CN114862428B - Inline enterprise authentication method, terminal device and computer-readable storage medium - Google Patents

Inline enterprise authentication method, terminal device and computer-readable storage medium Download PDF

Info

Publication number
CN114862428B
CN114862428B CN202210791345.8A CN202210791345A CN114862428B CN 114862428 B CN114862428 B CN 114862428B CN 202210791345 A CN202210791345 A CN 202210791345A CN 114862428 B CN114862428 B CN 114862428B
Authority
CN
China
Prior art keywords
enterprise
authentication
information
name
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210791345.8A
Other languages
Chinese (zh)
Other versions
CN114862428A (en
Inventor
贺碧威
张锐
郑一凡
梁珊
尧毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Jincheng Bank Ltd By Share Ltd
Original Assignee
Tianjin Jincheng Bank Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Jincheng Bank Ltd By Share Ltd filed Critical Tianjin Jincheng Bank Ltd By Share Ltd
Priority to CN202210791345.8A priority Critical patent/CN114862428B/en
Publication of CN114862428A publication Critical patent/CN114862428A/en
Application granted granted Critical
Publication of CN114862428B publication Critical patent/CN114862428B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides an intra-row enterprise authentication method, terminal equipment and a computer readable storage medium, which relate to the technical field of financial services, and the method is applied to a bank customer management system, and the enterprise authentication method comprises the following steps: in response to an enterprise authentication operation of an authenticated user who has passed real-name authentication, inquiring named enterprise information corresponding to the authenticated user; filtering the inquired famous enterprise information based on the enterprise display filtering rule, and displaying the enterprise information to be added; and responding to the click operation aiming at the target enterprise information in the enterprise information to be added, and finishing the in-line enterprise authentication of the target enterprise. According to the method and the system, the in-line enterprise authentication in the bank system can be carried out in the bank client management system according to the user who has carried out real-name authentication, the trouble of manual association authentication is avoided, the error of manual authentication is avoided, and the efficiency of enterprise authentication is improved.

Description

Inline enterprise authentication method, terminal device and computer-readable storage medium
Technical Field
The present application relates to the field of financial services technologies, and in particular, to an intra-row enterprise authentication method, a terminal device, and a computer-readable storage medium.
Background
At present, enterprises generally need to pass enterprise authentication to verify authenticity and legality of enterprise related information when entering a bank system, so that the enterprises which are not in compliance are prevented from entering or being impersonated, and smooth development of subsequent business processes is guaranteed. At present, the information of enterprise authentication is usually checked manually, and aiming at the conditions of numerous enterprises and large data volume, the effect of manual authentication is low, and the authentication processing period is long, so that the efficiency of enterprise authentication is low.
Disclosure of Invention
The application aims to provide an inline enterprise authentication method, terminal equipment and a computer readable storage medium, and the efficiency of enterprise authentication is improved.
In a first aspect, the present invention provides an inline enterprise authentication method, which is applied to a bank customer management system, and the enterprise authentication method includes: in response to an enterprise authentication operation of an authenticated user who has passed real-name authentication, inquiring named enterprise information corresponding to the authenticated user; filtering the inquired famous enterprise information based on the enterprise display filtering rule, and displaying the enterprise information to be added; and responding to the click operation aiming at the target enterprise information in the enterprise information to be added, and finishing the in-line enterprise authentication of the target enterprise.
In an alternative embodiment, in response to an enterprise authentication operation of an authenticated user who has passed real-name authentication, querying sub-name enterprise information corresponding to the authenticated user includes: responding to the enterprise authentication operation of the authenticated user which passes the real-name authentication, and inquiring whether the bank client management system stores an inquiry cache result; if so, jumping to an interface corresponding to the query cache result, and displaying the famous enterprise information corresponding to the authenticated user;
if not, calling a third-party credit investigation system, and inquiring the business information under the name corresponding to the authentication user based on the personal information of the authentication user.
In an alternative embodiment, the method further comprises: if the business information under the name corresponding to the authenticated user is not inquired, displaying an invitation control; in response to a trigger for the invitation control, invitation information is generated for associating with other authenticated users based on the invitation information to complete enterprise authentication.
In an optional embodiment, filtering the business information under the name obtained by the query based on the business display filtering rule, and displaying the business information to be added includes: judging whether the legal person information corresponding to the inquired famous enterprise information is consistent with the authenticated user or not; if so, acquiring the business operation state of the enterprise, filtering and removing the named enterprise information corresponding to the conditions of expense account, cancellation, immigration, emigration, stoppage, settlement or other abnormal business operation, filtering and retaining the first two digits of the unified social credit code as '91' or '92' or '93', filtering and removing the named enterprise information corresponding to the conditions of 'branch company', 'office' and 'limited partnership' in the business name key words, filtering and removing the named enterprise information of the unified social credit code in the wind control prohibited application list, and judging whether the loan service is opened or not in the place of the enterprise; and determining the business information under the name reserved by the filtering condition as the business information to be added, and displaying the business information to be added.
In an alternative embodiment, the method further comprises: and displaying the enterprise information to be added according to a first display mode, and displaying the filtered enterprise information under the name according to a second display mode.
In an alternative embodiment, after displaying in the first display mode, the method includes: responding to the province and city where the enterprise is and the taxpayer identification number input by the user, and displaying an application limit control; responding to the triggering operation aiming at the limit application control, and judging whether the bank client management system is in butt joint with a tax system corresponding to province and city where the enterprise is located and input by a user; if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page specified by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the docking mode is API access, jumping to a form filling page of a bank client management system, responding to form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add an enterprise manually; and if not, displaying error prompt information.
In an alternative embodiment, the method further comprises: responding to an enterprise application borrowing adding control triggered by a user, and jumping to an enterprise selection interface; responding to the selection operation of the location of the enterprise, and judging whether the bank customer management system is in butt joint with a tax system corresponding to the location; if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page specified by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the docking mode is API access, jumping to a form filling page of a bank client management system, responding to form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add an enterprise manually; and if not, displaying error prompt information.
In an optional embodiment, in response to a click operation for target enterprise information in the to-be-added enterprise information, completing inline enterprise authentication of the target enterprise, including: responding to the click operation aiming at the target enterprise information in the enterprise information to be added, and sending the legal person information and the identity information corresponding to the target enterprise information to the network credit system so that the network credit system can match the legal person information and the identity information corresponding to the target enterprise information with the real-name and the identity information; and if the matching is consistent, completing the in-line enterprise authentication of the target enterprise.
In a second aspect, the present invention provides a terminal device comprising a processor and a memory, the memory storing computer executable instructions capable of being executed by the processor, the processor executing the computer executable instructions to implement the in-line enterprise authentication method of any one of the preceding embodiments.
In a third aspect, the present invention provides a computer readable storage medium having stored thereon computer executable instructions which, when invoked and executed by a processor, cause the processor to implement the in-line enterprise authentication method of any one of the preceding embodiments.
The in-line enterprise authentication method, the terminal device and the computer readable storage medium are applied to a bank customer management system, and the enterprise authentication method firstly responds to enterprise authentication operation of an authenticated user who passes real-name authentication and inquires the information of the under-name enterprise corresponding to the authenticated user; inquiring the associated enterprises of the authenticated users based on the famous enterprise information to obtain the famous enterprise information; filtering the inquired famous enterprise information based on the enterprise display filtering rule, and displaying the enterprise information to be added; and responding to the click operation aiming at the target enterprise information in the enterprise information to be added, and finishing the in-line enterprise authentication of the target enterprise. By the method, enterprises under names can be queried according to users with real-name authentication, and then enterprise authentication is performed in the bank customer management system, so that the efficiency of enterprise authentication is improved.
Drawings
In order to more clearly illustrate the detailed description of the present application or the technical solutions in the prior art, the drawings needed to be used in the detailed description of the present application or the prior art description will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic diagram of a bank customer management system according to an embodiment of the present application;
fig. 2 is a flowchart of an intra-row enterprise authentication method according to an embodiment of the present application;
fig. 3 is a block diagram of an intra-row enterprise authentication apparatus according to an embodiment of the present application;
fig. 4 is a structural diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, as presented in the figures, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The embodiment of the application provides an intra-row enterprise authentication method, which is applied to a bank customer management system, and fig. 1 shows a schematic diagram of the bank customer management system for easy understanding. The system follows the layered design principle of a software architecture, uses Java language, is based on a Dubbo micro-service framework, and provides services to the outside by introducing kcms-api dependency from the outside and using a rpc interface.
The intra-row enterprise authentication method provided by the embodiment, which is applied to the bank customer management system, as shown in fig. 2, mainly includes the following steps:
step S202, responding to the enterprise authentication operation of the authenticated user which passes the real-name authentication, and inquiring the business information under the name corresponding to the authenticated user.
In an optional implementation manner, the query is a back-end silent query, and in implementation, in response to an enterprise authentication operation of an authenticated user who passes real-name authentication, whether a query cache result is stored in a bank client management system is queried, if so, jumping to an interface corresponding to the query cache result, and displaying named enterprise information corresponding to the authenticated user; if not, calling a third-party credit investigation system, and inquiring the under-name enterprise information corresponding to the authentication user based on the personal information of the authentication user.
In an example, if the system has a query cache result on the same day, the back end does not call the element credit any more, the front end page only needs to display countdown, and after the countdown is finished, the corresponding result page is skipped to cache. If the system on the same day has no query cache result, judging whether the query times of enterprise information under the personal name of the real-name user on the same day are over-limit (the limit times can be configured according to actual requirements); if the system does not have the query cache result on the current day and does not exceed the current day query limit times, the back end calls an element credit (such as a Pengcong credit standby) interface to query the enterprise information under the personal name of the real celebrity.
The interface query result comprises: (1) inquiring successfully to obtain the famous enterprises; (results cached for 24 hours); (2) the query is successful, but the enterprise cannot be named; (results cached for 24 hours); (3) Interface 999 exception codes (e.g., account balance is insufficient, exception is not cached).
Further, the method further comprises: if the business information under the name corresponding to the authenticated user is not inquired, displaying an invitation control; in response to a trigger for the invitation control, invitation information is generated for associating with other authenticated users based on the invitation information to complete enterprise authentication. The invitation information may be network connection or two-dimensional code information. In order to ensure the security of the customer account, the invitation information may be encrypted by an encryption algorithm and then sent to other authenticated users for association.
And step S204, filtering the enterprise information under the name obtained by the query based on the enterprise display filtering rule, and displaying the enterprise information to be added.
The enterprise display filtering rules may include: 1) The legal names (ryposfrs _ rynamines) fed back by the interface are consistent with the real names of the authenticated users, and 2) the enterprise state (ryposfrs _ entrustations) values are not 'cancel, migrate, stop, clear, and other' (fuzzy matching); 3) The first two digits of the unified social credit code (ryposfrs _ credit code) are '91' or '92' or '93'; 4) The enterprise name key words do not contain word patterns of 'division', 'office', 'limited partner' and the like; 5) Opening a golden enterprise loan service (Jiangsu only in the first period) in the province and city where the enterprise is located, and ignoring the condition if the query interface has no enterprise province and city information; 6) And the unique identifier corresponding to the enterprise, namely the social credit code, is not in the wind control prohibition application list.
In an optional embodiment, filtering the enterprise information under the name obtained by the query based on the enterprise display filtering rule, and when displaying the enterprise information to be added, the method may include the following steps 1.1) to 1.3):
step 1.1), judging whether legal information corresponding to the inquired famous enterprise information is consistent with the authenticated user;
step 1.2) if yes, acquiring an enterprise operation state, filtering and removing the enterprise information under the name corresponding to the condition of revoking, logout, immigration, emigration, stopping operation, settlement or other abnormal operation states, filtering and reserving the first two digits of the unified social credit code as '91' or '92' or '93', filtering and removing the enterprise information under the name corresponding to the enterprise name keyword including 'branch company', 'office of affairs', 'limited partnership', filtering and removing the enterprise information under the name of the unified social credit code in the wind control prohibited application list, and judging whether the loan service is opened at the location of the enterprise;
and 1.3) determining the named enterprise information retained by the filtering condition as the enterprise information to be added, and displaying the enterprise information to be added.
Further, if the business information under the name is reserved after filtering, the business information to be added is displayed according to a first display mode, and the filtered business information under the name is displayed according to a second display mode. For example, the enterprises meeting the filtering condition are highlighted, the non-conforming enterprises are grayed out, and if all are not conforming, all are grayed out.
In an alternative embodiment, if all the businesses are filtered (i.e. do not meet the borrowing condition), the front-end elements are as follows: 1) Displaying an enterprise name list, wherein the list is not available for ash placement; 2) The length of the enterprise name displays 42 Chinese characters at most, namely 84 characters; 3) The lists are sorted in descending order (if the amounts are equal and randomly sorted) according to the enterprise registered capital amount (cryptosfrs _ regcap).
In another alternative embodiment, if the designated enterprise meets the borrowing condition, the front-end elements are as follows: 1) Displaying an enterprise name list, wherein the list highlights a clickable point; 2) The length of the enterprise name displays 42 Chinese characters at most, namely 84 characters; 3) The lists are sorted in descending order according to the registered cost (cryptofrs _ regcap) of the enterprises (if the cost is equal, the enterprises are randomly sorted).
Further, after displaying according to the first display mode, the method further comprises:
responding to the province and city where the enterprise is and the taxpayer identification number input by the user, and displaying an application limit control;
responding to the triggering operation aiming at the limit application control, and judging whether the bank client management system is in butt joint with a tax system corresponding to the province and city where the enterprise is located and input by the user;
if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page specified by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the docking mode is API access, jumping to a form filling page of a bank client management system, responding to form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add an enterprise manually;
and if not, displaying error prompt information.
In one example, upon checking a borrowing business, the list expands downward, showing (1) the province city where the business is: if the famous enterprise information obtains province and city information, cash is returned, and if the famous enterprise information does not obtain the information, manual selection of a user is needed; (2) taxpayer identification number: and if the business information under the name obtains the identification number, the business information is returned, and if the business information under the name does not obtain the identification number, the business information needs to be manually filled by a user.
After the province and city where the enterprise is located and the tax payment identification number information is filled, the control for applying for the credit is highlighted, the control (button) is clicked to judge whether the tax system at the location is accessed, if the tax system is accessed, the protocol floating layer is forcibly read to slide upwards, the control for reading and agreeing to the protocol is clicked, and if the tax system is not accessed, the frame is popped to prompt the information that the service is not opened temporarily in the local area! ".
In addition, the results pages in four states, namely, the state that the query times are over, the state that the query service is maintained, the state that the famous enterprise is not queried, and the state that the query service is queried to the famous enterprise all support the user to manually add borrowing enterprises, and the method can adopt the following steps during specific implementation:
jumping to an enterprise selection interface in response to an enterprise application borrowing adding control triggered by a user;
responding to the selection operation of the location of the enterprise, and judging whether the bank customer management system is in butt joint with a tax system corresponding to the location;
if yes, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page specified by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the docking mode is API access, jumping to a form filling page of a bank client management system, responding to form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add an enterprise manually;
and if not, displaying error prompt information.
And step S206, responding to the click operation aiming at the target enterprise information in the enterprise information to be added, and finishing the in-line enterprise authentication of the target enterprise.
In an optional implementation manner, in response to a click operation for target enterprise information in the to-be-added enterprise information, legal person information and identity information corresponding to the target enterprise information are sent to the network loan system, so that the network loan system can match the legal person information and the identity information corresponding to the target enterprise information with real-name names and identity information; and if the matching is consistent, completing the in-line enterprise authentication of the target enterprise.
In one example, the my party "in authentication." page is recalled when the tax bank query task was created successfully. After the tax bank data is collected by the back-end credit worthiness platform, the collected names and identity card numbers of the legal person are pushed to a network credit system, the network credit system matches the names and identity card numbers of the legal person collected by the tax bank with real names and identity card numbers, if the names and identity card numbers are consistent, the front-end authentication is successful, the enterprise authentication is finished, and the network credit system enters a mail wind control system (PS: a user closes a page before the authentication is successful and enters a first page amount when the user comes in again); if the matching is inconsistent, the front-end authentication is failed, and if the page is closed by the user in the authentication process, the user directly re-enters the query process when the page comes again.
In summary, the intra-row enterprise authentication method provided by the embodiment of the application can perform intra-row enterprise authentication in the bank system according to the user who has performed real-name authentication in the bank client management system, thereby avoiding the complexity of manual association authentication, avoiding the error of manual authentication, and improving the efficiency of enterprise authentication.
Based on the above method embodiment, an embodiment of the present application further provides an inline enterprise authentication apparatus, which is applied to a bank customer management system, and as shown in fig. 3, the inline enterprise authentication apparatus includes:
the query module 32 is used for responding to the enterprise authentication operation of the authenticated user which passes the real-name authentication, and querying the business information under the name corresponding to the authenticated user;
the filtering display module 34 is configured to filter the queried famous enterprise information based on the enterprise display filtering rule, and display the enterprise information to be added;
and the enterprise authentication module 36 is configured to complete in-line enterprise authentication of the target enterprise in response to a click operation for the target enterprise information in the to-be-added enterprise information.
The in-line enterprise authentication device provided by the embodiment of the application can perform in-line enterprise authentication in the bank system according to the user who performs real-name authentication in the bank client management system, avoids the complexity of manual association authentication, avoids the error of manual authentication, and improves the efficiency of enterprise authentication.
In some embodiments, the query module 32 is further configured to:
responding to the enterprise authentication operation of the authenticated user which passes the real-name authentication, and inquiring whether the bank client management system stores an inquiry cache result; if so, jumping to an interface corresponding to the query cache result, and displaying the famous enterprise information corresponding to the authenticated user; if not, calling a third-party credit investigation system, and inquiring the business information under the name corresponding to the authentication user based on the personal information of the authentication user.
In some embodiments, the apparatus further comprises an invitation module configured to:
if the business information under the name corresponding to the authenticated user is not inquired, displaying an invitation control; in response to a trigger for the invitation control, invitation information is generated for associating with other authenticated users based on the invitation information to complete enterprise authentication.
In some embodiments, the filtering display module 34 is further configured to:
judging whether legal person information corresponding to the inquired famous enterprise information is consistent with the authenticated user or not; if so, acquiring the business operation state of the enterprise, filtering and removing the named enterprise information corresponding to the conditions of expense account, cancellation, immigration, emigration, stoppage, settlement or other abnormal business operation, filtering and retaining the first two digits of the unified social credit code as '91' or '92' or '93', filtering and removing the named enterprise information corresponding to the conditions of 'branch company', 'office' and 'limited partnership' in the business name key words, filtering and removing the named enterprise information of the unified social credit code in the wind control prohibited application list, and judging whether the loan service is opened or not in the place of the enterprise; and determining the under-name enterprise information retained by the filtering condition as the enterprise information to be added, and displaying the enterprise information to be added.
In some embodiments, the above apparatus further comprises: a display module to:
and displaying the enterprise information to be added according to a first display mode, and displaying the filtered enterprise information under the name according to a second display mode.
In some embodiments, after displaying in the first display mode, the apparatus further comprises: the limit application module is used for:
responding to the province and city where the enterprise is and the taxpayer identification number input by the user, and displaying an application limit control; responding to the triggering operation aiming at the limit application control, and judging whether the bank client management system is in butt joint with a tax system corresponding to province and city where the enterprise is located and input by a user; if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page specified by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the butt joint mode is API access, skipping to a form filling page of a bank customer management system, responding to the form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add enterprises manually; and if not, displaying error prompt information.
In some embodiments, the above apparatus further comprises: an enterprise add module to:
responding to an enterprise application borrowing adding control triggered by a user, and jumping to an enterprise selection interface; responding to the selection operation of the location of the enterprise, and judging whether the bank customer management system is in butt joint with a tax system corresponding to the location; if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page specified by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the docking mode is API access, jumping to a form filling page of a bank client management system, responding to form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add an enterprise manually; and if not, displaying error prompt information.
In some embodiments, enterprise authentication module 36 is further configured to:
responding to the click operation aiming at the target enterprise information in the enterprise information to be added, and sending the legal person information and the identity information corresponding to the target enterprise information to the network credit system so that the network credit system can match the legal person information and the identity information corresponding to the target enterprise information with the real-name and the identity information; and if the matching is consistent, completing the in-line enterprise authentication of the target enterprise.
The implementation principle and the generated technical effect of the inline enterprise authentication device provided in the embodiment of the present application are the same as those of the embodiment of the method described above, and for a brief description, reference may be made to corresponding contents in the embodiment of the inline enterprise authentication method described above where no embodiment of the inline enterprise authentication device is mentioned in part.
The present embodiment also provides a terminal device, as shown in fig. 4, which is a schematic structural diagram of the terminal device, wherein the terminal device 100 includes a processor 41 and a memory 40, the memory 40 stores computer executable instructions capable of being executed by the processor 41, and the processor 41 executes the computer executable instructions to implement any one of the in-line enterprise authentication methods described above.
In the embodiment shown in fig. 4, the terminal device further comprises a bus 42 and a communication interface 43, wherein the processor 41, the communication interface 43 and the memory 40 are connected via the bus 42.
The Memory 40 may include a high-speed Random Access Memory (RAM) and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 43 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, etc. may be used. The bus 42 may be an ISA (Industry Standard Architecture) bus, a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 42 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
Processor 41 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 41. The Processor 41 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and the processor 41 reads information in the memory and, in combination with hardware thereof, performs the steps of the inline enterprise authentication method of the previous embodiment.
Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are called and executed by a processor, the computer-executable instructions cause the processor to implement the inline enterprise authentication method in the inline enterprise authentication method, and specific implementation may refer to the foregoing method embodiments, and details are not repeated here.
The intra-row enterprise authentication method, the terminal device, and the computer program product of the computer readable storage medium provided in the embodiment of the present application include a computer readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, and will not be described herein again.
Unless specifically stated otherwise, the relative steps, numerical expressions, and values of the components and steps set forth in these embodiments do not limit the scope of the present application.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present application, it is noted that the terms "first," "second," and the like are used solely to distinguish one from another, and are not to be construed as indicating or implying relative importance.
In the description of the present application, it should also be noted that, unless expressly stated or limited otherwise, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and can include, for example, fixed connections, detachable connections, or integral connections; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (9)

1. An intra-row enterprise authentication method is characterized by being applied to a bank customer management system, wherein the bank customer management system is based on a Dubbo micro-service frame, and provides services to the outside by introducing kcms-api externally and using a rpc interface, wherein the services at least comprise user registration and login, short message sending and verification, user authority control, identity card OCR identification, customer personal information authentication, enterprise tax and bank inquiry and enterprise authentication; the enterprise authentication method comprises the following steps:
responding to enterprise authentication operation of an authenticated user who passes real-name authentication, and inquiring named enterprise information corresponding to the authenticated user;
filtering the inquired famous enterprise information based on an enterprise display filtering rule, and displaying the enterprise information to be added;
in response to the click operation aiming at the target enterprise information in the to-be-added enterprise information, completing inline enterprise authentication of the target enterprise so that the target enterprise applies for banking business processing in a bank customer management system;
responding to enterprise authentication operation of an authenticated user which passes real-name authentication, and inquiring the sub-name enterprise information corresponding to the authenticated user, wherein the method comprises the following steps: responding to enterprise authentication operation of an authenticated user which passes real-name authentication, and inquiring whether the bank client management system stores an inquiry cache result; if so, displaying countdown, skipping to the interface corresponding to the query cache result after the countdown is finished, and displaying the famous enterprise information corresponding to the authenticated user; if not, judging whether the current day inquiry times of the enterprise information under the name of the authentication user exceeds the limit, if not, calling a third-party credit investigation system, and inquiring the name-based enterprise information corresponding to the authentication user based on the personal information of the authentication user; wherein, the query mode is silent query;
the method further comprises the following steps: calling back a page of 'in authentication'; after the back-end credit worthiness platform collects the tax bank data, the collected legal person name and the collected identity card number are pushed to a network credit system, the network credit system matches the legal person name and the identity card number collected by the tax bank with the real name and the identity card number, if the matching is consistent, the front-end authentication is successful, and the enterprise authentication is finished.
2. The method of inline enterprise authentication as defined in claim 1, further comprising:
if the information of the business under the name corresponding to the authentication user is not inquired, displaying an invitation control;
and generating invitation information in response to the trigger of the invitation control, so as to associate other authenticated users based on the invitation information to complete enterprise authentication.
3. The inline enterprise authentication method of claim 2, wherein filtering the queried sub-name enterprise information based on enterprise display filtering rules to display to-be-added enterprise information comprises:
judging whether the legal person information corresponding to the inquired famous enterprise information is consistent with the authenticated user or not;
if so, acquiring the business operation state of the enterprise, filtering and removing the business information under the name corresponding to the abnormal operation state with the functions of cancellation, immigration, emigration, shutdown or settlement, filtering and reserving the first two digits of the unified social credit code as '91' or '92' or '93', filtering and removing the business information under the name corresponding to the keywords of the enterprise name including 'branch company', 'office of affairs', 'limited partnership', filtering and removing the business information under the name with the unified social credit code in the wind control prohibited application list, and judging whether the local enterprise opens the loan service;
and determining the business information under the name reserved by the filtering operation as the business information to be added, and displaying the business information to be added.
4. The inline enterprise authentication method of claim 3, further comprising:
and displaying the enterprise information to be added according to a first display mode, and displaying the filtered enterprise information under the name according to a second display mode.
5. The inline enterprise authentication method of claim 4, wherein after displaying in said first display mode, the method comprises:
responding to province and city and taxpayer identification numbers of enterprises input by a user, and displaying an application limit control;
responding to the triggering operation aiming at the application limit control, and judging whether the bank client management system is in butt joint with a tax system corresponding to the province and city where the enterprise is input by the user;
if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page appointed by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the docking mode is API access, jumping to a form filling page of the bank client management system, responding to form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add enterprises manually;
and if not, displaying error prompt information.
6. The method of inline enterprise authentication as recited in claim 5, further comprising:
jumping to an enterprise selection interface in response to an enterprise application borrowing adding control triggered by a user;
responding to the selection operation of the location of the enterprise, and judging whether the bank customer management system is in butt joint with a tax system corresponding to the location;
if so, determining a docking mode; the docking mode comprises H5 access or API access; when the docking mode is H5 access, jumping to an H5 page appointed by the tax system, responding to form filling operation of the H5 page, and performing enterprise query, so that a user can conveniently add an enterprise manually; when the butt joint mode is API access, skipping to a form filling page of the bank customer management system, responding to the form filling operation of the form filling page, and performing enterprise query, so that a user can conveniently add enterprises manually;
and if not, displaying error prompt information.
7. The inline enterprise authentication method of claim 5, wherein completing inline enterprise authentication of the target enterprise in response to a click operation on target enterprise information in the to-be-added enterprise information comprises:
responding to a click operation aiming at target enterprise information in the enterprise information to be added, and sending the legal person information and the identity information corresponding to the target enterprise information to a network credit system so that the network credit system can match the legal person information and the identity information corresponding to the target enterprise information with real-name names and identity information;
and if the matching is consistent, completing the in-line enterprise authentication of the target enterprise.
8. A terminal device comprising a processor and a memory, the memory storing computer-executable instructions executable by the processor, the processor executing the computer-executable instructions to implement the in-line enterprise authentication method of any of claims 1 to 6.
9. A computer-readable storage medium having stored thereon computer-executable instructions which, when invoked and executed by a processor, cause the processor to implement the in-line enterprise authentication method of any one of claims 1 to 6.
CN202210791345.8A 2022-07-07 2022-07-07 Inline enterprise authentication method, terminal device and computer-readable storage medium Active CN114862428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210791345.8A CN114862428B (en) 2022-07-07 2022-07-07 Inline enterprise authentication method, terminal device and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210791345.8A CN114862428B (en) 2022-07-07 2022-07-07 Inline enterprise authentication method, terminal device and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN114862428A CN114862428A (en) 2022-08-05
CN114862428B true CN114862428B (en) 2022-12-16

Family

ID=82626816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210791345.8A Active CN114862428B (en) 2022-07-07 2022-07-07 Inline enterprise authentication method, terminal device and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN114862428B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116010935B (en) * 2023-01-10 2024-06-18 北京金融大数据有限公司 Enterprise data authorization method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529979A (en) * 2016-12-05 2017-03-22 深圳微众税银信息服务有限公司 Enterprise identity authentication method and system
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN109509004A (en) * 2018-10-12 2019-03-22 深圳壹账通智能科技有限公司 Enterprise's real name identification method, device, computer equipment and storage medium
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
CN112990940A (en) * 2021-02-18 2021-06-18 支付宝(杭州)信息技术有限公司 Enterprise authentication method and device
CN113032767A (en) * 2021-03-24 2021-06-25 胡金钱 Authentication management method and authentication management terminal device
CN113111330A (en) * 2021-03-24 2021-07-13 广州智投链码科技有限公司 Enterprise legal identity authentication management method and system based on enterprise chain code
CN114417061A (en) * 2021-12-22 2022-04-29 航天信息股份有限公司 Enterprise electronic data management method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651748A (en) * 2020-07-19 2021-04-13 北京大禹创联商贸有限公司 Query system for verifying enterprise qualification
CN113689284B (en) * 2021-08-05 2023-11-03 湖南三湘银行股份有限公司 Credit management system and method based on big data wind control and behavior analysis

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529979A (en) * 2016-12-05 2017-03-22 深圳微众税银信息服务有限公司 Enterprise identity authentication method and system
CN108346061A (en) * 2018-02-12 2018-07-31 苏州朗动网络科技有限公司 Corporate authentication method, apparatus, computer equipment and storage medium
CN109509004A (en) * 2018-10-12 2019-03-22 深圳壹账通智能科技有限公司 Enterprise's real name identification method, device, computer equipment and storage medium
CN110336797A (en) * 2019-06-18 2019-10-15 阿里巴巴集团控股有限公司 Corporate authentication, certification retroactive method, device and equipment based on block chain
CN112990940A (en) * 2021-02-18 2021-06-18 支付宝(杭州)信息技术有限公司 Enterprise authentication method and device
CN113032767A (en) * 2021-03-24 2021-06-25 胡金钱 Authentication management method and authentication management terminal device
CN113111330A (en) * 2021-03-24 2021-07-13 广州智投链码科技有限公司 Enterprise legal identity authentication management method and system based on enterprise chain code
CN114417061A (en) * 2021-12-22 2022-04-29 航天信息股份有限公司 Enterprise electronic data management method and system

Also Published As

Publication number Publication date
CN114862428A (en) 2022-08-05

Similar Documents

Publication Publication Date Title
US11138300B2 (en) Multi-factor profile and security fingerprint analysis
CN109063985B (en) Business risk decision method and device
US20230134838A1 (en) User verification system and method based on restricted url opening on browser of user device
KR20180113229A (en) Loan service providing method using black chain and system performing the same
CN110489415B (en) Data updating method and related equipment
CN111985703B (en) User identity state prediction method, device and equipment
CN109086317B (en) Risk control method and related device
US11605088B2 (en) Systems and methods for providing concurrent data loading and rules execution in risk evaluations
CN114862428B (en) Inline enterprise authentication method, terminal device and computer-readable storage medium
CN106878244B (en) Authenticity certification information providing method and device
CN112990940B (en) Enterprise authentication method and device
WO2014043360A1 (en) Multi-factor profile and security fingerprint analysis
US10200355B2 (en) Methods and systems for generating a user profile
CN112907359B (en) Bank loan business qualification auditing and risk control system and method
CN109327814B (en) Short message processing method and device, electronic equipment and readable storage medium
CN113724077A (en) Loan approval method, device and system
CN114078049A (en) Data processing method and device for supply chain financial credit-information service
GB2606581A (en) Content verification
CN110795707A (en) Core body strategy recommendation method and device and electronic equipment
CA2877218C (en) Method for securing a transaction performed by bank card
CN114997122A (en) Form filling method and device, electronic equipment and storage medium
WO2013160830A1 (en) A server and mobile device for authorizing a transaction
KR100782012B1 (en) A Phone-Banking Auto Calling System On the Internet Banking and Finance Dealing Method Using the Same
CN117635354A (en) Service data date joining method, computer equipment and computer storage medium
CN115482074A (en) Accounting information checking method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant