CN114996676A - Supply chain financial platform authentication system and method based on historical data analysis - Google Patents
Supply chain financial platform authentication system and method based on historical data analysis Download PDFInfo
- Publication number
- CN114996676A CN114996676A CN202210917988.2A CN202210917988A CN114996676A CN 114996676 A CN114996676 A CN 114996676A CN 202210917988 A CN202210917988 A CN 202210917988A CN 114996676 A CN114996676 A CN 114996676A
- Authority
- CN
- China
- Prior art keywords
- information
- module
- supply chain
- user identity
- financial data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2291—User-Defined Types; Storage management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/252—Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Databases & Information Systems (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Economics (AREA)
- Operations Research (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of network financial security, in particular to an authentication system and method of a supply chain financial platform based on historical data analysis. The method comprises the following steps: step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to an upstream supply chain module, and uploading the user identity information to an identity authentication module; step S2: receiving and processing financial data information sent by a downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information; step S3: storing financial data information and user identity information; step S4: and performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result. The security authentication system for the supply chain financial platform has the advantages of resisting repudiation, security and confidentiality, identity credibility and the like.
Description
Technical Field
The invention relates to the technical field of network financial security, in particular to an authentication system and method of a supply chain financial platform based on historical data analysis.
Background
The supply chain refers to a functional network structure which is formed by forming intermediate products and final products around a core enterprise from kit parts, and finally sending the products to consumers through a sales network to connect suppliers, manufacturers, distributors and end users into a whole. The business idea of supply chain management is to optimize the supply chain as a whole through cooperation between enterprises from the perspective of consumers. Successful supply chain management can coordinate and integrate all activities in the supply chain, eventually becoming an integrated process of seamless connectivity.
Supply chain finance is a financial service derived based on modern supply chain management, and comprises the steps of research and development, purchasing, logistics, selling and the like, financial service development is carried out, basic information of financing enterprises and the trade conditions of the financing enterprises in the whole supply chain network are observed, the possibility that assets with poor liquidity are appeared in the future is judged by starting from up and down real transactions, and the operation capacity and the risk resistance of small and medium-sized enterprises can be judged more objectively under the management of the modern supply chain background, so that the financing scale and risk of the enterprises are judged.
However, with the rapid development of the internet and social media, the traditional financial model is gradually shifted to the internet, and the characteristics of trading at any time and place in the virtual world are expected to bring about a great expansion to the internet finance. Under the development trend, extremely strong safety guarantee is needed for the aspects of self information, fund, transaction safety and the like of all the parties participating in the finance of the supply chain. Therefore, how to provide an authentication system and method for a supply chain financial platform based on historical data analysis is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The invention aims to provide a supply chain financial platform authentication system and method based on historical data analysis.
The invention improves the problem of information isolated island of a supply chain financial platform in the prior art, improves the interactivity of data information by sharing an upstream supply chain and a downstream supply chain with an identity authentication module and a data storage module, eliminates the isolated island effect of the financial data information, improves the interaction efficiency of the supply chain financial platform data, and simultaneously carries out identity verification on user identity information through the identity authentication module to ensure that the authentication result has uniqueness, thereby preventing the trade on the supply chain financial platform from being repudiated.
The invention improves the problem that the user needs to verify the identity information every time in the prior art, the invention marks the user identity information of the verified user, stores the marked identity information in the database, matches the marked identity information when the user identity information of the user is detected again, and directly passes the verification of the user according to the matching result, thereby avoiding the problem that the verification needs to be carried out every time.
In order to achieve the purpose, the invention provides the following technical scheme:
an authentication system for a supply chain financial platform based on historical data analysis, comprising: the system comprises an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module;
the downstream supply chain module is used for acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
the upstream supply chain module is used for receiving and processing the financial data information sent by the downstream supply chain module and judging whether to establish connection with the downstream supply chain module or not based on the financial data information;
the data storage module is used for storing the financial data information and the user identity information, and is also used for establishing a historical database, and historical financial data information corresponding to the user identity information is stored in the historical database;
the data storage module is further used for carrying out data analysis on financial data information and historical financial data information corresponding to the current user identity information and judging whether to upload the current user identity information to the identity authentication module or not according to a data analysis result;
the identity authentication module is used for carrying out identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result.
In some embodiments of the present application, the data storage module is further configured to perform data analysis on the financial data information corresponding to the current user identity information and historical financial data information, and includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the identity authentication module is internally provided with a database and is also used for marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information when the identity authentication module receives the user identity information, and directly judging that the identity authentication result is passed if the matching result is consistent.
In some embodiments of the present application, the upstream supply chain module comprises: the system comprises a data processing module, a data receiving module, a data decryption module and an identity verification module;
the data processing module is used for preprocessing the financial data information sent by the downstream supply chain module and uploading the preprocessed data information to the data storage module for storage;
the data receiving module is used for receiving the financial data information sent by the downstream supply chain module;
the data decryption module is used for decrypting the encrypted financial data information sent by the downstream supply chain module;
the identity authentication module is configured to receive the identity authentication result, establish a communication channel with the downstream supply chain module when the user identity information of the downstream supply chain module is trusted, upload the financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not trusted, not establish a connection with the downstream supply chain module and feed back the identity authentication result to the downstream supply chain module.
In some embodiments of the present application, the downstream supply chain module comprises a data acquisition module, a data upload module, a data encryption module, and an identity information module;
the data acquisition module is used for acquiring the financial data information and user identity information corresponding to the financial data information;
the data uploading module is used for uploading the financial data information acquired by the downstream supply chain module;
the data encryption module is used for encrypting the acquired financial data information;
the identity information module is used for uploading the acquired user identity information to the identity authentication module.
In some embodiments of the application, the data encryption module is further configured to convert the financial data information into a text string plaintext, specify different code pages by Encoding, convert the text string plaintext into codes corresponding to the different code pages, output the codes as a byte stream plaintext, and convert the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
In order to achieve the above object, the present invention further provides a method for authenticating a supply chain financial platform based on historical data analysis, which is applied in a system including an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module, and includes:
step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
step S2: receiving and processing the financial data information sent by the downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information;
step S3: storing the financial data information and the user identity information, and establishing a historical database, wherein historical financial data information corresponding to the user identity information is stored in the historical database;
step S4: performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result;
the step S3 further includes: and performing data analysis on financial data information and historical financial data information corresponding to the current user identity information, and judging whether to upload the current user identity information to the identity authentication module according to a data analysis result.
In some embodiments of the present application, the step S3 further includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the step S4 further includes: and establishing a database, marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information with the marked identity information when the user identity information is received, and directly judging that the identity verification result is passed if the matching result is consistent.
In some embodiments of the present application, the step S1 further includes:
preprocessing the financial data information sent by the downstream supply chain module, and uploading the preprocessed data information to the data storage module for storage;
receiving the financial data information sent by the downstream supply chain module;
decrypting the encrypted financial data information sent by the downstream supply chain module;
receiving the authentication result, establishing a communication channel between the upstream supply chain module and the downstream supply chain module when the user identity information of the downstream supply chain module is trusted, uploading the financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not trusted, not establishing connection between the upstream supply chain module and the downstream supply chain module and feeding back the authentication result to the downstream supply chain module.
In some embodiments of the present application, the step S2 further includes:
acquiring the financial data information and user identity information corresponding to the financial data information;
uploading the financial data information acquired by a downstream supply chain module;
encrypting the acquired financial data information;
and uploading the acquired user identity information to the identity authentication module.
In some embodiments of the present application, the encrypting the obtained financial data information includes:
converting the financial data information into a character string plaintext, designating different code pages through Encoding, converting the character string plaintext into codes corresponding to the different code pages, outputting the codes as a byte stream plaintext, and converting the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
Compared with the prior art, the supply chain financial platform authentication system and method based on historical data analysis have the beneficial effects that:
the financial data information sent by the downstream supply chain module is received and processed, whether connection is established with the downstream supply chain module is judged based on the financial data information, the financial data information and the user identity information corresponding to the financial data information are obtained, the financial data information is uploaded to the upstream supply chain module, the user identity information is uploaded to the identity authentication module, the user identity information corresponding to the financial data information is received, the identity authentication is carried out based on the user identity information to obtain the authentication result, whether the authentication is passed or not is judged according to the authentication result, and the financial data information and the user identity information are stored. The invention has the advantages of resisting the repudiation, having uniqueness and non-repudiation on the financial data information based on the user identity information, having safety confidentiality, ensuring the safety of the system and the user transaction data through the encryption verification of the financial data information, having identity credibility, and ensuring the legality and credibility of the identity of the user subject participating in the financial activities by verifying whether the user identity information is credible or not and further establishing a communication channel.
Drawings
FIG. 1 is a functional block diagram of an authentication system for a supply chain financial platform based on historical data analysis in accordance with the present invention;
FIG. 2 is a flow chart of the method of the present invention for authentication of a supply chain financial platform based on historical data analysis.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
In the description of the present application, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referred device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless otherwise specified.
In the description of the present application, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be directly connected or indirectly connected through an intermediate member, or they may be connected to each other through an intermediate member. The specific meaning of the above terms in this application will be understood to be a specific case for those of ordinary skill in the art.
With the rapid development of the internet and social media, the traditional financial model is gradually shifted to the internet, and the characteristics of conducting transactions at any time and place in the virtual world are expected to bring about a great expansion to the internet finance. Under the development trend, extremely strong safety guarantee is needed for the aspects of self information, fund, transaction safety and the like of all the parties participating in the finance of the supply chain. Therefore, how to provide an authentication system and method for a supply chain financial platform based on historical data analysis is a technical problem that needs to be solved urgently by those skilled in the art.
Therefore, the supply chain financial platform authentication system and method based on historical data analysis provided by the invention have the advantages of uniqueness, security and confidentiality, identity credibility and the like by carrying out identity verification on user identity information.
Referring to fig. 1, an embodiment of the disclosure provides an authentication system for a supply chain financial platform based on historical data analysis, including: the system comprises an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module;
the downstream supply chain module is used for acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
the upstream supply chain module is used for receiving and processing the financial data information sent by the downstream supply chain module and judging whether to establish connection with the downstream supply chain module based on the financial data information;
the data storage module is used for storing financial data information and user identity information and establishing a historical database, and historical financial data information corresponding to the user identity information is stored in the historical database;
the data storage module is also used for carrying out data analysis on financial data information corresponding to the current user identity information and historical financial data information and judging whether to upload the current user identity information to the identity authentication module or not according to a data analysis result;
the identity authentication module is used for carrying out identity authentication on the identity information of the user to obtain an identity authentication result and judging whether the identity authentication result passes the authentication or not according to the identity authentication result.
In an embodiment of the present application, the data storage module is further configured to perform data analysis on the financial data information corresponding to the current user identity information and the historical financial data information, and includes:
extracting current attribute information in financial data information corresponding to current user identity information and extracting historical attribute information in historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis results are that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis results are that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
the identity authentication module is internally provided with a database and is also used for marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information when receiving the user identity information, and directly judging that the identity authentication result is passed if the matching result is consistent.
In one particular embodiment of the present application, the upstream supply chain module comprises: the system comprises a data processing module, a data receiving module, a data decryption module and an identity verification module;
the data processing module is used for preprocessing the financial data information sent by the downstream supply chain module and uploading the preprocessed data information to the data storage module for storage;
the data receiving module is used for receiving financial data information sent by the downstream supply chain module;
the data decryption module is used for decrypting the encrypted financial data information sent by the downstream supply chain module;
the identity authentication module is used for receiving an identity authentication result, when the user identity information of the downstream supply chain module is credible, the upstream supply chain module and the downstream supply chain module establish a communication channel, the downstream supply chain module uploads financial data information, and when the user identity information of the downstream supply chain module is not credible, the upstream supply chain module and the downstream supply chain module do not establish connection and feed the identity authentication result back to the downstream supply chain module.
In a specific embodiment of the present application, the downstream supply chain module includes a data acquisition module, a data upload module, a data encryption module, and an identity information module;
the data acquisition module is used for acquiring financial data information and user identity information corresponding to the financial data information;
the data uploading module is used for uploading the financial data information acquired by the downstream supply chain module;
the data encryption module is used for encrypting the acquired financial data information;
the identity information module is used for uploading the acquired user identity information to the identity authentication module.
In a specific embodiment of the application, the data encryption module is further configured to convert financial data information into a plaintext character string, specify different code pages by Encoding, convert the plaintext character string into codes corresponding to the different code pages, output the codes as a plaintext byte stream, and convert the plaintext byte stream into a ciphertext byte stream according to the plaintext byte stream and a preset encryption algorithm.
Based on the same technical concept, referring to fig. 2, the present invention also provides a method for authenticating a supply chain financial platform based on historical data analysis, which is applied to a system including an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module, and includes:
step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to an upstream supply chain module, and uploading the user identity information to an identity authentication module;
step S2: receiving and processing financial data information sent by a downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information;
step S3: storing financial data information and user identity information, and establishing a historical database, wherein historical financial data information corresponding to the user identity information is stored in the historical database;
step S4: performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result;
step S3 further includes: and performing data analysis on the financial data information corresponding to the current user identity information and the historical financial data information, and judging whether to upload the current user identity information to the identity authentication module according to a data analysis result.
In a specific embodiment of the present application, step S3 further includes:
extracting current attribute information in financial data information corresponding to current user identity information and extracting historical attribute information in historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis results are that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs the user of the upstream supply chain to confirm the financial data information;
step S4 further includes: establishing a database, marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information with the marked identity information when the user identity information is received, and directly judging that the identity verification result is passed if the matching result is consistent.
In an embodiment of the present application, step S1 further includes:
preprocessing financial data information sent by a downstream supply chain module, and uploading the preprocessed data information to a data storage module for storage;
receiving financial data information sent by a downstream supply chain module;
decrypting the encrypted financial data information sent by the downstream supply chain module;
and receiving an identity verification result, establishing a communication channel between the upstream supply chain module and the downstream supply chain module when the user identity information of the downstream supply chain module is credible, uploading financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not credible, not establishing connection between the upstream supply chain module and the downstream supply chain module and feeding back the identity verification result to the downstream supply chain module.
In an embodiment of the present application, step S2 further includes:
acquiring financial data information and user identity information corresponding to the financial data information;
uploading financial data information acquired by a downstream supply chain module;
encrypting the acquired financial data information;
and uploading the acquired user identity information to an identity authentication module.
In a specific embodiment of the present application, the encrypting the acquired financial data information includes:
the financial data information is converted into a character string plaintext, different code pages are specified through Encoding, the character string plaintext is converted into codes corresponding to the different code pages and output as a byte stream plaintext, and the byte stream plaintext is converted into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
According to the first concept of the invention, the upstream supply chain and the downstream supply chain are shared with the identity authentication module and the data storage module, so that the interactivity of data information is improved, the island effect of financial data information is eliminated, the interaction efficiency of the financial platform data of the supply chain is improved, and meanwhile, the identity authentication module is used for carrying out identity authentication on the user identity information, so that the authentication result has uniqueness, and further, the condition that the transaction on the financial platform of the supply chain is repudiated is prevented.
According to the second concept of the invention, the user identity information of the verified user is marked, the marked identity information is stored in the database, when the user identity information of the user is detected again, the marked identity information is matched, and the user passes the verification directly according to the matching result, so that the problem that the verification needs to be carried out every time is avoided, historical data correlation matching is carried out according to the attribute information of the historical financial data information, the safety of the financial data information is greatly improved, and the working efficiency is greatly improved.
In summary, the authentication system and method for a supply chain financial platform based on historical data analysis provided by the present invention receive and process financial data information sent by a downstream supply chain module, and determine whether to establish a connection with the downstream supply chain module based on the financial data information, obtain user identity information corresponding to the financial data information and the financial data information, upload the financial data information to an upstream supply chain module, upload the user identity information to an identity authentication module, receive the user identity information corresponding to the financial data information, perform identity authentication based on the user identity information to obtain an authentication result, determine whether to pass the authentication according to the authentication result, and store the financial data information and the user identity information. The invention has the advantages of resisting the repudiation, having uniqueness and non-repudiation on the financial data information based on the user identity information, having safety confidentiality, ensuring the safety of the system and the user transaction data through the encryption verification of the financial data information, having identity credibility, and ensuring the legality and credibility of the identity of the user subject participating in the financial activities by verifying whether the user identity information is credible or not and further establishing a communication channel.
The above description is only an embodiment of the present invention, but not intended to limit the scope of the present invention, and any structural changes made according to the present invention should be considered as being limited within the scope of the present invention without departing from the spirit of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process and related description of the system described above may refer to the corresponding process in the foregoing method embodiments, and will not be described herein again.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional modules, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the modules or steps in the embodiment of the present invention are further decomposed or combined, for example, the modules in the foregoing embodiment may be combined into one module, or may be further split into multiple sub-modules, so as to complete all or part of the functions described above. Names of the modules and steps related in the embodiments of the present invention are only for distinguishing the modules or steps, and are not to be construed as unduly limiting the present invention.
Those of skill in the art will appreciate that the various illustrative modules, method steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that programs corresponding to the software modules, method steps may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (10)
1. An authentication system for a supply chain financial platform based on historical data analysis, comprising: the system comprises an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module;
the downstream supply chain module is used for acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
the upstream supply chain module is used for receiving and processing the financial data information sent by the downstream supply chain module and judging whether to establish connection with the downstream supply chain module or not based on the financial data information;
the data storage module is used for storing the financial data information and the user identity information, and is also used for establishing a historical database, and historical financial data information corresponding to the user identity information is stored in the historical database;
the data storage module is further used for carrying out data analysis on financial data information and historical financial data information corresponding to the current user identity information and judging whether to upload the current user identity information to the identity authentication module or not according to a data analysis result;
the identity authentication module is used for carrying out identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result.
2. The system of claim 1, wherein the data storage module is further configured to perform data analysis on the financial data information corresponding to the current user identity information and historical financial data information, and includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the identity authentication module is internally provided with a database and is also used for marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information when the identity authentication module receives the user identity information, and directly judging that the identity authentication result is passed if the matching result is consistent.
3. The system of claim 1, wherein the upstream supply chain module comprises: the system comprises a data processing module, a data receiving module, a data decryption module and an identity verification module;
the data processing module is used for preprocessing the financial data information sent by the downstream supply chain module and uploading the preprocessed data information to the data storage module for storage;
the data receiving module is used for receiving the financial data information sent by the downstream supply chain module;
the data decryption module is used for decrypting the encrypted financial data information sent by the downstream supply chain module;
the identity authentication module is configured to receive the identity authentication result, establish a communication channel with the downstream supply chain module when the user identity information of the downstream supply chain module is trusted, upload the financial data information by the downstream supply chain module, and when the user identity information of the downstream supply chain module is not trusted, not establish a connection with the downstream supply chain module and feed back the identity authentication result to the downstream supply chain module.
4. The historical data analysis-based supply chain financial platform authentication system as claimed in claim 1, wherein the downstream supply chain module comprises a data acquisition module, a data uploading module, a data encryption module and an identity information module;
the data acquisition module is used for acquiring the financial data information and user identity information corresponding to the financial data information;
the data uploading module is used for uploading the financial data information acquired by the downstream supply chain module;
the data encryption module is used for encrypting the acquired financial data information;
the identity information module is used for uploading the acquired user identity information to the identity authentication module.
5. The system of claim 4, wherein the historical data analysis-based supply chain financial platform certification system,
the data encryption module is further used for converting the financial data information into a character string plaintext, designating different code pages through Encoding, converting the character string plaintext into codes corresponding to the different code pages, outputting the codes as a byte stream plaintext, and converting the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
6. A supply chain financial platform authentication method based on historical data analysis is applied to a system comprising an upstream supply chain module, a downstream supply chain module, an identity authentication module and a data storage module, and is characterized by comprising the following steps:
step S1: acquiring financial data information and user identity information corresponding to the financial data information, uploading the financial data information to the upstream supply chain module, and uploading the user identity information to the identity authentication module;
step S2: receiving and processing the financial data information sent by the downstream supply chain module, and judging whether to establish connection with the downstream supply chain module based on the financial data information;
step S3: storing the financial data information and the user identity information, and establishing a historical database, wherein historical financial data information corresponding to the user identity information is stored in the historical database;
step S4: performing identity authentication on the user identity information to obtain an identity authentication result, and judging whether the user identity information passes the authentication according to the identity authentication result;
the step S3 further includes: and performing data analysis on the financial data information corresponding to the current user identity information and historical financial data information, and judging whether to upload the current user identity information to the identity authentication module according to a data analysis result.
7. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 6, wherein the step S3 further includes:
extracting current attribute information in the financial data information corresponding to the current user identity information and extracting historical attribute information in the historical financial data information corresponding to the user identity information, wherein the current attribute information comprises current transaction amount information and current transaction commodity information, and the historical attribute information comprises historical transaction amount information and historical transaction commodity information;
judging the absolute value of the difference value between the current transaction amount information and the historical transaction amount information;
when the absolute value is less than or equal to 100 ten thousand, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the absolute value is larger than 100 ten thousand, if the data analysis result is that the analysis is not passed, stopping uploading the user identity information to the identity authentication module, uploading the financial data information corresponding to the current user identity information to the upstream supply chain module, and informing a user of an upstream supply chain to confirm the financial data information by the upstream supply chain module;
judging whether the current transaction commodity information is matched with the historical transaction commodity information;
when the matching results are consistent, the data analysis result is that the analysis is passed, and the user identity information is uploaded to the identity authentication module;
when the matching results are inconsistent, the data analysis result is that the analysis is not passed, the user identity information is stopped being uploaded to the identity authentication module, the financial data information corresponding to the current user identity information is uploaded to the upstream supply chain module, and the upstream supply chain module informs a user of an upstream supply chain to confirm the financial data information;
the step S4 further includes: establishing a database, marking the user identity information, obtaining marked identity information corresponding to the user identity information, storing the marked identity information in the database, matching the marked identity information with the user identity information when the user identity information is received, and directly judging that the identity verification result is passed if the matching result is consistent.
8. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 6, wherein the step S1 further includes:
preprocessing the financial data information sent by the downstream supply chain module, and uploading the preprocessed data information to the data storage module for storage;
receiving the financial data information sent by the downstream supply chain module;
decrypting the encrypted financial data information sent by the downstream supply chain module;
receiving the identity verification result, establishing a communication channel between the upstream supply-chain module and the downstream supply-chain module when the user identity information of the downstream supply-chain module is trusted, uploading the financial data information by the downstream supply-chain module, and when the user identity information of the downstream supply-chain module is not trusted, not establishing connection between the upstream supply-chain module and the downstream supply-chain module and feeding the identity verification result back to the downstream supply-chain module.
9. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 8, wherein the step S2 further comprises:
acquiring the financial data information and user identity information corresponding to the financial data information;
uploading the financial data information acquired by a downstream supply chain module;
encrypting the acquired financial data information;
and uploading the acquired user identity information to the identity authentication module.
10. The method for authenticating the supply chain financial platform based on the historical data analysis as claimed in claim 9, wherein the step of encrypting the acquired financial data information comprises:
converting the financial data information into a character string plaintext, designating different code pages through Encoding, converting the character string plaintext into codes corresponding to the different code pages, outputting the codes as a byte stream plaintext, and converting the byte stream plaintext into a byte stream ciphertext according to the byte stream plaintext and a preset encryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210917988.2A CN114996676A (en) | 2022-08-01 | 2022-08-01 | Supply chain financial platform authentication system and method based on historical data analysis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210917988.2A CN114996676A (en) | 2022-08-01 | 2022-08-01 | Supply chain financial platform authentication system and method based on historical data analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114996676A true CN114996676A (en) | 2022-09-02 |
Family
ID=83022486
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210917988.2A Pending CN114996676A (en) | 2022-08-01 | 2022-08-01 | Supply chain financial platform authentication system and method based on historical data analysis |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114996676A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115329156A (en) * | 2022-10-14 | 2022-11-11 | 北京云成金融信息服务有限公司 | Data management method and system based on historical data |
CN117611191A (en) * | 2023-11-27 | 2024-02-27 | 哈尔滨工程大学三亚南海创新发展基地 | Method, system, computer equipment and storage medium for generating industrial chain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843236A (en) * | 2012-09-12 | 2012-12-26 | 飞天诚信科技股份有限公司 | Generation and authentication method and system for dynamic password |
US20200201966A1 (en) * | 2018-12-21 | 2020-06-25 | Oath Inc. | Biometric based self-sovereign information management |
CN112101810A (en) * | 2020-09-23 | 2020-12-18 | 中国建设银行股份有限公司 | Risk event control method, device and system |
CN114124545A (en) * | 2021-11-25 | 2022-03-01 | 杭州摸象大数据科技有限公司 | Data credible cochain and identity authentication terminal for supply chain finance |
CN114742655A (en) * | 2022-06-13 | 2022-07-12 | 杭银消费金融股份有限公司 | Anti-money laundering behavior recognition system based on machine learning |
CN114820155A (en) * | 2022-06-29 | 2022-07-29 | 北京云成金融信息服务有限公司 | Data management system and method for supply chain financial platform |
-
2022
- 2022-08-01 CN CN202210917988.2A patent/CN114996676A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843236A (en) * | 2012-09-12 | 2012-12-26 | 飞天诚信科技股份有限公司 | Generation and authentication method and system for dynamic password |
US20200201966A1 (en) * | 2018-12-21 | 2020-06-25 | Oath Inc. | Biometric based self-sovereign information management |
CN112101810A (en) * | 2020-09-23 | 2020-12-18 | 中国建设银行股份有限公司 | Risk event control method, device and system |
CN114124545A (en) * | 2021-11-25 | 2022-03-01 | 杭州摸象大数据科技有限公司 | Data credible cochain and identity authentication terminal for supply chain finance |
CN114742655A (en) * | 2022-06-13 | 2022-07-12 | 杭银消费金融股份有限公司 | Anti-money laundering behavior recognition system based on machine learning |
CN114820155A (en) * | 2022-06-29 | 2022-07-29 | 北京云成金融信息服务有限公司 | Data management system and method for supply chain financial platform |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115329156A (en) * | 2022-10-14 | 2022-11-11 | 北京云成金融信息服务有限公司 | Data management method and system based on historical data |
CN117611191A (en) * | 2023-11-27 | 2024-02-27 | 哈尔滨工程大学三亚南海创新发展基地 | Method, system, computer equipment and storage medium for generating industrial chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10043186B2 (en) | Secure authentication system and method | |
US20220005048A1 (en) | Real and virtual identity verification circuit, system thereof and electronic transaction method | |
CN114996676A (en) | Supply chain financial platform authentication system and method based on historical data analysis | |
US20040250068A1 (en) | Individual certification method | |
CA2780278A1 (en) | Verification of portable consumer devices for 3-d secure services | |
CN103189886B (en) | Electronic receipt system, terminal installation, the offer method of electronic receipt and program | |
CN109858273B (en) | Product information acquisition method, device, computer equipment and storage medium | |
CN110602114A (en) | Block chain-based identity authentication method and device, storage medium and electronic equipment | |
CN110223159A (en) | Credit data query method, apparatus, computer equipment and storage medium | |
CN103824170A (en) | Mobile phone buying and selling client based on two-dimension codes, system and buying and selling management method | |
CN104090835A (en) | eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method | |
CN110162722A (en) | Products Show method, server and storage medium based on two dimensional code | |
CN104616389A (en) | Stamp recognition method and device | |
CN111753018B (en) | E-letter method, system and computer equipment | |
US20220277398A1 (en) | Selecting a contingent action token | |
CN106030637A (en) | Payment settlement system, payment settlement device, transaction terminal, payment management method, and program | |
US20210035217A1 (en) | Updating blockchain-encoded records of rived longevity-contingent instruments | |
CN110430052B (en) | POS key online filling method and device | |
CN110070365B (en) | Commodity evidence storing method and device based on block chain and electronic equipment | |
CN111429311A (en) | Intellectual property trading sharing system and method based on block chain | |
CN115511646A (en) | Fraud identification system applied to online transaction | |
CN113191790A (en) | User demand and commodity service slot point table docking and quality tracking method and system | |
US20210097610A1 (en) | Utilizing blockchain-encoded records for rived longevity-contingent instruments | |
CN115760148A (en) | Method and device for generating digital identity of geographic marking product | |
CN117592125B (en) | Reliability electronic signature method of paperless transaction system for second-hand house transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220902 |
|
RJ01 | Rejection of invention patent application after publication |