CN116703576A - Trade detection method and device, storage medium and electronic equipment - Google Patents

Trade detection method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN116703576A
CN116703576A CN202310458028.9A CN202310458028A CN116703576A CN 116703576 A CN116703576 A CN 116703576A CN 202310458028 A CN202310458028 A CN 202310458028A CN 116703576 A CN116703576 A CN 116703576A
Authority
CN
China
Prior art keywords
data set
target
information
logistics
trade
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310458028.9A
Other languages
Chinese (zh)
Inventor
李冠彬
雷斌
欧少焕
黄思创
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310458028.9A priority Critical patent/CN116703576A/en
Publication of CN116703576A publication Critical patent/CN116703576A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a trade detection method, a trade detection device, a storage medium and electronic equipment. Relates to the field of financial science and technology and other related technical fields, and the method comprises the following steps: receiving a collecting request of target trade initiated by a target transaction platform, and extracting first payment information and first logistics information in the collecting request; processing the first payment information according to a first preset rule to obtain a first data set; processing the first logistics information according to a second preset rule to obtain a second data set; acquiring a third data set and a fourth data set; judging whether the third data set contains the first data set or not, and judging whether the fourth data set contains the second data set or not; in the case where the third data set comprises the first data set and the fourth data set comprises the second data set, the targeted trade is determined to pass the authenticity detection. The application solves the problem that the data leakage risk exists in the authenticity detection in the related technology.

Description

Trade detection method and device, storage medium and electronic equipment
Technical Field
The application relates to the field of financial science and technology and other related technical fields, in particular to a trade detection method, a trade detection device, a storage medium and electronic equipment.
Background
The cross-border e-commerce method for trade through the e-commerce platform gradually replaces the traditional trade method, and the cross-border e-commerce method becomes a new engine for social economic growth. In the related art, when the business bank transacts the export collection business for the cross-border e-commerce business, trade authenticity check needs to be carried out on the collection business, namely, the source of the collection funds of the e-commerce platform is ensured to be real export trade. However, the process of trade authenticity checking involves order, payment and logistics information collision, and data sharing is required for all parties such as e-commerce websites, payment institutions, logistics enterprises and the like, so that privacy leakage risks exist.
Aiming at the problem that the data leakage risk exists in the authenticity detection in the related technology, no effective solution is proposed at present.
Disclosure of Invention
The application mainly aims to provide a trade detection method, a trade detection device, a storage medium and electronic equipment, so as to solve the problem that data leakage risks exist in the authenticity detection in the related technology.
In order to achieve the above object, according to one aspect of the present application, there is provided a method of detecting trade. The method comprises the following steps: receiving a collection request of target trade initiated by a target trading platform, and extracting first payment information and first logistics information in the collection request, wherein the first payment information is payment information when the target trading platform executes the target trade, and the first logistics information is logistics information when the target trading platform executes the target trade; processing the first payment information according to a first preset rule to obtain a first data set; processing the first logistics information according to a second preset rule to obtain a second data set; acquiring a third data set from the foreign exchange payment mechanism and acquiring a fourth data set from the foreign exchange payment mechanism, wherein the third data set is obtained by processing second payment information through a first preset rule by the foreign exchange payment mechanism, the fourth data set is obtained by processing second stream information through a second preset rule by the logistics platform, the second payment information is payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is logistics information of a plurality of transaction platforms stored by the logistics platform; judging whether the third data set contains the first data set or not, and judging whether the fourth data set contains the second data set or not; in the case where the third data set comprises the first data set and the fourth data set comprises the second data set, the targeted trade is determined to pass the authenticity detection.
Optionally, after determining whether the third data set includes the first data set and determining whether the fourth data set includes the second data set, the method further includes: determining that the target trade fails the authenticity detection if the third data set does not contain the first data set and/or the fourth data set does not contain the second data set; sending out prompt information for prompting the failure of target trade processing; re-carrying out authenticity detection on the target trade based on the prompt information, and receiving an authenticity detection modification instruction under the condition that the target trade passes the authenticity detection; and modifying the target trade failing the authenticity detection to the target trade passing the authenticity detection based on the authenticity detection modification instruction.
Optionally, processing the first payment information according to a first preset rule, and obtaining the first data set includes: extracting the order number and the payment list number of each payment detail from the first payment information, and combining the order number and the payment list number of each payment detail according to a first combination rule to obtain a group of first target character strings; respectively carrying out hash operation on a group of first target character strings to obtain a group of first hash values; and encrypting a group of first hash values through the public key in the target key pair respectively to obtain a first data set.
Optionally, processing the first logistics information according to a second preset rule to obtain a second data set includes: extracting order numbers and logistics list numbers of each logistics list from the first logistics information, and combining the order numbers and the logistics list numbers of each logistics list according to a second combination rule to obtain a group of second target character strings; respectively carrying out hash operation on a group of second target character strings to obtain a group of second hash values; and encrypting a group of second hash values through the public key in the target key pair respectively to obtain a second data set.
Optionally, obtaining the target payment information from the foreign exchange payment mechanism according to the transaction period and the platform information of the target transaction platform comprises: determining a transaction period of target trade, and transmitting the transaction period and platform information of a target transaction platform to a foreign exchange payment mechanism; controlling a foreign exchange payment mechanism to determine first payment information from a payment information set based on the transaction period and the platform information; and sending the first payment information to the target transaction platform.
Optionally, before receiving the sink request of the target trade initiated by the target trading platform, the method further comprises: determining a trading period of target trade, and sending the trading period and platform information of a target trading platform to a logistics platform; controlling a logistics platform to determine first logistics information from a logistics information set based on the transaction period and the platform information; and sending the first logistics information to a target transaction platform.
Optionally, before determining whether the third data set comprises the first data set and determining whether the fourth data set comprises the second data set, the method further comprises: verifying digital signatures on the third data set and the fourth data set through public keys in the target key pair, wherein the digital signatures are obtained by signing the third data set and the third data set through private keys in the target key pair; in the case that the digital signature verification is passed, the step of judging whether the third data set contains the first data set and judging whether the fourth data set contains the second data set is performed.
In order to achieve the above object, according to another aspect of the present application, there is provided a transaction detection device. The device comprises: the receiving unit is used for receiving a collection request of target trade initiated by the target trading platform, extracting first payment information and first logistics information in the collection request, wherein the first payment information is payment information when the target trading platform executes the target trade, and the first logistics information is logistics information when the target trading platform executes the target trade; the extraction unit is used for processing the first payment information according to a first preset rule to obtain a first data set; the first acquisition unit is used for processing the first logistics information according to a second preset rule to obtain a second data set; the second acquisition unit is used for acquiring a third data set from the foreign exchange payment mechanism and acquiring a fourth data set from the physical distribution platform, wherein the third data set is obtained by the foreign exchange payment mechanism through processing second payment information by a first preset rule, the fourth data set is obtained by the physical distribution platform through processing second stream information by a second preset rule, the second payment information is the payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is the logistics information of a plurality of transaction platforms stored by the physical distribution platform; a judging unit, configured to judge whether the third data set includes the first data set, and judge whether the fourth data set includes the second data set; a first determining unit for determining that the target trade passes the authenticity detection in case the third data set comprises the first data set and the fourth data set comprises the second data set.
According to the application, the following steps are adopted: receiving a collection request of target trade initiated by a target trading platform, and extracting first payment information and first logistics information in the collection request, wherein the first payment information is payment information when the target trading platform executes the target trade, and the first logistics information is logistics information when the target trading platform executes the target trade; processing the first payment information according to a first preset rule to obtain a first data set; processing the first logistics information according to a second preset rule to obtain a second data set; acquiring a third data set from the foreign exchange payment mechanism and acquiring a fourth data set from the foreign exchange payment mechanism, wherein the third data set is obtained by processing second payment information through a first preset rule by the foreign exchange payment mechanism, the fourth data set is obtained by processing second stream information through a second preset rule by the logistics platform, the second payment information is payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is logistics information of a plurality of transaction platforms stored by the logistics platform; judging whether the third data set contains the first data set or not, and judging whether the fourth data set contains the second data set or not; in the case that the third data set comprises the first data set and the fourth data set comprises the second data set, determining that the target trade passes the authenticity detection solves the problem that the authenticity detection in the related art has a data leakage risk. The trade detection system and the foreign exchange payment mechanism process target payment information according to the agreed first preset rule to obtain a first data set and a third data set, the trade detection system and the logistics platform process target logistics information according to the agreed second preset rule to obtain a second data set and a fourth data set, whether the third data set contains the first data set or not, whether the fourth data set contains the second data set or not determines whether target trade passes through authenticity detection or not, and further the effect of avoiding data leakage during authenticity detection is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 is a flow chart of a method of detecting trade provided in accordance with an embodiment of the present application;
FIG. 2 is a block diagram of a detection system for trade provided in accordance with an embodiment of the present application;
FIG. 3 is a schematic diagram of a transaction detection device provided in accordance with an embodiment of the present application;
fig. 4 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for presentation, analyzed data, etc.) related to the present disclosure are information and data authorized by the user or sufficiently authorized by each party.
The application is described below in connection with preferred implementation steps, and fig. 1 is a flowchart of a method for detecting trade according to an embodiment of the application, where the method is applied to a trade detection system, and the trade detection system includes a service operation terminal, a receiving and collecting service acceptance server, a trade authenticity checking server, an e-commerce platform server, a payment mechanism server, a logistics enterprise server, and a data encryption server. As shown in fig. 1, the method comprises the steps of:
Step S101, receiving a collection request of target trade initiated by a target trading platform, and extracting first payment information and first logistics information in the collection request, wherein the first payment information is payment information when the target trading platform executes the target trade, and the first logistics information is logistics information when the target trading platform executes the target trade.
Specifically, fig. 2 is a block diagram of a trade detection system provided according to an embodiment of the present application, and as shown in fig. 2, the trade detection system includes a service operation terminal 201, a sink service acceptance server 202, a trade authenticity check server 203, an e-commerce platform server 204, a payment mechanism server 205, a logistics enterprise server 206, and a data encryption server 207. The target transaction platform may be an e-commerce platform server 204, and the target trade may be a cross-border trade which is processed by the e-commerce platform server 204 and needs to be received, and the target trade of the e-commerce platform server 204 needs to carry out authenticity detection when a business bank handles a receiving business. The authenticity detection process firstly receives a sink request initiated by the e-commerce platform server 204 to the sink service acceptance server 202, and extracts first payment information and first logistics information in the sink request.
It should be noted that, the target transaction platform may also initiate a sink request through a third party, for example, a special foreign trade integrated service enterprise, and the third party platform forwards the sink request to the sink service acceptance server 202.
Step S102, processing the first payment information according to a first preset rule to obtain a first data set.
Specifically, the first preset rule may be a rule that is agreed by the detection system of trade and the foreign exchange payment mechanism to process payment information, and the trade authenticity checking server 203 processes the first payment information based on the first preset rule to obtain the first data set.
And step S103, processing the first logistics information according to a second preset rule to obtain a second data set.
Specifically, the second preset rule may be a rule that is agreed by the detection system of trade and the logistics platform and is used for processing the first logistics information, and the trade authenticity checking server 203 processes the first logistics information based on the second preset rule to obtain the second data set.
Step S104, a third data set is obtained from the foreign exchange payment mechanism, and a fourth data set is obtained from the foreign exchange payment mechanism through processing second payment information according to a first preset rule, the fourth data set is obtained from the logistics platform through processing second stream information according to a second preset rule, the second payment information is payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is logistics information of a plurality of transaction platforms stored by the logistics platform.
In particular, the payment mechanism server 205 may be a foreign exchange payment mechanism responsible for payment processing of online commerce. The payment mechanism server 205 extracts the order number and the payment order number of each payment detail from the second payment information of the database, and combines the order number and the payment order number of each payment detail according to the first combination rule to obtain a group of third target character strings; respectively carrying out hash operation on a group of third target character strings to obtain a group of third hash values; the set of third hash values is sent to the data encryption server 207, and the set of third hash values is encrypted by the public key of the target key pair, respectively, to obtain a third data set. The trade authenticity check server 203 obtains the third data set from the payment authority server 205.
The logistics platform may be a logistics enterprise server 206, the logistics enterprise server 206 extracts the order number and the logistics list number of each logistics detail from the first logistics information, and combines the order number and the logistics list number of each logistics detail according to a second combination rule to obtain a group of fourth target character strings; respectively carrying out hash operation on a group of fourth target character strings to obtain a group of fourth hash values; the set of fourth hash values is sent to the data encryption server 207, and the set of fourth hash values is encrypted by the public key of the target key pair, respectively, to obtain a fourth data set. The trade authenticity check server 203 obtains the fourth set of data from the stream enterprise server 206.
It should be noted that, the data encryption server 207 belongs to a public platform, for example, is built by a government or a non-profit department, and is specially used for receiving hash value sets generated by various parties such as an e-commerce platform, a foreign exchange payment mechanism, a logistics platform and the like, encrypting the hash values in the sets (public key encryption) by using an asymmetric algorithm (such as RSA), and replying the encrypted data sets to the requesting party, and the specific data format replied can be { "hash value 1": "ciphertext 1", "hash value 2": "ciphertext 2", }, so that the requesting party obtains the relation between the hash value and the ciphertext, thus after completing the ciphertext collision, the hash value corresponding to the ciphertext that has been successfully collided can be obtained, and since the data received by the data encryption server 207 is the hash value set generated by various parties, plaintext data is not stored per se, so that the risk of data leakage cannot be increased.
Step S105, determining whether the third data set includes the first data set, and determining whether the fourth data set includes the second data set.
Specifically, since the trade authenticity checking server 203 and the payment authority server 205 are the target payment information processed according to the same first preset rule, it is only necessary to determine whether the third data set includes the first data set, and it is possible to determine whether the target payment information of the e-commerce platform server 204 exists in the payment authority server 205. Since the trade authenticity checking server 203 and the logistics enterprise server 206 are the target logistics information processed according to the same second preset rule, only the fourth data set needs to be judged whether the fourth data set contains the second data set, so that it can be determined whether the target logistics information of the e-commerce platform server 204 exists in the logistics enterprise server 206.
In step S106, in the case where the third data set contains the first data set and the fourth data set contains the second data set, it is determined that the target trade passes the authenticity detection.
Specifically, if the third data set includes the first data set and the fourth data set includes the second data set, which indicates that the target payment information of the e-commerce platform server 204 exists in the payment mechanism server 205, and the target logistics information of the e-commerce platform server 204 exists in the logistics enterprise server 206, it can be determined that the target trade passes the authenticity detection. The target trade passes the authenticity detection and then is subjected to subsequent processing such as money transfer, money transfer and the like through the collection business receiving server 202.
According to the method for detecting the trade, provided by the embodiment of the application, a collection request of the target trade initiated by the target trading platform is received, and first payment information and first logistics information in the collection request are extracted, wherein the first payment information is payment information when the target trading platform executes the target trade, and the first logistics information is logistics information when the target trading platform executes the target trade; processing the first payment information according to a first preset rule to obtain a first data set; processing the first logistics information according to a second preset rule to obtain a second data set; acquiring a third data set from the foreign exchange payment mechanism and acquiring a fourth data set from the foreign exchange payment mechanism, wherein the third data set is obtained by processing second payment information through a first preset rule by the foreign exchange payment mechanism, the fourth data set is obtained by processing second stream information through a second preset rule by the logistics platform, the second payment information is payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is logistics information of a plurality of transaction platforms stored by the logistics platform; judging whether the third data set contains the first data set or not, and judging whether the fourth data set contains the second data set or not; in the case that the third data set comprises the first data set and the fourth data set comprises the second data set, determining that the target trade passes the authenticity detection solves the problem that the authenticity detection in the related art has a data leakage risk. The trade detection system and the foreign exchange payment mechanism process target payment information according to the agreed first preset rule to obtain a first data set and a third data set, the trade detection system and the logistics platform process target logistics information according to the agreed second preset rule to obtain a second data set and a fourth data set, whether the third data set contains the first data set or not, whether the fourth data set contains the second data set or not determines whether target trade passes through authenticity detection or not, and further the effect of avoiding data leakage during authenticity detection is achieved.
In the method for detecting trade provided by the embodiment of the present application, after determining whether the third data set includes the first data set and determining whether the fourth data set includes the second data set, the method further includes: determining that the target trade fails the authenticity detection if the third data set does not contain the first data set and/or the fourth data set does not contain the second data set; sending out prompt information for prompting the failure of target trade processing; re-carrying out authenticity detection on the target trade based on the prompt information, and receiving an authenticity detection modification instruction under the condition that the target trade passes the authenticity detection; and modifying the target trade failing the authenticity detection to the target trade passing the authenticity detection based on the authenticity detection modification instruction.
Specifically, if the third data set does not include the first data set or the fourth data set does not include the second data set, it indicates that the first payment information of the e-commerce platform server 204 does not exist in the payment mechanism server 205, and the first logistics information of the e-commerce platform server 204 does not exist in the logistics enterprise server 206, that is, the target trade fails the authenticity detection. The trade authenticity check server 203 issues a notice that the notice target trade process fails. After receiving the prompt message, the banking staff inquires the trade authenticity checking progress and result of the target trade through the service operation terminal 201; and (3) re-carrying out authenticity detection on the target trade through manual data auditing, and if the target trade passes the authenticity detection through manual re-detection, carrying out manual intervention on the result that the target trade does not pass the authenticity detection, namely manually setting the detection result as passing detection. By carrying out secondary artificial authenticity detection on the target trade, the fact that the authenticity detection is not passed due to the reasons of system faults and the like is avoided.
In order to avoid data leakage, the target payment information is processed according to a first preset rule before data interaction, optionally, in the method for detecting trade provided by the embodiment of the present application, the processing of the first payment information according to the first preset rule, to obtain a first data set includes: extracting the order number and the payment list number of each payment detail from the first payment information, and combining the order number and the payment list number of each payment detail according to a first combination rule to obtain a group of first target character strings; respectively carrying out hash operation on a group of first target character strings to obtain a group of first hash values; and encrypting a group of first hash values through the public key in the target key pair respectively to obtain a first data set.
Specifically, the trade authenticity checking server 203 extracts information such as order numbers and payment order numbers in each payment detail from the first payment information, combines the information into a group of first target character strings according to a first combination rule, then respectively performs hash operation on the group of first target character strings to obtain a group of first hash values, sends the obtained group of first hash values to the data encryption server 207, and respectively encrypts the group of first hash values through a public key in a target key pair to obtain a first data set. By processing the target payment information in the trade authenticity checking server 203 according to the first preset rule, data leakage when the trade authenticity checking server 203 interacts data with the payment authority server 205 is avoided. Based on multiparty privacy exchange, trade authenticity checking is achieved on the premise that all parties do not share data, and privacy leakage risks are avoided to the greatest extent. And meanwhile, a neutral party data encryption server 207 is introduced to encrypt data, so that one party is prevented from acquiring the original data of the other party by using a brute force cracking method.
For example, the first combination rule may be in json standard format, and the generated string samples are { "orderID": "111111", "payID": "222222",... The hash operation can adopt MD5 algorithm to realize the calculation result of processing the character string into 128 bits.
In order to avoid data leakage, the target logistics information is processed according to a second preset rule before data interaction, optionally, in the method for detecting trade provided by the embodiment of the present application, the processing of the first logistics information according to the second preset rule, to obtain a second data set includes: extracting order numbers and logistics list numbers of each logistics list from the first logistics information, and combining the order numbers and the logistics list numbers of each logistics list according to a second combination rule to obtain a group of second target character strings; respectively carrying out hash operation on a group of second target character strings to obtain a group of second hash values; and encrypting a group of second hash values through the public key in the target key pair respectively to obtain a second data set.
Specifically, the trade authenticity checking server 203 extracts information such as order numbers and logistics list numbers in each logistics list from the second stream information, combines the information into a group of second target character strings according to a second combination rule, then respectively performs hash operation on the group of second target character strings to obtain a group of second hash values, sends the obtained group of second hash values to the data encryption server 207, and respectively encrypts the group of second hash values through a public key in the target key pair to obtain a second data set. By processing the target logistics information in the trade authenticity checking server 203 according to the second preset rule, data leakage when the trade authenticity checking server 203 interacts data with the logistics enterprise server 206 is avoided. Based on multiparty privacy exchange, trade authenticity checking is achieved on the premise that all parties do not share data, and privacy leakage risks are avoided to the greatest extent. And meanwhile, a neutral party data encryption server 207 is introduced to encrypt data, so that one party is prevented from acquiring the original data of the other party by using a brute force cracking method.
For example, the second combination rule may be in json standard format, with the generated string sample being { "orderID": "333333", "XID": "444444",... The hash operation can adopt MD5 algorithm to realize the calculation result of processing the character string into 128 bits.
In the method for detecting trade provided by the embodiment of the application, the target payment information is acquired from the foreign exchange payment mechanism according to the transaction period and the platform information of the target transaction platform, which comprises the following steps: determining a transaction period of target trade, and transmitting the transaction period and platform information of a target transaction platform to a foreign exchange payment mechanism; controlling a foreign exchange payment mechanism to determine first payment information from a payment information set based on the transaction period and the platform information; and sending the first payment information to the target transaction platform.
Specifically, the payment mechanism server 205 stores payment information of various transaction platforms, and according to the transaction period and platform information of the target transaction platform sent by the trade authenticity checking server 203, payment information of all transaction platforms in the transaction period is screened out from all payment information stored in the payment mechanism server 205 through the transaction period, and then first payment information is determined according to the platform information of the target transaction platform. And sending the first payment information to the target transaction platform. By determining the first payment information, data for judging whether the detection is passed or not is provided for the authenticity detection.
In the method for detecting trade provided by the embodiment of the application, before receiving the collection request of the target trade initiated by the target trading platform, the method further comprises the following steps: determining a trading period of target trade, and sending the trading period and platform information of a target trading platform to a logistics platform; controlling a logistics platform to determine first logistics information from a logistics information set based on the transaction period and the platform information; and sending the first logistics information to a target transaction platform.
Specifically, the logistics enterprise server 206 stores logistics information of various transaction platforms, according to the transaction period and platform information of the target transaction platform sent by the trade authenticity checking server 203, firstly, the logistics information of all the transaction platforms in the transaction period is screened out from all the logistics information stored in the logistics enterprise server 206 through the transaction period, and then, the first logistics information is determined according to the platform information of the target transaction platform. And sending the first logistics information to a target transaction platform. By determining the first logistics information, data for judging whether the detection is passed or not is provided for the authenticity detection.
Optionally, in the method for detecting trade provided by the embodiment of the present application, before determining whether the third data set includes the first data set and determining whether the fourth data set includes the second data set, the method further includes: verifying digital signatures on the third data set and the fourth data set through public keys in the target key pair, wherein the digital signatures are obtained by signing the third data set and the third data set through private keys in the target key pair; in the case that the digital signature verification is passed, the step of judging whether the third data set contains the first data set and judging whether the fourth data set contains the second data set is performed.
Specifically, the data encryption server 207 needs to encrypt the data for the same trade authenticity check by each of the payment authority server 205, the logistics enterprise server 206, and the trade authenticity check server 203 using the same public key. To ensure consistency of the public key, the data encryption server 207 may sign the encrypted data using the private key, and each party may verify the signature using the public key after obtaining the data, and each verify the signature by restarting the step of determining whether the third data set includes the first data set and determining whether the fourth data set includes the second data set. Wherein the private key is maintained at the data encryption server 207 and the public key is disclosed to the payment authority server 205, the logistics enterprise server 206 and the trade authenticity check server 203. The consistency of the public key used in encrypting the data is ensured by digitally signing the data.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment of the application also provides a transaction detection device, and the transaction detection device can be used for executing the detection method for trade. The following describes a transaction detection device provided by an embodiment of the present application.
Fig. 3 is a schematic diagram of a transaction detection device according to an embodiment of the present application. As shown in fig. 3, the apparatus includes:
the receiving unit 10 is configured to receive a collection request of a target trade initiated by a target transaction platform, and extract first payment information and first logistics information in the collection request, where the first payment information is payment information when the target transaction platform executes the target trade, and the first logistics information is logistics information when the target transaction platform executes the target trade;
the first processing unit 20 is configured to process the first payment information according to a first preset rule, so as to obtain a first data set;
A second processing unit 30, configured to process the first logistics information according to a second preset rule, so as to obtain a second data set;
an obtaining unit 40, configured to obtain a third data set from the foreign exchange payment mechanism and obtain a fourth data set from the physical platform, where the third data set is obtained by processing second payment information by the foreign exchange payment mechanism through a first preset rule, the fourth data set is obtained by processing second stream information by the physical platform through a second preset rule, the second payment information is payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is logistics information of a plurality of transaction platforms stored by the physical platform;
a judging unit 50 for judging whether the third data set contains the first data set and judging whether the fourth data set contains the second data set;
a first determining unit 60 for determining that the target trade passes the authenticity detection in case the third data set comprises the first data set and the fourth data set comprises the second data set.
According to the transaction detection device provided by the embodiment of the application, the receiving unit 10 is used for receiving a collection request of target trade initiated by a target transaction platform, and extracting first payment information and first logistics information in the collection request, wherein the first payment information is payment information when the target transaction platform executes the target trade, and the first logistics information is logistics information when the target transaction platform executes the target trade; the first processing unit 20 processes the first payment information according to a first preset rule to obtain a first data set; the second processing unit 30 processes the first logistics information according to a second preset rule to obtain a second data set; an obtaining unit 40, configured to obtain a third data set from the foreign exchange payment mechanism and obtain a fourth data set from the physical platform, where the third data set is obtained by processing second payment information by the foreign exchange payment mechanism through a first preset rule, the fourth data set is obtained by processing second stream information by the physical platform through a second preset rule, the second payment information is payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is logistics information of a plurality of transaction platforms stored by the physical platform; a judging unit 50 that judges whether the third data set includes the first data set and judges whether the fourth data set includes the second data set; the first determining unit 60 determines that the target trade passes the authenticity detection in the case that the third data set includes the first data set and the fourth data set includes the second data set, solves the problem that the authenticity detection in the related art has a data leakage risk, processes the target payment information according to the agreed first preset rule in the trade detecting system and the foreign exchange payment mechanism to obtain the first data set and the third data set, processes the target logistics information according to the agreed second preset rule in the trade detecting system and the logistics platform to obtain the second data set and the fourth data set, and determines whether the target trade passes the authenticity detection according to whether the third data set includes the first data set and whether the fourth data set includes the second data set, thereby achieving the effect of avoiding the data leakage during the authenticity detection.
Optionally, in the transaction detection device provided by the embodiment of the present application, the device further includes: a second determining unit for determining that the target trade fails the authenticity detection in a case where the third data set does not contain the first data set and/or the fourth data set does not contain the second data set; the sending unit is used for sending out prompt information for prompting the failure of target trade processing; the detection unit is used for carrying out authenticity detection on the target trade again based on the prompt information, and receiving an authenticity detection modification instruction under the condition that the target trade passes the authenticity detection; and the modification unit is used for modifying the target trade failing to pass the authenticity detection into the target trade passing the authenticity detection based on the authenticity detection modification instruction.
Optionally, in the transaction detection device provided in the embodiment of the present application, the first processing unit 20 includes: the first extraction module is used for extracting the order number and the payment list number of each payment list from the first payment information, and combining the order number and the payment list number of each payment list according to a first combination rule to obtain a group of first target character strings; the first operation module is used for carrying out hash operation on a group of first target character strings respectively to obtain a group of first hash values; and the first encryption module is used for encrypting a group of first hash values through the public key in the target key pair respectively to obtain a first data set.
Optionally, in the transaction detection device provided in the embodiment of the present application, the second processing unit 30 includes: the second extraction module is used for extracting the order number and the logistics list number of each logistics list from the first logistics information, and combining the order number and the logistics list number of each logistics list according to a second combination rule to obtain a group of second target character strings; the second operation module is used for carrying out hash operation on a group of second target character strings respectively to obtain a group of second hash values; and the second encryption module is used for encrypting a group of second hash values through the public key in the target key pair respectively to obtain a second data set.
Optionally, in the transaction detection device provided in the embodiment of the present application, the first processing unit 20 includes: the first determining module is used for determining the trading period of the target trade and sending the trading period and platform information of the target trading platform to the foreign exchange payment mechanism; a second determining module for controlling the foreign exchange payment mechanism to determine first payment information from the payment information set based on the transaction period and the platform information; and the first sending module is used for sending the first payment information to the target transaction platform.
Optionally, in the transaction detection device provided in the embodiment of the present application, the second processing unit 30 includes: the third determining module is used for determining the trading period of the target trade and sending the trading period and the platform information of the target trading platform to the logistics platform; the fourth determining module is used for controlling the logistics platform to determine first logistics information from the logistics information set based on the transaction period and the platform information; and the second sending module is used for sending the first logistics information to the target transaction platform.
Optionally, in the transaction detection device provided by the embodiment of the present application, the device further includes: the verification unit is used for verifying the digital signature on the third data set and the fourth data set through the public key in the target key pair, wherein the digital signature is obtained by signing the third data set and the third data set through the private key in the target key pair; and the execution unit is used for executing the steps of judging whether the third data set contains the first data set and judging whether the fourth data set contains the second data set under the condition that the digital signature verification is passed.
The transaction detection device includes a processor and a memory, where the receiving unit 10, the first processing unit 20, the second processing unit 30, the acquiring unit 40, the judging unit 50, the first determining unit 60, and the like are stored as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one, and data leakage during the authenticity detection is avoided by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
Embodiments of the present application provide a computer-readable storage medium having stored thereon a program that when executed by a processor implements a method of detecting commerce.
The embodiment of the application provides a processor, which is used for running a program, wherein the program runs a detection method for executing trade.
Fig. 4 is a schematic diagram of an electronic device according to an embodiment of the present application. As shown in fig. 4, the electronic device 401 includes a processor, a memory, and a program stored on the memory and executable on the processor, and the processor implements the following steps when executing the program: a method for detecting trade. The device herein may be a server, PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of: a method for detecting trade.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (10)

1. A method of detecting commerce, comprising:
receiving a collecting request of target trade initiated by a target transaction platform, and extracting first payment information and first logistics information in the collecting request, wherein the first payment information is payment information when the target transaction platform executes the target trade, and the first logistics information is logistics information when the target transaction platform executes the target trade;
Processing the first payment information according to a first preset rule to obtain a first data set;
processing the first logistics information according to a second preset rule to obtain a second data set;
acquiring a third data set from a foreign exchange payment mechanism and acquiring a fourth data set from a foreign exchange payment mechanism, wherein the third data set is obtained by processing second payment information through a first preset rule by the foreign exchange payment mechanism, the fourth data set is obtained by processing second stream information through a second preset rule by the logistics platform, the second payment information is the payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is the logistics information of a plurality of transaction platforms stored by the logistics platform;
judging whether the third data set contains the first data set or not, and judging whether the fourth data set contains the second data set or not;
in the case where the third data set includes the first data set and the fourth data set includes the second data set, determining that the target trade passes an authenticity detection.
2. The method of claim 1, wherein after determining whether the third data set comprises the first data set and determining whether the fourth data set comprises the second data set, the method further comprises:
determining that the target trade fails the authenticity detection if the third data set does not contain the first data set and/or the fourth data set does not contain the second data set;
sending out prompt information for prompting the failure of the target trade processing;
re-performing authenticity detection on the target trade based on the prompt information, and receiving an authenticity detection modification instruction under the condition that the target trade passes the authenticity detection;
modifying the target trade failing the authenticity detection based on the authenticity detection modification instruction to the target trade passing the authenticity detection.
3. The method of claim 1, wherein processing the first payment information according to a first preset rule to obtain a first data set comprises:
extracting order numbers and payment list numbers of each payment list from the first payment information, and combining the order numbers and the payment list numbers of each payment list according to a first combination rule to obtain a group of first target character strings;
Respectively carrying out hash operation on the group of first target character strings to obtain a group of first hash values;
and encrypting the group of first hash values through a public key in the target key pair respectively to obtain the first data set.
4. The method of claim 1, wherein processing the first logistics information according to a second predetermined rule to obtain a second data set comprises:
extracting order numbers and logistics list numbers of each logistics list from the first logistics information, and combining the order numbers and the logistics list numbers of each logistics list according to a second combination rule to obtain a group of second target character strings;
respectively carrying out hash operation on the group of second target character strings to obtain a group of second hash values;
and encrypting the group of second hash values through the public key in the target key pair to obtain the second data set.
5. The method of claim 1, wherein prior to receiving a sink request for a target trade initiated by a target trading platform, the method further comprises:
determining the transaction period of the target trade, and sending the transaction period and platform information of the target transaction platform to the foreign exchange payment mechanism;
Controlling the foreign exchange payment mechanism to determine first payment information from a payment information set based on the transaction period and the platform information;
and sending the first payment information to the target transaction platform.
6. The method of claim 1, wherein prior to receiving a sink request for a target trade initiated by a target trading platform, the method further comprises:
determining the trading period of the target trade, and sending the trading period and platform information of the target trading platform to the logistics platform;
controlling the logistics platform to determine first logistics information from a logistics information set based on the transaction period and the platform information;
and sending the first logistics information to the target transaction platform.
7. The method of claim 1, wherein prior to determining whether the third data set comprises the first data set and determining whether the fourth data set comprises the second data set, the method further comprises:
verifying digital signatures on the third data set and the fourth data set through a public key in a target key pair, wherein the digital signatures are obtained by signing the third data set and the third data set through a private key in the target key pair;
And if the digital signature verification is passed, executing the step of judging whether the third data set contains the first data set and judging whether the fourth data set contains the second data set.
8. A transaction detection device, comprising:
the receiving unit is used for receiving a collection request of target trade initiated by a target transaction platform, and extracting first payment information and first logistics information in the collection request, wherein the first payment information is payment information when the target transaction platform executes the target trade, and the first logistics information is logistics information when the target transaction platform executes the target trade;
the extraction unit is used for processing the first payment information according to a first preset rule to obtain a first data set;
the first acquisition unit is used for processing the first logistics information according to a second preset rule to obtain a second data set;
the second acquisition unit is used for acquiring a third data set from the foreign exchange payment mechanism and acquiring a fourth data set from the physical distribution platform, wherein the third data set is obtained by processing second payment information through the first preset rule by the foreign exchange payment mechanism, the fourth data set is obtained by processing second stream information through the second preset rule by the physical distribution platform, the second payment information is the payment information of a plurality of transaction platforms stored by the foreign exchange payment mechanism, and the second stream information is the logistics information of a plurality of transaction platforms stored by the physical distribution platform;
A judging unit, configured to judge whether the third data set includes the first data set, and judge whether the fourth data set includes the second data set;
a first determining unit for determining that the target trade passes the authenticity detection in case the third data set comprises the first data set and the fourth data set comprises the second data set.
9. A non-volatile storage medium, characterized in that the non-volatile storage medium comprises a stored program, wherein the program, when run, controls a device in which the non-volatile storage medium is located to perform the method of detecting trade according to any one of claims 1 to 7.
10. An electronic device comprising one or more processors and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of detecting commerce of any one of claims 1 to 7.
CN202310458028.9A 2023-04-25 2023-04-25 Trade detection method and device, storage medium and electronic equipment Pending CN116703576A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310458028.9A CN116703576A (en) 2023-04-25 2023-04-25 Trade detection method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310458028.9A CN116703576A (en) 2023-04-25 2023-04-25 Trade detection method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN116703576A true CN116703576A (en) 2023-09-05

Family

ID=87836376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310458028.9A Pending CN116703576A (en) 2023-04-25 2023-04-25 Trade detection method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN116703576A (en)

Similar Documents

Publication Publication Date Title
US11004067B2 (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
US9978094B2 (en) Tokenization revocation list
US10673839B2 (en) Systems and methods for authenticating network messages
CN110932859B (en) User information processing method, device and equipment and readable storage medium
CN110633963A (en) Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment
KR20180113229A (en) Loan service providing method using black chain and system performing the same
US20230020190A1 (en) Techniques For Performing Secure Operations
CN112801778A (en) Federated bad asset blockchain
WO2022206433A1 (en) Method and apparatus for pre-executing chaincode in fabric blockchain
CN111861737B (en) Block chain-based wind control model optimization method and device and computer equipment
CN112150158B (en) Block chain transaction delivery verification method and device
CN116703576A (en) Trade detection method and device, storage medium and electronic equipment
CN114463003A (en) Virtual resource processing method and system based on block chain and processor
CN107483210B (en) Data verification method and system
CN111027992A (en) Asset transaction method and device based on blockchain system and hardware equipment
KR20210017308A (en) Method for providing secondary authentication service using device registration and distributed storage of data
RU2795371C1 (en) Method and system of depersonalized assessment of clients of organizations for carrying out operations between organizations
US20240086575A1 (en) Method and a system for processing transactions between entities
CN116934460A (en) Block chain-based joint credit card handling method, device and storage medium
CN116484402A (en) Financial business processing method and device, processor and electronic equipment
CN118278932A (en) Block chain-based transaction method, device, equipment and medium
CN116823429A (en) Standardized bank account checking method
CN114677214A (en) Service processing method and device based on carbon emission reduction support tool
CN115271960A (en) Block chain fund transaction method and device, storage medium and electronic equipment
CN117273715A (en) Method and device for processing transfer withdrawal request, processor and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination