CN117611330A - Credit data processing system, method, device, equipment and medium - Google Patents

Credit data processing system, method, device, equipment and medium Download PDF

Info

Publication number
CN117611330A
CN117611330A CN202410090451.2A CN202410090451A CN117611330A CN 117611330 A CN117611330 A CN 117611330A CN 202410090451 A CN202410090451 A CN 202410090451A CN 117611330 A CN117611330 A CN 117611330A
Authority
CN
China
Prior art keywords
service
credit
information
shadow
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410090451.2A
Other languages
Chinese (zh)
Other versions
CN117611330B (en
Inventor
康会来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Jincheng Bank Ltd By Share Ltd
Original Assignee
Tianjin Jincheng Bank Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Jincheng Bank Ltd By Share Ltd filed Critical Tianjin Jincheng Bank Ltd By Share Ltd
Priority to CN202410090451.2A priority Critical patent/CN117611330B/en
Publication of CN117611330A publication Critical patent/CN117611330A/en
Application granted granted Critical
Publication of CN117611330B publication Critical patent/CN117611330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
    • G06F2211/008Public Key, Asymmetric Key, Asymmetric Encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a credit investigation data processing system, a method, a device, equipment and a medium, which are applied to the technical field of finance and comprise that a business system initiates a business shadow account application request to a credit investigation system, the credit investigation system generates business shadow account information and returns the business shadow account information to a business system, the business system initiates a credit investigation request to a business engine system based on the business shadow account information, the business engine system acquires user credit investigation data and engine shadow account information from the credit investigation system based on the business shadow account information and sends a credit investigation report success notice to the business system, the credit investigation is carried out based on the user credit investigation data and the engine shadow account information is bound, the business shadow account information sent by the business system is converted into engine shadow account information, a credit investigation result is acquired based on the engine shadow account information and returned to the business system, and therefore the data association between the business system and the business engine system is cut off through double shadow account information, and the risk of data leakage is effectively reduced.

Description

Credit data processing system, method, device, equipment and medium
Technical Field
The present disclosure relates to the field of financial technologies, and in particular, to a credit information data processing system, method, device, equipment, and medium.
Background
In the financial technical field, when a business system examines and approves a loan business such as an enterprise loan and a personal loan, after determining a credit level or a credit risk of the enterprise user or the personal user according to credit data of the enterprise user or the personal user, determining whether the loan business of the enterprise user or the personal user is examined and approved or not according to the credit level or the credit risk of the enterprise user or the personal user.
At present, credit rating or credit risk of enterprise users or individual users and other user credit assessment needs to be calculated through a calculation engine maintained by a credit investigation system and then provided for a service system.
Disclosure of Invention
The application provides a credit investigation data processing system, a method, a device, equipment and a medium, which are used for solving the problems of higher maintenance cost and larger maintenance workload of the credit investigation data processing system in the prior art, and specifically, the technical scheme provided by the application is as follows:
in one aspect, the present application provides a credit data processing system, including a service system, a service engine system, and a credit system; the service system is in communication connection with the service engine system, and the service engine system is in communication connection with the credit investigation system; the service system is used for acquiring user identity information and a target credit information data field corresponding to the service request when receiving the service request, performing encryption and signature operation on the user identity information and the target credit information data field to obtain service encryption signature information, and initiating a service shadow account application request to the credit system based on the service encryption signature information; initiating a credit evaluation request to a service engine system based on first service shadow encryption signature information in a service shadow account application response returned by a credit evaluation system; initiating an evaluation acquisition request to the service engine system based on service shadow account information in the credit investigation order success notification sent by the service engine system; executing service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system; the credit system is used for executing signature verification and decryption operation on the business encryption signature information in the business shadow account application request to obtain user identity information and a target credit data field, generating business shadow account information, binding the business shadow account information with the user identity information and the target credit data field, executing encryption and signature operation on the business shadow account information to obtain first business shadow encryption signature information, and returning a business shadow account application response to the business system based on the first business shadow encryption signature information; executing signature verification and decryption operations on second service shadow encryption signature information in a credit acquisition request initiated by a service engine system to obtain service shadow account information, acquiring user identity information and a target credit data field which are bound with the service shadow account information, acquiring user credit data corresponding to the target credit data field based on the user identity information, generating engine shadow account information and binding with the service shadow account information, executing encryption and signature operations on the engine shadow account information and the user credit data to obtain credit encryption signature information, and returning a credit acquisition response to the service engine system based on the credit encryption signature information; the service engine system is used for executing signature verification and decryption operation on first service shadow encryption signature information in a credit evaluation request initiated by the service system to obtain service shadow account information, executing encryption and signature operation on the service shadow account information to obtain second service shadow encryption signature information, and initiating a credit acquisition request to the credit system based on the second service shadow encryption signature information; in the process of executing signature verification and decryption operations on credit encryption signature information in a credit acquisition response returned by a credit system to obtain engine shadow account information and user credit data, a credit receipt success notification is sent to a service system based on the service shadow account information, credit evaluation is carried out based on the user credit data to obtain a user credit evaluation result, and the user credit evaluation result is bound with the engine shadow account information; and acquiring engine shadow account information bound with the service shadow account information in the evaluation acquisition request initiated by the service system from the credit verification system, acquiring a user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system based on the user credit evaluation result.
On the other hand, the application provides a credit information data processing method, which is applied to a service system in the credit information data processing system and comprises the following steps: receiving a service request, acquiring user identity information and a target credit investigation data field corresponding to the service request, encrypting and signing the user identity information and the target credit investigation data field to obtain service encryption signature information, and then initiating a service shadow account application request to a credit investigation system based on the service encryption signature information; initiating a credit evaluation request to a service engine system based on first service shadow encryption signature information in a service shadow account application response returned by a credit evaluation system; the first business shadow encryption signature information is obtained by performing signature verification and decryption operations on the business encryption signature information by the credit investigation system to obtain user identity information and a target credit investigation data field, generating business shadow account information, binding the business shadow account information with the user identity information and the target credit investigation data field, and performing encryption and signature operations on the business shadow account information; initiating an evaluation acquisition request to the service engine system based on service shadow account information in the credit investigation order success notification sent by the service engine system; the credit receipt success notice is sent in the process that the service engine system converts the first service shadow encryption signature information into second service shadow encryption signature information, initiates a credit acquisition request to the credit system based on the second service shadow encryption signature information, and then performs signature verification and decryption operations on the credit encryption signature information in a credit acquisition response returned by the credit system to obtain engine shadow account information and user credit data; the credit acquisition response is that the credit acquisition system performs signature verification and decryption operation on second business shadow encryption signature information in the credit acquisition request to obtain business shadow account information, acquires user identity information and target credit data fields which are bound with the business shadow account information, acquires user credit data corresponding to the target credit data fields based on the user identity information, generates engine shadow account information and binds with the business shadow account information, performs encryption and signature operation on the engine shadow account information and the user credit data to obtain credit encryption signature information, and returns the credit encryption signature information to the business engine system based on the credit encryption signature information; executing service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system; and the evaluation acquisition response is that the service engine system performs credit evaluation based on the user credit information to obtain a user credit evaluation result and binds with engine shadow account information, and then acquires the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit system and returns after acquiring the user credit evaluation result bound with the engine shadow account information.
On the other hand, the application provides another credit data processing method, which is applied to a business engine system in the credit data processing system and comprises the following steps: receiving a credit evaluation request initiated by a service system; the credit evaluation request is initiated by the service system based on first service shadow encryption signature information in a service shadow account application response returned by the credit evaluation system after the service system initiates a service shadow account application request to the credit evaluation system based on the service encryption signature information by executing encryption and signature operation on user identity information and a target credit evaluation data field corresponding to the service request when the service request is received; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operation on the service encryption signature information in the service shadow account application request to obtain user identity information and a target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operation on the service shadow account information; executing signature verification and decryption operation on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and after executing encryption and signature operation on the service shadow account information to obtain second service shadow encryption signature information, initiating a credit acquisition request to a credit investigation system based on the second service shadow encryption signature information; receiving a credit acquisition response returned by a credit system; the credit acquisition response is that the credit acquisition system acquires user identity information and target credit data fields which are bound with the service shadow account information after performing signature verification and decryption operation on the second service shadow encryption signature information to obtain the service shadow account information, generates engine shadow account information and binds with the service shadow account information after acquiring user credit data corresponding to the target credit data fields based on the user identity information, and returns the credit encryption signature information based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit encryption signature information; in the process of executing signature verification and decryption operation on credit encryption signature information in a credit acquisition response to obtain engine shadow account information and user credit information, a credit receipt success notice is sent to a service system based on the service shadow account information, credit evaluation is carried out based on the user credit information to obtain a user credit evaluation result, and the credit evaluation result is bound with the engine shadow account information; receiving an evaluation acquisition request initiated by a service system based on service shadow account information; and acquiring engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit investigation system, acquiring a user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system based on the user credit evaluation result so that the service system executes service operation based on the user credit evaluation result in the evaluation acquisition response.
On the other hand, the application provides another credit information data processing method, which is applied to the credit information system in the credit information data processing system, and comprises the following steps: receiving a service shadow account number application request initiated by a service system based on service encryption signature information; the service encryption signature information is obtained by executing encryption and signature operations on user identity information and a target credit sign data field corresponding to a service request when the service system receives the service request; executing signature verification and decryption operation on the service encryption signature information to obtain user identity information and a target credit investigation data field, generating service shadow account information and binding the service shadow account information with the user identity information and the target credit investigation data field; performing encryption and signature operations on the service shadow account information to obtain first service shadow encryption signature information, and returning service shadow account application response to the service system based on the first service shadow encryption signature information so that the service system initiates a credit evaluation request to the service engine system based on the first service shadow encryption signature information; receiving a credit acquisition request initiated by a service engine system aiming at a credit evaluation request; the credit acquisition request is initiated based on second service shadow encryption signature information after the service engine system performs signature verification and decryption operations on first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and performs encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information. Executing signature verification and decryption operation on second service shadow encryption signature information in the credit acquisition request to obtain service shadow account information, acquiring user identity information and a target credit data field which are bound with the service shadow account information, acquiring user credit data corresponding to the target credit data field based on the user identity information, generating engine shadow account information and binding with the service shadow account information; and in the process of obtaining the engine shadow account information and the user credit data by executing encryption and signature operations on the engine shadow account information and the user credit data, obtaining credit encryption signature information, returning credit acquisition response to the service engine system based on the credit encryption signature information, so that the service engine system obtains the user credit evaluation result bound with the engine shadow account information and returns the user credit evaluation result bound with the engine shadow account information to the service system to execute service operation after obtaining the engine shadow account information bound with the engine shadow account information in the credit acquisition request from the credit system when credit evaluation is carried out to obtain the user credit evaluation result bound with the engine shadow account information based on the user credit evaluation data and receiving an evaluation acquisition request initiated by the service system based on the service shadow account information in the credit evaluation result successful notification.
In another aspect, the present application provides a credit data processing apparatus, including: the service receiving unit is used for receiving the service request, acquiring user identity information and a target credit investigation data field corresponding to the service request, performing encryption and signature operation on the user identity information and the target credit investigation data field to obtain service encryption signature information, and then initiating a service shadow account application request to a credit investigation system based on the service encryption signature information; the evaluation initiating unit is used for initiating a credit evaluation request to the service engine system based on first service shadow encryption signature information in a service shadow account application response returned by the credit evaluating system; the first business shadow encryption signature information is obtained by performing signature verification and decryption operations on the business encryption signature information by the credit investigation system to obtain user identity information and a target credit investigation data field, generating business shadow account information, binding the business shadow account information with the user identity information and the target credit investigation data field, and performing encryption and signature operations on the business shadow account information; the evaluation acquisition unit is used for initiating an evaluation acquisition request to the service engine system based on the service shadow account information in the credit receipt success notification sent by the service engine system; the credit receipt success notice is sent in the process that the service engine system converts the first service shadow encryption signature information into second service shadow encryption signature information, initiates a credit acquisition request to the credit system based on the second service shadow encryption signature information, and then performs signature verification and decryption operations on the credit encryption signature information in a credit acquisition response returned by the credit system to obtain engine shadow account information and user credit data; the credit acquisition response is that the credit acquisition system performs signature verification and decryption operation on second business shadow encryption signature information in the credit acquisition request to obtain business shadow account information, acquires user identity information and target credit data fields which are bound with the business shadow account information, acquires user credit data corresponding to the target credit data fields based on the user identity information, generates engine shadow account information and binds with the business shadow account information, performs encryption and signature operation on the engine shadow account information and the user credit data to obtain credit encryption signature information, and returns the credit encryption signature information to the business engine system based on the credit encryption signature information; the service processing unit is used for executing service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system; and the evaluation acquisition response is that the service engine system performs credit evaluation based on the user credit information to obtain a user credit evaluation result and binds with engine shadow account information, and then acquires the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit system and returns after acquiring the user credit evaluation result bound with the engine shadow account information.
In another aspect, the present application provides another credit data processing apparatus, including: the evaluation receiving unit is used for receiving a credit evaluation request initiated by the service system; the credit evaluation request is initiated by the service system based on first service shadow encryption signature information in a service shadow account application response returned by the credit evaluation system after the service system initiates a service shadow account application request to the credit evaluation system based on the service encryption signature information by executing encryption and signature operation on user identity information and a target credit evaluation data field corresponding to the service request when the service request is received; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operation on the service encryption signature information in the service shadow account application request to obtain user identity information and a target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operation on the service shadow account information; the credit request unit is used for executing signature verification and decryption operation on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and after executing encryption and signature operation on the service shadow account information to obtain second service shadow encryption signature information, initiating a credit acquisition request to a credit system based on the second service shadow encryption signature information; the credit receipt unit is used for receiving a credit acquisition response returned by the credit system; the credit acquisition response is that the credit acquisition system acquires user identity information and target credit data fields which are bound with the service shadow account information after performing signature verification and decryption operation on the second service shadow encryption signature information to obtain the service shadow account information, generates engine shadow account information and binds with the service shadow account information after acquiring user credit data corresponding to the target credit data fields based on the user identity information, and returns the credit encryption signature information based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit encryption signature information; the evaluation execution unit is used for sending a credit receipt success notice to the service system based on the service shadow account information in the process of executing signature verification and decryption operation on credit encryption signature information in the credit acquisition response to obtain engine shadow account information and user credit data, and carrying out credit evaluation based on the user credit data to obtain a user credit evaluation result and binding with the engine shadow account information; the evaluation return unit is used for receiving an evaluation acquisition request initiated by the service system based on the service shadow account information; and acquiring engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit investigation system, acquiring a user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system based on the user credit evaluation result so that the service system executes service operation based on the user credit evaluation result in the evaluation acquisition response.
In another aspect, the present application provides another credit data processing apparatus, including: the shadow request receiving unit is used for receiving a service shadow account number application request initiated by the service system based on the service encryption signature information; the service encryption signature information is obtained by executing encryption and signature operations on user identity information and a target credit sign data field corresponding to a service request when the service system receives the service request; the shadow account generation unit is used for executing signature verification and decryption operation on the service encryption signature information to obtain user identity information and a target credit investigation data field, generating service shadow account information and binding the service shadow account information with the user identity information and the target credit investigation data field; the shadow account number return unit is used for performing encryption and signature operations on the service shadow account number information to obtain first service shadow encryption signature information, and returning service shadow account number application response to the service system based on the first service shadow encryption signature information so that the service system initiates a credit evaluation request to the service engine system based on the first service shadow encryption signature information. The credit request receiving unit is used for receiving a credit acquisition request initiated by the service engine system aiming at the credit evaluation request; the credit acquisition request is initiated based on second service shadow encryption signature information after the service engine system performs signature verification and decryption operations on first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and performs encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information. The credit account number obtaining unit is used for obtaining the credit account number information by executing signature verification and decryption operation on the second business shadow encryption signature information in the credit account number obtaining request, obtaining the user identity information and the target credit account number data domain which are bound with the business shadow account number information, obtaining the user credit account number data corresponding to the target credit account number data domain based on the user identity information, generating engine shadow account number information and binding with the business shadow account number information; and the credit account information receiving unit is used for receiving an evaluation acquisition request initiated by the service system based on the service shadow account information in the credit account information success notification, acquiring the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit system, acquiring the user credit evaluation result bound with the shadow account information and returning to the service system to execute the service operation after acquiring the service shadow account information bound with the shadow account information in the evaluation acquisition request.
In another aspect, the application further provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements any one of the above credit investigation data processing methods when executing the computer program.
On the other hand, the application also provides a computer readable storage medium, wherein the computer readable storage medium stores computer instructions, and the computer instructions realize any credit data processing method when being executed by a processor.
The beneficial effects of this application are as follows:
according to the service engine system and the service system, the service engine system and the service system are deployed together on the service side for maintenance and management, the user credit evaluation logic of the service engine system can be flexibly configured according to the service side requirements, so that the calculation requirements of the service system can be supported under the condition that the service engine system is not required to be continuously and transversely expanded, further the maintenance and management costs of the service engine system can be reduced, moreover, by establishing service shadow account information for the service system and engine shadow account information for the service engine system, the double shadow account information can be utilized to cut off the data association of the service system and the service engine system for user credit investigation data, so that the leakage risk of the user credit investigation data can be effectively reduced, the safety of the user credit investigation data can be improved, the safe and reliable user credit evaluation can be realized under the condition that the credit investigation side is not required to maintain and manage a calculation engine, the system maintenance cost and the workload of the credit investigation side can be reduced.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a schematic diagram of a composition architecture of a credit data processing system in an embodiment of the present application;
fig. 2 is an interactive flow chart of a credit data interfacing application and authorization configuration process in a credit data processing method in an embodiment of the present application;
fig. 3 is an interactive flow chart of a credit data acquisition request and a credit evaluation process in a credit data processing method in an embodiment of the application;
FIG. 4 is a schematic functional structure of a credit data processing device according to an embodiment of the present application;
FIG. 5 is a schematic functional structure diagram of another credit data processing device according to an embodiment of the disclosure;
FIG. 6 is a schematic functional structure diagram of a credit data processing device according to an embodiment of the present application;
fig. 7 is a schematic diagram of a hardware structure of an electronic device in an embodiment of the application.
Detailed Description
In order to make the objects, technical solutions and advantageous effects of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments, but not all embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
In order to facilitate a better understanding of the present application, technical terms related to the present application will be briefly described below.
The business system is a front-end system for receiving the business demands of users, such as enterprise loan systems, personal loan systems and the like.
The service engine system is a system for evaluating the credit rating, the credit risk and the like of the user, and in the application, the service engine system and the service system are managed and maintained by the service side together, and the service engine system and the service system can form a one-to-one or one-to-many relationship according to actual requirements.
And the credit investigation system is used for generating and storing user credit investigation data.
The encryption system is a system for storing public and private keys of various systems such as a service system, a service engine system, a credit investigation system and the like and generating digital envelopes and signatures in the interaction process of the various systems.
OA (Office Automation ) system, which is a system for approving the user credit data of the business system and business engine system.
The credit SDK (Software Development Kit ) component, a development kit provided to the business engine system for the credit system, can be embedded into the business engine system for controlling the rights of the user to credit data.
The public and private key identification is a unique identification corresponding to the public and private key generated in the process of generating the public and private key by the encryption system, and the related key identification is transmitted when the service system, the service engine system, the credit investigation system and other systems use the related public and private key to perform encryption and decryption or signature verification and other operations.
The digital envelope is a technology for realizing data confidentiality transmission by encrypting data through a symmetric key and carrying out communication transmission after encrypting the symmetric key through an asymmetric key, and comprehensively utilizes symmetric encryption and asymmetric encryption to carry out data security transmission, thereby not only playing the advantages of high speed and good security of a symmetric encryption algorithm, but also playing the advantage of convenience in key management of the asymmetric encryption technology.
The digital signature is a technology for generating second summary information for received original text data after the first summary information is decrypted by a sender public key and compared with the first summary information to verify whether the received original text data is complete or not by encrypting the first summary information of the original text data by using a sender private key and transmitting the first summary information and the original text data to a receiver together, and the sender proves the authenticity of the original text data by generating a section of digital string which cannot be forged.
The shadow account information is random generated random unique identification and is used for hiding the real identification, and in the application, the shadow account information comprises service shadow account information and engine shadow account information, wherein the service shadow account information is random generated random unique identification for hiding the service system identification, and the engine shadow account information is random generated random unique identification for hiding the service engine system identification.
The credit data field is a data field divided according to different credit data types shown in the credit report, for example, the credit data field includes, but is not limited to, user basic information (such as name, age, school, marital status, professional status, etc.), overdue condition of a loan (such as overdue times in several years, duration corresponding to each overdue, overdue amount, loan organization, etc.), end of a loan condition (such as number of completed loans in several years, amount of loan corresponding to each completed loan, period of loan, time of completion, loan organization, etc.), end of a loan condition (such as number of currently outstanding loan, amount of loan corresponding to each outstanding loan, period of loan, organization of loan, etc.), end of credit inquiry condition (such as number of inquiry times in several years, credit inquiry organization corresponding to each inquiry credit inquiry, credit inquiry time), etc. In the application, the target credit investigation data field is a credit investigation data field required by a service request received by a service system; and authorizing the credit investigation data field, wherein the credit investigation data field is a credit investigation data field which is configured for the service system by the credit investigation system and allows the service system to inquire.
After technical terms related to the application are introduced, application scenes and design ideas of the application are briefly introduced.
In order to solve the problems that in the prior art, a computing engine is deployed on a credit side for management and maintenance, so that the computing engine must be continuously and transversely expanded to support the computing requirements of each service system, and then the maintenance cost and the workload of the credit side system are high, the service engine system and the service system are jointly deployed on the service side for maintenance and management, the user credit evaluation logic of the service engine system can be flexibly configured according to the requirements of the service side, so that the computing requirements of the service system can be supported under the condition that the service engine system is not continuously and transversely expanded, further the maintenance and management cost of the service engine system can be reduced, in addition, in the process of processing the user credit data, the service system is established with engine shadow account information, the service system can be cut off by utilizing the dual shadow account information, the data correlation of the user credit data can be effectively reduced, the risk of leakage of the user credit data is not required, the safety evaluation of the user credit data is improved, further, safe and reliable users can be realized under the condition that the credit side is maintained and managed, the credit information of the credit system is required to be successfully transmitted from the service system to the service system, and the digital signature information is encrypted and the digital signature information is successfully transmitted to the service system is encrypted by the system, the problem of acquiring the user credit information data by utilizing network behavior analysis can be effectively solved through asynchronous operation, so that the safety of the user credit information data can be further improved, the leakage risk of the user credit information data is reduced, in addition, the service engine system can be ensured to only acquire the minimum range of the user credit information data to carry out user credit assessment by splitting the credit information data into different credit information data fields, and the safety of the user credit information data can be further improved.
After the application scenario and design idea of the present application are introduced, the technical solution provided by the present application is described in detail below.
Referring to fig. 1, a credit information data processing system 100 provided in the embodiment of the present application at least includes a service system 110, a service engine system 120, a credit information system 130 and an encryption system 140; the service system 110 is respectively in communication connection with the service engine system 120 and the encryption system 140, the service engine system 120 is respectively in communication connection with the credit investigation system 130 and the encryption system 140, and the credit investigation system 130 is in communication connection with the encryption system 140;
the service system 110 is configured to, when receiving a service request, obtain user identity information and a target credit data field corresponding to the service request, perform an encryption operation based on a public key of the credit system and a signature operation based on a private key of the service system on the user identity information and the target credit data field through the encryption system 140 to obtain service encryption signature information, and initiate a service shadow account application request to the credit system 130 based on the service encryption signature information; and receiving a service shadow account application response returned by the credit investigation system 130 for the service shadow account application request, and initiating a credit investigation request to the service engine system 120 based on the first service shadow encryption signature information in the service shadow account application response; and when receiving a credit receipt success notification sent by the service engine system 120 for the credit evaluation request, initiating an evaluation acquisition request to the service engine system 120 based on service shadow account information in the credit receipt success notification; and receiving an evaluation acquisition response returned by the service engine system 120 for the evaluation acquisition request, and executing a service operation based on the user credit evaluation result in the evaluation acquisition response;
The credit system 130 is configured to, when receiving a service shadow account application request initiated by the service system 110, perform, through the encryption system 140, a signature verification operation based on a service system public key and a decryption operation based on a credit system private key on service encryption signature information in the service shadow account application request to obtain user identity information and a target credit data field, and when determining that the target credit data field is an authorized credit data field of the service system 110, generate service shadow account information and bind the user identity information and the target credit data field, perform, through the encryption system 140, an encryption operation based on a service engine public key and a signature operation based on a credit system private key on the service shadow account information to obtain first service shadow encryption signature information, and return a service shadow account application response to the service system 110 based on the first service shadow encryption signature information; when a credit acquisition request initiated by the service engine system 120 for the credit evaluation request is received, performing a signature verification operation based on a public key of the service engine system and a decryption operation based on a private key of the credit engine system on second service shadow encryption signature information in the credit acquisition request through the encryption system 140 to obtain service shadow account information, determining that the service shadow account information exists and is not used, acquiring user identity information and a target credit data field which are bound with the service shadow account information, acquiring user credit data corresponding to the target credit data field based on the user identity information, generating engine shadow account information and binding the engine shadow account information with the service shadow account information, performing an encryption operation based on the public key of the service engine system and the signature operation based on the private key of the credit engine system on the second service shadow encryption signature information, and returning a credit acquisition response to the service engine system 120 based on the credit encryption signature information;
The service engine system 120 is configured to, when receiving a credit evaluation request initiated by the service system 110, perform, through the encryption system 140, signature verification operation based on a public key of a credit investigation system and decryption operation based on a private key of the service engine system on first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, perform, through the encryption system 140, encryption operation based on the public key of the credit investigation system and signature operation based on the private key of the service engine system on service shadow account information to obtain second service shadow encryption signature information, and initiate a credit investigation acquisition request to the credit investigation system 130 based on the second service shadow encryption signature information; after receiving a credit acquisition response returned by the credit acquisition system 130 for the credit acquisition request, performing a credit verification operation based on a credit system public key on credit digital signature information contained in credit encryption signature information in the credit acquisition response through the encryption system 140, sending a credit receipt success notification to the service system 110 based on service shadow account information, and asynchronously performing a decryption operation based on a service engine system private key on credit digital envelope information contained in the credit acquisition response through the encryption system 140 to obtain engine shadow account information and user credit data, performing credit evaluation based on the user credit data to obtain a user credit evaluation result and binding with the engine shadow account information; and when an evaluation acquisition request initiated by the service system 110 is received, acquiring engine shadow account information bound with service shadow account information in the evaluation acquisition request from the credit system 130, acquiring a user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system 110 based on the user credit evaluation result.
In a specific implementation, the credit investigation SDK component is embedded in the service engine system 120, and operations such as transmission, encryption and decryption, signature and signature verification of user credit investigation data between the service engine system 120 and the credit investigation system 130 can be performed by calling the credit investigation SDK component, so that leakage of the user credit investigation data can be further prevented, and further safety of the user credit investigation data can be further improved.
In a possible implementation manner, referring to fig. 1, the credit information data processing system 100 provided in the embodiment of the present application further includes an OA system 150, where the OA system 150 is respectively connected in communication with the service system 110, the service engine system 120, and the credit information system 130;
the OA system 150 is configured to, when receiving a credit receipt request sent by the service system 110 and the service engine system 120 corresponding to the service system 110, perform compliance verification on service basic information in the credit receipt request, and display a compliance verification result of the service basic information; when a public key submission request initiated after the compliance audit of the basic information of the service is confirmed based on the compliance audit result is received, a service system public key identification of the service system 110 and a service engine system public key identification of the service engine system 120 are obtained, and a credit investigation butt joint configuration request is sent to a credit investigation system 130 based on the service system public key identification and the service engine system public key identification; the credit investigation system 130 receives a credit investigation docking configuration response returned by aiming at the credit investigation docking configuration request, and based on the service system identifier, the service engine system identifier and the credit investigation system public key identifier in the credit investigation docking configuration response, the delivery allocation operation is executed for the service system 110 and the service engine system 120;
The credit system 130 is further configured to, when receiving a credit docking configuration request sent by the OA system 150, configure a service system identifier and an authorized credit data field for the service system 110 and bind with a service system public key identifier in the credit docking configuration request, configure a service engine system identifier for the service engine system 120 and bind with a service engine system public key identifier in the credit docking configuration request, bind the service system identifier with the service engine system identifier, and return a credit docking configuration response to the OA system 150 based on the service system identifier, the service engine system identifier and the credit system public key identifier.
In a specific implementation, the OA system 150 may perform automatic compliance audit on the service basic information in the credit receipt request based on a pre-configured compliance audit rule or based on a pre-trained compliance audit model, may display the service basic information in the credit receipt request on a credit receipt management user interface to perform manual compliance audit on the service basic information in the credit receipt request, may further display the service basic information in the credit receipt request on a credit receipt management user interface to perform manual compliance audit on the service basic information in the credit receipt request after performing automatic compliance audit on the service basic information in the credit receipt request based on a pre-configured compliance audit rule or based on a pre-trained compliance audit model, and so on.
Based on the credit data processing system 100, the embodiment of the present application further provides a credit data processing method, where the credit data processing method provided by the embodiment of the present application includes a credit data docking application and authorization configuration process, and a credit data acquisition request and credit evaluation process; wherein:
referring to fig. 2, in the credit investigation data processing method provided in the embodiment of the present application, the interaction flow of the credit investigation data docking application and the authorization configuration process is as follows:
step 201: and when the OA system 150 receives the credit receipt request sent by the service system 110 and the service engine system 120 corresponding to the service system 110, compliance checking is performed on the service basic information in the credit receipt request.
In practical application, the service management user may input or select the service system 110 and the registration name, application scenario, service type, service required credit investigation data field and other service basic information of the service engine system 120 corresponding to the service system 110 on the service management user interface, and initiate a credit investigation application request for the service system 110 and the service engine system 120 corresponding to the service system 110; and when the OA system 150 receives the credit receipt application request, compliance verification is carried out on the basic information of the business in the credit receipt application request.
In a specific implementation, when the OA system 150 performs compliance verification on the service basic information in the credit application request, in one embodiment, the OA system 150 may directly perform automatic compliance verification on the service basic information in the credit application request based on a pre-configured compliance verification rule or based on a pre-trained compliance verification model; in another embodiment, the OA system 150 may also display the service basic information in the credit receipt request on the credit management user interface, so that the credit management user returns the compliance verification result of the service basic information after performing the manual compliance verification on the service basic information; in another embodiment, the OA system 150 may further perform automatic compliance verification on the service basic information in the credit receipt request based on a pre-configured compliance verification rule or based on a pre-trained compliance verification model to obtain an automatic compliance verification result, and display the service basic information in the credit receipt request on the credit receipt management user interface so that the credit management user returns a manual compliance verification result after performing manual compliance verification on the service basic information on the credit receipt, so as to determine the compliance verification result of the credit receipt on the service basic information according to the automatic compliance verification result and the manual compliance verification result, for example, when the compliance verification result and the manual compliance verification result both characterize the compliance verification of the credit receipt on the service basic information, determine that the compliance verification of the credit receipt on the service basic information passes, and otherwise determine that the compliance verification of the credit receipt on the service basic information does not pass.
Step 202: OA system 150 displays the compliance audit results of the business base information.
In practical application, after the OA system 150 obtains the compliance verification result of the service basic information, the compliance verification result of the service basic information is returned to the sender of the credit receipt request, specifically, the compliance verification result of the service basic information may be displayed on the service management user interface to be returned to the service management user.
Step 203: and when the OA system 150 receives the public key submission request initiated after the compliance verification of the service basic information is determined based on the compliance verification result, acquiring the service system public key identifier of the service system 110 and the service engine system public key identifier of the service engine system 120.
In practical application, after the service management user determines that the compliance audit of the service basic information is passed based on the compliance audit result displayed on the service management user interface, a public key identifier submitting request may be initiated on the service management user interface, and when the OA system 150 receives the public key identifier submitting request, the service system public key identifier may be obtained from the service system 110 and the service engine system public key identifier may be obtained from the service engine system 120.
Step 204: OA system 150 sends a credit interface configuration request to credit system 130 based on the business system public key identification and the business engine system public key identification.
In practical application, OA system 150 obtains the service system public key identifier and the service engine system public key identifier, and then sends the service system public key identifier and the service engine system public key identifier carried in the credit investigation docking configuration request to credit investigation system 130.
Step 205: when the credit investigation system 130 receives the credit investigation docking configuration request sent by the OA system 150, a service system identifier and an authorized credit investigation data field are configured for the service system 110 and bound with a service system public key identifier in the credit investigation docking configuration request, a service engine system identifier is configured for the service engine system 120 and bound with a service engine system public key identifier in the credit investigation docking configuration request, and the service system identifier is bound with the service engine system identifier.
Step 206: the credit investigation system 130 returns a credit investigation docking configuration response to the OA system 150 based on the service system identification, the service engine system identification, and the credit investigation system public key identification.
In practical application, after obtaining the service system identifier, the service engine system identifier and the credit system public key identifier, the credit system 130 carries the service system identifier, the service engine system identifier and the credit system public key identifier in a credit docking configuration response and returns the result to the OA system 150.
Step 207: the OA system 150 receives the credit investigation docking configuration response returned by the credit investigation system 130 for the credit investigation docking configuration request, and performs a delivery allocation operation to the service system 110 and the service engine system 120 based on the service system identifier, the service engine system identifier, and the credit investigation system public key identifier in the credit investigation docking configuration response.
In practical application, OA system 150 receives the credit butt-joint configuration response returned by credit system 130, performs a delivery allocation operation to service system 110 based on the service system identifier and the credit system public key identifier in the credit butt-joint configuration response, and performs a delivery allocation operation to service engine system 120 based on the service engine system identifier and the credit system public key identifier in the credit butt-joint configuration response.
Referring to fig. 3, in the credit investigation data processing method provided in the embodiment of the present application, the interaction flow of the credit investigation data acquisition request and the credit investigation process is as follows:
step 301: when the service system 110 receives the service request, user identity information and a target credit information data field corresponding to the service request are acquired.
In a specific implementation, when the business system 110 receives a business request such as a loan business initiated by an enterprise user or a personal user, it can acquire the enterprise credit code of the enterprise user or user identity information such as an identity card number of the personal user, and the target credit investigation data fields such as user basic information, a loan outstanding condition, a loan overdue condition, a loan clearing condition, and a credit investigation condition required by the business request such as the loan business.
Step 302: the service system 110 performs encryption operation based on the public key of the credit investigation system and signature operation based on the private key of the service system on the user identity information and the target credit investigation data field through the encryption system 140 to obtain service encryption signature information.
In a specific implementation, the service system 110 may send the service system private key identifier, the credit investigation system public key identifier, the user identity information and the target credit investigation data field to the encryption system 140 in the first encryption and signature request; when the encryption system 140 receives the first encryption and signature request, a service system private key is obtained based on a service system private key identifier in the first encryption and signature request, the service digital signature information is obtained by signing the user identity information and the target credit data field in the first encryption and signature request based on the service system private key, a first symmetric key is generated, the first data ciphertext is obtained by encrypting the user identity information and the target credit data field in the first encryption and signature request based on the first symmetric key, the credit system public key is obtained based on a credit system public key identifier, the first symmetric key is obtained by encrypting the first symmetric key based on the credit system public key, the service digital envelope information is formed based on the first data ciphertext and the first key ciphertext, the service digital signature information and the service digital envelope information form service encryption signature information which is carried in a first encryption and signature response and returned to the service system 110, and the service system 110 can obtain the service encryption signature information formed by the service digital signature information and the service digital envelope information from the first encryption and signature response.
Step 303: the business system 110 initiates a business shadow account application request to the credit investigation system 130 based on the business encryption signature information.
In particular implementations, the service system 110 may send the service system identifier and the service encryption signature information to the credit investigation system 130 along with the service shadow account number application request.
Step 304: when the credit investigation system 130 receives a service shadow account application request initiated by the service system 110, the encryption system 140 executes a signature verification operation based on a service system public key and a decryption operation based on a credit investigation system private key to service encryption signature information in the service shadow account application request to obtain user identity information and a target credit investigation data field.
In a specific implementation, when receiving a service shadow account application request initiated by the service system 110, the credit investigation system 130 obtains a service system public key identifier based on a service system identifier in the service shadow account application request, and sends the service system public key identifier, the credit investigation system private key identifier and service encryption signature information in the service shadow account application request to the encryption system 140 in a first decryption and signature verification request; when the encryption system 140 receives the first decryption and verification request, a service system public key is obtained based on a service system public key identifier in the first decryption and verification request, after verification is performed on service digital signature information contained in service encryption signature information in the first decryption and verification request based on the service system public key, a credit investigation system private key is obtained based on a credit investigation system private key identifier in the first decryption and verification request, a first key ciphertext in service digital envelope information contained in the service encryption signature information in the first decryption and verification request is decrypted based on the credit investigation system private key to obtain a first symmetric key, and after the first data ciphertext in the service digital envelope information is decrypted based on the first symmetric key to obtain user identity information and a target credit investigation data field, the user identity information and the target credit investigation data field are carried in a first decryption and credit investigation response to the credit investigation system 130, and the credit investigation system 130 can obtain the user identity information and the target credit investigation data field from the first decryption and verification response.
Step 305: when the credit investigation system 130 determines that the target credit investigation data field is the authorized credit investigation data field of the service system 110, service shadow account information is generated and bound with the user identity information and the target credit investigation data field.
In a specific implementation, after the credit investigation system 130 obtains the user identity information and the target credit investigation data field, the user identity information and the target credit investigation data field are analyzed, and based on the service system identifier, the authorized credit investigation data field of the service system 110 is obtained, and whether the target credit investigation data field is the authorized credit investigation data field of the service system 110 is verified, and when the target credit investigation data field is the authorized credit investigation data field of the service system 110, a character string is randomly generated as service shadow account information by adopting a random number generation algorithm and is bound with the user identity information, the target credit investigation data field and the service system identifier.
Step 306: the credit investigation system 130 performs an encryption operation based on a public key of the service engine system and a signature operation based on a private key of the credit investigation system on the service shadow account information through the encryption system 140 to obtain first service shadow encryption signature information.
In a specific implementation, after the credit investigation system 130 generates service shadow account information and binds with the user identity information and the target credit investigation data field, a service engine system identifier is obtained based on the service system identifier in the service shadow account application request, and then after a service engine system public key is obtained according to the service engine system identifier, the service engine system public key identifier, the credit investigation system private key identifier and the service shadow account information are carried in a second encryption and signature request and sent to the encryption system 140; when the encryption system 140 receives the second encryption and signature request, a credit system private key is obtained based on a credit system private key identifier in the second encryption and signature request, the first service shadow digital signature information is obtained by signing the service shadow account information in the second encryption and signature request based on the credit system private key, a second symmetric key is generated, the second data ciphertext is obtained by encrypting the service shadow account information in the second encryption and signature request based on the second symmetric key, a service engine system public key is obtained based on a service engine system public key identifier in the second encryption and signature request, a second key ciphertext is obtained by encrypting the second symmetric key based on the service engine system public key, the first service shadow digital envelope information is formed based on the second data ciphertext and the second key ciphertext, the first service shadow digital signature information is formed into the first service shadow encryption signature information and the first service shadow digital envelope information, the first service shadow encryption signature information is carried in the second encryption and signature response and returned to the credit system 130, and the credit system 130 can obtain the first service shadow encryption signature information formed by the service digital envelope information and the service shadow digital signature information from the second encryption and signature response.
Step 307: the credit investigation system 130 returns a service shadow account number application response to the service system 110 based on the first service shadow cryptographic signature information.
In a specific implementation, after obtaining the first service shadow encryption signature information, the credit investigation system 130 carries the first service shadow encryption signature information in a service shadow account number application response and returns the first service shadow encryption signature information to the service system 110.
Step 308: the service system 110 receives a service shadow account application response returned by the credit investigation system 130 for the service shadow account application request, and initiates a credit assessment request to the service engine system 120 based on the first service shadow encryption signature information in the service shadow account application response.
In a specific implementation, when the service system 110 receives the service shadow account application response, the service system sends the first service shadow encryption signature information in the service shadow account application response to the service engine system 120 along with the credit evaluation request.
Step 309: when the service engine system 120 receives the credit evaluation request initiated by the service system 110, the encryption system 140 performs signature verification operation based on the public key of the credit investigation system and decryption operation based on the private key of the service engine system on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information.
In a specific implementation, when the service engine system 120 receives the credit evaluation request, the service engine system private key identifier, the credit investigation system public key identifier and the first service shadow encryption signature information in the credit evaluation request are carried in the second decryption and signature verification request and sent to the encryption system 140; when the encryption system 140 receives the second decryption and signature verification request, a public key of the credit investigation system is obtained based on a public key identification of the credit investigation system in the second decryption and signature verification request, after signature verification is performed on first service shadow digital signature information contained in first service shadow encryption signature information in the second decryption and signature verification request based on the public key of the credit investigation system, a private key of the service engine system is obtained based on a private key identification of the service engine system in the second decryption and signature verification request, a second symmetric key is obtained by decrypting second key ciphertext in first service shadow digital envelope information contained in the first service shadow encryption signature information in the second decryption and signature verification request based on the private key of the service engine system, and after service shadow account information is obtained by decrypting second data ciphertext in the first service shadow digital envelope information based on the second symmetric key, the service shadow account information is carried in the second decryption and signature verification response and returned to the service engine system 120, and the service engine system 120 can obtain service shadow account information from the second decryption and signature verification response.
Step 310: the service engine system 120 performs an encryption operation based on the public key of the credit investigation system and a signature operation based on the private key of the service engine system on the service shadow account information through the encryption system 140 to obtain second service shadow encrypted signature information.
In a specific implementation, after the service engine system 120 obtains the service shadow account information, the service engine system private key identifier and the service shadow account information are carried in a third signature request and sent to the encryption system 140; when the encryption system 140 receives the third signature request, a service engine system private key is obtained based on a service engine system private key identification in the third signature request, service shadow account information in the third signature request is signed based on the service engine system private key to obtain second service shadow digital signature information, the second service shadow digital signature information is carried in a third signature response and returned to the service engine system 120, the service engine system 120 can obtain the second service shadow digital signature information from the third signature response, and further, the service engine system 120 transmits the second service shadow digital signature information, the service shadow account information and the service system identification to the credit sign SDK component to call the credit SDK component to carry the service shadow account information and the credit sign system public key identification in the third encryption request and send the service shadow digital signature information and the credit sign system public key identification to the encryption system 140; when the encryption system 140 receives the third encryption request, a third symmetric key is generated, service shadow account information in the third encryption request is encrypted based on the third symmetric key to obtain a third data ciphertext, a credit system public key is obtained based on a credit system public key identification in the third encryption request, the third symmetric key is encrypted based on the credit system public key to obtain a third key ciphertext, the second service shadow digital envelope information is formed based on the third data ciphertext and the third key ciphertext, the second service shadow digital envelope information is carried in a third encryption response and returned to a credit SDK component in the service engine system 120, the credit SDK component in the service engine system 120 can obtain second service shadow digital envelope information from the third encryption response, and the second service shadow digital signature information and the second service shadow digital envelope information are further formed into second service shadow encryption signature information.
Step 311: the business engine system 120 initiates a credit acquisition request to the credit system 130 based on the second business shadow encrypted signature information.
In a specific implementation, after the credit SDK component in the service engine system 120 obtains the second service shadow encryption signature information, the second service shadow encryption signature information and the service system identifier are carried in the credit acquisition request and sent to the credit system 130.
Step 312: when the credit investigation system 130 receives the credit investigation acquisition request initiated by the credit investigation engine system 120 for the credit investigation request, the encryption system 140 executes the signature verification operation based on the public key of the business engine system and the decryption operation based on the private key of the credit investigation system to the second business shadow encryption signature information in the credit investigation acquisition request to obtain the business shadow account information.
In a specific implementation, when the credit investigation system 130 receives a credit investigation acquisition request initiated by the service engine system 120, inquiring the service engine system identifier based on the service system identifier in the credit investigation acquisition request, then inquiring the service engine system public key identifier based on the service engine system identifier, and sending the second service shadow encryption signature information in the service engine system public key identifier, the credit investigation system private key identifier and the credit investigation acquisition request to the encryption system 140; when the encryption system 140 receives the third decryption and signature verification request, a service engine system public key is obtained based on a service engine system public key identifier in the third decryption and signature verification request, after signature verification is performed on second service shadow digital signature information contained in second service shadow encryption signature information in the third decryption and signature verification request based on the service engine system public key, a credit investigation system private key is obtained based on a credit investigation system private key identifier in the third decryption and signature verification request, a third symmetric key is obtained by decrypting a third key ciphertext in the second service shadow digital envelope information contained in the third decryption and signature verification request based on the credit investigation system private key, and after service account information is obtained by decrypting a third data ciphertext in the second service shadow digital envelope information contained in the second service shadow encryption signature information in the third decryption and signature verification request based on the third symmetric key, the service account information is carried in a third decryption and signature verification response and returned to the credit investigation system 130, so that the service account information can be obtained from the third decryption and signature verification response.
Step 313: and when the credit investigation system 130 determines that the service shadow account information exists and is not used, engine shadow account information is generated and bound with the service shadow account information.
In a specific implementation, after obtaining the service shadow account information, the credit investigation system 130 verifies whether the service shadow account information exists and is not used; when the service shadow account information is determined to be absent or used, judging that a credit acquisition request initiated by the service engine system 120 is invalid, rejecting the credit acquisition request initiated by the service engine system 120, then returning a credit receipt failure notice to the service system 110 by the service engine system 120, and then, initiating a service shadow account application request to the credit system 130 by the service system 110 again to acquire the service shadow account information again, wherein when the application times of the service shadow account information exceeds a set threshold (for example, 3 times) due to poor network state and other reasons, the credit data processing flow aiming at the service request is ended, and the service request fails; when the existence and the unused of the service shadow account information are determined, a character string is randomly generated by adopting a random number generation algorithm to serve as engine shadow account information and is bound with the service shadow account information and the service system identifier.
Step 314: the credit investigation system 130 obtains user identity information and a target credit investigation data field which are bound with the business shadow account information, and obtains user credit investigation data corresponding to the target credit investigation data field based on the user identity information.
In a specific implementation, after the credit investigation system 130 generates engine shadow account information and binds with service shadow account information, user identity information and a target credit investigation data field bound with service shadow account information and service system identification are further obtained, and user credit investigation data corresponding to the target credit investigation data field is obtained based on the user identity information.
Step 315: the credit investigation system 130 performs encryption operation based on the public key of the service engine system and signature operation based on the private key of the credit investigation system on the engine shadow account information and the user credit investigation data through the encryption system 140 to obtain credit investigation encryption signature information.
In a specific implementation, after the credit investigation system 130 obtains the user credit investigation data, the engine shadow account information, the user credit investigation data, the credit investigation system private key identifier and the service engine system public key identifier are carried in a fourth encryption and signature request and sent to the encryption system 140; when the encryption system 140 receives the fourth encryption and signature request, the private key of the credit system is obtained based on the private key identification of the credit system in the fourth encryption and signature request, the credit digital signature information is obtained by signing the engine shadow account information and the user credit data in the fourth encryption and signature request based on the private key of the credit system, the fourth symmetric key is generated, the engine shadow account information and the user credit data in the fourth encryption and signature request are encrypted based on the fourth symmetric key to obtain the fourth data ciphertext, the public key of the business engine system is obtained based on the public key identification of the business engine system in the fourth encryption and signature request, after the secret key of the fourth symmetric key is obtained based on the public key of the business engine system, the credit digital envelope information is formed based on the fourth data ciphertext and the fourth secret key ciphertext, the credit digital signature information is formed into credit digital envelope information, the credit digital signature information is carried in the fourth encryption and signature response, and is returned to the credit system 130, and the credit system 130 can obtain the encryption signature information formed by the credit digital envelope information and the credit digital signature information from the fourth encryption and signature response.
Step 316: the credit system 130 returns a credit acquisition response to the business engine system 120 based on the credit encrypted signature information.
In a specific implementation, after the credit sign system 130 obtains the credit sign encrypted signature information, the credit sign encrypted signature information is carried in a credit sign obtaining response and returned to the credit sign SDK component in the service engine system 120.
Step 317: the service engine system 120 receives the credit acquisition response returned by the credit acquisition system 130 for the credit acquisition request, and performs a signature verification operation based on the public key of the credit system on the credit digital signature information contained in the credit encryption signature information in the credit acquisition response through the encryption system 140.
In a specific implementation, the credit sign SDK component in the service engine system 120 receives a credit sign acquisition response returned by the credit sign system 130, and carries credit sign digital signature information contained in the credit sign system public key identification and the credit sign encryption signature information in the credit sign acquisition response in a fourth signature verification request and sends the fourth signature verification request to the encryption system 140; when the encryption system 140 receives the fourth signature verification request, the public key of the credit investigation system is obtained based on the public key identification of the credit investigation system in the fourth signature verification request, and after the signature verification result of the credit investigation digital signature information is obtained by carrying the signature verification result of the credit investigation digital signature information in the fourth signature verification response and returning the signature verification result to the credit investigation SDK component in the service engine system 120, the credit investigation SDK component in the service engine system 120 can obtain the signature verification result of the credit investigation digital signature information contained in the credit investigation encryption signature information from the fourth signature verification response.
Step 318: the business engine system 120 sends a credit receipt success notification to the business system 110 based on the business shadow account information.
In a specific implementation, after obtaining the signature verification result of the credit digital signature information contained in the credit encrypted signature information, the credit SDK component in the service engine system 120 sends the service shadow account information to the service system 110 in a credit receipt success notification when determining that the credit digital signature information passes the signature verification based on the signature verification result of the credit digital signature information.
Step 319: the service engine system 120 asynchronously performs a decryption operation based on a private key of the service engine system on credit digital envelope information contained in the credit encrypted signature information in the credit acquisition response through the encryption system 140 to obtain engine shadow account information and user credit data.
In a specific implementation, after the credit receipt success notification is sent to the service system 110 based on the service shadow account information by the credit SDK component in the service engine system 120, the credit digital envelope information contained in the credit encryption signature information is asynchronously transferred to the credit evaluation standard interface, so that after the credit evaluation standard interface is called by the service engine system 120 to obtain the credit digital envelope information contained in the credit encryption signature information, the credit digital envelope information and the service engine system public key identification are further carried in a fourth decryption request and sent to the encryption system 140; when the encryption system 140 receives the fourth decryption request, the service engine system public key is obtained based on the service engine system public key identifier in the fourth decryption request, the fourth key ciphertext in the credit digital envelope information in the fourth decryption request is decrypted based on the service engine system public key to obtain a fourth symmetric key, the fourth data ciphertext in the credit digital envelope information is decrypted based on the fourth symmetric key to obtain engine shadow account information and user credit data, and then the engine shadow account information and the user credit data are carried in a fourth decryption response and returned to the service engine system 120, so that the service engine system 120 can obtain the engine shadow account information and the user credit data from the fourth decryption response.
Step 320: the service engine system 120 performs credit evaluation based on the user credit data to obtain a user credit evaluation result and binds the user credit evaluation result with engine shadow account information.
In a specific implementation, after obtaining the engine shadow account information and the user credit data, the service engine system 120 performs credit evaluation based on the user credit data to obtain a user credit evaluation result and binds the user credit evaluation result with the engine shadow account information, and waits for an evaluation acquisition request of the service system 110.
Step 321: when the service system 110 receives the credit receipt success notification sent by the service engine system 120 for the credit evaluation request, an evaluation acquisition request is initiated to the service engine system 120 based on the service shadow account information in the credit receipt success notification.
In a specific implementation, when the service system 110 receives a credit receipt success notification sent by the service engine system 120, the service shadow account information in the credit receipt success notification is carried in an evaluation acquisition request and sent to the service engine system 120.
Step 322: when the service engine system 120 receives the evaluation acquisition request initiated by the service system 110, engine shadow account information bound with the service shadow account information in the evaluation acquisition request is acquired from the credit system 130.
In a specific implementation, when receiving an evaluation acquisition request initiated by the service system 110, the service engine system 120 transmits service shadow account information in the evaluation acquisition request to the credit sign SDK component, so as to call the credit sign SDK component to carry the service shadow account information in the engine shadow account acquisition request and send the service shadow account information to the credit sign system 130; when the credit system 130 receives the engine shadow account acquisition request, engine shadow account information bound with the service shadow account information in the engine shadow account acquisition request is acquired, and the engine shadow account information is carried in an engine shadow account acquisition response and returned to the credit SDK component in the service engine system 120, and the credit SDK component in the service engine system 120 can acquire the engine shadow account information from the engine shadow account acquisition response.
Step 323: the business engine system 120 obtains the user credit assessment result bound with the engine shadow account information.
In a specific implementation, after the credit investigation SDK component in the service engine system 120 obtains engine shadow account information, the engine shadow account information is transferred into a new thread, so that the new thread is called to obtain a user credit evaluation result bound with the engine shadow account information, and then the user credit investigation SDK component is transferred into the credit investigation SDK component, and the credit investigation SDK component in the service engine system 120 can obtain the user credit evaluation result.
Step 324: the business engine system 120 returns an assessment acquisition response to the business system 110 based on the user credit assessment results.
In implementation, after the credit sign SDK component in the service engine system 120 obtains the user credit evaluation result, the user credit evaluation result is carried in an evaluation acquisition response and returned to the service system 110.
Step 325: the service system 110 receives an evaluation acquisition response returned by the service engine system 120 for the evaluation acquisition request, and performs a service operation based on the user credit evaluation result in the evaluation acquisition response.
In a specific implementation, the service system 110 receives an evaluation acquisition response returned by the credit sign SDK component in the service engine system 120, performs a service operation based on the user credit evaluation result in the evaluation acquisition response, for example, performs a loan approval operation based on the user credit evaluation result in the evaluation acquisition response, and then displays an application result of a service request such as a loan service to the user.
Based on the foregoing embodiments, the embodiments of the present application provide a credit data processing apparatus, and referring to fig. 4, a credit data processing apparatus 400 provided in the embodiments of the present application at least includes:
the service receiving unit 401 is configured to receive a service request, obtain user identity information and a target credit data field corresponding to the service request, perform encryption and signature operations on the user identity information and the target credit data field to obtain service encryption signature information, and initiate a service shadow account application request to a credit system based on the service encryption signature information;
An evaluation initiating unit 402, configured to initiate a credit evaluation request to the service engine system based on the first service shadow encryption signature information in the service shadow account application response returned by the credit evaluating system; the first business shadow encryption signature information is obtained by performing signature verification and decryption operations on the business encryption signature information by the credit investigation system to obtain user identity information and a target credit investigation data field, generating business shadow account information, binding the business shadow account information with the user identity information and the target credit investigation data field, and performing encryption and signature operations on the business shadow account information;
an evaluation obtaining unit 403, configured to initiate an evaluation obtaining request to the service engine system based on service shadow account information in the credit receipt success notification sent by the service engine system; the credit receipt success notice is sent in the process that the service engine system converts the first service shadow encryption signature information into second service shadow encryption signature information, initiates a credit acquisition request to the credit system based on the second service shadow encryption signature information, and then performs signature verification and decryption operations on the credit encryption signature information in a credit acquisition response returned by the credit system to obtain engine shadow account information and user credit data; the credit acquisition response is that the credit acquisition system performs signature verification and decryption operation on second business shadow encryption signature information in the credit acquisition request to obtain business shadow account information, acquires user identity information and target credit data fields which are bound with the business shadow account information, acquires user credit data corresponding to the target credit data fields based on the user identity information, generates engine shadow account information and binds with the business shadow account information, performs encryption and signature operation on the engine shadow account information and the user credit data to obtain credit encryption signature information, and returns the credit encryption signature information to the business engine system based on the credit encryption signature information;
A service processing unit 404, configured to perform a service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system; and the evaluation acquisition response is that the service engine system performs credit evaluation based on the user credit information to obtain a user credit evaluation result and binds with engine shadow account information, and then acquires the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit system and returns after acquiring the user credit evaluation result bound with the engine shadow account information.
Based on the foregoing embodiments, another credit data processing apparatus is provided in the embodiments of the present application, and referring to fig. 5, a credit data processing apparatus 500 provided in the embodiments of the present application includes at least:
an evaluation receiving unit 501, configured to receive a credit evaluation request initiated by a service system; the credit evaluation request is initiated by the service system based on first service shadow encryption signature information in a service shadow account application response returned by the credit evaluation system after the service system initiates a service shadow account application request to the credit evaluation system based on the service encryption signature information by executing encryption and signature operation on user identity information and a target credit evaluation data field corresponding to the service request when the service request is received; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operation on the service encryption signature information in the service shadow account application request to obtain user identity information and a target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operation on the service shadow account information;
The credit request unit 502 is configured to perform signature verification and decryption operations on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, perform encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information, and initiate a credit acquisition request to the credit system based on the second service shadow encryption signature information;
a credit receipt unit 503, configured to receive a credit acquisition response returned by the credit system; the credit acquisition response is that the credit acquisition system acquires user identity information and target credit data fields which are bound with the service shadow account information after performing signature verification and decryption operation on the second service shadow encryption signature information to obtain the service shadow account information, generates engine shadow account information and binds with the service shadow account information after acquiring user credit data corresponding to the target credit data fields based on the user identity information, and returns the credit encryption signature information based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit encryption signature information;
the evaluation execution unit 504 is configured to send a credit receipt success notification to the service system based on the service shadow account information in the process of performing signature verification and decryption on the credit encryption signature information in the credit acquisition response to obtain engine shadow account information and user credit data, and perform credit evaluation based on the user credit data to obtain a user credit evaluation result and bind the user credit evaluation result with the engine shadow account information;
An evaluation return unit 505, configured to receive an evaluation acquisition request initiated by the service system based on service shadow account information; and acquiring engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit investigation system, acquiring a user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system based on the user credit evaluation result so that the service system executes service operation based on the user credit evaluation result in the evaluation acquisition response.
Based on the foregoing embodiments, another credit data processing apparatus is provided in the embodiments of the present application, and referring to fig. 6, a credit data processing apparatus 600 provided in the embodiments of the present application includes at least:
a shadow request receiving unit 601, configured to receive a service shadow account number application request initiated by a service system based on service encryption signature information; the service encryption signature information is obtained by executing encryption and signature operations on user identity information and a target credit sign data field corresponding to a service request when the service system receives the service request;
the shadow account generation unit 602 is configured to perform signature verification and decryption operations on the service encrypted signature information to obtain user identity information and a target credit data field, generate service shadow account information, and bind the service shadow account information with the user identity information and the target credit data field;
The shadow account number return unit 603 is configured to perform encryption and signature operations on the service shadow account number information to obtain first service shadow encryption signature information, and return a service shadow account number application response to the service system based on the first service shadow encryption signature information, so that the service system initiates a credit evaluation request to the service engine system based on the first service shadow encryption signature information.
A credit request receiving unit 604, configured to receive a credit acquisition request initiated by the service engine system for the credit evaluation request; the credit acquisition request is initiated based on second service shadow encryption signature information after the service engine system performs signature verification and decryption operations on first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and performs encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information.
The credit shadow acquiring unit 605 is configured to perform signature verification and decryption on the second service shadow encrypted signature information in the credit acquiring request to obtain service shadow account information, acquire user identity information and a target credit data field that are bound with the service shadow account information, acquire user credit data corresponding to the target credit data field based on the user identity information, generate engine shadow account information, and bind with the service shadow account information;
And the credit account information receiving unit 606 is configured to receive a credit account information acquisition request initiated by the service system based on the credit account information in the credit account information acquisition request, acquire the engine shadow account information bound with the engine credit account information in the credit account acquisition request, and then acquire the user credit account information bound with the engine shadow account information and return to the service system to perform service operation.
It should be noted that, the principle of solving the technical problem by the credit information data processing device provided in the embodiment of the present application is similar to that of the credit information data processing method provided in the embodiment of the present application, so that the implementation of the credit information data processing device provided in the embodiment of the present application can refer to the implementation of the credit information data processing method provided in the embodiment of the present application, and the repetition is not repeated.
After introducing the credit investigation data processing system, method and device provided by the embodiment of the application, the electronic device provided by the embodiment of the application is briefly described next.
Referring to fig. 7, an electronic device 700 provided in the embodiments of the present application at least includes a processor 701, a memory 702, and a computer program stored in the memory 702 and capable of running on the processor 701, where the processor 701 implements any one of the credit data processing methods provided in the embodiments of the present application when executing the computer program.
The electronic device 700 provided by the embodiments of the present application may also include a bus 703 that connects the different components, including the processor 701 and the memory 702. Bus 703 represents one or more of several types of bus structures, including a memory bus, a peripheral bus, a local bus, and so forth.
The Memory 702 may include readable media in the form of volatile Memory, such as random access Memory (Random Access Memory, RAM) 7021 and/or cache Memory 7022, and may further include Read Only Memory (ROM) 7023. The memory 702 may also include a program tool 7025 having a set (at least one) of program modules 7024, the program modules 7024 including, but not limited to: an operating subsystem, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The processor 701 may be a processing element or a collective term for a plurality of processing elements, for example, the processor 701 may be a micro control unit (Microcontroller Unit, MCU), or a central processing unit (Central Processing Unit, CPU), or one or more integrated circuits configured to implement any of the credit data processing methods provided in the embodiments of the present application. In particular, the processor 701 may be a general purpose processor including, but not limited to, a central processing unit, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
The electronic device 700 may also communicate with one or more external devices 704 (e.g., remote control, etc.), with one or more devices that enable a user to interact with the electronic device 700 (e.g., cell phone, computer, etc.), and/or with any device that enables the electronic device 700 to communicate with one or more other electronic devices 700 (e.g., router, modem, etc.). Such communication may occur through an Input/Output (I/O) interface 705. Also, the electronic device 700 may communicate with one or more networks (e.g., local area network (Local Area Network, LAN), wide area network (Wide Area Network, WAN) and/or public network, such as the internet) via the network adapter 706. As shown in fig. 7, the network adapter 706 communicates with other modules of the electronic device 700 via the bus 703. It should be appreciated that although not shown in fig. 7, other hardware and/or software modules may be used in connection with electronic device 700, including, but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, disk array (Redundant Arrays of Independent Disks, RAID) subsystems, tape drives, data backup storage subsystems, and the like.
It should be noted that, the electronic device 700 shown in fig. 7 is only an example, and should not impose any limitation on the functions and application scope of the embodiments of the present application.
In addition, the embodiment of the application also provides a computer readable storage medium, and the computer readable storage medium stores computer instructions which when executed by a processor realize any one of the credit investigation data processing methods provided by the embodiment of the application. Specifically, the computer instructions may be built-in or installed in the processor, so that the processor implements any of the credit data processing methods provided in the embodiments of the present application by executing the built-in or installed computer instructions.
In addition, the credit investigation data processing method provided in the embodiment of the present application may also be implemented as a program product, where the program product includes a program code, and when the program code is executed by a processor, any of the credit investigation data processing methods provided in the embodiment of the present application is implemented.
The program product provided by the embodiments of the present application may employ any combination of one or more readable media, where the readable media may be a readable signal medium or a readable storage medium, and the readable storage medium may be, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof, and more specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a random access Memory, a read-Only Memory, an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), an optical fiber, a portable compact disk read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product provided by the embodiment of the application can adopt a CD-ROM and comprises program codes, and can also run on the electronic device. However, the program product provided by the embodiments of the present application is not limited thereto, and in the embodiments of the present application, the readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such a division is merely exemplary and not mandatory. Indeed, the features and functions of two or more of the elements described above may be embodied in one element in accordance with embodiments of the present application. Conversely, the features and functions of one unit described above may be further divided into a plurality of units to be embodied.
Furthermore, although the operations of the methods of the present application are depicted in the drawings in a particular order, this is not required to or suggested that these operations must be performed in this particular order or that all of the illustrated operations must be performed in order to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the embodiments of the present application without departing from the spirit and scope of the embodiments of the present application. Thus, if such modifications and variations of the embodiments of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to encompass such modifications and variations.

Claims (10)

1. The credit investigation data processing system is characterized by comprising a service system, a service engine system and a credit investigation system; the service system is in communication connection with the service engine system, and the service engine system is in communication connection with the credit investigation system;
the service system is used for acquiring user identity information and a target credit investigation data field corresponding to a service request when receiving the service request, performing encryption and signature operation on the user identity information and the target credit investigation data field to obtain service encryption signature information, and initiating a service shadow account application request to the credit investigation system based on the service encryption signature information; initiating a credit evaluation request to the service engine system based on first service shadow encryption signature information in a service shadow account application response returned by the credit investigation system; initiating an evaluation acquisition request to the service engine system based on service shadow account information in a credit receipt success notice sent by the service engine system; executing service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system;
The credit investigation system is used for executing signature verification and decryption operation on the service encryption signature information in the service shadow account application request to obtain the user identity information and the target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, executing encryption and signature operation on the service shadow account information to obtain the first service shadow encryption signature information, and returning the service shadow account application response to the service system based on the first service shadow encryption signature information; executing signature verification and decryption operations on second service shadow encryption signature information in a credit acquisition request initiated by the service engine system to obtain service shadow account information, acquiring user identity information and the target credit data field which are bound with the service shadow account information, acquiring user credit data corresponding to the target credit data field based on the user identity information, generating engine shadow account information and binding with the service shadow account information, executing encryption and signature operations on the engine shadow account information and the user credit data to obtain credit encryption signature information, and returning a credit acquisition response to the service engine system based on the credit encryption signature information;
The service engine system is configured to perform signature verification and decryption operations on the first service shadow encryption signature information in the credit evaluation request initiated by the service system to obtain service shadow account information, perform encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information, and initiate the credit acquisition request to the credit investigation system based on the second service shadow encryption signature information; in the process of executing signature verification and decryption operations on the credit encryption signature information in the credit acquisition response returned by the credit investigation system to obtain the engine shadow account information and the user credit investigation data, sending the credit investigation receipt success notification to the service system based on the service shadow account information, carrying out credit evaluation based on the user credit investigation data to obtain a user credit evaluation result and binding with the engine shadow account information; and acquiring the user credit evaluation result bound with the engine shadow account information after acquiring the engine shadow account information bound with the service shadow account information in the evaluation acquisition request initiated by the service system from the credit evaluation system, and returning an evaluation acquisition response to the service system based on the user credit evaluation result.
2. The credit data processing system of claim 1, further comprising an office automation OA system communicatively coupled to the business system, the business engine system, and the credit system, respectively;
the OA system is used for conducting compliance audit on service basic information in the credit receipt request aiming at the credit receipt request initiated by the service system and the service engine system corresponding to the service system, and displaying a compliance audit result of the service basic information; when a public key submission request initiated after the compliance verification result based on the compliance verification result determines that the compliance verification of the service basic information is passed is received, acquiring a service system public key identification of the service system and a service engine system public key identification of the service engine system, and sending a credit investigation butt joint configuration request to the credit investigation system based on the service system public key identification and the service engine system public key identification; receiving a credit investigation docking configuration response returned by the credit investigation system for the credit investigation docking configuration request, and executing delivery allocation operation to the service system and the service engine system based on the service system identifier, the service engine system identifier and the credit investigation system public key identifier in the credit investigation docking configuration response;
The credit investigation system is further configured to, when receiving the credit investigation docking configuration request sent by the OA system, configure a service system identifier and an authorized credit investigation data field for the service system and bind with the service system public key identifier in the credit investigation docking configuration request, configure a service engine system identifier for the service engine system and bind with the service engine system public key identifier in the credit investigation docking configuration request, bind the service system identifier with the service engine system identifier, and return a credit investigation docking configuration response to the OA system based on the service system identifier, the service engine system identifier and the credit investigation system public key identifier.
3. A credit data processing method, characterized by being applied to a service system in a credit data processing system as claimed in any one of claims 1-2, comprising:
receiving a service request, acquiring user identity information and a target credit investigation data field corresponding to the service request, performing encryption and signature operation on the user identity information and the target credit investigation data field to obtain service encryption signature information, and then initiating a service shadow account application request to a credit investigation system based on the service encryption signature information;
Initiating a credit evaluation request to a service engine system based on first service shadow encryption signature information in a service shadow account application response returned by the credit investigation system; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operations on the service encryption signature information to obtain the user identity information and the target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operations on the service shadow account information;
initiating an evaluation acquisition request to the service engine system based on service shadow account information in a credit receipt success notice sent by the service engine system; the credit receipt success notice is that the service engine system converts the first service shadow encryption signature information into second service shadow encryption signature information, and sends a credit acquisition request to the credit system based on the second service shadow encryption signature information, and then performs signature verification and decryption operations on credit encryption signature information in a credit acquisition response returned by the credit system to obtain engine shadow account information and user credit data; the credit acquisition response is that the credit acquisition system acquires the user identity information and the target credit data field bound with the service shadow account information after performing signature verification and decryption on the second service shadow encryption signature information in the credit acquisition request to obtain the service shadow account information, generates engine shadow account information and binds with the service shadow account information after acquiring user credit data corresponding to the target credit data field based on the user identity information, and returns to the service engine system based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit data to obtain credit encryption signature information;
Executing service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system; and the evaluation acquisition response is that the service engine system acquires the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit evaluation system after performing credit evaluation on the user credit evaluation data to obtain a user credit evaluation result and binding the user credit evaluation result with the engine shadow account information, and returns the engine shadow account information after acquiring the user credit evaluation result bound with the engine shadow account information.
4. A credit data processing method, characterized by being applied to a business engine system in a credit data processing system as claimed in any one of claims 1-2, comprising:
receiving a credit evaluation request initiated by a service system; the credit evaluation request is initiated by the service system based on first service shadow encryption signature information in a service shadow account application response returned by the credit system after the service system initiates a service shadow account application request to the credit system based on the service encryption signature information by executing encryption and signature operation on user identity information and a target credit data field corresponding to the service request when the service request is received; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operations on the service encryption signature information in the service shadow account application request to obtain the user identity information and the target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operations on the service shadow account information;
Executing signature verification and decryption operations on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and after executing encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information, initiating a credit acquisition request to the credit investigation system based on the second service shadow encryption signature information;
receiving a credit acquisition response returned by the credit system; the credit acquisition response is that the credit acquisition system acquires the user identity information and the target credit data field bound with the service shadow account information after performing signature verification and decryption operation on the second service shadow encryption signature information to obtain the service shadow account information, generates engine shadow account information and binds with the service shadow account information after acquiring user credit data corresponding to the target credit data field based on the user identity information, and returns based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit data to obtain credit encryption signature information;
In the process of executing signature verification and decryption operation on the credit encryption signature information in the credit acquisition response to obtain the engine shadow account information and the user credit data, sending the credit receipt success notification to the service system based on the service shadow account information, performing credit evaluation based on the user credit data to obtain a user credit evaluation result and binding with the engine shadow account information;
receiving an evaluation acquisition request initiated by the service system based on the service shadow account information;
and acquiring the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit investigation system, acquiring the user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system based on the user credit evaluation result so that the service system executes service operation based on the user credit evaluation result in the evaluation acquisition response.
5. A credit data processing method, characterized by being applied to a credit system in a credit data processing system as claimed in any one of claims 1 to 2, comprising:
Receiving a service shadow account number application request initiated by a service system based on service encryption signature information; the service encryption signature information is obtained by executing encryption and signature operations on user identity information and a target credit information data field corresponding to a service request when the service system receives the service request;
executing signature verification and decryption operation on the service encryption signature information to obtain user identity information and a target credit investigation data field, generating service shadow account information and binding the service shadow account information with the user identity information and the target credit investigation data field;
performing encryption and signature operations on the service shadow account information to obtain first service shadow encryption signature information, and returning a service shadow account application response to the service system based on the first service shadow encryption signature information so that the service system initiates a credit evaluation request to a service engine system based on the first service shadow encryption signature information;
receiving a credit acquisition request initiated by the service engine system aiming at the credit evaluation request; the credit acquisition request is initiated based on second service shadow encryption signature information after the service engine system performs signature verification and decryption operations on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and performs encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information;
Executing signature verification and decryption operation on second service shadow encryption signature information in the credit acquisition request to obtain service shadow account information, acquiring the user identity information and the target credit data field which are bound with the service shadow account information, acquiring user credit data corresponding to the target credit data field based on the user identity information, generating engine shadow account information and binding with the service shadow account information;
and in the process that the service engine system performs signature verification and decryption operations on the credit encryption signature information to obtain the engine shadow account information and the user credit data, sends a credit receipt success notice to the service system based on the service shadow account information, performs credit evaluation based on the user credit data to obtain a user credit evaluation result and binds with the engine shadow account information, and obtains the shadow engine credit evaluation result bound with the engine shadow account information from the credit system and returns the shadow engine account information bound with the service account information in the evaluation acquisition request to the service system to perform service operation after receiving an evaluation acquisition request initiated by the service system based on the service shadow account information in the credit receipt success notice.
6. A credit data processing apparatus, comprising:
the service receiving unit is used for receiving a service request, acquiring user identity information and a target credit investigation data field corresponding to the service request, performing encryption and signature operation on the user identity information and the target credit investigation data field to obtain service encryption signature information, and then initiating a service shadow account application request to a credit investigation system based on the service encryption signature information;
the evaluation initiating unit is used for initiating a credit evaluation request to the service engine system based on first service shadow encryption signature information in a service shadow account application response returned by the credit evaluating system; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operations on the service encryption signature information to obtain the user identity information and the target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operations on the service shadow account information;
the evaluation acquisition unit is used for initiating an evaluation acquisition request to the service engine system based on the service shadow account information in the credit receipt success notification sent by the service engine system; the credit receipt success notice is that the service engine system converts the first service shadow encryption signature information into second service shadow encryption signature information, and sends a credit acquisition request to the credit system based on the second service shadow encryption signature information, and then performs signature verification and decryption operations on credit encryption signature information in a credit acquisition response returned by the credit system to obtain engine shadow account information and user credit data; the credit acquisition response is that the credit acquisition system acquires the user identity information and the target credit data field bound with the service shadow account information after performing signature verification and decryption operation on the second service shadow encryption signature information in the credit acquisition request to obtain the service shadow account information, generates the engine shadow account information and binds with the service shadow account information after acquiring the user credit data corresponding to the target credit data field based on the user identity information, and returns the credit encryption signature information to the service engine system based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit data to obtain the credit encryption signature information;
The service processing unit is used for executing service operation based on the user credit evaluation result in the evaluation acquisition response returned by the service engine system; and the evaluation acquisition response is that the service engine system acquires the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit evaluation system after performing credit evaluation on the user credit evaluation data to obtain a user credit evaluation result and binding the user credit evaluation result with the engine shadow account information, and returns the engine shadow account information after acquiring the user credit evaluation result bound with the engine shadow account information.
7. A credit data processing apparatus, comprising:
the evaluation receiving unit is used for receiving a credit evaluation request initiated by the service system; the credit evaluation request is initiated by the service system based on first service shadow encryption signature information in a service shadow account application response returned by the credit system after the service system initiates a service shadow account application request to the credit system based on the service encryption signature information by executing encryption and signature operation on user identity information and a target credit data field corresponding to the service request when the service request is received; the first service shadow encryption signature information is obtained by the credit investigation system executing signature verification and decryption operations on the service encryption signature information in the service shadow account application request to obtain the user identity information and the target credit investigation data field, generating service shadow account information, binding the service shadow account information with the user identity information and the target credit investigation data field, and executing encryption and signature operations on the service shadow account information;
The credit assessment request unit is used for executing signature verification and decryption operation on the first service shadow encryption signature information in the credit assessment request to obtain service shadow account information, and after executing encryption and signature operation on the service shadow account information to obtain second service shadow encryption signature information, initiating a credit assessment acquisition request to the credit assessment system based on the second service shadow encryption signature information;
the credit receipt unit is used for receiving a credit acquisition response returned by the credit system; the credit acquisition response is that the credit acquisition system acquires the user identity information and the target credit data field bound with the service shadow account information after performing signature verification and decryption operation on the second service shadow encryption signature information to obtain the service shadow account information, generates engine shadow account information and binds with the service shadow account information after acquiring user credit data corresponding to the target credit data field based on the user identity information, and returns based on the credit encryption signature information after performing encryption and signature operation on the engine shadow account information and the user credit data to obtain credit encryption signature information;
The evaluation execution unit is used for sending a credit receipt success notice to the service system based on the service shadow account information in the process of executing signature verification and decryption operation on the credit encryption signature information in the credit acquisition response to obtain the engine shadow account information and the user credit data, and carrying out credit evaluation based on the user credit data to obtain a user credit evaluation result and binding the user credit account information with the engine shadow account information;
the evaluation return unit is used for receiving an evaluation acquisition request initiated by the service system based on the service shadow account information; and acquiring the engine shadow account information bound with the service shadow account information in the evaluation acquisition request from the credit investigation system, acquiring the user credit evaluation result bound with the engine shadow account information, and returning an evaluation acquisition response to the service system based on the user credit evaluation result so that the service system executes service operation based on the user credit evaluation result in the evaluation acquisition response.
8. A credit data processing apparatus, comprising:
the shadow request receiving unit is used for receiving a service shadow account number application request initiated by the service system based on the service encryption signature information; the service encryption signature information is obtained by executing encryption and signature operations on user identity information and a target credit information data field corresponding to a service request when the service system receives the service request;
The shadow account generation unit is used for executing signature verification and decryption operation on the service encryption signature information to obtain user identity information and a target credit investigation data field, generating service shadow account information and binding the service shadow account information with the user identity information and the target credit investigation data field;
the shadow account number return unit is used for performing encryption and signature operations on the service shadow account number information to obtain first service shadow encryption signature information, and returning service shadow account number application response to the service system based on the first service shadow encryption signature information so that the service system initiates a credit evaluation request to a service engine system based on the first service shadow encryption signature information;
a credit request receiving unit, configured to receive a credit acquisition request initiated by the service engine system for the credit evaluation request; the credit acquisition request is initiated based on second service shadow encryption signature information after the service engine system performs signature verification and decryption operations on the first service shadow encryption signature information in the credit evaluation request to obtain service shadow account information, and performs encryption and signature operations on the service shadow account information to obtain second service shadow encryption signature information;
The credit account number obtaining unit is used for obtaining the service shadow account number information by executing signature verification and decryption operation on the second service shadow encryption signature information in the credit account number obtaining request, obtaining the user identity information and the target credit account number data field which are bound with the service shadow account number information, obtaining user credit account number data corresponding to the target credit account number data field based on the user identity information, generating engine shadow account number information and binding the engine shadow account number information with the service shadow account number information;
and the credit account information receiving unit is used for receiving a credit account information acquisition request initiated by the service system based on the service account information in the credit account information acquisition request, acquiring the credit account information binding with the service account information in the credit account acquisition request from the credit system, and returning the credit account information binding with the shadow engine to the service system to execute service operation.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the credit data processing method of any of claims 3-5 when the computer program is executed.
10. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the credit data processing method of any of claims 3-5.
CN202410090451.2A 2024-01-23 2024-01-23 Credit data processing system, method, device, equipment and medium Active CN117611330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410090451.2A CN117611330B (en) 2024-01-23 2024-01-23 Credit data processing system, method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410090451.2A CN117611330B (en) 2024-01-23 2024-01-23 Credit data processing system, method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN117611330A true CN117611330A (en) 2024-02-27
CN117611330B CN117611330B (en) 2024-04-09

Family

ID=89946575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410090451.2A Active CN117611330B (en) 2024-01-23 2024-01-23 Credit data processing system, method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN117611330B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009372A (en) * 2012-08-03 2019-07-12 阿里巴巴集团控股有限公司 A kind of consumer's risk recognition methods and device
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN111178884A (en) * 2019-12-16 2020-05-19 平安壹钱包电子商务有限公司 Information processing method, device, equipment and readable storage medium
CN111241533A (en) * 2020-01-08 2020-06-05 深圳壹账通智能科技有限公司 Block chain-based password management method and device and computer-readable storage medium
CN113177842A (en) * 2021-05-27 2021-07-27 中国银行股份有限公司 Credit investigation data processing method, system, equipment and medium
CN115511596A (en) * 2022-09-02 2022-12-23 杭州榜置科技有限公司 Credit investigation, verification, evaluation and management method and system for aid decision
CN115564434A (en) * 2022-09-23 2023-01-03 西南交通大学 Block chain supervision privacy protection method based on zero knowledge proof
US20230071847A1 (en) * 2021-04-02 2023-03-09 Tencent Technology (Shenzhen) Company Limited Information verification method and related apparatus, device, and storage medium
CN117036005A (en) * 2023-08-30 2023-11-10 中国工商银行股份有限公司 Loan risk assessment method and device based on privacy intersection and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110009372A (en) * 2012-08-03 2019-07-12 阿里巴巴集团控股有限公司 A kind of consumer's risk recognition methods and device
CN111178884A (en) * 2019-12-16 2020-05-19 平安壹钱包电子商务有限公司 Information processing method, device, equipment and readable storage medium
CN110912712A (en) * 2019-12-18 2020-03-24 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN111241533A (en) * 2020-01-08 2020-06-05 深圳壹账通智能科技有限公司 Block chain-based password management method and device and computer-readable storage medium
US20230071847A1 (en) * 2021-04-02 2023-03-09 Tencent Technology (Shenzhen) Company Limited Information verification method and related apparatus, device, and storage medium
CN113177842A (en) * 2021-05-27 2021-07-27 中国银行股份有限公司 Credit investigation data processing method, system, equipment and medium
CN115511596A (en) * 2022-09-02 2022-12-23 杭州榜置科技有限公司 Credit investigation, verification, evaluation and management method and system for aid decision
CN115564434A (en) * 2022-09-23 2023-01-03 西南交通大学 Block chain supervision privacy protection method based on zero knowledge proof
CN117036005A (en) * 2023-08-30 2023-11-10 中国工商银行股份有限公司 Loan risk assessment method and device based on privacy intersection and electronic equipment

Also Published As

Publication number Publication date
CN117611330B (en) 2024-04-09

Similar Documents

Publication Publication Date Title
Basin et al. The EMV standard: Break, fix, verify
CN112131316B (en) Data processing method and device applied to block chain system
CN110348853B (en) Block chain off-line transaction method and system based on identification authentication
CN106899552A (en) Authentication method, certification terminal and system
CN109670803A (en) Method, apparatus, medium and the electronic equipment tested before online trading
CN112287379B (en) Service data using method, device, equipment, storage medium and program product
CN110708162B (en) Resource acquisition method and device, computer readable medium and electronic equipment
CN111698312B (en) Service processing method, device, equipment and storage medium based on open platform
JP7223067B2 (en) Methods, apparatus, electronics, computer readable storage media and computer programs for processing user requests
CN109815659A (en) Safety certifying method, device, electronic equipment and storage medium based on WEB project
CN112967056A (en) Access information processing method and device, electronic equipment and medium
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN112381540A (en) Method and device for verifying signed document based on zero-knowledge proof and electronic equipment
CN110830428A (en) Block chain financial big data processing method and system
US20150206143A1 (en) Line item processing in a multi-layer transaction tracking system
CN110601836B (en) Key acquisition method, device, server and medium
CN117611330B (en) Credit data processing system, method, device, equipment and medium
CN116362726A (en) Transaction order processing system, method, device, equipment and medium
CN114445922A (en) Secondary issuing method, device, equipment and storage medium for charging equipment
KR101171798B1 (en) System and method for electronic payment in electronic commerce, and recording medium used thereto
US11354227B2 (en) Conducting software testing using dynamically masked data
CN110932861A (en) Digital certificate management method, device, equipment and storage medium based on multiple CA
CN114172660B (en) Account management method, device and equipment of alliance chain and storage medium
CN114826616B (en) Data processing method, device, electronic equipment and medium
CN114881773B (en) User information processing system, method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant