CN113452679B - Method and system for realizing supporting enterprise financial service authentication - Google Patents

Method and system for realizing supporting enterprise financial service authentication Download PDF

Info

Publication number
CN113452679B
CN113452679B CN202110604850.2A CN202110604850A CN113452679B CN 113452679 B CN113452679 B CN 113452679B CN 202110604850 A CN202110604850 A CN 202110604850A CN 113452679 B CN113452679 B CN 113452679B
Authority
CN
China
Prior art keywords
node
enterprise
scene
information
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110604850.2A
Other languages
Chinese (zh)
Other versions
CN113452679A (en
Inventor
李珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CIB Fintech Services Shanghai Co Ltd
Original Assignee
CIB Fintech Services Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CIB Fintech Services Shanghai Co Ltd filed Critical CIB Fintech Services Shanghai Co Ltd
Priority to CN202110604850.2A priority Critical patent/CN113452679B/en
Publication of CN113452679A publication Critical patent/CN113452679A/en
Application granted granted Critical
Publication of CN113452679B publication Critical patent/CN113452679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method and a system for realizing support of enterprise financial service authentication, which relate to the technical field of block chains and comprise the following steps: establishing a alliance link network node; acquiring a submitted service opening application through a scene application inlet end; acquiring submitted enterprise writing information to a first scene node of a alliance chain corresponding to a scene application inlet end; synchronizing enterprise information between first scene nodes of the alliance chain to other scene nodes in the alliance chain; the first scene node and the Nth scene node calculate the real effectiveness of the enterprise submitted information; synchronizing enterprise information between the Nth scene nodes of the alliance chain to the first scene nodes of the alliance chain; after a first scene node of a alliance chain has a complete enterprise information authentication real and effective result, acquiring a digital identity identifier of an enterprise; and processing the result of whether the enterprise application service is successfully opened or not and informing the scene end of the result of whether the enterprise application service is successfully opened or not. The invention enables the bank to open the business according to the digital certificate, provides better service and protects the information security of enterprise users.

Description

Method and system for realizing support of enterprise financial service authentication
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a system for realizing support of enterprise financial service authentication.
Background
At present, medium and small-sized micro enterprises face the problem of repeatedly submitting materials when handling supply chain public business of different banks, and the efficiency of wind control auditing of each bank is different, thereby influencing the use experience of the enterprises and needing to have a uniform standard; meanwhile, the traditional centralized architecture mode is not beneficial to information privacy protection of an enterprise authentication link, and potential data safety hazards caused by the traditional centralized architecture mode cannot be ignored.
The Chinese patent with publication number CN110060037B discloses a distributed digital identity system based on a block chain, which comprises a digital identity establishing platform and a digital identity using platform; the digital identity creation platform comprises: a user module; the authentication module is used for verifying the authenticity of the identity information and the identity authentication material; and the storage module is used for storing the identity information and the identity authentication material of the user who succeeds in authentication, and the user identity information is encrypted by an asymmetric public key and then stored in the public chain.
The method of the distributed identity system constructed in the public chain manner can play a certain role in protecting personal information, but is not suitable for protecting the privacy of small and medium-sized micro-enterprises. Meanwhile, the method is realized in a public chain mode, compared with a union chain, the controllability of the nodes is weak, consensus is not easy to achieve, and the transaction performance is not high. In addition, for the distributed digital identity theory, the prior art does not originally design the distributed digital identity theory, but simply realizes the distributed digital identity theory.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a method and a system for realizing support of enterprise financial service authentication.
According to the implementation method and the system for supporting the enterprise financial service authentication provided by the invention, the scheme is as follows:
in a first aspect, an implementation method for supporting enterprise financial service authentication is provided, where the method includes:
step S1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
step S2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
and step S3: the scene application inlet end submits the enterprise writing information in the step S1 to a first scene node of a federation chain corresponding to the scene application inlet end;
and step S4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain field;
step S5: the first scene node calculates the actual condition of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
step S6: the Nth scene node calculates the actual situation of the self computing power and calculates the actual validity of the enterprise self authenticity information, the user authenticity information, the bank account authenticity information, the user and enterprise affiliated relationship information and the four information of the enterprise self authenticity information, the user authenticity information, the bank account authenticity information and the enterprise affiliated relationship information;
step S7: synchronizing enterprise information to a alliance chain scene node 1 through a specific consensus algorithm among the N scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: and the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not.
Preferably, the step S1 includes:
step S1.1: the organization member can deploy and call contracts after registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
step S1.2: when a node is manually and newly added, the addition of the new node firstly configures a firewall of the existing node and opens the network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
Preferably, the step S4 includes: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the step S7 includes: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the ledger file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the step S8 includes:
step S8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
step S8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
step S8.3: the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
In a second aspect, an implementation system supporting enterprise financial service authentication is provided, the system including:
a module M1: establishing alliance chain network nodes, wherein the node service types comprise scene nodes and bank nodes;
a module M2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
a module M3: an enterprise in the scene application inlet end submitting module M1 writes information into a first scene node of a federation chain corresponding to the scene application inlet end;
a module M4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain field;
a module M5: the first scene node calculates the actual condition of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
a module M6: the Nth scene node calculates the actual condition of the enterprise to submit the self-authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the affiliated relationship between the user and the enterprise and the actual validity of the four information through the self-computing power actual condition;
a module M7: synchronizing enterprise information to a alliance chain scene node 1 through a specific consensus algorithm among the N scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: and the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not.
Preferably, the module M1 comprises:
module M1.1: the organization members can deploy and call contracts through registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
module M1.2: when a new node is manually added, the new node is added by firstly configuring a firewall of the existing node and opening a network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
Preferably, the module M4 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the module M7 comprises: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Preferably, the module M8 comprises:
module M8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
module M8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
module M8.3: the bank requests to acquire the digital identity identifier of the enterprise corresponding to the service to be opened on the chain through the SDK.
Compared with the prior art, the invention has the following beneficial effects:
1. by adopting a distributed digital identity technology based on a block chain alliance chain, the problems of medium and small enterprises in various scenes of a supply chain that authentication materials are linked up and the authentication is prevented from being tampered after the chain is linked up are solved, the authentication submitting material standard of a chain-linked bank is unified, a client only needs to submit once, the client experience is optimized, an alliance is formed by a plurality of organizations to digitize and control the authentication result of the user, the sharing property and the transferring property can be endowed, and the bank performs service opening according to a digitized certificate to provide high-quality service;
2. the data sharing mode is changed through the block chain distributed account book, and compared with the traditional API calling mode, the full life cycle safety management of data sharing is achieved;
3. through the mode of the block chain alliance chain, the controllability and the high performance of the node authority are ensured, the transparent auditing of the whole data sharing process is ensured, and the legal compliance of data use is ensured.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is an overall schematic view of the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will aid those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any manner. It should be noted that variations and modifications can be made by persons skilled in the art without departing from the concept of the invention. All falling within the scope of the present invention.
The embodiment of the invention provides an implementation method for supporting enterprise financial service authentication, which is shown in figure 1 and comprises the following steps:
step S1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
step S2: an enterprise submits a service opening application through a scene application inlet end and simultaneously submits information containing the authenticity information of the enterprise, the authenticity information of a user, the authenticity information of a bank account and the information of the relationship between the user and the enterprise;
and step S3: the scene application inlet end submits the enterprise writing information in the step S1 to a first scene node of a federation chain corresponding to the scene application inlet end;
and step S4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain;
step S5: the first scene node calculates the actual condition of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
step S6: the Nth scene node calculates the actual condition of the enterprise to submit the self-authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the affiliated relationship between the user and the enterprise and the actual validity of the four information through the self-computing power actual condition;
step S7: synchronizing enterprise information to a alliance chain scene node 1 through a specific consensus algorithm among the N scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: and the bank processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not.
Wherein, step S1 includes:
the organization member can deploy and call contracts after registration, and the unregistered private certificate cannot be inquired and called; the operation authority of the node is configured according to the service cooperation condition; the scene node is configured with read-write permission, and the bank node is configured with read-only permission.
When a new node is manually added, the new node is added by firstly configuring a firewall of the existing node and opening a network access permission; new nodes join the chain by signing the cooperation agreement offline and then deploying the node program by using the issued identity and data transmission certificate.
Step S4 includes: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm. In this embodiment, the SDK refers to a protocol and key management that encapsulates communication interaction with an actually used blockchain network, so as to facilitate integrated use by a development and invocation party.
Step S7 also includes: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
The step S8 specifically includes: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
Next, the present invention will be described in more detail.
Step S1: the establishment of the alliance link network node can be added by an authentication party, so that the sharing and the synchronization of user information among network members are realized, the integrity in the data transmission process is ensured, and the tampering of an unauthorized party is prevented; the node service types comprise scene nodes and bank nodes. The method specifically comprises the following steps:
the intelligent contract has a corresponding registration mechanism, registered organization members can deploy and call the contract, and unregistered private certificates cannot perform query operation nor call. The operation authority of the node is configured according to the service cooperation condition; the scene node is configured with read-write permission, and the bank node is configured with read-only permission.
When a node is manually and newly added, the addition of the new node firstly configures a firewall of the existing node and opens the network access permission; the new node joins the chain by signing the cooperation agreement offline, and then deploying the node program by using the issued identity and the data transmission certificate.
Step S2: and the enterprise submits a service opening application through the scene application inlet end and simultaneously submits information including enterprise self authenticity information A, user authenticity information B, bank account authenticity information C and user and enterprise affiliated relationship information D.
And step S3: and submitting the enterprise writing information in the step S1 to a first scene node of the alliance chain corresponding to the scene application inlet end by the scene application inlet end.
And step S4: the enterprise information is synchronized among the first scene nodes of the alliance chain to other scene nodes (the first scene node … N) in the alliance chain through a specific consensus algorithm. The method specifically comprises the following steps: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the ledger file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Step S5: the first scene node calculates the actual situation of the self-computing power and submits the self-authenticity information A of the enterprise, the authenticity information B of the user, the authenticity information C of the bank account and the affiliated relationship information D of the user and the enterprise by the self-computing power actual situation, and the authenticity and the validity of the four information are calculated, for example, the A, B information authenticity and validity are calculated;
step S6: the Nth scene node calculates the actual validity of the four information, namely enterprise self authenticity information A, user authenticity information B, bank account authenticity information C and user and enterprise affiliated relationship information D, submitted by an enterprise through self computing power actual conditions, for example, C, D information is calculated to be actual and valid;
step S7: synchronizing enterprise information to a first scene node of the alliance chain through a specific consensus algorithm among the alliance chain scene nodes N; the method comprises the following steps: a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account data of all consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the data successfully linked by the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
Step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise; the method comprises the following steps:
after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
Step S9: and the bank processes the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the application enterprise service is successfully opened or not.
The embodiment of the invention provides a method for realizing supporting enterprise financial service authentication, which adopts a distributed digital identity technology based on a block chain alliance chain, solves the problems of medium and small enterprises in various scenes of a supply chain, authentication material chaining, anti-tampering after the chaining, unification of authentication submission material standards of a chaining bank, only once submission of a client, optimization of client experience, formation of an alliance by a plurality of institutions for digitalization and control of a user authentication result, shareability and transferability, and service opening of the bank according to a digital certificate to provide high-quality service; the data sharing mode is changed through the block chain distributed account book, and compared with the traditional API calling mode, the full life cycle safety management of data sharing is achieved; by means of the block chain alliance chain, the node authority is controllable, the performance is high, the data sharing whole process is transparent and auditable, and legal compliance of data use is guaranteed.
Those skilled in the art will appreciate that, in addition to implementing the system and its various devices, modules, units provided by the present invention as pure computer readable program code, the system and its various devices, modules, units provided by the present invention can be fully implemented by logically programming method steps in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system and various devices, modules and units thereof provided by the invention can be regarded as a hardware component, and the devices, modules and units included in the system for realizing various functions can also be regarded as structures in the hardware component; means, modules, units for performing the various functions may also be regarded as structures within both software modules and hardware components for performing the method.
The foregoing description has described specific embodiments of the present invention. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.

Claims (8)

1. An implementation method for supporting enterprise financial service authentication is characterized by comprising the following steps:
step S1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
step S2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
and step S3: the scene application inlet end submits the enterprise writing information in the step S1 to a first scene node of a federation chain corresponding to the scene application inlet end;
and step S4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain;
step S5: the first scene node of the alliance chain calculates the actual situation of the enterprise through the self computing power and submits the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the authenticity and validity of the four information;
step S6: the N scene node of the alliance chain calculates the actual situation of the enterprise to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information through the self computing power actual situation;
step S7: synchronizing enterprise information to a first scene node of the alliance chain through a specific consensus algorithm among the Nth scene nodes of the alliance chain;
step S8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
step S9: the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not;
the step S8 includes:
step S8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
step S8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
step S8.3: the bank requests to acquire the digital identity identifier of the enterprise corresponding to the service to be opened on the chain through the SDK.
2. The method of claim 1, wherein the step S1 comprises:
step S1.1: the organization members can deploy and call contracts through registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
step S1.2: when a new node is manually added, the new node is added by firstly configuring a firewall of the existing node and opening a network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
3. The method of claim 1, wherein the step S4 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
4. The method of claim 1, wherein the step S7 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the ledger file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
5. An implementation system for supporting authentication of enterprise financial services, comprising:
a module M1: establishing a alliance link network node, wherein the node service type comprises a scene node and a bank node;
a module M2: acquiring a submitted service opening application through a scene application inlet end, and acquiring submitted information including enterprise self authenticity information, user authenticity information, bank account authenticity information and information of the relationship between a user and an enterprise;
a module M3: an enterprise in the scene application inlet end submitting module M1 writes information into a first scene node of a federation chain corresponding to the scene application inlet end;
a module M4: synchronizing enterprise information to other scene nodes in the alliance chain through a specific consensus algorithm among the first scene nodes in the alliance chain;
a module M5: the first scene node of the alliance chain calculates the actual situation of the enterprise through the self computing power to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information;
a module M6: the N scene node of the alliance chain calculates the actual situation of the enterprise to submit the self authenticity information of the enterprise, the authenticity information of the user, the authenticity information of the bank account, the information of the relationship between the user and the enterprise and the actual validity of the four information through the self computing power actual situation;
a module M7: synchronizing enterprise information to a first scene node of the alliance chain through a specific consensus algorithm among the Nth scene nodes of the alliance chain;
a module M8: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, a bank obtains a digital identity identifier of an enterprise;
a module M9: the bank node processes the opening of the enterprise application service according to the acquired enterprise digital identity identifier and informs the scene end of the result whether the opening of the enterprise application service is successful or not;
the module M8 comprises:
module M8.1: after a first scene node of the alliance chain has a complete enterprise information authentication real and effective result, generating a unique identity identifier on the chain;
module M8.2: after the identity identifier is generated, synchronizing the identity identifier to the bank node through a specific consensus algorithm;
module M8.3: the bank requests to acquire the digital identity identifier of the business enterprise to be opened on the chain through the SDK.
6. The system according to claim 5, wherein the module M1 comprises:
module M1.1: the organization members can deploy and call contracts through registration, and the unregistered private certificate cannot be inquired and called;
the operation authority of the node is configured according to the service cooperation condition; the scene node configures read-write permission, and the bank node configures read-only permission;
module M1.2: when a node is manually and newly added, the addition of the new node firstly configures a firewall of the existing node and opens the network access permission;
and the new node is added to the chain, an offline signing cooperation protocol is required, and then the node program is deployed by using the issued identity and the data transmission certificate, namely the node program can be added to the chain.
7. The system of claim 5, wherein the module M4 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
8. The system of claim 5, wherein the module M7 comprises: the method comprises the steps that a scene node distributes read-write permission, a request is initiated through an SDK, the request is encrypted and then successfully linked, and account book data of all the consensus nodes in a private cloud are synchronized by using a specific consensus algorithm for the successfully linked data of the request; and after the account book file of one node is modified, data modification synchronization is carried out according to a configured algorithm.
CN202110604850.2A 2021-05-31 2021-05-31 Method and system for realizing supporting enterprise financial service authentication Active CN113452679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110604850.2A CN113452679B (en) 2021-05-31 2021-05-31 Method and system for realizing supporting enterprise financial service authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110604850.2A CN113452679B (en) 2021-05-31 2021-05-31 Method and system for realizing supporting enterprise financial service authentication

Publications (2)

Publication Number Publication Date
CN113452679A CN113452679A (en) 2021-09-28
CN113452679B true CN113452679B (en) 2023-04-07

Family

ID=77810587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110604850.2A Active CN113452679B (en) 2021-05-31 2021-05-31 Method and system for realizing supporting enterprise financial service authentication

Country Status (1)

Country Link
CN (1) CN113452679B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114201362A (en) * 2021-12-09 2022-03-18 兴业银行股份有限公司 Prometheus-based enterprise-level high-availability monitoring system and implementation method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930833A (en) * 2020-07-07 2020-11-13 杭州云象网络技术有限公司 Credit asset block chain construction method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8707031B2 (en) * 2009-04-07 2014-04-22 Secureauth Corporation Identity-based certificate management
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
CN109981750B (en) * 2019-03-06 2021-09-17 北京百度网讯科技有限公司 Business process system, business data processing method and device
US20200175588A1 (en) * 2019-04-30 2020-06-04 Alibaba Group Holding Limited Blockchain-based payment
CN112818368A (en) * 2021-02-09 2021-05-18 南京邮电大学 Digital certificate authentication method based on block chain intelligent contract

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930833A (en) * 2020-07-07 2020-11-13 杭州云象网络技术有限公司 Credit asset block chain construction method and system

Also Published As

Publication number Publication date
CN113452679A (en) 2021-09-28

Similar Documents

Publication Publication Date Title
WO2020192743A1 (en) Permission management method, permission validation method and related apparatuses
CN109189962B (en) License service implementation system based on block chain
US11645632B2 (en) System and method for a decentralized portable information container supporting privacy protected digital information credentialing, remote administration, local validation, access control and remote instruction signaling utilizing blockchain distributed ledger and container wallet technologies
US9635000B1 (en) Blockchain identity management system based on public identities ledger
TW202036348A (en) Managing sensitive data elements in a blockchain network
US11876915B2 (en) Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions
CN108960825A (en) Electric endorsement method and device, electronic equipment based on block chain
CN109003185B (en) Intelligent contract establishing method and device, computing equipment and storage medium
CN111881483B (en) Resource account binding method, device, equipment and medium based on blockchain
CN109962890A (en) A kind of the authentication service device and node access, user authen method of block chain
Panchamia et al. Passport, VISA and immigration management using blockchain
CN112149073B (en) Cone blockchain management method and system
CN113228075B (en) Computer-implemented system and method for controlling or enforcing transfers made on blockchain
CN111402033A (en) Asset information management method and device based on block chain
CN111555891A (en) Material data self-management and self-management system based on block chain and use method thereof
Khan et al. Smart fir: securing e-fir data through blockchain within smart cities
CN112149077B (en) Supply chain billing method, system and computer equipment based on block chain technology
WO2024082818A1 (en) Multi-blockchain-based cross-chain processing method and apparatus, and device, system and medium
CN113452679B (en) Method and system for realizing supporting enterprise financial service authentication
CN114900534B (en) Big data supervision method based on block chain technology
CN112231755A (en) Data authorization method, device and system based on block chain
CN114418570B (en) Method and device for processing non-homogeneous pass based on blockchain
CN114553440A (en) Cross-data center identity authentication method and system based on block chain and attribute signature
Guo et al. Antitampering scheme of evidence transfer information in judicial system based on blockchain
CN116484329A (en) Data work ownership processing method and device based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant