CN117997560A - Enterprise identity verification method and equipment - Google Patents

Enterprise identity verification method and equipment Download PDF

Info

Publication number
CN117997560A
CN117997560A CN202211354326.5A CN202211354326A CN117997560A CN 117997560 A CN117997560 A CN 117997560A CN 202211354326 A CN202211354326 A CN 202211354326A CN 117997560 A CN117997560 A CN 117997560A
Authority
CN
China
Prior art keywords
information
enterprise
account
amount
business
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211354326.5A
Other languages
Chinese (zh)
Inventor
惠静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XFusion Digital Technologies Co Ltd
Original Assignee
XFusion Digital Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XFusion Digital Technologies Co Ltd filed Critical XFusion Digital Technologies Co Ltd
Priority to CN202211354326.5A priority Critical patent/CN117997560A/en
Publication of CN117997560A publication Critical patent/CN117997560A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to the technical field of cloud computing, in particular to an enterprise identity verification method and equipment. The method comprises the following steps: acquiring verification data, wherein the verification data comprises enterprise information and a bank account of a first enterprise; transferring funds of a first amount to the bank account and sending first information to a first communication account associated with the first business if the business identity of the first business is legal and the bank account is legal; receiving a second amount and second information input by a user; and when the second amount is consistent with the first amount and the second information is consistent with the third information, creating a resource utilization account for the first enterprise in the resource platform, wherein the third information is obtained based on the first information. The method can reduce the risk of the enterprise being imitated by illegal personnel.

Description

Enterprise identity verification method and equipment
Technical Field
The application relates to the technical field of cloud computing, in particular to an enterprise identity verification method and equipment.
Background
With the development of cloud computing technology, users can more conveniently utilize computing resources, storage resources and other resources provided by a cloud platform. In particular, the enterprise utilizes the resources provided by the cloud platform, and a resource infrastructure is not required to be built locally, so that the enterprise operation cost is reduced. In order to enable an enterprise to utilize resources provided by the cloud platform, the enterprise needs to create a resource utilization account at the cloud platform. The resource utilization account is used for a user to purchase a resource at the cloud platform to utilize the resource.
The cloud platform needs to allow the enterprise to create a resource utilization account on the cloud platform under the condition that the identity of the enterprise is legal and the bank account for purchasing the resource is legal. At present, the scheme of verifying whether the identity of an enterprise is legal by a cloud platform is poor in safety, verification information is possibly leaked, and the risk that an illegal user imitates the identity of the enterprise to create a resource utilization account is high.
Disclosure of Invention
The embodiment of the application provides an enterprise identity verification method and equipment, which can reduce the risk of enterprises being imitated by illegal personnel.
In a first aspect, an enterprise identity verification method is provided, which is applied to a resource providing platform, and includes: acquiring verification data, wherein the verification data comprises enterprise information and a bank account of a first enterprise; transferring funds of a first amount to the bank account and sending first information to a first communication account associated with the first business if the business identity of the first business is legal and the bank account is legal; receiving a second amount and second information input by a user; and when the second amount is consistent with the first amount and the second information is consistent with the third information, creating a resource utilization account for the first enterprise in the resource platform, wherein the third information is obtained based on the first information.
When the identity of the enterprise of the first enterprise is verified, the method transfers verification money to a bank account of the enterprise and sends verification information to an enterprise associated communication account, and when the fund amount input by a user is consistent with the money amount of the verification money and the information input by the user is consistent with the verification information, a resource utilization account is created on a resource providing platform, so that the risk of the enterprise being imitated by illegal personnel is reduced.
In a possible implementation manner, the first information is the same as the third information, and the first information is a verification code.
In one possible implementation, the first information is random information.
In the embodiment, the verification information sent to the enterprise associated communication account is random information, so that the risk that the verification information is estimated by illegal personnel is avoided.
In one possible implementation, the transferring funds to the bank account in a first amount and the sending first information to a first communication account associated with the business information includes: generating third information; encrypting the third information using the first private key; taking the encrypted third information as the fund remarking information of funds transferred to the bank account for a first amount; and sending a first public key corresponding to the first private key as the first information to the first communication account, wherein the first public key is used for decrypting the payment remark information to obtain the third information.
In the embodiment, an asymmetric encryption technology is introduced to encrypt the verification information so as to verify whether the user verifying the identity of the enterprise at the resource providing platform is a legal proxy of the enterprise, thereby further reducing the risk of the enterprise being imitated by illegal personnel.
In one possible implementation, in case that the identity of the first enterprise is legal and the bank account is legal, a public-private key pair consisting of the first private key and the first public key is applied to a public-key infrastructure.
In the embodiment, under the condition that the identity of the first enterprise identity is legal and the bank account is legal, the public-private key pair formed by the first private key and the first public key is applied, so that the risk that the public-private key pair is obtained by an illegal person is avoided.
In one possible implementation, before the sending the first information to the first communication account associated with the enterprise information, the method further includes: confirming that the first communication account is associated with the first enterprise.
In one possible implementation, the verification data further includes the first communication account, and the validating that the first communication account is associated with the first enterprise includes: querying a second communication account corresponding to the enterprise information in a third party enterprise verification system; when the second communication account and the first communication account both include a first identification, confirming that the first communication account is associated with the first enterprise.
In the embodiment, the communication account of the enterprise in the third-party enterprise verification system is utilized to identify whether the communication account in the verification data is the associated communication account of the enterprise, so that the identification accuracy is high.
In one possible implementation, the first communication account and the second communication account are both enterprise email boxes, and the first identifier is an enterprise email box suffix.
In one possible implementation, the confirming that the first communication account is associated with the first enterprise includes: querying a second communication account corresponding to the enterprise information in a third party enterprise verification system; and taking the second communication account as the first communication account.
In the embodiment, the communication account of the enterprise in the direct third-party enterprise verification system is used as the associated communication account of the enterprise, so that the risk that the associated communication account of the enterprise is imitated is avoided.
In one possible implementation, the business information includes any one or more of a business name of the first business, a unified credit code of the first business, a legal name of the first business, a picture of a business license of the first business; the picture is a scanned picture covered with a official seal of the first enterprise.
The enterprise official seal is not easy to obtain by illegal personnel, and the enterprise information comprises a scanning picture covered with the enterprise official seal, so that the legal agency of the enterprise can be further ensured.
In a second aspect, a user terminal is provided, the user terminal includes a display, a processor and a receiving port, the processor is connected with the receiving port, the display is connected with the processor, the receiving port is used for receiving a first message, the processor responds to the first message and outputs a first interface through the display, the first interface prompts a user to input verification data, and the verification data includes enterprise information and bank accounts of a first enterprise; the processor is used for acquiring the verification data and transmitting the verification data to a resource providing platform; the processor is used for responding to a second message, outputting a second interface through the display, and prompting a user to input a second amount and second information, wherein the second amount is information which needs to be input by the user when the resource providing platform transfers funds of a first amount to the bank account, and the second information is information which needs to be input by the user when the resource providing platform transfers funds of a first amount to the first communication account associated with the first enterprise; the processor is configured to respond to a third message by outputting a third interface through the display, where the third interface prompts the first enterprise to successfully create the resource utilization account.
In a third aspect, a server is provided, where the server includes a processor and a communication interface, where the processor is connected with the communication interface, and the communication interface is configured to obtain verification data, where the verification data includes enterprise information of a first enterprise and a bank account; the processor is configured to transfer funds of a first amount to the bank account and send first information to a first communication account associated with the first business if the business identity of the first business is legal and the bank account is legal; the processor is used for receiving a second amount and second information input by a user; the processor is configured to create a resource utilization account for the first enterprise in a resource providing platform when the second amount is consistent with the first amount and the second information is consistent with third information, where the third information is obtained based on the first information.
According to the enterprise verification method and the enterprise verification device, when the identity of the enterprise of the first enterprise is verified, verification money is transferred into the bank account of the enterprise and verification information is sent to the enterprise associated communication account, and when the fund amount input by the user is consistent with the money amount of the verification money and the information input by the user is consistent with the verification information, the resource utilization account is created on the resource providing platform, so that the risk that the enterprise is imitated by illegal personnel is reduced.
Drawings
FIG. 1 illustrates an embodiment of the present application providing a system architecture;
FIG. 2 shows an implementation flow of an enterprise identity verification scheme provided by an embodiment of the present application;
FIG. 3A illustrates a user interface provided by an embodiment of the present application;
FIG. 3B illustrates a user interface provided by an embodiment of the present application;
FIG. 4 shows an implementation flow of an enterprise identity verification scheme provided by an embodiment of the present application;
FIG. 5 illustrates a user interface provided by an embodiment of the present application;
FIG. 6 shows a flow chart of an enterprise identity verification method provided by an embodiment of the application;
Fig. 7 shows a client provided by an embodiment of the present application;
Fig. 8 shows a server provided by an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the application.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in various places are not necessarily all referring to the same embodiment, but mean "one or more, but not all, of the embodiments" unless expressly specified otherwise.
Wherein, in the description of the embodiments of the present application, unless otherwise indicated, "/" means or, for example, a/B may represent a or B; "and/or" herein is merely an association relation describing associated objects, meaning that three relations may exist, e.g., a and/or B may represent: a exists alone, A and B exist together, and B exists alone. In addition, in the description of the embodiments of the present application, "plurality" means two or more than two.
In the description of embodiments of the present application, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
The enterprise needs to register a resource utilization account in the cloud platform by utilizing the identity of the enterprise and the bank account. Then, through the resource utilization account, the resource that can be provided by the cloud platform is purchased. When registering a resource utilization account, the cloud platform needs to verify whether the enterprise identity and the bank account of the enterprise are legal or not, and whether the bank account and the enterprise identity are controlled by legal agents of the enterprise or not.
The verification scheme is that after the cloud platform confirms that the identity of an enterprise is legal and that the identity of a public bank account is legal, a small amount of verification gold with any amount between 0.01 and 1.00 yuan is transferred to the bank account through an online banking system. The enterprise inquires the bank account and feeds the amount of the small-amount verification gold received by the bank account back to the cloud platform. And if the amount of the small-amount verification gold actually transferred to the bank account by the cloud platform is consistent with the amount fed back by the enterprise, confirming that the verification bank account and the enterprise identity are controlled by legal agents of the enterprise. The cloud platform may then create a resource utilization account for the enterprise. When the enterprise uses the resources provided by the cloud platform through the resource utilization account, the cloud platform can deduct the cost from the bank account according to the amount of the used resources to complete the purchase of the resources.
Since business information (business name, unified social credit code, legal name, etc.) for verifying the business identity of the business, etc. can be queried on government websites (e.g., national business credit information publicity system). Thus, an illegal person can obtain the enterprise information. In addition, the information in the process of transferring money to the bank account of the enterprise by the online banking system is transmitted in the clear text in the network and is easily intercepted by illegal personnel. Therefore, illegal personnel can impersonate a proxy of the enterprise, register a resource utilization account in the cloud platform by utilizing the account of the enterprise for the public bank, and purchase resources by utilizing the resource utilization account. This results in property loss for the enterprise.
The embodiment of the application provides an enterprise identity verification scheme. The scheme can be used for providing a user interface B1 for a user to input enterprise information and bank accounts of the enterprise A when the user registers a resource utilization account on the resource providing platform by means of the identity of the enterprise A. In the case where it is confirmed that the business information of the business a and the bank account input by the user are legal, funds of the amount C1 are transferred to the bank account, and information D1 is transmitted to the communication account A1 associated with the business a. Then, a user interface B2 is provided for the user to input information D2 and for the amount C2. When the information D2 is consistent with the information D3 based on the information D1 and the amount C2 is equal to the amount C1, it can be confirmed that the user is a legal proxy of the enterprise a. Therefore, through a double verification mechanism of verification of the money (namely, the funds of the amount C1 transferred to the bank account) and verification of the information (namely, the information D3 obtained based on the information D1), whether the user is a legal agent of the enterprise is verified, so that the risk of the enterprise being imitated by illegal personnel is reduced. Wherein enterprise a may also be referred to as a first enterprise and communication account A1 may also be referred to as a first communication account.
Next, an enterprise identity verification scheme provided by the embodiment of the application is specifically described.
Fig. 1 illustrates a system architecture that may be used to implement an enterprise identity verification scheme. As shown in fig. 1, the system architecture may include a resource providing platform 110, a client 120.
The resource provisioning platform 110 may include at least one resource pool for provisioning at least one resource, such as resource 112 and/or resource 113, externally. Illustratively, resource 112 may be a computing resource and resource 113 may be a storage resource. The computing resources may also be referred to as processor resources, and may include central processing unit (central processing unit, CPU) resources, and may also include graphics processor (graphics processing unit, GPU) resources. Storage resources refer to resources used to store data, and may include memory (memory) resources, disk resources, and the like. The computing resources and the storage resources may also be in other forms, which are not described in detail herein.
In some embodiments, the resource providing platform 110 may be implemented as a cloud platform, and provides resources externally in the form of a cloud.
In some embodiments, the resource providing platform 110 may be a device cluster consisting of at least one server.
The resource providing platform 110 may further comprise a verification unit 111. The verification unit 111 is configured to verify, when the enterprise a registers the resource utilization account, whether the enterprise identity of the enterprise a and the bank account of the enterprise a are legal, and whether the enterprise identity of the enterprise a and the bank account of the enterprise a are manipulated by a legal proxy of the enterprise a. The legal agent of the enterprise refers to a person who receives the commission or arrangement of the enterprise a and registers a resource utilization account on behalf of the enterprise a on a resource providing platform. Typically, legal representatives of an enterprise are employees of the enterprise.
The verification unit 111 may be used to provide user interfaces, such as a user interface B1 and a user interface B2, among others. Illustratively, the verification unit 111 may provide a user interface in the form of a web page. I.e. the user interface may be implemented as a web page. The authentication unit 111 may acquire information input by the user at the user interface, such as enterprise information, bank accounts, and the like. The verification unit 111 may be used to verify whether the identity of the enterprise is legal or not and to verify that the bank account is legal according to the enterprise information.
With continued reference to FIG. 1, the resource providing platform 110 may be coupled to an authentication system. The authentication system is specifically a third party enterprise authentication system, and may be referred to as a third party enterprise authentication system. In one embodiment, the authentication system may be a national enterprise credit information reporting system. In some embodiments, the authentication system may be an electronic tax system.
The database of the identity verification system stores authenticated and recorded enterprise information and bank accounts, and can be used for verifying whether the enterprise identity represented by the enterprise information and the bank account are legal or not by the verification unit 111. For example, the authentication unit 111 may transmit the user-entered enterprise information of the enterprise a and the bank account to the authentication system. The identity verification system can query the enterprise information and the bank account in the database, and if the enterprise information is queried and the bank account corresponding to the enterprise information is queried as the bank account input by the user, the enterprise information of the enterprise A input by the user is consistent with the enterprise information of the enterprise A in the identity verification system, and the bank account of the enterprise A input by the user is consistent with the bank account of the enterprise A in the identity verification system. In this case, it may be confirmed that the user-entered enterprise identity and bank account of enterprise a are legitimate. The authentication system may then feed back information indicating that the identity of the enterprise and the bank account are legal as authentication results to the authentication unit 111. The authentication unit 111, upon receiving information indicating that the identity of the business and the bank account are legal, can confirm that the business information of the business a and the bank account input by the user are legal.
With continued reference to FIG. 1, the resource providing platform 110 may also be connected to a silver-linked system and include a payment unit 114. Where both the identity of the corporation and the bank account are legal, the payment unit 114 may generate a randomly sized amount, e.g., any amount between 0.01 and 1.00 yuan. The payment unit 114 may then notify the verification unit 111 of the amount and instruct the banking system to transfer funds to the bank account in the amount.
In some embodiments, with continued reference to fig. 1, the resource providing platform 110 may also be connected to a public key infrastructure (public key infrastructure, PKI) system. The PKI system includes a cryptographic engine that can generate a public-private key pair. The authentication unit 111 may send a key request to the PKI system. The PKI system may generate a public-private key pair in response to the key request and send the public-private key pair to the verification unit 111. The authentication unit 111 may use the public-private key pair to perform information interaction with the user, which will be described in detail below and not be repeated here.
Wherein, a public-private key pair is composed of a public key and a private key under an asymmetric key system mechanism. Specifically, the private key and the public key are not the same key, information encrypted by the private key may be decrypted by the public key, and information encrypted by the public key may be decrypted by the private key. Wherein the private key can only be owned and used by the owner of the public-private key pair, the public key can be issued to other parties. One party possessing the private key may encrypt information using the private key and send the encrypted information to the party possessing the public key. A party possessing the public key may decrypt the information using the public key. A party having a public key may encrypt information using the public key and send the encrypted information to the party having the private key. One party possessing the private key may decrypt the information using the private key.
In addition, each functional unit in the resource providing platform 110, such as an authentication unit, a payment unit, may be implemented by hardware. For example, the verification unit 111 may be one or more servers, and the payment unit 114 may be another one or more servers. The functional units in the resource providing platform 110 may also be implemented in software. For example, the verification unit 111 and/or the payment unit 114 may be implemented as a Virtual Machine (VM) or a container (container) or the like. As another example, the validation unit 111 and/or the payment unit 114 may be implemented as one or more processes (processes). Illustratively, the validation unit 111 and the payment unit 114 may run different virtual machines, containers, or processes on the same server or physical machine. Illustratively, the validation unit 111 and the payment unit 114 may operate on different servers.
The embodiment of the present application is not particularly limited to a specific implementation form of the functional units in the resource providing platform 110.
The user terminal 120 is a device for a user to interact with the resource providing platform 110. Specifically, the user terminal 120 may interact with the resource providing platform 110 in response to a user operation. For example, the user terminal 120 may be a terminal device such as a personal computer, a mobile phone, a vehicle-mounted terminal, a notebook computer, a tablet computer, a smart television, or a smart wearable device. For example, the client 120 may be another device, such as a server.
User U1 may be set as a person who registers a resource utilization account with the resource providing platform 110 using the enterprise identity and bank account of enterprise a. The enterprise a may be a large enterprise (e.g., an enterprise with staff more than 2000 persons), or a small enterprise (e.g., an enterprise with staff less than 2000 persons). The user U1 may input relevant information such as enterprise information, bank account, etc. at the user terminal 120 through the user interface provided by the resource providing platform 110. The details will be described below, and are not described in detail herein. It should be noted that, the user interface provided by the user terminal 120 through the resource providing platform 110 may be a user interface displayed on the interface after the user terminal receives and parses the interface information, where the resource providing platform 110 sends the interface information to the user terminal.
The above examples introduce the system architecture provided by the embodiments of the present application. Next, in conjunction with the system architecture provided above, the flow of the enterprise identity verification scheme provided by the embodiment of the present application is described.
The enterprise identity verification may also be referred to as enterprise identity verification, which includes verifying or verifying whether the enterprise identity and the bank account are legal, and whether the enterprise identity and the bank account are manipulated by legal agents.
As shown in fig. 2, an enterprise identity verification scheme provided by an embodiment of the present application includes the following steps.
The resource providing platform 110 may execute step 201, and provide the user interface B1 to the user U1 through the user terminal 120, where, for example, the user interface B1 may send interface information to the user terminal for the resource providing platform 110, and the user terminal receives and parses the interface information to display a user interface on the interface.
Where user U1 requests that resource provisioning platform 110 create a resource utilization account by virtue of or otherwise utilizing the enterprise identity of enterprise A, resource provisioning platform 110 may perform step 201. For example, the resource providing platform 110 may perform step 201 in response to an operation of requesting the identity authentication of the enterprise or an operation of real name authentication of the enterprise issued by the user terminal 120.
The user interface B1 is used for prompting the user U1 to input information E1 of the enterprise a. The information E1 may include information for authenticating an identity of an enterprise, a bank account, and the like. In some embodiments, the business information for business a may include any one or more of a business name for business a, a universal credit code for business a, a legal name for business a, a picture of business license for business a. In particular, the picture of the business license may be a scanned picture covered with a business official seal. It can be understood that the enterprise official seal is not easy to be obtained by illegal personnel, and the enterprise information comprises the scanned picture covered with the enterprise official seal, so that the user U1 can be further ensured to be a legal agent of the enterprise A. The bank account of the enterprise a is specifically a public bank account of the enterprise a. In some embodiments, enterprise information for enterprise a may not include a picture of the business license for enterprise a.
In some embodiments, information E1 may also include an enterprise mailbox for user U1. The enterprise mailbox of the enterprise A is an email address adopting the enterprise A specified information, such as the domain name of the enterprise A website, as a suffix. Typically, an administrator of enterprise a will set up an enterprise mailbox for an employee of enterprise a. After the employee leaves the job, the employee's enterprise mailbox is also closed or deleted. Therefore, if the user U1 has the enterprise mailbox of the enterprise a, the user U1 is the employee of the enterprise a, and the user U1 is the legal agent of the enterprise a.
In some embodiments, the information E1 may also include personal information such as the name, identification number, etc. of the user U1, so that the resource providing platform records and records personal information of a person attempting to register a resource utilization account with the resource providing platform by virtue of the enterprise identity of enterprise a.
To facilitate the user U1 to input the information E1, the user interface B1 may include a plurality of input boxes and input prompts to facilitate the user to input related information. In one example, user interface B1 may be as shown in fig. 3A, comprising: an input box for accommodating business names, an input box for accommodating unified credit codes, an input box for accommodating legal representative names, an input box for accommodating sponsor business mailboxes, an input box for accommodating business license scan pieces, an input box for accommodating sponsor names, an input box for accommodating sponsor identification card numbers, and the like. The user interface B1 may further include an input box for accommodating a name of a bank account, an input box for accommodating an issuer of a bank account, an input box for accommodating a bank account, and the like.
In some embodiments, user interface B1 may be presented in the form of a web page. That is, the user terminal 120 may display the user interface B1 through the browser, and thus, it may be convenient for the user U1 to input the information E1 through the user terminal 120, and the user terminal transmits the input information E1 to the resource providing platform 110.
Returning to FIG. 1, in step 202, information E1 entered by user U1 at user interface B1 may be sent to resource providing platform 110. The resource providing platform 110 may then perform step 203 of verifying whether the enterprise identity and the bank account of the enterprise a are legal based on the enterprise information and the bank account of the enterprise a included in the information E1.
In step 203, the resource providing platform 110 may verify, through the identity verification system, whether the enterprise identity and the bank account of the enterprise a are legal based on the enterprise information and the bank account of the enterprise a. As described above, the database of the authentication system stores the authenticated and recorded enterprise information and bank account, and can be used for the resource providing platform 110 to verify whether the enterprise identity represented by the enterprise information and the bank account are legal. The resource providing platform 110 may send the enterprise information and the bank account of the enterprise a in the information E1 received in step 202 to the authentication system. The authentication system may query the database for the enterprise information and the bank account of the enterprise a, and if the enterprise information of the enterprise a is queried and the bank account corresponding to the queried enterprise information of the enterprise a is the bank account input by the user, it is indicated that the enterprise information of the enterprise a received in step 202 is consistent with the enterprise information of the enterprise a in the authentication system, and the bank account of the enterprise a received in step 202 is consistent with the bank account of the enterprise a in the authentication system. In this case, it may be confirmed that the enterprise identity and bank account of enterprise a input by the user in step 202 are legal. Otherwise, it may be confirmed that the user entered in step 202 the enterprise identity and/or bank account of enterprise a is illegal
Thereafter, the authentication system may perform step 204, sending the authentication result to the resource providing platform 110. The verification result is information indicating whether the identity of the enterprise and the bank account are legal or not. After receiving the verification result, the resource providing platform 110 may execute step 205 to determine whether the enterprise identity and the bank account of the enterprise a are all legal.
If the verification result indicates that the identity of the enterprise a is illegal and/or the bank account is illegal, in step 205, it may be determined that the identity of the enterprise a and the bank account are legal and not all legal. At this time, the flow ends.
If the verification result indicates that the enterprise identity of the enterprise a is legal and the bank account is legal, in step 205, it is confirmed that the enterprise identity and the bank account of the enterprise a are all legal. At this point, the resource providing platform 110 may execute 206a, sending a payment instruction to the banking system. Wherein the funding indication may include an amount C1 randomly generated by the resource providing platform 110. I.e. the amount C1 is of random size and is not preset or predictable. The amount C may also be referred to as a first amount. Illustratively, the amount C1 is a randomly generated amount between 0.01 and 1.00 yuan. The funding indication may also include a bank account of enterprise a. The funding instruction is used for indicating funds transferred to the bank account of the enterprise A in the Unionpay system by the amount C1. After receiving the indication of the payment, the Union system may execute step 207b to transfer funds of the amount C1 to the bank account of the corporation A. Specifically, the resource providing platform 110 has a bank account in the banking system, and in step 207b, the banking system may transfer funds of the amount C1 in the bank account of the resource providing platform 110 into the bank account of the enterprise a.
With continued reference to FIG. 2, in the event that the identity of enterprise A and the bank account are both validated, the resource providing platform 110 may execute 206b, randomly generating verification information d1. I.e. the authentication information d1 is random information. The verification information d1 may be, for example, a randomly generated verification code. The resource providing platform 110 may then perform step 207b, sending the verification information D1 as information D1 to the communication account A1 of the enterprise a. The information D1 may be referred to as first information, and the verification information D1 may be referred to as third information. Here, the third information is the first information.
The communication account A1 is an associated communication account of the enterprise A after verification by the identity verification system or is an associated communication account of the enterprise A obtained by the identity verification system. Prior to performing step 207b, the resource providing platform 110 may determine whether the communication account A1 is an associated communication account of enterprise a. In particular, as described above, the authentication system may be a national enterprise credit information presentation system or an electronic tax system. Enterprises typically leave communication accounts, such as cell phone numbers, mailboxes, etc., when making business or tax registrations. In some embodiments, the resource providing platform 110 may query the communication account of enterprise a from the authentication system and take the queried communication account as communication account A1, so that it may be confirmed that communication account A1 is the associated communication account of enterprise a. The communication account of the enterprise a queried in the authentication system may also be referred to as a second communication account. In some embodiments, in the case where the communication account left by the enterprise at the time of business registration or tax registration is the enterprise mailbox a1, and the information E1 includes the enterprise mailbox a2 input by the user U1, the resource providing platform may acquire the suffix of the enterprise mailbox a1 from the identity verification system, and then determine whether the suffixes of the enterprise mailbox a1 and the enterprise mailbox a2 are consistent. If so, the enterprise mailbox a2 can be considered as the associated communication account of the enterprise A, and the enterprise mailbox a2 is taken as the communication account A1. The suffix of the mailbox of the enterprise may be referred to as a first identifier.
The execution sequence of steps 206a and 206b is not limited in the embodiment of the present application. Steps 206a, 206b may be performed simultaneously. Step 206a and step 206b may also be performed sequentially, for example, step 206a is performed before step 206b is performed, or step 206b is performed before step 206a is performed. The execution sequence of step 207a and step 207b is not limited in the embodiment of the present application. Step 207a, step 207b may be performed simultaneously. Step 207a and step 207b may be performed sequentially, for example, step 207a may be performed before step 207b is performed, or step 207b may be performed before step 207a is performed.
It will be appreciated that, in the case where the execution sequence of steps 206a and 206b is not limited in the embodiment of the present application, the execution sequence of steps 206a and 207b is not limited in the embodiment of the present application, and the execution sequence of steps 206b and 207b is not limited in the embodiment of the present application. In particular, the expansion is no longer one by one.
After step 207B, the resource providing platform 110 may perform step 208 to provide the user interface B2 to the user terminal 120. The user interface B2 is used for inputting the amount of funds received by the bank account of the enterprise a and receiving verification information by the communication account A1 by the user U1. In one example, in the case where the verification information is a verification code, the user interface B2 may include an input box for inputting a collection amount and an input box for inputting a verification unit, as shown in fig. 3B, to facilitate the user to input the amount of funds received by the bank account of the enterprise a and the communication account A1 to receive the verification information.
In step 209, the user U1 may input the information D2 and the amount C2 at the user interface B2 displayed on the user terminal 120. The information D2 is used for indicating the verification information received by the communication account A1 and input by the user U1, and the amount C2 is used for indicating the amount of funds received by the bank account of the enterprise a and input by the user U1. The resource providing platform 110 may acquire the information D2 and the amount C2 input by the user U1 in step 209, and then, perform step 210 to determine whether the information D2 and the verification information D1 are consistent, and determine whether the amount C2 and the amount C1 are consistent. The information D2 may be referred to as second information, and the amount C2 may be referred to as a second amount.
When the information D2 and the verification information D1 are not identical, and/or the amount C2 and the amount C1 are not identical, it is indicated that the user U1 may not be a legal agent of the enterprise a. In this case, the resource providing platform 110 ends the flow.
When the information D2 and the verification information D1 are consistent, and the amount C2 and the amount C1 are consistent, it is indicated that the user U1 is a legal proxy of the enterprise a. In this case, the resource providing platform 110 may perform step 211 to confirm that the enterprise identity authentication of the enterprise a is successful. Later procedures may then be performed, such as the resource-providing platform 110 creating a resource-utilizing account for enterprise a, and debiting a bank account for enterprise a when the resource-utilizing account purchases resources from the resource-providing platform, and so forth.
The enterprise identity verification scheme provided by the embodiment of the application can verify whether the user verifying the identity of the enterprise at the resource providing platform is a legal agent of the enterprise or not through a double verification mechanism of transferring verification gold to the bank of the enterprise and sending verification information to the enterprise associated communication account, thereby reducing the risk of the enterprise being imitated by illegal personnel.
The embodiment of the application also provides an enterprise identity verification scheme. The proposal is based on the proposal shown in fig. 2, and adopts the cryptography technology to further reduce the risk of the enterprise being imitated by illegal personnel. As shown in fig. 4, the scheme includes the following steps.
The steps 401, 402, 403, 404, and 405 in fig. 4 may be implemented by referring to the descriptions of the steps 201, 202, 203, 204, and 205 in fig. 2, respectively, and are not described herein.
In some embodiments, where the resource providing platform 110 confirms that both the enterprise identity and the bank account of enterprise a are legitimate, the resource providing platform 110 may perform step 406, sending a request to the KPI system. The request is used to provide a public-private key pair to the resource providing platform 110. The PKI system may generate a pair of public and private key pairs F1 in response to the request and send the generated public and private key pairs F1 to the resource providing platform 110, via step 407. Illustratively, the resource providing platform 110 may use the public-private key pair F1 received in step 407 as the private public-private key pair F1 of the enterprise a, only for the enterprise identity authentication of the enterprise a. The public key in the public-private key pair F1 may be referred to as a first public key, and the private key may be referred to as a first private key.
In some embodiments, the resource providing platform 110 has a public-private key pair F2. The public-private key pair F2 may be obtained from the KPI system for the resource providing platform 110 before initiating enterprise authentication of enterprise a, e.g., before performing step 401. In this case, the resource providing platform 110 may not perform step 406, and accordingly, the KPI system need not perform step 407. The public key in the public-private key pair F2 may be referred to as a first public key, and the private key may be referred to as a first private key.
With continued reference to FIG. 4, the resource providing platform 110 may execute step 408 to randomly generate the authentication information d1 and encrypt the authentication information d1 with the public-private key pair F1 or the private key in the public-private key pair F2. Thereafter, the resource providing platform 110 may perform step 409a to send the payment instruction and the encrypted authentication information d1 to the banking system. The resource providing platform 110 may perform step 409b to send the public key corresponding to the private key of the encrypted verification information D1 (the public key in the public-private key pair F1 or the public-private key pair F2) as the information D1 to the communication account A1. Here the public key is the information D1, i.e. the public key is the first information. Wherein the public key sent to communication account A1 is used to decrypt the authentication information d1 encrypted using the private key at step 408. The funding indication may include an amount C1 randomly generated by the resource providing platform 110, the funding indication indicating funds in the banking system to transfer the amount C1 to the bank account of the corporation a. The amount C1 and the communication account A1 may refer to the description of the embodiment shown in fig. 2, and are not described herein.
The execution sequence of step 409b and step 408 is not limited in the embodiment of the present application. Step 409a and step 408 may be performed simultaneously. Step 409a and step 408 may be performed sequentially, for example, step 408 is performed first, then step 409b is performed, or step 409b is performed first, then step 408 is performed. The embodiment of the present application does not limit the execution sequence of step 409b and step 409b. Step 409a and step 409b may be performed simultaneously. Step 409a and step 409b may be performed sequentially, for example, step 409b is performed before step 409a is performed, or step 409a is performed before step 409b is performed.
After receiving the payment instruction and the encrypted verification information d1, the Unionpay system may execute step 410 to transfer funds of the amount C1 to the bank account of the enterprise A and remark the encrypted verification information d1. The encrypted verification information d1 may be referred to as: the encrypted verification information d1 is used as the fund remark information of the funds transferred to the bank account of the enterprise A for the amount C1. Specifically, the banking system may transfer funds of the amount C1 in the bank account of the resource providing platform 110 into the bank account of the enterprise a, and send the encrypted verification information d1 as a fund remark to the bank account of the enterprise a. The amount C1 may be referred to as a first amount, and the verification information d1 may be referred to as third information.
With continued reference to fig. 4, the resource providing platform 110 may execute step 411 to provide the user interface B2' to the user U1 through the user terminal 120. The user interface B2' may be as shown in fig. 5. The user may be prompted via the user interface B2' to obtain validation information d1 (e.g., a validation code) from the communication account A1 (e.g., an enterprise mailbox), and to decrypt and enter the validation information d1..
The user U1 may input information D2 and an amount C2 to the user interface B2 displayed on the user terminal 120 at step 412. The information D2 is information, input by the user U1 at the user decryption B2, used to represent verification information in the fund remarks received by the bank account of the enterprise a, and the amount C2 is an amount, input by the user U1, used to represent funds received by the bank account of the enterprise a. The information D2 may be referred to as second information, and the amount C2 may be referred to as a second amount.
If the user U1 is a legal proxy of the enterprise a, the user U1 may obtain the public key from the communication account A1, and decrypt the encrypted information in the payment remark received by the bank account of the enterprise a by using the public key. Specifically, the user U1 may input the public key and the encrypted information into a decryption tool having an asymmetric encryption/decryption function, and the decryption tool may decrypt the encrypted information using the public key to obtain and output the authentication information d1. Thus, the user U1 can obtain the decrypted verification information D1, so that the verification information D1 can be input as the information D2 into the input box corresponding to the user interface B2 displayed on the user terminal 120.
In one example, the decryption tool may be a perfect privacy (open pretty good privacy, pgp) tool. Wherein pgp is an OPEN source, which may also be referred to as OPEN source pgp (OPEN pgp).
If the user U1 is not a legal agent of the enterprise a, it is difficult for the user U1 to obtain the public key from the communication account A1, and thus it is difficult to correctly decrypt the authentication information D1 encrypted using the private key in step 408, and thus it is difficult to input the correct authentication information D1 as the information D2 to the user interface input box in step 412.
The resource providing platform 110 may acquire the information D2 and the amount C2 input by the user U1 in step 209 in step 412, and then, perform step 413 to determine whether the information D2 and the verification information D1 are identical, and to determine whether the amount C2 and the amount C1 are identical.
When the information D2 and the verification information D1 are not identical, and/or the amount C2 and the amount C1 are not identical, it is indicated that the user U1 may not be a legal agent of the enterprise a. In this case, the resource providing platform 110 ends the flow.
When the information D2 and the verification information D1 are consistent, and the amount C2 and the amount C1 are consistent, it is indicated that the user U1 is a legal proxy of the enterprise a. In this case, the resource providing platform 110 may perform step 414 to confirm that the enterprise identity authentication of the enterprise a is successful. Later procedures may then be performed, such as the resource-providing platform 110 creating a resource-utilizing account for enterprise a, and debiting a bank account for enterprise a when the resource-utilizing account purchases resources from the resource-providing platform, and so forth.
The enterprise identity verification scheme provided by the embodiment of the application can be used for verifying whether the user verifying the enterprise identity on the resource providing platform is a legal proxy of the enterprise or not by transferring verification money to the bank of the enterprise and sending verification information to the enterprise associated communication account by introducing an asymmetric encryption technology, so that the risk of the enterprise being imitated by illegal personnel is further reduced.
Based on the enterprise identity verification scheme described above, the embodiment of the application provides an enterprise identity verification method. The method is applicable to a resource provisioning platform. As shown in fig. 6, the method includes the following steps. Step 601, obtaining verification data, wherein the verification data comprises enterprise information and bank accounts of a first enterprise. The steps 201 and 202 in fig. 2 may be specifically implemented by reference to the above description, and will not be repeated here.
Step 602, transferring funds of a first amount to the bank account and sending first information to a first communication account associated with the first enterprise in the case that the enterprise identity of the first enterprise is legal and the bank account is legal. The above description of steps 203-207 b in fig. 2 and steps 403-409 b in fig. 4 may be referred to for implementation, and will not be repeated here.
Step 603, receiving a second amount and second information input by the user. The steps 208 and 209 in fig. 2 and the steps 411 and 412 in fig. 4 may be specifically described above, and will not be described herein.
And step 604, when the second amount is consistent with the first amount and the second information is consistent with the third information, creating a resource utilization account for the first enterprise in the resource platform, wherein the third information is obtained based on the first information. The steps 210 and 211 in fig. 2 and the steps 413 and 414 in fig. 4 can be specifically described and implemented by reference to the above descriptions, and are not repeated here.
In some embodiments, the first information is the same as the third information, the first information being a verification code.
In some embodiments, transferring funds of a first amount to the bank account and transmitting first information to a first communication account associated with the business information includes: generating third information; encrypting the third information using the first private key; taking the encrypted third information as the fund remarking information of funds transferred to the bank account for a first amount; and sending a first public key corresponding to the first private key as the first information to the first communication account, wherein the first public key is used for decrypting the payment remark information to obtain the third information.
In some embodiments, before the sending the first information to the first communication account associated with the enterprise information, the method further comprises: confirming that the first communication account is associated with the first enterprise.
In one example of this embodiment, the verification data further includes the first communication account, and the validating that the first communication account is associated with the first enterprise includes: querying a second communication account corresponding to the enterprise information in a third party enterprise verification system; when the second communication account and the first communication account both include a first identification, confirming that the first communication account is associated with the first enterprise.
In one example of this example, the first communication account and the second communication account are each an enterprise email box, and the first identifier is an enterprise mailbox suffix.
In one example of this embodiment, the confirming that the first communication account is associated with the first enterprise includes: querying a second communication account corresponding to the enterprise information in a third party enterprise verification system; and taking the second communication account as the first communication account.
In some embodiments, the business information includes a combination of any one or more of a business name of the first business, a unified credit code of the first business, a legal name of the first business, a picture of a business license of the first business; the picture is a scanned picture covered with a official seal of the first enterprise.
The method provided by the embodiment of the application can verify whether the user verifying the identity of the enterprise at the resource providing platform is a legal agent of the enterprise or not through a double verification mechanism of transferring verification gold to the bank of the enterprise and sending verification information to the enterprise associated communication account, thereby reducing the risk of the enterprise being imitated by illegal personnel.
The embodiment of the application also provides a user terminal 700. As shown in fig. 7, the client 700 includes a display 710, a processor 720 and a receiving port 730, the processor 720 is connected to the receiving port 730, and the display 710 is connected to the processor 720. Wherein,
The receiving port 730 is configured to receive a first message, and the processor outputs a first interface through the display 710 in response to the first message, where the first interface prompts the user to input verification data, and the verification data includes enterprise information and bank account of a first enterprise;
The processor 720 is configured to obtain the verification data, and send the verification data to a resource providing platform; the processor responds to a second message, outputs a second interface through the display, and prompts a user to input a second amount and second information, wherein the second amount is information which needs to be input by the user when the resource providing platform transfers funds of a first amount to the bank account, and the second information is information which needs to be input by the user when the resource providing platform transfers funds of a first amount to the first communication account associated with the first enterprise;
The processor 720 is further configured to output, via the display, a third interface prompting the first enterprise to successfully create the resource utilization account in response to the third message.
The functions of each functional unit in the ue 700 may be implemented by referring to the description of the operations performed by the ue 120, which is not described herein.
The embodiment of the application also provides a server 800. As shown in fig. 8, the server 800 includes a processor 810 and a communication interface 820, and the processor 810 is connected to the communication interface 820. Wherein,
The communication interface 820 is configured to obtain verification data, where the verification data includes enterprise information of a first enterprise and a bank account;
The processor 810 is configured to transfer funds of a first amount to the bank account and send first information to a first communication account associated with the first business if the business identity of the first business is legal and the bank account is legal;
The processor 810 is configured to receive a second amount and second information input by a user;
The processor 810 is configured to create a resource utilization account for the first enterprise in a resource providing platform when the second amount is consistent with the first amount and the second information is consistent with third information, where the third information is derived based on the first information.
The functions of the functional units in the server 800 may also be implemented by referring to the description of the operations performed by the resource providing platform 110, which is not described herein.
There is also provided in an embodiment of the present application a computer-readable storage medium having stored thereon a computer program which, when executed in a computer, causes the computer to perform the method of fig. 6 described above.
There is also provided in an embodiment of the present application a computer program product storing instructions that, when executed by a computer, cause the computer to implement the method shown in fig. 6 described above.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; these modifications or substitutions do not depart from the essence of the corresponding technical solutions from the protection scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An enterprise identity verification method, which is applied to a resource providing platform, comprises the following steps:
Acquiring verification data, wherein the verification data comprises enterprise information and a bank account of a first enterprise;
transferring funds of a first amount to the bank account and sending first information to a first communication account associated with the first business if the business identity of the first business is legal and the bank account is legal;
Receiving a second amount and second information input by a user;
And when the second amount is consistent with the first amount and the second information is consistent with the third information, creating a resource utilization account for the first enterprise in the resource platform, wherein the third information is obtained based on the first information.
2. The method of claim 1, wherein the first information is identical to the third information, and wherein the first information is a verification code.
3. The method of claim 1, wherein transferring funds of a first amount to the bank account and transmitting first information to a first communication account associated with the business information comprises:
generating third information;
Encrypting the third information using the first private key;
Taking the encrypted third information as the fund remarking information of funds transferred to the bank account for a first amount;
And sending a first public key corresponding to the first private key as the first information to the first communication account, wherein the first public key is used for decrypting the payment remark information to obtain the third information.
4. The method of any of claims 1-3, wherein prior to the sending the first information to the first communication account associated with the enterprise information, the method further comprises: confirming that the first communication account is associated with the first enterprise.
5. The method of claim 4, wherein the validation data further comprises the first communication account, and wherein the validating that the first communication account is associated with the first business comprises:
Querying a second communication account corresponding to the enterprise information in a third party enterprise verification system;
When the second communication account and the first communication account both include a first identification, confirming that the first communication account is associated with the first enterprise.
6. The method of claim 5, wherein the first communication account and the second communication account are each an enterprise electronic mailbox, and the first identifier is an enterprise mailbox suffix.
7. The method of claim 4, wherein the confirming that the first communication account is associated with the first enterprise comprises:
Querying a second communication account corresponding to the enterprise information in a third party enterprise verification system;
and taking the second communication account as the first communication account.
8. The method of any of claims 1-7, wherein the business information comprises a combination of any one or more of a business name of the first business, a universal credit code of the first business, a legal name of the first business, a picture of a business license of the first business; the picture is a scanned picture covered with a official seal of the first enterprise.
9. A user terminal, which comprises a display, a processor and a receiving port, wherein the processor is connected with the receiving port, the display is connected with the processor,
The receiving port is used for receiving a first message, the processor responds to the first message, and outputs a first interface through the display, the first interface prompts a user to input verification data, and the verification data comprises enterprise information and bank accounts of a first enterprise;
The processor is used for acquiring the verification data and transmitting the verification data to a resource providing platform; the processor is used for responding to a second message, outputting a second interface through the display, and prompting a user to input a second amount and second information, wherein the second amount is information which needs to be input by the user when the resource providing platform transfers funds of a first amount to the bank account, and the second information is information which needs to be input by the user when the resource providing platform transfers funds of a first amount to the first communication account associated with the first enterprise;
the processor is configured to respond to a third message by outputting a third interface through the display, where the third interface prompts the first enterprise to successfully create the resource utilization account.
10. A server is characterized in that the server comprises a processor and a communication interface, the processor is connected with the communication interface,
The communication interface is used for acquiring verification data, wherein the verification data comprises enterprise information and bank accounts of a first enterprise;
the processor is configured to transfer funds of a first amount to the bank account and send first information to a first communication account associated with the first business if the business identity of the first business is legal and the bank account is legal;
the processor is used for receiving a second amount and second information input by a user;
The processor is configured to create a resource utilization account for the first enterprise in a resource providing platform when the second amount is consistent with the first amount and the second information is consistent with third information, where the third information is obtained based on the first information.
CN202211354326.5A 2022-11-01 2022-11-01 Enterprise identity verification method and equipment Pending CN117997560A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211354326.5A CN117997560A (en) 2022-11-01 2022-11-01 Enterprise identity verification method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211354326.5A CN117997560A (en) 2022-11-01 2022-11-01 Enterprise identity verification method and equipment

Publications (1)

Publication Number Publication Date
CN117997560A true CN117997560A (en) 2024-05-07

Family

ID=90899628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211354326.5A Pending CN117997560A (en) 2022-11-01 2022-11-01 Enterprise identity verification method and equipment

Country Status (1)

Country Link
CN (1) CN117997560A (en)

Similar Documents

Publication Publication Date Title
US20220321359A1 (en) Methods and systems for ownership verification using blockchain
US10235672B2 (en) Securely receiving from a remote user sensitive information and authorization to perform a transaction using the sensitive information
CN101222333B (en) Data transaction processing method and apparatus
CA2914956C (en) System and method for encryption
US20100153273A1 (en) Systems for performing transactions at a point-of-sale terminal using mutating identifiers
GB2549118A (en) Electronic payment system using identity-based public key cryptography
US20140172741A1 (en) Method and system for security information interaction based on internet
WO2016118087A1 (en) System and method for secure online payment using integrated circuit card
CN110740136A (en) Network security control method for open bank and open bank platform
EP3788535B1 (en) Techniques for performing secure operations
CN113783690A (en) Tender inviting method and device based on authentication
CN117997560A (en) Enterprise identity verification method and equipment
CA2891432C (en) Securely receiving from a remote user sensitive information and authorization to perform a transaction using the sensitive information
JP6501813B2 (en) INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM
TWM578432U (en) System for assisting a financial card holder in setting password for the first time
TWM578411U (en) System for assisting a financial card holder in setting password for the first time
CN112990927B (en) Payment verification method, system, device, computer system and storage medium
US20220311627A1 (en) Systems and methods for transaction card-based authentication
CN117196875A (en) Account data verification method, device, equipment and storage medium
CN115631045A (en) Electronic certificate transaction method, device, computer equipment and storage medium
CN115310976A (en) Non-contact transaction processing method, device and system
CN113469854A (en) Information sharing system and method, medium and electronic device
CN111444482A (en) Safe electronic seal management method based on electronic notarization
KR20020093161A (en) electronic an account commerce use national tax payment System
TW200904114A (en) Method of subscriber terminal providing identity verification for server terminal, computer accessible storage media, transaction safety verification method and its system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication