CN116112173A - Method and device for verifying image file in bank credit wind control scene - Google Patents

Method and device for verifying image file in bank credit wind control scene Download PDF

Info

Publication number
CN116112173A
CN116112173A CN202211555649.0A CN202211555649A CN116112173A CN 116112173 A CN116112173 A CN 116112173A CN 202211555649 A CN202211555649 A CN 202211555649A CN 116112173 A CN116112173 A CN 116112173A
Authority
CN
China
Prior art keywords
image file
verification
file
image
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211555649.0A
Other languages
Chinese (zh)
Inventor
李林林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC, ICBC Technology Co Ltd filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211555649.0A priority Critical patent/CN116112173A/en
Publication of CN116112173A publication Critical patent/CN116112173A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a method and a device for verifying image files in a bank credit wind control scene, which can be used in the financial field or other technical fields, and the method comprises the following steps: acquiring an image file compression packet sent by a channel side; determining physical verification for the image file compression package; after the physical verification is passed, carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package; and after the file anti-counterfeiting verification and the file data verification pass, signing and accepting signature is carried out on the image file, and the image file after signing and accepting signature is uploaded to a preset image platform. The invention realizes closed loop verification of loan contract image files, manages and controls risks of image files related to interaction with a third party system, and reduces loan reject ratio and potential legal disputes.

Description

Method and device for verifying image file in bank credit wind control scene
Technical Field
The invention relates to the field of credit wind control, in particular to a method and a device for verifying an image file in a bank credit wind control scene.
Background
In the process of carrying out credit operation by banks, financing business is carried out through third party channels (channel parties), such as supply chain insurance business, financing application business can be initiated by means of channels such as a bank enterprise banking end, a third party supply chain platform, a core enterprise ERP system and the like, corresponding image files are submitted to credit together with the financing instruction while the credit is entered, and the image files comprise credit investigation and authorization books, borrowing contracts, withdrawal notices, credit investigation and resolution, business license and other image files. However, at present, the verification of the image files is often performed manually, and a verifier needs to examine and examine each image file one by one to see whether the image files meet the requirements, which is time-consuming and laborious and has the risk of misjudgment caused by human negligence. The prior art lacks a scheme for verifying the credit image file sent by the channel side more efficiently and accurately.
Disclosure of Invention
The invention provides a method and a device for verifying an image file in a bank credit wind control scene, which aim to solve at least one technical problem in the background art.
In order to achieve the above object, according to one aspect of the present invention, there is provided a method for verifying an image file in a banking credit wind control scene, the method comprising:
acquiring an image file compression packet sent by a channel side;
determining physical verification for the image file compression package;
after the physical verification is passed, carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package;
and after the file anti-counterfeiting verification and the file data verification pass, signing and accepting signature is carried out on the image file, and the image file after signing and accepting signature is uploaded to a preset image platform.
Optionally, the method for verifying the image file in the bank credit wind control scene further comprises the following steps:
when receiving an image verification request sent by the channel side, carrying out access authentication on the channel side;
and after the access authentication is passed, storing the image file compression packet corresponding to the image verification request into a local temporary storage area.
Optionally, the determining physical verification on the image file compression packet specifically includes:
performing MD5 verification on the image file compression packet;
and carrying out anti-compression package bomb verification on the image file compression package.
Optionally, performing file anti-counterfeiting verification on the image file in the image file compression package specifically includes:
and verifying the electronic signature of each image file.
Optionally, performing file anti-counterfeiting verification on the image file in the image file compression package specifically includes:
extracting a file signing sequence from the image file;
and verifying the signing sequence of the file.
Optionally, the verifying the file data of the image file in the image file compression packet specifically includes:
extracting business data from the image file;
and verifying the service data.
Optionally, the obtaining the compressed package of the image file sent by the channel side specifically includes:
and acquiring the image file compression package from the local temporary storage area.
In order to achieve the above object, according to another aspect of the present invention, there is provided an image file verification apparatus in a banking credit wind control scene, the apparatus comprising:
the image file compression package acquisition unit is used for acquiring an image file compression package sent by a channel side;
the compressed package physical verification unit is used for determining physical verification for the image file compressed package;
the file verification unit is used for carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package after the physical verification is passed;
and the signature storage unit is used for signing and accepting the signature on the image file after the file anti-counterfeiting verification and the file data verification pass, and uploading the image file after signing and accepting the signature to a preset image platform.
In order to achieve the above object, according to another aspect of the present invention, there is also provided a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the image file verification method in the bank credit wind control scenario described above when the computer program is executed.
To achieve the above object, according to another aspect of the present invention, there is also provided a computer-readable storage medium having stored thereon a computer program/instruction which, when executed by a processor, implements the steps of the image file verification method in a bank credit wind control scenario described above.
To achieve the above object, according to another aspect of the present invention, there is also provided a computer program product comprising computer program/instructions which, when executed by a processor, implement the steps of the method for verifying an image file in a banking credit wind control scenario described above.
The beneficial effects of the invention are as follows:
the method comprises the steps of firstly determining physical verification of the image file compression package, carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package after the physical verification is passed, signing and accepting signature on the image file after the file anti-counterfeiting verification and the file data verification are passed, and uploading the image file after signing and accepting signature to a preset image platform. The invention can efficiently and accurately verify the credit image file sent by the channel side, realizes closed loop verification of the loan contract image file, manages and controls risks of the image file related to the interaction process with the third party system, and reduces the bad rate of loan and potential legal disputes.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. In the drawings:
FIG. 1 is a first flowchart of a method for verifying an image file in a bank credit wind control scenario according to an embodiment of the present invention;
FIG. 2 is a second flowchart of an image file verification method in a bank credit wind control scenario according to an embodiment of the present invention;
FIG. 3 is a third flowchart of a method for verifying an image file in a bank credit wind control scenario according to an embodiment of the present invention;
FIG. 4 is a fourth flowchart of a method for verifying an image file in a bank credit wind control scenario according to an embodiment of the present invention;
FIG. 5 is a fifth flowchart of a method for verifying an image file in a bank credit wind control scenario according to an embodiment of the present invention;
FIG. 6 is a schematic view of a credit system receiving image channels;
FIG. 7 is a flow chart of the overall method of the present invention;
FIG. 8 is a schematic diagram of an external image verification request message structure;
FIG. 9 is a MD5 verification schematic;
FIG. 10 is an electronic signature verification schematic;
FIG. 11 is a schematic diagram of traffic data extraction;
FIG. 12 is a block diagram of an image file verification device in a bank credit wind control scenario according to an embodiment of the present invention;
FIG. 13 is a schematic diagram of a computer device according to an embodiment of the invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
It is noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of the present invention and in the foregoing figures, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, without conflict, the embodiments of the present invention and features of the embodiments may be combined with each other. The invention will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that, in the technical scheme of the application, the acquisition, storage, use, processing and the like of the data all conform to the relevant regulations of national laws and regulations.
It should be noted that the method and the device for verifying the image file in the bank credit wind control scene can be used in the financial field and can also be used in any field except the financial field, and the application field of the method and the device for verifying the image file in the bank credit wind control scene is not limited.
The verification of the image file in the bank credit wind control scene in the prior art has the following problems and defects:
1. and in the manual approval link, whether each image meets the requirements or not needs to be approved one by one, the time and effort are consumed, the risk of misjudgment caused by human negligence exists, and an auxiliary auditing tool is lacked.
2. The automatic approval link is usually simply used for judging whether an image file and a corresponding image type exist or not, but does not further check whether the content of the image file and the current financing application are adapted or not, and a certain approval vulnerability exists.
3. File transmission links, such as pictures and pdf files, have the possibility of being tampered in the financing initiation or transmission process.
4. Signature image files, such as electronic signatures, may not be the subject of the present financing application for the file signer information.
5. And after the credit system receives the image file, the credit is transferred to a storage or submitting image platform, and the acceptance label is absent, so that hidden danger that the image file is replaced exists.
As shown in fig. 6, in the prior art, a simple image interface is used for docking, so as to directly receive a request message and an image file, and after decompression, the request message and the image file are directly transferred to be stored or submitted to an image platform. The disadvantages of the prior art are:
1. MD5 verification is not performed on the image file, and the risk of man-in-the-middle attack tampering exists.
2. Without zip bomb verification on the image file, bandwidth-saving compressed zip transmissions may present a risk of the zip bomb causing a disk explosion of the application server.
3. The image file has been electronically signed, but it has not been verified whether the signature entity is the current credit financing entity.
4. The image file is often a contract text output by credit, and after the contract text receives a signature, whether the contract text is tampered and replaced or not lacks verification anti-counterfeiting.
5. The image contract file and the key business data verification such as interest rate, money amount, repayment date, and information way need to be matched with the present credit financing application.
6. The lack of credit acceptance image files for signature verification directly stores or submits to a third party image platform, and the possibility of being tampered and replaced exists.
The invention relates to a method and a device for automatically checking image files, which are suitable for a bank credit wind control scene, and mainly solve a series of problems that key image files such as warranty borrowing contracts, credit investigation and authorization books and the like possibly exist such as illegal signature bodies, tampered and replaced image files, no signature checking after the image files are received and the like when a third party channel applies for a credit financing service to a bank.
Fig. 7 is a flowchart of the whole method of the present invention, and as shown in fig. 7, the method for verifying an image file in a bank credit wind control scene of the present invention specifically includes: access authentication, physical verification, logical verification, signature reception and image uploading platform.
Fig. 1 is a first flowchart of a method for verifying an image file in a bank credit wind control scenario according to an embodiment of the present invention, as shown in fig. 1, in an embodiment of the present invention, the method for verifying an image file in a bank credit wind control scenario includes steps S101 to S104.
Step S101, obtaining an image file compression packet sent by a channel side.
Step S102, determining physical verification for the image file compression package.
This step is mainly directed to some hard checks of the file itself.
And step S103, after the physical verification is passed, carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package.
The step is mainly to verify from the aspect of whether the actual service needs are met.
Step S104, after the file anti-counterfeiting verification and the file data verification pass, signing and accepting signatures are added to the image file, and the image file after signing and accepting signatures is uploaded to a preset image platform.
As shown in fig. 2, in one embodiment of the present invention, the method for verifying an image file in a banking credit wind control scenario further includes steps S201 to S202.
Step S201, when receiving the image verification request sent by the channel side, performing access authentication on the channel side.
When the invention receives the image verification request sent by the external channel side, authentication processing is firstly carried out, wherein the authentication processing comprises user name and password, request decryption and analysis, and the key message structure is shown in figure 8. The input file list message covers key information required by MD5 verification, electronic signature verification, anti-counterfeiting verification and business data verification.
Step S202, after the access authentication is passed, storing the image file compression packet corresponding to the image verification request in a local temporary storage area.
In one embodiment of the present invention, the image file compression packet sent by the obtaining channel side in the step S101 specifically includes:
and acquiring the image file compression package from the local temporary storage area.
As shown in fig. 3, in one embodiment of the present invention, the determining physical verification for the compressed package of the image file in the step S102 specifically includes a step S301 and a step S302.
Step S301, performing MD5 verification on the compressed video file packet.
As shown in fig. 9, MD5 is a popular message digest algorithm that can produce 128 bits of three inferior quality and can be used to confirm the consistency of message transmission, and the image file does not need to be verified by a strict encryption algorithm like the user password.
In one embodiment of the present invention, the present invention performs MD5 verification not only on the image file compression package, but also on each image file in the image file compression package.
Step S302, anti-compression package bomb verification is conducted on the image file compression package.
In one embodiment of the present invention, the image file compression packet of the present invention is a Zip compression packet. The present invention requires anti-compaction packet bomb verification (i.e., zip bomb verification). Zip frying refers to a compressed file with high compression ratio, although a credit system and the like possibly take a limiting measure on the uploading size of the file, when a file with high compression ratio reaches the credit system and the like, the file is recursively decompressed in the background, so that the file such as a CPU, a memory, a disk and the like continuously operates under high load, and a DDOS denial of service attack effect is generated.
In one embodiment of the present invention, the step S103 of performing file anti-counterfeit verification on the image file in the image file compression package specifically includes:
and verifying the electronic signature of each image file.
In one embodiment of the present invention, the image file of the present invention is specifically a PDF file. Fig. 10 is a schematic diagram of electronic signature verification, in which, based on a PDF file, a Hash algorithm and an encryption algorithm are utilized to realize a PDF file signature, so as to realize the tamper-proof characteristic of the PDF file, and the current PDF electronic signature technology belongs to the industry general technology.
As shown in fig. 4, in one embodiment of the present invention, the step S103 performs the file anti-counterfeit verification on the image file in the compressed package of the image file, and specifically includes step S401 and step S402.
Step S401, extracting the document signing order from the image document.
Step S402, verifying the document signing sequence.
Assuming that the original PDF text of the contract is provided by a credit and other business systems, and then transmitted to related platform parties through interfaces, such as an enterprise network bank, a certain supply chain platform, a certain core enterprise ERP system and the like, the circulation sequence is always fixed, and the file is finally returned to the credit system after being signed, so that the closed loop is completed.
The document signing sequence is based on the circulation party signing verification principle, and takes an online banking as an example, and the sequence is as follows:
original sign (system sign), credit system outputs PDF original text, namely initial sign
The credit system outputs PDF business contracts, namely the business labels of the line parties
The system signature is a receipt signature of the internet banking system, and represents the internet banking system level signature.
Transaction signature (business signature), the financing enterprise operates the signature at the bank end, representing the completion of the transaction.
Check-in (system check) and after transaction is completed, the credit system receives and adds the check-in to complete closed loop
The sequence is a fixed execution sequence, and once the intermediate link sequence is not matched or missing, the financing application is denied.
The invention can extract the document signing sequence from the image document by an open source Java item 5 tool, thereby verifying the document signing sequence.
As shown in fig. 5, in one embodiment of the present invention, the step S103 performs file data verification on the image file in the image file compression package, and specifically includes step S501 and step S502.
In step S501, service data is extracted from the image file.
Step S502, the service data is verified.
File data verification is mainly based on the reasonability of PDF file service data, solves the problems of tampering of service data or unmatched current financing application and the like, and is exemplified by: the PDF contract original should be the corresponding value under normal conditions, namely 100 ten thousand of financing application, 4.45% of LPR (line cost per minute) interest rate, 4.45% of floating base point-20 and 360 periods of period, but due to the fact that the transaction link is separated from the credit system, after the PDF signing flow returns to the credit system, the key contract elements are possibly tampered, such as floating point number-30, and legal disputes are extremely easy to cause.
The file data verification is realized as follows:
1. and verifying a key coordinate, namely reading the horizontal and vertical coordinates of the pdf file key word by means of an open source Java item 5 tool in a key word form, and matching with the horizontal and vertical coordinate values preset in a system, wherein an error value threshold can be customized, and the error value mainly solves the problem that the text is moved out after being longer, for example.
2. And (3) verifying the key data, namely performing accuracy verification on the key data, and after reading the pdf key value, performing grabbing matching with the approved flow business data of the credit system, wherein the example is shown in fig. 11.
The invention scans the appointed content in PDF file through the pre-input key value, front sentence and rear sentence, analyzes the content between the broken sentences, and performs matching check with the recorded value of the system database, if the check is not matched, the financing application is carried out this time, the paying operation is overrule, and the instruction is returned to be confirmed by the client manager.
In one embodiment of the present invention, the present invention may convert the image file into text first, and then extract the service data from the text based on a preset regular expression for service data extraction.
Compared with the prior art, the method for verifying the image file in the bank credit wind control scene has the following advantages:
1. and the management and control are enhanced, the closed loop verification of the contract image file is realized, the risk management and control are carried out on the image file related to the interaction process with the third party system, and the loan reject ratio and the potential legal dispute are reduced.
2. The security is enhanced, and the security management and control are carried out from the main links of initiation, transmission, transaction, acceptance and the like, so that the verification blank of the third-party channel for receiving the traditional credit image is made up.
3. The invention is easy to expand, is relatively independent, and can enrich the wind control verification rules of the image file based on different service scenes, thereby providing the automatic verification service of the image file for credit and other service systems.
4. The efficiency is improved, and the method is used as an auxiliary tool for the client manager to examine and approve the contract image, so that the examination and approval accuracy and examination and approval efficiency are further improved.
5. Unified standards, image files, especially critical contract text image automated verification, provide standardized automated verification models or specifications.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Based on the same inventive concept, the embodiment of the invention also provides an image file verification device in the bank credit wind control scene, which can be used for realizing the image file verification method in the bank credit wind control scene described in the above embodiment, as described in the following embodiment. Because the principle of solving the problem of the image file verification device in the bank credit wind control scene is similar to that of the image file verification method in the bank credit wind control scene, the embodiment of the image file verification device in the bank credit wind control scene can be referred to the embodiment of the image file verification method in the bank credit wind control scene, and the repetition is omitted. As used below, the term "unit" or "module" may be a combination of software and/or hardware that implements the intended function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 12 is a block diagram of a device for verifying an image file in a banking and credit wind control scenario according to an embodiment of the present invention, as shown in fig. 12, in one embodiment of the present invention, the device for verifying an image file in a banking and credit wind control scenario according to the present invention includes:
an image file compression packet acquisition unit 1 for acquiring an image file compression packet transmitted by a channel side;
the compressed package physical verification unit 2 is used for determining physical verification for the image file compressed package;
the file verification unit 3 is used for carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package after the physical verification is passed;
and the signature storage unit 4 is used for signing and accepting signatures on the image files after the file anti-counterfeiting verification and the file data verification pass, and uploading the image files after signing and accepting signatures to a preset image platform.
In one embodiment of the present invention, the image file verification device in the banking credit wind control scene of the present invention further includes:
the access authentication unit is used for carrying out access authentication on the channel side when receiving the image verification request sent by the channel side;
and the temporary storage unit is used for storing the image file compression packet corresponding to the image verification request to a local temporary storage area after the access authentication is passed.
In one embodiment of the present invention, the compressed packet physical verification unit 2 specifically includes:
the MD5 checking module is used for performing MD5 checking on the image file compression packet;
and the anti-compression package bomb checking module is used for carrying out anti-compression package bomb checking on the image file compression package.
In one embodiment of the present invention, the document authentication unit 3 specifically includes:
and the electronic signature verification module is used for verifying the electronic signature of each image file.
In one embodiment of the present invention, the document authentication unit 3 specifically includes:
the file signing order acquisition module is used for extracting a file signing order from the image file;
and the file signing order verification module is used for verifying the file signing order.
In one embodiment of the present invention, the document authentication unit 3 specifically includes:
the service data extraction module is used for extracting service data from the image file;
and the service data verification module is used for verifying the service data.
In one embodiment of the present invention, the image file compression package obtaining unit 1 is specifically configured to obtain the image file compression package from the local temporary storage area.
To achieve the above object, according to another aspect of the present application, there is also provided a computer apparatus. As shown in fig. 13, the computer device includes a memory, a processor, a communication interface, and a communication bus, on which a computer program executable on the processor is stored, which processor implements the steps of the method of the embodiments described above when executing the computer program.
The processor may be a central processing unit (Central Processing Unit, CPU). The processor may also be any other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof.
The memory is used as a non-transitory computer readable storage medium for storing non-transitory software programs, non-transitory computer executable programs, and units, such as corresponding program units in the above-described method embodiments of the invention. The processor executes the various functional applications of the processor and the processing of the composition data by running non-transitory software programs, instructions and modules stored in the memory, i.e., implementing the methods of the method embodiments described above.
The memory may include a memory program area and a memory data area, wherein the memory program area may store an operating system, at least one application program required for a function; the storage data area may store data created by the processor, etc. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory may optionally include memory located remotely from the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more units are stored in the memory, which when executed by the processor, performs the method in the above embodiments.
The details of the computer device may be correspondingly understood by referring to the corresponding relevant descriptions and effects in the above embodiments, and will not be repeated here.
To achieve the above object, according to another aspect of the present application, there is also provided a computer readable storage medium storing a computer program which, when executed in a computer processor, implements the steps in the image file verification method in the bank credit wind control scenario described above. It will be appreciated by those skilled in the art that implementing all or part of the above-described embodiment method may be implemented by a computer program to instruct related hardware, where the program may be stored in a computer readable storage medium, and the program may include the above-described embodiment method when executed. Wherein the storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a random access Memory (RandomAccessMemory, RAM), a Flash Memory (Flash Memory), a Hard Disk (HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
To achieve the above object, according to another aspect of the present application, there is also provided a computer program product, including a computer program/instruction, which when executed by a processor, implements the steps of the image file verification method in a bank credit wind control scenario described above.
It will be apparent to those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, or they may alternatively be implemented in program code executable by computing devices, such that they may be stored in a memory device for execution by the computing devices, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps within them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (11)

1. The method for verifying the image file in the bank credit wind control scene is characterized by comprising the following steps of:
acquiring an image file compression packet sent by a channel side;
determining physical verification for the image file compression package;
after the physical verification is passed, carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package;
and after the file anti-counterfeiting verification and the file data verification pass, signing and accepting signature is carried out on the image file, and the image file after signing and accepting signature is uploaded to a preset image platform.
2. The method for verifying an image file in a banking credit wind control scenario as defined in claim 1, further comprising:
when receiving an image verification request sent by the channel side, carrying out access authentication on the channel side;
and after the access authentication is passed, storing the image file compression packet corresponding to the image verification request into a local temporary storage area.
3. The method for verifying an image file in a banking credit wind control scene according to claim 1, wherein the determining physical verification of the image file compression package specifically comprises:
performing MD5 verification on the image file compression packet;
and carrying out anti-compression package bomb verification on the image file compression package.
4. The method for verifying an image file in a banking credit wind control scene according to claim 1, wherein the verifying an image file in the image file compression package against counterfeiting of the image file comprises:
and verifying the electronic signature of each image file.
5. The method for verifying an image file in a banking credit wind control scene according to claim 1, wherein the verifying an image file in the image file compression package against counterfeiting of the image file comprises:
extracting a file signing sequence from the image file;
and verifying the signing sequence of the file.
6. The method for verifying an image file in a banking credit wind control scene according to claim 1, wherein the verifying the image file in the image file compression package comprises:
extracting business data from the image file;
and verifying the service data.
7. The method for verifying an image file in a banking credit wind control scene according to claim 2, wherein the acquiring an image file compression packet sent by a channel party specifically comprises:
and acquiring the image file compression package from the local temporary storage area.
8. An image file verification device in a bank credit wind control scene is characterized by comprising:
the image file compression package acquisition unit is used for acquiring an image file compression package sent by a channel side;
the compressed package physical verification unit is used for determining physical verification for the image file compressed package;
the file verification unit is used for carrying out file anti-counterfeiting verification and file data verification on the image file in the image file compression package after the physical verification is passed;
and the signature storage unit is used for signing and accepting the signature on the image file after the file anti-counterfeiting verification and the file data verification pass, and uploading the image file after signing and accepting the signature to a preset image platform.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 7 when the computer program is executed by the processor.
10. A computer readable storage medium having stored thereon a computer program/instruction, which when executed by a processor, implements the steps of the method of any of claims 1 to 7.
11. A computer program product comprising computer programs/instructions which, when executed by a processor, implement the steps of the method of any of claims 1 to 7.
CN202211555649.0A 2022-12-06 2022-12-06 Method and device for verifying image file in bank credit wind control scene Pending CN116112173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211555649.0A CN116112173A (en) 2022-12-06 2022-12-06 Method and device for verifying image file in bank credit wind control scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211555649.0A CN116112173A (en) 2022-12-06 2022-12-06 Method and device for verifying image file in bank credit wind control scene

Publications (1)

Publication Number Publication Date
CN116112173A true CN116112173A (en) 2023-05-12

Family

ID=86266571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211555649.0A Pending CN116112173A (en) 2022-12-06 2022-12-06 Method and device for verifying image file in bank credit wind control scene

Country Status (1)

Country Link
CN (1) CN116112173A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117745396A (en) * 2023-12-27 2024-03-22 江苏金融租赁股份有限公司 Electronic contract signing method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117745396A (en) * 2023-12-27 2024-03-22 江苏金融租赁股份有限公司 Electronic contract signing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US10942994B2 (en) Multicomputer processing for data authentication using a blockchain approach
US11159537B2 (en) Multicomputer processing for data authentication and event execution using a blockchain approach
KR101952498B1 (en) Loan service providing method using black chain and system performing the same
CN108009445B (en) Semi-centralized trusted data management system
CN111133734A (en) Block chain based decision execution
US8700721B2 (en) Method and system for electronic delivery of essential mail items
KR102241246B1 (en) A stamp authority system based on blockchain for verifying the authenticity of issued documents
US10728036B2 (en) Cryptographically linking related events processed across multiple processing systems
KR20190125683A (en) System and method for verifying forgery of contract information or legal information based on block chain
CN111897770A (en) Method and system for initiating litigation request
CN113343313A (en) Verification report validity identification method, legal service system and readable storage medium
CN116112173A (en) Method and device for verifying image file in bank credit wind control scene
CN113515781B (en) Electronic insurance letter verification method and device
CN115731056A (en) Method for protecting insurance claim settlement report information
CN113688418B (en) Engineering order settlement method and system based on blockchain data storage
Oladejo Blockchain technology: Disruptor or enhancer to the accounting and auditing profession
CN112598502A (en) Evidence obtaining method, device, equipment and storage medium
US7818256B1 (en) Digital receipt for electronic data and methods and systems for generating same
KR20200128250A (en) System and method for providing contract platform service based on block chain
CN113592625A (en) Credit report generation method and device and electronic equipment
CN112115423A (en) Electronic notarization information processing method, device, system, equipment and storage medium
US20230362013A1 (en) Systems and methods for token authentication
CN114358767A (en) Data transaction flow compliance notarization method and device, electronic equipment and storage medium
CN114240399A (en) Government affair data processing method and system based on block chain platform
CN107566410A (en) A kind of data save message request treating method and apparatus from damage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination