CN115114642A - Financing lease verification method, device and equipment based on under-chain trusted computing - Google Patents

Financing lease verification method, device and equipment based on under-chain trusted computing Download PDF

Info

Publication number
CN115114642A
CN115114642A CN202210748140.1A CN202210748140A CN115114642A CN 115114642 A CN115114642 A CN 115114642A CN 202210748140 A CN202210748140 A CN 202210748140A CN 115114642 A CN115114642 A CN 115114642A
Authority
CN
China
Prior art keywords
financing
private
data
party
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210748140.1A
Other languages
Chinese (zh)
Inventor
刘坚
杨文龙
杜敬凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Blockchain Technology Shanghai Co Ltd filed Critical Ant Blockchain Technology Shanghai Co Ltd
Priority to CN202210748140.1A priority Critical patent/CN115114642A/en
Publication of CN115114642A publication Critical patent/CN115114642A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Abstract

The embodiment of the specification discloses a financing lease verification method, a financing lease verification device and equipment based on under-chain trusted computing, which are applied to privacy computing nodes arranged in a block chain, and the scheme comprises the following steps: receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party; carrying out privacy calculation on the encrypted privacy data by running a check contract issued in the block chain to generate a corresponding check result; returning a check result to the financing leasing platform so that the financing leasing platform interacts with the financing party according to the check result to decide whether the financing party purchases the specified resource and leases the specified resource to the financing party for operation; and in the case that the verification result indicates that the verification is passed, the encrypted private data or the private business data is linked up in the blockchain so as to enable an authorized party to access.

Description

Financing lease verification method, device and equipment based on under-chain trusted computing
Technical Field
The specification relates to the field of trusted computing, in particular to a financing lease verification method, a financing lease verification device and equipment based on under-chain trusted computing.
Background
With the development of computer and internet technologies, users can perform financial transactions on a network to meet financial needs of various parties.
For example, a financing lease service is executed, the financing party puts forward lease requirements to the sponsor, the sponsor acquires equipment required by the financing party through the sponsor or a third party and leases the equipment to the financing party for use, and the financing party pays a lease amount to the sponsor during use. After the lease deadline is over, the two parties determine whether to transfer ownership of the equipment to the financing party based on agreement in financing lease.
In general, the financing party needs to send the operation status to the resource, and the resource is verified and evaluated to determine whether to obtain the equipment.
Based on this, there is a need for a financing lease verification scheme that can protect the privacy of the financers.
Disclosure of Invention
One or more embodiments of the present specification provide a private data verification method, apparatus, device and storage medium based on financing lease, so as to solve the following technical problems: there is a need for a financing lease verification scheme that can protect the privacy of financers.
To solve the above technical problems, one or more embodiments of the present specification are implemented as follows:
one or more embodiments of the present specification provide a financing lease verification method based on under-chain trusted computing, which is applied to a privacy computing node arranged in a block chain, and the method includes:
receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party;
carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result;
returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays a designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
One or more embodiments of the present specification provide a privacy data verification method based on financing lease, which is applied to a financing lease platform, and the method includes:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
One or more embodiments of the present specification provide a financing lease verification apparatus based on under-chain trusted computing, which is applied to a privacy computing node arranged in a block chain, and the apparatus includes:
the first receiving module is used for receiving encrypted privacy data sent by the financing leasing platform, wherein the encrypted privacy data is generated after the financing party encrypts the private operation data;
the privacy calculation module is used for carrying out privacy calculation on the encrypted privacy data by running the issued verification contract in the block chain to generate a corresponding verification result;
the first check result module returns the check result to the financing lease platform so that the financing lease platform interacts with a sponsor according to the check result to decide whether the sponsor invests resources to purchase specified resources and leases the specified resources to the financing party for operation;
and the first uplink module is used for uplink transmitting the encrypted private data or the private business data in the block chain under the condition that the verification result shows that the verification is passed so as to enable an authorized party to access the block chain.
One or more embodiments of the present specification provide a private data verification device based on financing lease, which is applied to a financing lease platform, and the device includes:
the second receiving module is used for receiving encrypted private data sent by the financing party, wherein the encrypted private data is generated after the financing party encrypts the private operation data;
the sending module is used for sending the encrypted privacy data to a privacy calculation node so as to specify the privacy calculation node to carry out privacy calculation on the encrypted privacy data through a verification contract issued in a block chain where the privacy calculation node is located, and generate a corresponding verification result;
the second verification result module is used for receiving the verification result returned by the privacy computing node and interacting with a sponsor according to the verification result so as to decide whether the sponsor invests the specified resources or not and leases the specified resources to the financing party for operation;
and the second uplink module is used for linking the encrypted private data or the private business data in the block chain through the private computing node under the condition that the verification result shows that the verification is passed so as to enable an authorized party to access the block chain.
One or more embodiments of the present specification provide a financing lease verification device based on under-chain trusted computing on a private computing node side, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party;
carrying out privacy calculation on the encrypted privacy data by operating the checking contract issued in the block chain to generate a corresponding checking result;
returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays a designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
One or more embodiments of the present specification provide a financing lease verification device based on under-chain trusted computing on the side of a financing lease platform, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
One or more embodiments of the present specification provide a non-transitory computer storage medium storing computer-executable instructions configured to:
receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party;
carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result;
returning the check result to the financing lease platform so that the financing lease platform interacts with a sponsor according to the check result to decide whether the sponsor invests the designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
One or more embodiments of the present specification provide a non-transitory computer storage medium storing computer-executable instructions configured to:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
At least one technical scheme adopted by one or more embodiments of the specification can achieve the following beneficial effects:
the private operation data of the financing party is always in an encrypted state in the transmission process, and even if the private operation data is received by the financing lease platform, the private operation data is encrypted, so that the privacy protection of the financing party in the data transmission process is ensured. The privacy computing node can further ensure the privacy protection of the financing party in the data processing process no matter which way the privacy computing node performs the privacy computation on the encrypted privacy data. Before data chaining, data verification is carried out on the encrypted private data, and the reliability of the uplink data can be realized on the premise of not revealing the privacy of the user.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a schematic flowchart of a method for verifying financing lease of under-chain trusted computing on a private computing node side according to one or more embodiments of the present disclosure;
FIG. 2 is a block diagram of a system for verifying a financing lease with a chain trusted computing according to one or more embodiments of the present disclosure;
FIG. 3 is a schematic flow diagram illustrating a method for verifying financing leases by performing an under-chain trusted computation on a financing lease platform according to one or more embodiments of the present disclosure;
fig. 4 is a schematic flowchart of a financing lease verification method in an application scenario, according to one or more embodiments of the present disclosure;
fig. 5 is a schematic structural diagram of a private computing node side financing lease verification device based on under-chain trusted computing according to one or more embodiments of the present specification;
FIG. 6 is a block diagram of a financing lease verification device based on under-chain trusted computing on the side of a financing lease platform according to one or more embodiments of the present disclosure;
fig. 7 is a schematic structural diagram of a private computing node side financing lease verification device based on under-chain trusted computing according to one or more embodiments of the present specification;
fig. 8 is a schematic structural diagram of a financing lease verification device based on under-chain trusted computing on the side of a financing lease platform according to one or more embodiments of the present specification.
Detailed Description
The embodiment of the specification provides a financing lease verification method, a financing lease verification device, equipment and a storage medium based on under-chain trusted computing.
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any inventive step based on the embodiments of the present disclosure, shall fall within the scope of protection of the present application.
Fig. 1 is a flowchart of a method for verifying financing lease based on under-chain trusted computing on a private computing node side according to one or more embodiments of the present disclosure. The method can be applied to different business fields, such as the field of internet financial business, the field of privacy calculation, the field of electric business, the field of instant messaging business, the field of game business, the field of official business and the like. The process can be executed by computing equipment in the corresponding field (such as an intelligent customer service server or an intelligent mobile terminal corresponding to the payment service, and the like), and certain input parameters or intermediate results in the process allow manual intervention and adjustment to help improve the accuracy.
Fig. 2 is a schematic diagram of a framework of a system for verifying financing lease for under-link trusted computing according to one or more embodiments of the present disclosure, where the system mainly includes a financing party, an lending party, a financing lease platform, and a privacy computing node (MYTF).
The financer provides a lease requirement, which indicates that a specified resource (which is usually a device, but can also be a virtual resource, such as a cloud storage space, software, and the like) is required by the financer, and the financer leases the specified resource (such as providing funds or a device) to the financer for use. The financing lease platform is mainly used for executing financing lease services for both financing parties and financing parties, for example, appointments in the financing lease services are generated for both parties, behaviors of both parties in the service execution process are supervised, matching is carried out for a plurality of financing parties and the financing parties, and the like. The privacy computing node is mainly used for verifying related data in financing lease on the premise of ensuring that privacy data of a financing party are not leaked through a privacy computing mode. In this document, the method for checking financing lease based on under-chain trusted computing shown in fig. 1 is mainly explained by taking a private computing node as a main body.
The process in fig. 1 may include the following steps:
s102: and receiving encrypted privacy data sent by the financing leasing platform, wherein the encrypted privacy data is generated after the financing party encrypts the private operation data.
In order to ensure that the privacy of the financing party is not revealed, the private operation data of the financing party is not generally disclosed to the financing leasing platform in the data transmission processing process. Based on the method, the financing party encrypts the private operation data of the financing party to obtain the encrypted private data, and then sends the encrypted private data to the financing leasing platform, and then the financing leasing platform sends the encrypted private data to the private computing node. The financing leasing platform receives encrypted privacy data, and the encrypted privacy data are difficult to acquire clear private operation data, so that privacy protection of financing parties is realized.
S104: and carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result.
The method comprises the steps that a block chain is preset, and a privacy computation node is deployed as a node in the block chain, and can write data into the block chain or read the written data in the block chain under the condition that the privacy computation node meets requirements.
The block chain can be in the form of a public chain, an alliance chain or a private chain, and the financing party, the sponsor and the financing lease platform can also be deployed in the block chain as nodes. In order to guarantee the authenticity and accuracy of data in the blockchain, the blockchain is set to be in a form of a federation chain, and the privacy computing node is used as an accounting node.
And issuing a verification contract in the block chain, wherein the verification contract belongs to an intelligent contract and can automatically perform privacy calculation on the received encrypted privacy data to generate a verification result. The verification method includes various methods, which perform corresponding settings based on different requirements, such as verification of authenticity of encrypted private data sent by the financer (through verification of fund transfer data, identity data, historical order transaction records and the like provided by the financer), verification of feasibility of equipment and operation plans required by the financer, and the like. However, no matter what way the verification is performed, the verification result finally generated does not carry the private operation data of the plaintext, so as to ensure that the privacy of the financing party is not revealed.
The privacy calculation can be carried out on the premise of ensuring the privacy of the financing party to obtain the verification result. For example, the verification result is obtained through secure multiparty computation, federal learning, trusted execution environment and other manners.
S106: and returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays the appointed resource and leases the appointed resource to the financing party for operation.
When the verification result returned to the financing leasing platform is received, the financing leasing platform decrypts the verification result to obtain the verification result (for example, a secret key which can be obtained through the financing leasing platform is encrypted in a symmetric encryption mode to ensure that the data cannot be easily cracked after being intercepted and captured in the data transmission process). If the verification result meets the preset requirement, for example, the authenticity of the encrypted private data is higher than a preset threshold, the credibility of the financer operation plan is higher than a preset threshold, and the like. The financing lease platform can interact with the financing party to execute the financing lease service for both parties.
The financing and leasing party can be registered in the financing and leasing platform in advance, when the financing and leasing platform receives the verification result generated according to the financing party, the financing and leasing platform matches the financing and leasing party in a plurality of pre-registered financing parties, and a proper financing party is selected to perform financing and purchase the specified resource.
S108: and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
In addition to encrypting private data or private business data, verification results may also be stored in the upper chain.
The authorized parties can comprise a financing leasing platform, a financing party and a financing party, and the authorized parties are different based on different privacy protection levels and different requirements corresponding to financing leasing services. For example, in some cases, to facilitate the execution of a financing rental service by a financing rental platform, it may act as an authorized party to obtain encrypted private data or private business data. Alternatively, in order to facilitate the sponsor to obtain the private business data for research analysis on whether to fund, the sponsor can also be used as an authorized party. Therefore, although the encrypted private data or the private business data of the financing party are linked, the private data of the financing party can be ensured not to be leaked to the maximum extent under the condition of ensuring the convenience of service execution and the funding basis obtained by the funding party by controlling the number of authorized parties.
It should be noted that for ease of explanation herein, the primary station is described in terms of a financer: the financing party sends private operation data to search for financing of the financing party and execute financing lease service. Similarly, the approach herein is also applicable to the sponsor. For example, the sponsor generates encrypted privacy data according to private operation data of the sponsor, and sends the encrypted privacy data to the privacy computing node through the financing lease platform. And the privacy calculation result is subjected to privacy calculation through the issued checking contract, a checking result is generated and returned, the financing leasing platform interacts with the financing party according to the checking result, and the financing party decides whether to accept the appointed resources purchased and leased by the financing party for operation.
Based on the process of fig. 1, some specific embodiments and embodiments of the process are also provided in the present specification, and the description is continued below.
In one or more embodiments of the present description, the financer (for convenience of description, the financer is still used as an example herein, but it is to be understood that the sponsor is also equally applicable to the solution herein) sends the registration request to the privacy computing node in advance. If the registration request passes the verification, the private computing node generates and issues a private key for the registration request, the private key can also be called a secret key, the private computing node retains the private key, and the two parties can perform encryption interaction in a symmetric encryption mode through the private computing node.
And the financing party encrypts the private operation data through the private key to obtain encrypted private data, and sends the encrypted private data to the private computing node through the financing lease platform. The private computing node decrypts the encrypted private data through a private key reserved in advance to obtain private business data so as to verify the private business data. As shown in fig. 2, the privacy computing node may perform processes of data decryption and verification analysis based on Trusted Application (TAPP), where the processes include multiple TAPPs, such as TAPP 1-TAPP 4, to ensure that privacy of the financer is not revealed in the verification process after decryption.
Further, in the verification, if the authenticity of the private business data is verified, the information that can be provided is limited. At this time, the financing lease service initiated by the financing party can be further analyzed to assist the financing lease platform in executing the financing lease service.
And obtaining the operating state of the financing party and the operating strategy of the financing party for the required specified resources according to the private operating data. The business status represents the current business status of the financer, while the operation policy represents how it operates the specified resource. The operation state can comprise financial data such as expense budget, profit condition and non-public financial data of the financing party, and technical information such as proprietary technology, research results, engineering design and product design drawings. The operation strategy can comprise business activity methods such as marketing means, management know-how, management method, pricing method and sales method of the financing party, and business activity information such as business plan, product development plan, internal business process, bidding document, budget, license, price, cost, employee information, supplier, distributor, client resource, client list, client address and contact method.
And evaluating the financing lease service initiated by the financing party according to the operation strategy to obtain the current corresponding saturation level. For example, the financing lease service is that the financing party wants to lease a large engineering equipment and use it to execute the relevant engineering activity. And evaluating the engineering activity, and determining that the saturation level corresponding to the financing lease service is a higher level if a plurality of mature enterprises in the current market perform the engineering activity and the market is saturated.
The financing lease is a long-term process, and if the saturation level corresponding to the financing lease service is low and the market is not saturated, higher income can be brought in the initial stage of the financing lease. But the subsequent lack of strength and the decline of the profit are rapid, the profit finally generated by the financing leasing service may still be unsatisfactory. Based on the above, the financing lease service is further estimated according to the saturation level and the operation state, and the decline level corresponding to the future is determined. The saturation level represents the height of the starting point of the financing lease service, the operation state represents the operation capacity of the financing party, and the decline level can be obtained by combining the saturation level and the operation state. For example, if the saturation level is low, which means that the corresponding starting point is high, and the operation capability of the financing party is strong, it can be estimated that the income decline of the service is low in a future period of time, even the increase can be realized, and it can be determined that the corresponding decline level is low, even a negative decline level.
Furthermore, the saturation level and the decline level can indicate the feasibility of the financing lease service, and provide corresponding support for the financing lease platform and the sponsor (for convenience of description, the following explanation is given by taking one of the parties as a main body) to judge whether to fund. However, the financing leasing platform may still be not intuitive enough, which is not favorable for the financing leasing platform to obtain the judgment result of the financing leasing service, and is also not favorable for the sponsor to decide whether to fund.
Based on this, mapping is performed on part or all of the data in the private business data to obtain target data with the same saturation level and decay level (the target data may be real data obtained from historical data or false data obtained through a simulated scene). For example, in the private business data, it is determined that the user wants to operate through the device a in the mode B according to the operation policy of the financer, and the corresponding saturation level and decline level are obtained through analysis. At this time, in the industry or other industries, it is mapped to the device C and the manner D having the same saturation level and degradation level. And generating an inspection result according to the target data obtained by mapping, wherein at the moment, although the financing leasing platform still cannot obtain the plaintext private operation data, the target data provided for the financing leasing platform has the same saturation level and decline level with the private operation data, and the private operation data can be restored to the maximum extent on the premise that the private data is not leaked, so that the financing leasing platform can judge the feasibility of the financing leasing service more intuitively.
In the mapping process, if the mapping target is randomly selected, the expected effect may be difficult to achieve, and the financing leasing platform still cannot intuitively analyze the financing leasing service.
Based on this, the industry transfer degree corresponding to the financing lease service is determined according to the saturation level and the decline level, in general, the lower the saturation level and the decline level are, the higher the income which can be brought by the financing lease service is, the higher the importance degree of the financing party and the financing party is, the higher the required privacy protection level is, and at this time, the industry transfer degree is set to be higher.
And determining a target industry according to the industry of the financing lease service and the industry transfer degree, wherein when the industry transfer degree is higher, the industry span between the target industry and the industry of the financing lease service is also larger, and the target industry and the industry are positively correlated. Therefore, the private privacy data are mapped into the target industry, and the corresponding target industry can be selected according to different service lease levels. And combining the actual service condition to bring an intuitive expression mode for the financing leasing platform in a most adaptive mode.
For example, when the industry transition degree is lower than a first preset threshold (the first preset threshold may be a value or a range), it indicates that the importance degree is lower, and the income can be lower. At the moment, the industry is selected as a target industry, private operation data can be restored to the maximum extent, the most visual expression mode is brought to the financing leasing platform, and the accuracy of the analysis result of the financing leasing platform on the financing leasing business is ensured.
And when the industry transfer degree is higher than the first preset threshold, the importance degree is higher, if the industry is selected as the target industry, the industry is easily discovered and simulated by a competitor, and the business execution of the financing party and the financing party is not facilitated. Therefore, there is a need to select target industries across industries. In order to make the judgment of the sponsor intuitive, the industry where the sponsor is located is considered as a target industry. However, since the industry transition degree of the financing lease service is high, the corresponding saturation level and the corresponding decline level are both low, and the target data of the same level can not be found in the target industry exactly. At this time, a preset general industry is taken as a target industry. The general industry can be industries (such as living goods industry, food industry and the like) which are easily contacted in life of people, and in the general industry, various target data are preset and correspond to different saturation levels and decline levels respectively. At the moment, even if the target industry is not the industry where the sponsor is located, the intuitive degree of the sponsor in judging the feasibility of the financing lease service can be increased to the maximum extent.
Fig. 3 is a flowchart illustrating a method for verifying financing lease based on an under-chain trusted computing on a financing lease platform according to one or more embodiments of the present disclosure. The flow in fig. 3 may include the following steps:
s302: and receiving encrypted privacy data sent by the financing party, wherein the encrypted privacy data is generated after the financing party encrypts the private operation data.
S304: and sending the encrypted privacy data to a privacy calculation node to specify the privacy calculation node to carry out privacy calculation on the encrypted privacy data through a verification contract issued in a block chain where the privacy calculation node is located, and generating a corresponding verification result.
As already mentioned above, the private compute nodes are deployed in blockchains. The financing lease platform is pre-compiled to generate a corresponding check algorithm, then the check algorithm is issued to the privacy computing node through compiling, and the privacy computing node can issue a corresponding check contract in the block chain according to the check algorithm. The financing lease platform can write a plurality of verification algorithms in advance based on different scenes (such as different industries, different verification requirements and the like), and issue corresponding verification contracts, and the privacy computing node can select an adaptive verification contract to perform verification in the verification process.
S306: and receiving the verification result returned by the privacy computing node, and interacting with a sponsor according to the verification result so as to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation.
The interactive mode includes various modes, for example, the mode of mail, telephone, short message, etc., and the interactive content can include: the requirements of the financing party, the verification result (which may include the authenticity analysis of the private business data provided by the financing party, the saturation level and the decline level obtained through the data analysis, etc.), the operation strategy of the financing party in the operation process, etc.
S308: and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
Based on the method of fig. 3, the present specification also provides some specific embodiments and extensions of the method, which are further described below.
When a plurality of financing parties exist, the financing lease platform can select the adapted financing party for the financing party according to the verification result, for example, if the market value of the equipment required by the financing party is more than one million, the financing party capable of providing more than one million funds is searched among all registered financing parties.
And interacting with the sponsor to generate corresponding business commitments for the two parties. In the service contract, obligations and rights to be acquired required by both parties are agreed, for example, a resource payment mode of the financing party (including paying funds, delivering the funds to a third party or a financing leasing platform for purchasing equipment and then leasing the equipment for the financing party, or directly paying the equipment for the financing party), within which time the financing party needs to provide resources to the financing party, the price and leasing duration of the rent, an operation plan which the financing party needs to disclose to the financing party, the attribution of the equipment after leasing is finished, and the like. For example, according to the saturation level and the decline level, determining a lease term corresponding to the financing lease service for both parties (the lower the saturation level and the decline level, the higher the income of the financing lease service is, the longer the lease term can be, so as to ensure the maximum income of both parties), and an equipment recovery strategy (combining the decline level and the saturation level, determining the value of equipment leased by a financing party when the lease term is over, and setting a corresponding equipment recovery strategy for both parties according to the willingness of the rent and the financing party), sending the lease time and the equipment recovery strategy to the financing party, if the financing party agrees, generating a corresponding service agreement, and if the agreement does not agree, negotiating among multiple parties.
Specifically, when selecting the adapted sponsor, the financing leasing platform can determine the trust level for selecting the sponsor based on the saturation level and the decline level carried in the verification result. The trust level refers to the degree to which the sponsor value is trusted in the process of selecting the sponsor. As already mentioned above, the lower the saturation level and the decline level, the higher the required confidentiality level of the service is, and at this time, the more careful selection of the sponsor should be made, and the lower the trusted level of the sponsor should be. When the trust level is lower than the second preset threshold, it is indicated that the security level corresponding to the service is higher, and the sponsor is not trustworthy, and if too much content is disclosed to the sponsor, the privacy of the financing party is easily revealed.
Based on this, if the content disclosed to the sponsor includes what the equipment required by the financing party is in the financing lease service, the sponsor may analyze the operation strategy of the financing party in combination with other related information of the financing party, which is not favorable for privacy protection of the financing party.
Therefore, when the resource is selected, the equipment owner is screened out. And only selecting an adaptive fund provider from the rest fund producers, providing the fund by the adaptive fund provider, and acquiring equipment required by the fund financing leasing platform at a third party. The acquisition process of equipment is all in secret state to the sponsor, the sponsor only need provide capital, remaining equipment purchase, the process of lease hand over by financing lease platform and third party realize can, to the sponsor save time and save effort, to the third party its equipment of only knowing oneself is bought by financing lease platform, to equipment who purchases, who goes to use etc. information too detailed yet can not know, just also can guarantee that the privacy of financing party is not revealed.
Fig. 4 is a schematic flowchart of a financing lease verification method in an application scenario, where the financing lease platform writes a verification algorithm and sends the verification algorithm to a privacy computing node to generate a verification contract, according to one or more embodiments of the present specification. The private computing node generates and issues a private key to the financing party, the financing party encrypts private operation data through the private key to obtain encrypted private data, the encrypted private data are sent to the private computing node, the private computing node conducts verification, and a verification result is sent to the financing leasing platform.
Based on the same idea, one or more embodiments of the present specification further provide apparatuses and devices corresponding to the above-described method, as shown in fig. 5 to 8.
Fig. 5 is a schematic structural diagram of a private computing node side financing lease verification apparatus based on under-chain trusted computing according to one or more embodiments of the present specification, where the apparatus includes:
the first receiving module 502 is used for receiving encrypted privacy data sent by the financing leasing platform, wherein the encrypted privacy data is generated after the financing party encrypts the private operation data;
the privacy calculation module 504 is used for performing privacy calculation on the encrypted privacy data by running the check contract issued in the block chain to generate a corresponding check result;
the first verification result module 506 returns the verification result to the financing leasing platform, so that the financing leasing platform interacts with a sponsor according to the verification result to decide whether the sponsor invests the designated resource and leases the designated resource to the financing party for operation;
and a first uplink module 508, configured to uplink the encrypted private data or the private business data in the block chain to enable an authorized party to access the block chain if the verification result indicates that the verification passes.
Optionally, the method further comprises:
a registration module 510, configured to receive a registration request sent by the financing party;
and generating and issuing a corresponding private key for the financing party according to the registration request so that the financing party and the privacy computing node perform encryption interaction in a symmetric encryption mode through the private key.
Optionally, the privacy computation module 504 decrypts the encrypted privacy data by using the stored private key issued by the financing party to obtain the private business data;
determining the operation state of the financing party and the operation strategy of the financing party for the specified resources according to the private operation data;
according to the operation strategy, evaluating the financing lease service initiated by the financing party, and determining the current corresponding saturation level;
estimating the financing lease service according to the operation state and the saturation level, and determining a decline level corresponding to the financing lease service in the future;
mapping at least part of the private operation data to obtain target data with the same saturation level and decline level as the private operation data;
and generating a verification result according to the target data so that the financing leasing platform can acquire the target data of the plaintext.
Optionally, the privacy computation module 504 determines an industry transfer degree of the financing lease service according to the saturation level and the decline level;
determining a target industry according to the industry transfer degree and the industry of the financing lease service, wherein the industry span between the target industry and the industry is positively correlated with the industry transfer degree;
mapping at least part of the private business data to the target industry to obtain target data which has the same saturation level and the same decline level with the private business data and belongs to the target industry.
Optionally, the privacy calculation module 504 determines, if the industry transfer degree is lower than a first preset threshold, an industry where the financing lease service is located as a target industry;
if the industry transfer degree is higher than the first preset threshold value, trying to take the industry where the sponsor is located as a target industry;
and if the target data with the saturation level and the decline level which are the same as the private operation data cannot be obtained in the industry of the sponsor, taking a preset general industry as the target industry.
Fig. 6 is a schematic structural diagram of a financing lease verification device based on under-chain trusted computing on a financing lease platform side according to one or more embodiments of the present specification, the device including:
a second receiving module 602, configured to receive encrypted private data sent by an information aggregator, where the encrypted private data is generated by the information aggregator after encrypting its private operation data;
the sending module 604 is configured to send the encrypted privacy data to a privacy computing node, so as to specify that the privacy computing node performs privacy computation on the encrypted privacy data through a verification contract issued in a block chain where the privacy computing node is located, and generate a corresponding verification result;
the second verification result module 606 receives the verification result returned by the privacy computing node, and interacts with a sponsor according to the verification result to decide whether the sponsor purchases a specified resource or not and leases the specified resource to the financing party for operation;
and a second uplink module 608, configured to uplink, by the privacy computing node, the encrypted privacy data or the private business data in the blockchain to enable an authorized party to access the blockchain if the verification result indicates that the verification passes.
Optionally, the method further comprises:
the compiling module 610 compiles and generates a corresponding verification algorithm;
and issuing the verification algorithm to the privacy computing node through compiling so as to issue the verification and the appointment corresponding to the verification algorithm in the block chain where the privacy computing node is located.
Optionally, the second verification result module 606 determines an adapted sponsor for the financing party according to the verification result;
interacting with the financing party, generating a service agreement corresponding to a financing lease service for the financing party and the financing party, so that the financing party provides resources according to the service agreement, obtains equipment required by the financing party, and leases the equipment to the financing party for operation;
and when the financing party provides enough rent to the sponsor according to the service appointed time, determining the ownership party of the equipment ownership.
Optionally, the second verification result module 606 determines a saturation level and a degradation level carried in the verification result, where the saturation level is obtained by the private computation node according to the operation policy evaluation in the private operation data, and the degradation level is obtained by the private computation node according to the operation state in the private operation data and the saturation level through estimation;
obtaining a trusted level according to the saturation level and the decline level;
if the trusted level is lower than a second preset threshold value, screening out the equipment owner from all the sponsors, and selecting an adaptive fund provider for the financer from the remaining sponsors;
the method for providing resources by the sponsor according to the service agreement and acquiring the equipment required by the financing party comprises the following steps:
and the fund provider provides funds, and equipment required by the fund financing party is acquired at a third party through the financing lease platform.
Optionally, the second verification result module 606 determines lease time limits and equipment recycling strategies corresponding to the financing lease services for the financing party and the resource party according to the saturation level and the decline level;
and sending the lease time and the equipment recovery strategy to the sponsor, and generating a service contract corresponding to the financing lease service for the financing sponsor and the sponsor according to the feedback information of the sponsor.
Fig. 7 is a schematic structural diagram of a private computing node side financing lease verification device based on under-chain trusted computing according to one or more embodiments of the present specification, where the device includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party;
carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result;
returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays a designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
Based on the same idea, one or more embodiments of the present specification further provide a non-volatile computer storage medium corresponding to the method, storing computer-executable instructions configured to:
receiving encrypted privacy data sent by a financing lease platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing lease platform;
carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result;
returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays a designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
Fig. 8 is a schematic structural diagram of a financing lease verification device based on under-chain trusted computing on a financing lease platform side according to one or more embodiments of the present specification, where the device includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
Based on the same idea, one or more embodiments of the present specification further provide a non-volatile computer storage medium corresponding to the above method, and storing computer-executable instructions configured to:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: the ARC625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more pieces of software and/or hardware in the practice of this description.
As will be appreciated by one skilled in the art, the present specification embodiments may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiments of the apparatus, the device, and the nonvolatile computer storage medium, since they are substantially similar to the embodiments of the method, the description is simple, and for the relevant points, reference may be made to the partial description of the embodiments of the method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The above description is merely one or more embodiments of the present disclosure and is not intended to limit the present disclosure. Various modifications and alterations to one or more embodiments of the present description will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of one or more embodiments of the present specification should be included in the scope of the claims of the present specification.

Claims (22)

1. A financing lease verification method based on under-chain trusted computing is applied to a privacy computing node arranged in a block chain, and the method comprises the following steps:
receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party;
carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result;
returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays a designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
2. The method of claim 1, prior to receiving the encrypted privacy data sent by the financing rental platform, the method further comprising:
receiving a registration request sent by the financing party;
and generating and issuing a corresponding private key for the financing party according to the registration request so that the financing party and the privacy computing node perform encryption interaction in a symmetric encryption mode through the private key.
3. The method according to claim 2, wherein the performing the privacy calculation on the encrypted privacy data to generate the corresponding verification result specifically includes:
decrypting the encrypted private data through the stored private key issued by the financing party to obtain the private operation data;
determining the operation state of the financing party and the operation strategy of the financing party for the specified resources according to the private operation data;
according to the operation strategy, evaluating the financing lease service initiated by the financing party, and determining the current corresponding saturation level;
estimating the financing lease service according to the operation state and the saturation level, and determining a decline level corresponding to the financing lease service in the future;
mapping at least part of the private operation data to obtain target data with the same saturation level and decline level as the private operation data;
and generating a verification result according to the target data so that the financing leasing platform can acquire the target data of the plaintext.
4. The method according to claim 3, wherein the mapping at least a part of the private business data to obtain the target data having the same saturation level and the same decline level as the private business data specifically comprises:
determining the industry transfer degree of the financing lease service according to the saturation level and the decline level;
determining a target industry according to the industry transfer degree and the industry of the financing lease service, wherein the industry span between the target industry and the industry is positively correlated with the industry transfer degree;
mapping at least part of the private business data to the target industry to obtain target data which has the same saturation level and the same decline level with the private business data and belongs to the target industry.
5. The method of claim 4, wherein the determining a target industry according to the industry transition degree and the industry of the financing lease service comprises:
if the industry transfer degree is lower than a first preset threshold value, determining the industry where the financing lease service is located as a target industry;
if the industry transfer degree is higher than the first preset threshold value, trying to take the industry where the sponsor is located as a target industry;
and if the target data with the saturation level and the decline level which are the same as the private operation data cannot be obtained in the industry of the sponsor, taking a preset general industry as the target industry.
6. A privacy data verification method based on financing lease is applied to a financing lease platform, and comprises the following steps:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
7. The method of claim 6, prior to sending the encrypted privacy data to a privacy computing node, the method further comprising:
compiling and generating a corresponding verification algorithm;
and issuing the verification algorithm to the privacy calculation node through compiling so as to issue the verification and the appointment corresponding to the verification algorithm in the block chain where the privacy calculation node is located.
8. The method of claim 6, wherein the interacting with the sponsor to decide whether the sponsor purchases the specified resource and leases the specified resource to the financer for operation according to the verification result comprises:
determining an adaptive sponsor for the financing party according to the verification result;
interacting with the financing party, generating a service agreement corresponding to a financing lease service for the financing party and the financing party, so that the financing party provides resources according to the service agreement, obtains equipment required by the financing party, and leases the equipment to the financing party for operation;
and when the financing party provides enough rent to the sponsor according to the service appointed time, determining the ownership party of the equipment ownership.
9. The method according to claim 8, wherein determining an adapted sponsor for the financer based on the verification result comprises:
determining a saturation level and a decline level carried in the verification result, wherein the saturation level is obtained by the privacy computing node according to the evaluation of the operation strategy in the private operation data, and the decline level is obtained by the privacy computing node according to the estimation of the operation state in the private operation data and the saturation level;
obtaining a trusted level according to the saturation level and the decline level;
if the trusted level is lower than a second preset threshold value, screening out the equipment owner from all the sponsors, and selecting an adaptive fund provider for the financer from the remaining sponsors;
the method for providing resources by the sponsor according to the service agreement and acquiring the equipment required by the financing party comprises the following steps:
and the fund providing party provides funds and obtains equipment required by the fund financing party at a third party through the financing lease platform.
10. The method of claim 9, wherein the interacting with the sponsor to generate a business engagement corresponding to a financing lease business for the financing party and the sponsor specifically comprises:
determining lease time limit and equipment recovery strategy corresponding to financing lease service for the financing party and the resource party according to the saturation grade and the decline grade;
and sending the lease time and the equipment recovery strategy to the sponsor, and generating a service contract corresponding to the financing lease service for the financing sponsor and the sponsor according to the feedback information of the sponsor.
11. A financing lease verification device based on under-chain trusted computing is applied to a privacy computing node arranged in a block chain, and the device comprises:
the first receiving module is used for receiving encrypted privacy data sent by the financing leasing platform, wherein the encrypted privacy data is generated after the financing party encrypts the private operation data;
the privacy calculation module is used for carrying out privacy calculation on the encrypted privacy data by running the issued verification contract in the block chain to generate a corresponding verification result;
the first check result module returns the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor invests the designated resource and leases the designated resource to the financing party for operation;
and the first uplink module is used for uplink transmitting the encrypted private data or the private business data in the block chain under the condition that the verification result shows that the verification is passed so as to enable an authorized party to access the block chain.
12. The apparatus of claim 11, further comprising:
the registration module is used for receiving a registration request sent by the financing party;
and generating and issuing a corresponding private key for the financing party according to the registration request so that the financing party and the privacy computing node perform encryption interaction in a symmetric encryption mode through the private key.
13. The apparatus of claim 12, the privacy computation module to decrypt the encrypted privacy data with the stored private key issued by the financer to obtain the private business data;
determining the operation state of the financing party and the operation strategy of the financing party for the specified resources according to the private operation data;
according to the operation strategy, evaluating the financing lease service initiated by the financing party, and determining the current corresponding saturation level;
estimating the financing lease service according to the operation state and the saturation level, and determining a decline level corresponding to the financing lease service in the future;
mapping at least part of the private operation data to obtain target data with the same saturation level and decline level as the private operation data;
and generating a verification result according to the target data so that the financing leasing platform can acquire the target data of the plaintext.
14. The apparatus of claim 13, the privacy computation module to determine an industry transfer degree of the financing lease service based on the saturation level and the decline level;
determining a target industry according to the industry transfer degree and the industry of the financing lease service, wherein the industry span between the target industry and the industry is positively correlated with the industry transfer degree;
mapping at least part of the private business data to the target industry to obtain target data which has the same saturation level and the same decline level with the private business data and belongs to the target industry.
15. The apparatus of claim 14, wherein the privacy computation module determines the industry in which the financing lease service is located as a target industry if the industry transition degree is lower than a first preset threshold;
if the industry transfer degree is higher than the first preset threshold value, trying to take the industry where the sponsor is located as a target industry;
and if the target data with the saturation level and the decline level which are the same as the private operation data cannot be obtained in the industry of the sponsor, taking a preset general industry as the target industry.
16. A private data verification device based on financing lease is applied to a financing lease platform, and comprises the following components:
the second receiving module is used for receiving encrypted private data sent by the financing party, wherein the encrypted private data is generated after the financing party encrypts the private operation data;
the sending module is used for sending the encrypted privacy data to a privacy computing node so as to designate the privacy computing node to carry out privacy computation on the encrypted privacy data through a verification contract issued in a block chain where the privacy computing node is located, and generate a corresponding verification result;
the second verification result module is used for receiving the verification result returned by the privacy computing node and interacting with a sponsor according to the verification result so as to decide whether the sponsor invests the specified resources or not and leases the specified resources to the financing party for operation;
and the second uplink module is used for linking the encrypted private data or the private business data in the block chain through the private computing node under the condition that the verification result shows that the verification is passed so as to enable an authorized party to access the block chain.
17. The apparatus of claim 16, further comprising:
the compiling module is used for compiling and generating a corresponding verification algorithm;
and issuing the verification algorithm to the privacy computing node through compiling so as to issue the verification and the appointment corresponding to the verification algorithm in the block chain where the privacy computing node is located.
18. The apparatus of claim 16, said second verification result module determining an adapted sponsor for said financer based on said verification result;
interacting with the financing party, generating a service agreement corresponding to a financing lease service for the financing party and the financing party, so that the financing party provides resources according to the service agreement, obtains equipment required by the financing party, and leases the equipment to the financing party for operation;
and when the financing party provides enough rent to the sponsor according to the service appointed time, determining the ownership party of the equipment ownership.
19. The apparatus according to claim 18, wherein the second verification result module determines a saturation level and a degradation level carried in the verification result, the saturation level being estimated by the privacy computing node according to an operation policy in the private operation data, and the degradation level being estimated by the privacy computing node according to an operation state in the private operation data and the saturation level;
obtaining a trusted level according to the saturation level and the decline level;
if the trusted level is lower than a second preset threshold value, screening out the equipment owner from all the sponsors, and selecting an adaptive fund provider for the financer from the remaining sponsors;
the method for providing resources by the sponsor according to the service agreement and acquiring the equipment required by the financing party comprises the following steps:
and the fund providing party provides funds and obtains equipment required by the fund financing party at a third party through the financing lease platform.
20. The apparatus of claim 19, wherein the second verification result module determines lease time limits and equipment recycling policies corresponding to the financing lease services for the financing party and the resource party according to the saturation level and the decline level;
and sending the lease time and the equipment recovery strategy to the sponsor, and generating a service contract corresponding to the financing lease service for the financing sponsor and the sponsor according to the feedback information of the sponsor.
21. A private computing node side financing lease verification device based on under-chain trusted computing comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
receiving encrypted privacy data sent by a financing leasing platform, wherein the encrypted privacy data is generated after a financing party encrypts private operation data of the financing party;
carrying out privacy calculation on the encrypted privacy data by operating the issued verification contract in the block chain to generate a corresponding verification result;
returning the check result to the financing leasing platform so that the financing leasing platform interacts with a sponsor according to the check result to decide whether the sponsor pays a designated resource and leases the designated resource to the financing party for operation;
and if the verification result shows that the verification is passed, uplink the encrypted private data or the private business data in the block chain so as to enable an authorized party to access.
22. A financing lease verification device based on under-chain trusted computing on the side of a financing lease platform, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
receiving encrypted private data sent by an information-melting party, wherein the encrypted private data is generated after the information-melting party encrypts private operation data of the information-melting party;
sending the encrypted private data to a private calculation node to specify the private calculation node to carry out private calculation on the encrypted private data through a verification contract issued in a block chain where the private calculation node is located, and generating a corresponding verification result;
receiving the check result returned by the privacy computing node, and interacting with a sponsor according to the check result to decide whether the sponsor purchases the specified resource or not and lease the specified resource to the financing party for operation;
and if the verification result shows that the verification is passed, the encrypted private data or the private business data is linked up in the block chain through the private computing node so as to enable an authorized party to access.
CN202210748140.1A 2022-06-29 2022-06-29 Financing lease verification method, device and equipment based on under-chain trusted computing Pending CN115114642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210748140.1A CN115114642A (en) 2022-06-29 2022-06-29 Financing lease verification method, device and equipment based on under-chain trusted computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210748140.1A CN115114642A (en) 2022-06-29 2022-06-29 Financing lease verification method, device and equipment based on under-chain trusted computing

Publications (1)

Publication Number Publication Date
CN115114642A true CN115114642A (en) 2022-09-27

Family

ID=83330508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210748140.1A Pending CN115114642A (en) 2022-06-29 2022-06-29 Financing lease verification method, device and equipment based on under-chain trusted computing

Country Status (1)

Country Link
CN (1) CN115114642A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502732A (en) * 2023-06-29 2023-07-28 杭州金智塔科技有限公司 Federal learning method and system based on trusted execution environment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502732A (en) * 2023-06-29 2023-07-28 杭州金智塔科技有限公司 Federal learning method and system based on trusted execution environment
CN116502732B (en) * 2023-06-29 2023-10-20 杭州金智塔科技有限公司 Federal learning method and system based on trusted execution environment

Similar Documents

Publication Publication Date Title
CN107451485B (en) Data processing method and device based on block chain
CN109544160B (en) Transaction authenticity verification method and system based on block chain and intelligent contract
Asante et al. Distributed ledger technologies in supply chain security management: A comprehensive survey
TWI736705B (en) Business processing method and device
CN109583857B (en) Method, system, device and storage medium for processing public offer task
CN112132198B (en) Data processing method, device and system and server
CN107888671A (en) A kind of information-pushing method and device
CN112182644A (en) Data processing method and device and electronic equipment
CN104811428A (en) Method, device and system for verifying client identity by social relation data
CN109583891B (en) Information processing method, device and storage medium
US11488271B2 (en) System and method for supplier information management
US20190386968A1 (en) Method to securely broker trusted distributed task contracts
CN112465627A (en) Financial loan auditing method and system based on block chain and machine learning
US20190122183A1 (en) Blockchain scheduling
CN114896639A (en) Data processing method and device, electronic equipment and storage medium
US9258371B1 (en) Managing interaction with hosted services
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
CN115114642A (en) Financing lease verification method, device and equipment based on under-chain trusted computing
CN117240605B (en) Data transaction method, device, equipment and storage medium
CN114265577A (en) Service data processing method and device, computer equipment and storage medium
Kinai et al. Multi-factor authentication for users of non-internet based applications of blockchain-based platforms
US10922392B2 (en) Systems and methods for generating and managing composite digital identities
JP6542672B2 (en) Control account of online trading platform
CN111125734B (en) Data processing method and system
CN114301675A (en) Private data transaction method, system, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination