1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
step S2: an enterprise submits a service opening application through a scene application inlet end and simultaneously submits information containing the authenticity information of the enterprise, the authenticity information of a user, the authenticity information of a bank account and the information of the relationship between the user and the enterprise;
and step S3: the scene application inlet end submits the enterprise writing information in the step S1 to a first scene node of a federation chain corresponding to the scene application inlet end;
and step S4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain;
step S5: the first scene node calculates the actual condition of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
step S6: the Nth scene node calculates the actual condition of the enterprise to submit the self-authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the affiliated relationship between the user and the enterprise and the actual validity of the four information through the self-computing power actual condition;
step S7: synchronizing enterprise information to a alliance chain scene node 1 through a specific consensus algorithm among the N scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: and the bank processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not.
Wherein, step S1 includes:
the organization member can deploy and call contracts after registration, and the unregistered private certificate cannot be inquired and called; the operation authority of the node is configured according to the service cooperation condition; the scene node is configured with read-write permission, and the bank node is configured with read-only permission.
When a new node is manually added, the new node is added by firstly configuring a firewall of the existing node and opening a network access permission; new nodes join the chain by signing the cooperation agreement offline and then deploying the node program by using the issued identity and data transmission certificate.
Step S4 includes: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm. In this embodiment, the SDK refers to a protocol and key management that encapsulates communication interaction with an actually used blockchain network, so as to facilitate integrated use by a development and invocation party.
Step S7 also includes: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
The step S8 specifically includes: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
Next, the present invention will be described in more detail.
Step S1: the establishment of the alliance link network node can be added by an authentication party, so that the sharing and the synchronization of user information among network members are realized, the integrity in the data transmission process is ensured, and the tampering of an unauthorized party is prevented; the node service types comprise scene nodes and bank nodes. The method specifically comprises the following steps:
the intelligent contract has a corresponding registration mechanism, registered organization members can deploy and call the contract, and unregistered private certificates cannot perform query operation nor call. The operation authority of the node is configured according to the service cooperation condition; the scene node is configured with read-write permission, and the bank node is configured with read-only permission.
When a node is manually and newly added, the addition of the new node firstly configures a firewall of the existing node and opens the network access permission; the new node joins the chain by signing the cooperation agreement offline, and then deploying the node program by using the issued identity and the data transmission certificate.
Step S2: and the enterprise submits a service opening application through the scene application inlet end and simultaneously submits information including enterprise self authenticity information A, user authenticity information B, bank account authenticity information C and user and enterprise affiliated relationship information D.
And step S3: and submitting the enterprise writing information in the step S1 to a first scene node of the alliance chain corresponding to the scene application inlet end by the scene application inlet end.
And step S4: the enterprise information is synchronized among the first scene nodes of the alliance chain to other scene nodes (the first scene node … N) in the alliance chain through a specific consensus algorithm. The method specifically comprises the following steps: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the ledger file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Step S5: the first scene node calculates the actual situation of the self-computing power and submits the self-authenticity information A of the enterprise, the authenticity information B of the user, the authenticity information C of the bank account and the affiliated relationship information D of the user and the enterprise by the self-computing power actual situation, and the authenticity and the validity of the four information are calculated, for example, the A, B information authenticity and validity are calculated;
step S6: the Nth scene node calculates the actual validity of the four information, namely enterprise self authenticity information A, user authenticity information B, bank account authenticity information C and user and enterprise affiliated relationship information D, submitted by an enterprise through self computing power actual conditions, for example, C, D information is calculated to be actual and valid;
step S7: synchronizing enterprise information to a first scene node of the alliance chain through a specific consensus algorithm among the alliance chain scene nodes N; the method comprises the following steps: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise; the method comprises the following steps:
after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
Step S9: and the bank processes the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the application enterprise service is successfully opened or not.
The embodiment of the invention provides a method for realizing supporting enterprise financial service authentication, which adopts a distributed digital identity technology based on a block chain alliance chain, solves the problems of medium and small enterprises in various scenes of a supply chain, authentication material chaining, anti-tampering after the chaining, unification of authentication submission material standards of a chaining bank, only once submission of a client, optimization of client experience, formation of an alliance by a plurality of institutions for digitalization and control of a user authentication result, shareability and transferability, and service opening of the bank according to a digital certificate to provide high-quality service; the data sharing mode is changed through the block chain distributed account book, and compared with the traditional API calling mode, the full life cycle safety management of data sharing is achieved; by means of the block chain alliance chain, the node authority is controllable, the performance is high, the data sharing whole process is transparent and auditable, and legal compliance of data use is guaranteed.
Those skilled in the art will appreciate that, in addition to implementing the system and its various devices, modules, units provided by the present invention as pure computer readable program code, the system and its various devices, modules, units provided by the present invention can be fully implemented by logically programming method steps in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system and various devices, modules and units thereof provided by the invention can be regarded as a hardware component, and the devices, modules and units included in the system for realizing various functions can also be regarded as structures in the hardware component; means, modules, units for performing the various functions may also be regarded as structures within both software modules and hardware components for performing the method.
The foregoing description has described specific embodiments of the present invention. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
Claims (8)
1. An implementation method for supporting enterprise financial service authentication is characterized by comprising the following steps:
step S1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
step S2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
and step S3: the scene application inlet end submits the enterprise writing information in the step S1 to a first scene node of a federation chain corresponding to the scene application inlet end;
and step S4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain;
step S5: the first scene node of the alliance chain calculates the actual situation of the enterprise through the self computing power and submits the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the authenticity and validity of the four information;
step S6: the N scene node of the alliance chain calculates the actual situation of the enterprise to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information through the self computing power actual situation;
step S7: synchronizing enterprise information to a first scene node of the alliance chain through a specific consensus algorithm among the Nth scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not;
the step S8 includes:
step S8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
step S8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
step S8.3: the bank requests to acquire the digital identity identifier of the enterprise corresponding to the service to be opened on the chain through the SDK.
2. The method of claim 1, wherein the step S1 comprises:
step S1.1: the organization members can deploy and call contracts through registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
step S1.2: when a new node is manually added, the new node is added by firstly configuring a firewall of the existing node and opening a network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
3. The method of claim 1, wherein the step S4 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
4. The method of claim 1, wherein the step S7 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the ledger file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
5. An implementation system for supporting authentication of enterprise financial services, comprising:
a module M1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
a module M2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
a module M3: an enterprise in the scene application inlet end submitting module M1 writes information into a first scene node of a federation chain corresponding to the scene application inlet end;
a module M4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain;
a module M5: the first scene node of the alliance chain calculates the actual situation of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
a module M6: the N scene node of the alliance chain calculates the actual situation of the enterprise to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information through the self computing power actual situation;
a module M7: synchronizing enterprise information to a first scene node of the alliance chain through a specific consensus algorithm among the Nth scene nodes of the alliance chain;
a module M8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
a module M9: the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not;
the module M8 comprises:
module M8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
module M8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
module M8.3: the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
6. The system according to claim 5, wherein the module M1 comprises:
module M1.1: the organization members can deploy and call contracts through registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
module M1.2: when a node is manually and newly added, the addition of the new node firstly configures a firewall of the existing node and opens the network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
7. The system of claim 5, wherein the module M4 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
8. The system of claim 5, wherein the module M7 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110604850.2A CN113452679B (en) | 2021-05-31 | 2021-05-31 | Method and system for realizing supporting enterprise financial service authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110604850.2A CN113452679B (en) | 2021-05-31 | 2021-05-31 | Method and system for realizing supporting enterprise financial service authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113452679A CN113452679A (en) | 2021-09-28 |
CN113452679B true CN113452679B (en) | 2023-04-07 |
Family
ID=77810587
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110604850.2A Active CN113452679B (en) | 2021-05-31 | 2021-05-31 | Method and system for realizing supporting enterprise financial service authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113452679B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114201362A (en) * | 2021-12-09 | 2022-03-18 | 兴业银行股份有限公司 | Prometheus-based enterprise-level high-availability monitoring system and implementation method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111930833A (en) * | 2020-07-07 | 2020-11-13 | 杭州云象网络技术有限公司 | Credit asset block chain construction method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8707031B2 (en) * | 2009-04-07 | 2014-04-22 | Secureauth Corporation | Identity-based certificate management |
CN107025602A (en) * | 2017-02-24 | 2017-08-08 | 杭州象链网络技术有限公司 | A kind of financial asset transaction system construction method based on alliance's chain |
CN109981750B (en) * | 2019-03-06 | 2021-09-17 | 北京百度网讯科技有限公司 | Business process system, business data processing method and device |
US20200175588A1 (en) * | 2019-04-30 | 2020-06-04 | Alibaba Group Holding Limited | Blockchain-based payment |
CN112818368A (en) * | 2021-02-09 | 2021-05-18 | 南京邮电大学 | Digital certificate authentication method based on block chain intelligent contract |
-
2021
- 2021-05-31 CN CN202110604850.2A patent/CN113452679B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111930833A (en) * | 2020-07-07 | 2020-11-13 | 杭州云象网络技术有限公司 | Credit asset block chain construction method and system |
Also Published As
Publication number | Publication date |
---|---|
CN113452679A (en) | 2021-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020192743A1 (en) | Permission management method, permission validation method and related apparatuses | |
CN109189962B (en) | License service implementation system based on block chain | |
US11645632B2 (en) | System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies | |
US9635000B1 (en) | Blockchain identity management system based on public identities ledger | |
TW202036348A (en) | Managing sensitive data elements in a blockchain network | |
US11876915B2 (en) | Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions | |
CN108960825A (en) | Electric endorsement method and device, electronic equipment based on block chain | |
CN109003185B (en) | Intelligent contract establishing method and device, computing equipment and storage medium | |
CN111881483B (en) | Resource account binding method, device, equipment and medium based on blockchain | |
CN109962890A (en) | A kind of the authentication service device and node access, user authen method of block chain | |
Panchamia et al. | Passport, VISA and immigration management using blockchain | |
CN112149073B (en) | Cone blockchain management method and system | |
CN113228075B (en) | Computer-implemented system and method for controlling or enforcing transfers made on blockchain | |
CN111402033A (en) | Asset information management method and device based on block chain | |
CN111555891A (en) | Material data self-management and self-management system based on block chain and use method thereof | |
Khan et al. | Smart fir: securing e-fir data through blockchain within smart cities | |
CN112149077B (en) | Supply chain billing method, system and computer equipment based on block chain technology | |
WO2024082818A1 (en) | Multi-blockchain-based cross-chain processing method and apparatus, and device, system and medium | |
CN113452679B (en) | Method and system for realizing supporting enterprise financial service authentication | |
CN114900534B (en) | Big data supervision method based on block chain technology | |
CN112231755A (en) | Data authorization method, device and system based on block chain | |
CN114418570B (en) | Method and device for processing non-homogeneous pass based on blockchain | |
CN114553440A (en) | Cross-data center identity authentication method and system based on block chain and attribute signature | |
Guo et al. | Antitampering scheme of evidence transfer information in judicial system based on blockchain | |
CN116484329A (en) | Data work ownership processing method and device based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |