CN105825427A - Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method - Google Patents

Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method Download PDF

Info

Publication number
CN105825427A
CN105825427A CN201610173164.3A CN201610173164A CN105825427A CN 105825427 A CN105825427 A CN 105825427A CN 201610173164 A CN201610173164 A CN 201610173164A CN 105825427 A CN105825427 A CN 105825427A
Authority
CN
China
Prior art keywords
platform
people
trust value
user
credit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610173164.3A
Other languages
Chinese (zh)
Inventor
李西明
王钦云
郭玉彬
马莎
祝胜林
杜志国
黄琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Agricultural University
Original Assignee
South China Agricultural University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Agricultural University filed Critical South China Agricultural University
Priority to CN201610173164.3A priority Critical patent/CN105825427A/en
Publication of CN105825427A publication Critical patent/CN105825427A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention discloses an encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method. The system is composed of a cloud matching platform and is communicated with a social platform and a guarantee platform to operate, the cloud matching platform matches a debit side and a credit side and analyzes the credit capability of the debit side, the guarantee platform is used to guarantee a financial transaction process, and the social platform is used to communicate with the cloud matching platform to obtain the acquaintance information data. The debit side is the initiator of a debit request, and the credit side is the provider of the credit fund. In the encrypted keyword search-based bidirectional anonymity trusted network debit and credit system of the present invention, the debit side does not need to publicize the personal information, and the system carries out the weighted calculation on the information provided by a user and the trust value obtained by the encrypted search on the social platform to obtain an acquaintance relationship index between the debit side and the credit side, thereby matching the debit and credit behaviors of the debit side and the credit side under the anonymity premise, and improving the privacy and the safety of the debit and credit behaviors.

Description

Two-way anonymous trustable network balance system based on the search of cryptography key word and method
Technical field
The present invention relates to the research field of network loan service, particularly to a kind of two-way anonymous trustable network balance system based on the search of cryptography key word and method.
Background technology
After 21 century, Internet technology has developed into the new epoch, and the network coverage obtains huge raising, and network service quality obtains the lifting of essence.Under such background, the network loan service convenient, easy-to-use, threshold is low gradually comes into vogue.But traditional network loan has plenty of and carries out between stranger, and the personal information needing borrower's publicity oneself having and loaning bill purpose assess its credit facility for lending people.For the people of publicity oneself personal information of being much unwilling, existing network loan pattern can not meet demand.
P2P network loan refers to individual-to-individual, or point-to-point network is borrowed money, and is a kind of debt-credit small amount debt-credit pattern to the crowd having credit requirement that gathered together by nongovernmental fund.China P2P network loan total value increases rapidly in recent years, and increasing people begins to use P2P network loan.
Existing several big P2P network loan platform is the most not fully up to expectations.The loaning bill auditing flow of maximum P2P loan platform LendingClub in the whole world is quite strict, needs to meet exacting terms.The application of the most about 90% can be rejected.Another U.S. of family P2P debt-credit website Prosper, when processing borrower and applying for, only relies on the credit scoring obtained from credit rating organization and does not carry out too much personal information examination & verification.P2P debt-credit founder Zopa not only determines the return rate of investor but also determines the borrowing rate of borrower.Zopa does not provide directly contacting of borrower and investor.And public type P2P platform Kiva is mainly directed towards the small amount debt-credit of poverty-stricken area, can by information announcements such as the basic condition of applicant, photo, the demand amount of money, purposes plans on the net.By the analysis to the P2P network loan system model being presently in existence, we have found that, existing balance system or need borrows the personal information of people's publicity oneself with credit facility for lending the anonymous debt-credit that people judges between its credit facility and loan repayment capacity, or stranger.For the angle of individual privacy Yu information security, under many circumstances, and borrowing people between acquaintance and be unwilling the personal information of publicity oneself, this contradicts with existing P2P network loan pattern.
Summary of the invention
Present invention is primarily targeted at the shortcoming overcoming prior art with not enough, it is provided that a kind of two-way anonymous trustable network balance system based on the search of cryptography key word and method.
In order to arrive above-mentioned purpose, the present invention by the following technical solutions:
The two-way anonymous trustable network balance system that the present invention searches for based on cryptography key word, brings platform, guarantee platform and social platform together including cloud;Described cloud is brought platform together and is carried out brining together with lending people borrowing people, analyze the credit facility borrowing people, the guarantee in gold process of exchange of the described guarantee platform, fund first by lending people or borrowing the bank account of people and squeeze into guarantee platform, is delivered to borrow people accordingly or lend the bank account of people the most again;Described social platform is used for the master data during providing acquaintance to analyze, and cloud is brought platform communication together and obtained trust value between user;The described sponsor borrowing artificial request of borrowing money, described in the offer people artificially lent funds is provided.
As preferred technical scheme, described social platform includes trust metric model, described trust metric model is used for measuring trusting relationship, the size of degree of belief is determined by trust value, the method that draws of described trust value is: user is after system registry account, it is submitted to social platform after acquaintance list that system is provided and personal information encryption and carries out cipher text searching based on keyword, draw the anonymous acquaintance list of the account and the trust value to each acquaintance.
As preferred technical scheme, in the trust value computing of social platform, there are three key parameters, it is respectively the natural law α that last time contact time interval is present, history contacts the present natural law β of time interval and nearly 180 days associated natural law γ the earliest, the trust value Β that the trust value A of contact, history contact in the recent period, the trust value Γ contacting frequent degree in half a year is calculated respectively by these three parameters
When a≤3, A=20, α often increase by 1, and A reduces 1, i.e.
When β≤730,As β > 730, Β is equal to 20, i.e.
The value of Γ is equal to trust value being evenly distributed in 180 days that total size is 20, i.e.
The trust value P=A then obtained at social platform × 30%+ Β × 30%+ Γ × 40%, the initial trust value finally given is
As preferred technical scheme, if lend-borrow action of a user is refunded on time, then its trust value T-phase should add 5%;Otherwise reduce by the trust value of 50% accordingly;The calculating of trust value is also the appraisement system of transmission, and the loan requests of acquaintance also will appear in the anonymous list of user, and the computational methods of its trust value are for being multiplied.
As preferred technical scheme, described platform of brining together includes cryptography key word search model, in cryptography key word is searched for, first being made by social platform and a encryption user name that comprises of renewal every day is to the list with corresponding trust value, brining platform together will need the user name of inquiry to (Cname1, Cname2) obtain (C after encryption1,C2), by the user name of this encryption to being sent to social platform inquiry, return this user name to and trust value therebetween.
As preferred technical scheme, above-mentioned cryptography key word search model realizes anonymity by one of following method and searches for:
1) being updated a all trust value lists being related between user every day by social platform, bring the user name pair after platform sends encryption every time together, social platform returns trust value after inquiring about in table;
2) bring platform together and first all user profile are sent to social platform in plain text, comprise the trust value list between wherein user by updating social platform every day portion again, brining the user name pair after platform sends encryption every time together, social platform returns trust value after inquiring about in table;
3) bring platform together and first all user profile are sent to social platform in plain text, comprise the trust value list between wherein user by updating social platform every day portion again, this list returns to bring platform together, brings the trust value between platform search relative users the most in the list together.
The invention allows for some two-way anonymous trustable network debt-credit methods based on the search of cryptography key word, comprise the steps:
S1, user's registration;
S2, borrow people/lend people and supply information to loan platform;
S3, borrowing people and initiate to borrow money, loan platform is to borrowing people and lending the information of people and carry out Auto-matching;
S4, to social platform application trusting relationship verify;
S5, ratify successfully to bring together to borrow to lend people couple;
S6, delivery of funds, transaction completes, and loan and interest are regained.
As preferred technical scheme, in described step S1, user's registration is exactly that a user submits necessary information to system to the potential user of the process of system registry, mainly system, it is thus achieved that the process of a registration user, and it concretely comprises the following steps:
S1.1, borrow people/lend people with cell-phone number in the credible balance system login account of anonymity based on acquaintance;
S1.2, borrowing people and prove to brining its credit of offer together, both are offered to personal information, including identity information, E-mail address and a acquaintance's list trusted;
Trust value and other users that S1.3, system are returned by historical transaction record, social platform judge its credit to this users to trust information summary, and the Trusted List after rejecting the bad individuality of wherein credit and rejecting shows user again.
As preferred technical scheme, in step S3, after user's registration, system will utilize the information and trusted contact's list that user fills in when registering, request anonymity of contact persons borrowed or lent money all in this list being borrowed money is shown, according to the trust value that the given amount of money, time, interest rate and system are given, user comprehensively determines that selection lends, concrete steps include:
S3.1, borrow people initiate borrow money request, fill in need borrow principal amount, refund time and interest rate;
S3.2, bring platform together and this is borrowed people and the people that lends being chosen as the credible people of borrowing matches;
S3.3, system return, after judging respectively, the list including each judging this anonymous letter borrowing people to each people of lending, and list comprises the principal amount of demand, refund time, interest rate and its credit facility, trust value;
S3.4, lend people and choose whether to lend.
As preferred technical scheme, in step S4, the concrete grammar of trusting relationship checking is:
S4.1, KDC are to social platform and loan platform and other participants distribution key;
S4.2, bring the social information encryption that login account provides by platform together after be submitted to social platform;
S4.3, social platform use cipher text searching based on keyword to obtain the acquaintance trust value of the account according to account information, and return to bring together platform, and the comparison of ciphertext is provided by the encryption technology compared in ciphertext;
In described step S6, user is in debt-credit process of exchange, fund is not directly to be delivered in reciprocal account but is first delivered to assure platform, the bank account of correspondence it is delivered to again by guarantee platform, in refund flow process, the most first sending to money assure platform, platform is issued to corresponding bank account again, and concrete steps include:
S6.1, lend people by payment funding to guarantee platform;
S6.2, guarantee platform deduction cost of use;
Fund is beaten to borrowing people's bank account by S6.3, guarantee platform;
S6.4, refund step no longer deduct platform licensing, identical with above-mentioned S6.1~S6.3 step.
The present invention compared with prior art, has the advantage that and beneficial effect:
1, the present invention in the two-way anonymous trustable network balance system searched for based on cryptography key word, borrow people need not publicity oneself personal information and borrowing demand, system by calculating, in social platform encryption search calculating and platform, the acquaintance index borrowed people and lend between people by the information weighting that user provides, bring two people together and carry out lend-borrow action under anonymous premise, improve privacy and the safety of lend-borrow action.
2, the present invention proposes two-way anonymous trustable network balance system based on the search of cryptography key word, and system, to borrowing people and lending people and collect a acquaintance's list provided by me, can be address list, QQ, micro-signal etc..System, by the acquaintance's information list collected, is submitted to social platform after encryption, use cipher text searching based on keyword to obtain acquaintance's trusting relationship degree of the account, and system sets up anonymous acquaintance network.
3, designed system of the present invention can realize borrowing people and lend the double anonymous of people, and both sides do not know whom the other side is, but they are believed that the other side is acquaintance, and borrows people and have suitable loan repayment capacity.Bring platform together according to borrowing people and lending the relation list of people and bring together, and verify their friend relation by social platform (such as Tengxun, Facebook, twitter etc.), thus be further ensured that the certainty of two people's acquaintances.System uses search technique based on ciphertext so that the relation of two people can be verified in the case of borrowing people and lending people's anonymity by social platform, thus protects the privacy of the two.
Accompanying drawing explanation
Fig. 1 is the structural representation of balance system of the present invention;
Fig. 2 (a)-Fig. 2 (c) is the schematic diagram of three kinds of cryptography key word search models of the present invention;
Fig. 3 is the system general flow chart of the present invention;
Fig. 4 is the register flow path figure of the present invention;
Fig. 5 is the credit relationship checking flow chart of the present invention;
Fig. 6 is the application coupling flow process of the present invention;
Fig. 7 (a)-Fig. 7 (b) is delivery of funds flow chart of the present invention;
Fig. 8 is that the present invention borrows or lends money flow process example schematic;
Fig. 9 is that the present invention lends flow process example schematic;
Figure 10 is degree of belief calculated example schematic diagram of the present invention.
Detailed description of the invention
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited to this.
Embodiment
As it is shown in figure 1, the designed system of the present invention is made up of five entities, be respectively borrow people, lend people, cloud brings platform together, guarantee platform, social platform, the most each entity institute role is different.Borrow people can be real-life anyone, as long as he/her has a demand of borrowed funds, and the fund of raising of having no idea in normal channel, may be added to this system.Lending people is the people having a large amount of idle fund in actual life, and they are provided with one's own reserves and to other people and obtain the demand higher than cash in banks income.They also are intended to the safety of conservation funds to greatest extent simultaneously.It is a web station system that cloud brings platform together, and user can complete to register on website, borrows, lend a series of behaviors such as fund.Guarantee platform is that an acquisition is borrowed people, lent people and bring the Fund Supervision platform (typically bank) that platform tripartite trusts together, and the fund operation demand for tripartite provides assistance.After the fund of user is the most all first submission guarantee platform, then it is issued to corresponding account.Such design improves the safety of fund in flow process.Social platform is similar Tengxun, facebook such social software platform, has actual user data, can infer the true social relations of user accordingly, and that analyzes user is familiar with (trust) degree.Because this system is a two-way anonymous trustable network balance system based on the search of cryptography key word, based on credit relationship, it is not necessary to the too many proof in terms of assets, the various problems that the traditional financial departments such as bank are run into can be exempted.System angle color table is as shown in table 1:
Table 1
Described social platform includes trust metric model, described trust metric model is used for measuring trusting relationship, the size of degree of belief is determined by trust value, the method that draws of described trust value is: user is after system registry account, it is submitted to social platform after acquaintance list that system is provided and personal information encryption and carries out cipher text searching based on keyword, draw the anonymous acquaintance list of the account and the trust value to each acquaintance.
Acquaintance is a kind of trusting relationship in fact, two people produced because of the various common factors in daily contacts or how person-to-person a kind of special trust.Trusting relationship can be measured, and the size of degree of belief is represented by trust value.We can add a trust value to everyone recognized in life.Certainly the trust value to a particular person that everyone is given is discrepant.The trust value of one people is the Comprehensive Evaluation to its trust value of the people in its all social relations.Trust value combines the acquaintance trust value of a user, historical trading behavior and comprehensively draws the judgement number of users of its credible people of borrowing status.The method that draws of acquaintance trust value is: user is after system registry account, it is submitted to social platform after acquaintance list that system is provided and personal information encryption and carries out cipher text searching based on keyword, draw the anonymous acquaintance list of the account and the trust value to each acquaintance.
The trust value P that wherein initial trust value T is obtained by social platform is classified as ratio Q of trusted users again and is multiplied and calculates divided by 20 with other users.
In the trust value computing of social platform, having three parameters, be respectively the natural law α that last time contact time interval is present, history contacts the present natural law β of time interval and nearly 180 days associated natural law γ the earliest.The trust value Β that the trust value A of contact, history contact in the recent period, the trust value Γ contacting frequent degree in half a year is calculated respectively by these three parameters.
When α≤3, A=20, α often increase by 1, and A reduces 1.I.e.
When β≤730,As β > 730, Β is equal to 20.I.e.
The value of Γ is equal to trust value being evenly distributed in 180 days that total size is 20.I.e.
The trust value P=A then obtained at social platform × 30%+ Β × 30%+ Γ × 40%.The initial trust value finally given is
If lend-borrow action of a user is refunded on time, then its trust value T-phase should add 5%.Otherwise reduce by the trust value of 50% accordingly.If the trust value decrement of the lend-borrow action broken one's promise is identical with the trust value increments that success is borrowed or lent money every time every time, the impact causing the lend-borrow action broken one's promise being cancelled easily, undesirable may take this opportunity to make profit.
Meanwhile, the calculating of trust value is also the appraisement system of transmission, and the loan requests of the acquaintance of acquaintance also will appear in the anonymous list of user, and the computational methods of its trust value are for being multiplied.Such as: A Yu B is acquaintance, trust value is 80%, B Yu C is acquaintance, trust value is 90%, C Yu D is acquaintance, and trust value is 80%, does not has acquaintance between other people, then the request of borrowing money of D also will appear in the loaned money page of A, and its trust value is 80%*90%*80%=57.6%.To be not present in anonymous list less than the trust value of certain value.
Described platform of brining together includes cryptography key word search model, in cryptography key word is searched for, is first made by social platform and a encryption user name that comprises of renewal every day is to the list with corresponding trust value, and brining platform together will need the user name of inquiry to (Cname1,Cname2) obtain (C after encryption1,C2), by the user name of this encryption to being sent to social platform inquiry, return this user name to and trust value therebetween.
As shown in Fig. 2 (a)-Fig. 2 (c), the present embodiment proposes three kinds of feasible cryptography key word search solutions as a example by Facebook.
1) being updated a all trust value lists being related between user every day by Facebook, bring the user name pair after platform sends encryption every time together, Facebook returns trust value after inquiring about in table.
2) bring platform together and first all user profile are sent in plain text Facebook, then is updated portion every day by Facebook and comprise the trust value list between wherein user.Brining the user name pair after platform sends encryption every time together, Facebook returns trust value after inquiring about in table.
3) bring platform together and first all user profile are sent in plain text Facebook, then is updated portion every day by Facebook and comprise the trust value list between wherein user.This list returns to bring platform together.Bring the trust value between platform search relative users the most in the list together.
As it is shown on figure 3, the total flow process of system is divided into six parts, closely coupled between each part.Each it is partially completed specific function, and will couple with other parts and jointly complete borrowing process.User submits to the information of necessity to ask loan platform can suitably lend people by Auto-matching to loan platform, the loaning bill for user after registering.Concrete steps include:
1) user's registration;
2) borrow people/lend people and supply information to loan platform;
3) borrowing people to initiate to borrow money, loan platform carries out Auto-matching to the information borrowing people with lend people;
4) verify to social platform application trusting relationship;
5) ratify successfully to bring together to borrow to lend people couple;
6) delivery of funds, transaction completes.Loan and interest are regained.
As shown in Figure 4, user's registration is exactly that a user submits necessary information to system to the potential user of the process of system registry, mainly system, it is thus achieved that the process of a registration user.In registration process, user to provide material to be closed to verify for system.Meanwhile, a acquaintance's list is also provided to judge contact person's situation of user for system when user registers.Concrete steps include:
1) people/lend people with cell-phone number in the credible balance system login account of anonymity based on acquaintance is borrowed;
2) borrowing people proves to brining its credit of offer together, and both are offered to personal information, including identity information (must fill out), E-mail address (must fill out), social networks account (choosing is filled out) etc..And a acquaintance's list (can be cell-phone number, social platform account) trusted, it lends the people of fund to be i.e. willing to purpose.The data filled in is the most complete, and degree of being trusted is the highest.
3) trust value and other users that system is returned by historical transaction record, social platform judges its credit to this users to trust information summary, and the Trusted List after rejecting the bad individuality of wherein credit and rejecting shows user again.
As it is shown in figure 5, after user submits loan application to, bring together and be submitted to social platform after this user is encrypted with the potential people's of the lending information this user being classified as trusted users by platform one by one and scan for, therefore deduce that the trust value of the two.
1) KDC is to social platform and loan platform and other participants distribution key;
2) it is submitted to social platform after brining social information (cell-phone number, the social platform account etc.) encryption that login account is provided by platform together;
3) social platform uses cipher text searching based on keyword to obtain the acquaintance degree of belief of the account according to account information, and returns to bring platform together.The comparison of ciphertext is provided by the encryption technology compared in ciphertext.
As shown in Figure 6, after user's registration, system will utilize the information and trusted contact's list that user fills in when registering, request anonymity of contact persons borrowed or lent money all in this list being borrowed money is shown, according to the trust value that the given amount of money, time, interest rate and system are given, user comprehensively determines that selection lends.Concrete steps include:
1) borrow people and initiate the request of borrowing money, fill in principal amount, refund time and the interest rate needing to borrow;
2) bring platform together and this is borrowed people and the people that lends being chosen as the credible people of borrowing matches;
3) each people of lending returns after system judges respectively the list including each judging this anonymous letter borrowing people, and list comprises the principal amount of demand, refund time, interest rate and its credit facility, trust value;
4) lend people to choose whether to lend.
As shown in Fig. 7 (a)-Fig. 7 (b), user is in debt-credit process of exchange, and fund is not directly to be delivered in reciprocal account but is first delivered to assure platform, then is delivered to the bank account of correspondence by guarantee platform.In refund flow process, the most first sending to money assure platform, platform is issued to corresponding bank account again.Concrete steps include:
1) people is lent by payment funding to guarantee platform;
2) guarantee platform deduction cost of use;
3) fund is beaten to borrowing people's bank account by guarantee platform;
4) refund step no longer deducts platform licensing, identical with above-mentioned 1~3 steps.
Below with the actual specific description that should be used as:
Shipment flow process is illustrated:
As shown in Figure 8, Alice wants that the A website from have employed two-way anonymous trustable network balance system based on the search of cryptography key word borrows or lends money 2,000 yuans.He opens A website mobile phone app, have input mailbox as logon account, and inputs password.The credit that he have printed individual to bank afterwards proves and takes pictures to upload, and demonstrates cell-phone number by the way of identifying code.And then he agreed to mobile phone app read address list request, have selected wherein he think credible people and agree to submit to.Remaining list is also showed Alice to see by system automatic rejection some people, tells the Alice these people are credible.
After this, he have submitted a loan application, fill in the amount of money of needs loan, refund time and the interest rate that he considers appropriate.After wait after a while, someone is ready to lend him, and loan, after deducting part usage charges in advance, has been issued to his bank account from loan platform.
Lend flow process to illustrate:
As it is shown in figure 9, Bob has certain spare cash to want for investing at hand, he opens the A website mobile phone app of two-way anonymous trustable network balance system based on the search of cryptography key word, have input mailbox as logon account, and inputs password.The credit that he have printed individual to bank afterwards proves and takes pictures to upload, and demonstrates cell-phone number by the way of identifying code.And then he agreed to mobile phone app read address list request, have selected wherein he think credible people and agree to submit to.Remaining list is also showed Alice to see by system automatic rejection some people, tells the Alice these people are credible.
Then he opens the investment page of app, it is seen that the loan application of a plurality of anonymity.The credit marking be given according to the amount of the loan therein, interest rate, the length of maturity and system, have selected a suitable application, and gives loan platform by money payment.Every month afterwards, he have received the refund on time of that anonymous from loan platform.After six months, he has brought back whole investments, and has obtained good income.
Degree of belief calculated example
As shown in Figure 10, Alice and Bob is good friend, and they often contact.Bob also has a good friend, is called Celina, Celina and does not recognize Alice.When their all registrations in the A website using two-way anonymous trustable network balance system based on the search of cryptography key word, the other side is classified as believable contact person by Alice Yu Bob, Bob with Alice is also.System submits to them respective information to verify to social platform.Alice and bob was mutually added as good friend the most before 3 years, the date of 2/3rds is all related the most over the past half year, and last chat is exactly yesterday, and the trust value of Bob is by system-computed Alice Same, system-computed show that Bob is 70% to the degree of belief of Celina.And Alice is 86.7% × 70%=60.7% to the degree of belief of Celina.When Celina has initiated to borrow money request, Bob sees in his the investment page and occurs in that corresponding anonymous request, shows that its degree of belief is 86.7%.The page of the Alice also anonymous anonymous request occurring in that Celina, shows that its degree of belief is 60.7%.
Above-described embodiment is the present invention preferably embodiment; but embodiments of the present invention are also not restricted to the described embodiments; the change made under other any spirit without departing from the present invention and principle, modify, substitute, combine, simplify; all should be the substitute mode of equivalence, within being included in protection scope of the present invention.

Claims (10)

1. two-way anonymous trustable network balance system based on the search of cryptography key word, it is characterised in that include that cloud brings platform, guarantee platform and social platform together;Described cloud is brought platform together and is carried out brining together with lending people borrowing people, analyze the credit facility borrowing people, the guarantee in gold process of exchange of the described guarantee platform, fund first by lending people or borrowing the bank account of people and squeeze into guarantee platform, is delivered to borrow people accordingly or lend the bank account of people the most again;Described social platform is used for the master data during providing acquaintance to analyze, and cloud is brought platform communication together and obtained trust value between user;The described sponsor borrowing artificial request of borrowing money, described in the offer people artificially lent funds is provided.
Two-way anonymous trustable network balance system based on the search of cryptography key word the most according to claim 1, it is characterized in that, described social platform includes trust metric model, described trust metric model is used for measuring trusting relationship, the size of degree of belief is determined by trust value, the method that draws of described trust value is: user is after system registry account, it is submitted to social platform after acquaintance list that system is provided and personal information encryption and carries out cipher text searching based on keyword, draw the anonymous acquaintance list of the account and the trust value to each acquaintance.
Two-way anonymous trustable network balance system based on the search of cryptography key word the most according to claim 2, it is characterized in that, in the trust value computing of social platform, there are three key parameters, it is respectively the natural law α that last time contact time interval is present, history contacts the present natural law β of time interval and nearly 180 days associated natural law γ the earliest, is calculated the trust value B that the trust value A of contact, history contact in the recent period, the trust value Γ contacting frequent degree in half a year by these three parameters respectively
When α≤3, A=20, α often increase by 1, and A reduces 1, i.e.
When β≤730,As β > 730, B is equal to 20, i.e.
The value of Γ is equal to trust value being evenly distributed in 180 days that total size is 20, i.e.
Trust value P=A × 30%+B × 30%+ Γ × 40% then obtained at social platform, the initial trust value finally given is
Two-way anonymous trustable network balance system based on the search of cryptography key word the most according to claim 3, it is characterised in that if lend-borrow action of a user is refunded on time, then its trust value T-phase should add 5%;Otherwise reduce by the trust value of 50% accordingly;The calculating of trust value is also the appraisement system of transmission, and the loan requests of acquaintance also will appear in the anonymous list of user, and the computational methods of its trust value are for being multiplied.
Two-way anonymous trustable network balance system based on the search of cryptography key word the most according to claim 3, it is characterized in that, described platform of brining together includes cryptography key word search model, in cryptography key word is searched for, first being made by social platform and a encryption user name that comprises of renewal every day is to the list with corresponding trust value, brining platform together will need the user name of inquiry to (Cname1,Cname2) obtain (C after encryption1,C2), by the user name of this encryption to being sent to social platform inquiry, return this user name to and trust value therebetween.
Two-way anonymous trustable network balance system based on the search of cryptography key word the most according to claim 5, it is characterised in that above-mentioned cryptography key word search model realizes anonymity by one of following method and searches for:
1) being updated a all trust value lists being related between user every day by social platform, bring the user name pair after platform sends encryption every time together, social platform returns trust value after inquiring about in table;
2) bring platform together and first all user profile are sent to social platform in plain text, comprise the trust value list between wherein user by updating social platform every day portion again, brining the user name pair after platform sends encryption every time together, social platform returns trust value after inquiring about in table;
3) bring platform together and first all user profile are sent to social platform in plain text, comprise the trust value list between wherein user by updating social platform every day portion again, this list returns to bring platform together, brings the trust value between platform search relative users the most in the list together.
7. according to based on the search of cryptography key word the two-way anonymous trustable network debt-credit method according to any one of claim 1-6, it is characterised in that comprise the steps:
S1, user's registration;
S2, borrow people/lend people and supply information to loan platform;
S3, borrowing people and initiate to borrow money, loan platform is to borrowing people and lending the information of people and carry out Auto-matching;
S4, to social platform application trusting relationship verify;
S5, ratify successfully to bring together to borrow to lend people couple;
S6, delivery of funds, transaction completes, and loan and interest are regained.
Two-way anonymous trustable network debt-credit method based on the search of cryptography key word the most according to claim 7, it is characterized in that, in described step S1, user's registration is exactly that a user is to the process of system registry, the mainly potential user of system submits necessary information to system, obtaining the process of a registration user, it concretely comprises the following steps:
S1.1, borrow people/lend people with cell-phone number in the credible balance system login account of anonymity based on acquaintance;
S1.2, borrowing people and prove to brining its credit of offer together, both are offered to personal information, including identity information, E-mail address and a acquaintance's list trusted;
Trust value and other users that S1.3, system are returned by historical transaction record, social platform judge its credit to this users to trust information summary, and the Trusted List after rejecting the bad individuality of wherein credit and rejecting shows user again.
Two-way anonymous trustable network debt-credit method based on the search of cryptography key word the most according to claim 7, it is characterized in that, in step S3, after user's registration, system will utilize the information and trusted contact's list that user fills in when registering, request anonymity of contact persons borrowed or lent money all in this list being borrowed money is shown, according to the trust value that the given amount of money, time, interest rate and system are given, user comprehensively determines that selection lends, concrete steps include:
S3.1, borrow people initiate borrow money request, fill in need borrow principal amount, refund time and interest rate;
S3.2, bring platform together and this is borrowed people and the people that lends being chosen as the credible people of borrowing matches;
S3.3, system return, after judging respectively, the list including each judging this anonymous letter borrowing people to each people of lending, and list comprises the principal amount of demand, refund time, interest rate and its credit facility, trust value
S3.4, lend people and choose whether to lend.
Two-way anonymous trustable network debt-credit method based on the search of cryptography key word the most according to claim 8, it is characterised in that in step S4, the concrete grammar of trusting relationship checking is:
S4.1, KDC are to social platform and loan platform and other participants distribution key;
S4.2, bring the social information encryption that login account provides by platform together after be submitted to social platform;
S4.3, social platform use cipher text searching based on keyword to obtain the acquaintance trust value of the account according to account information, and return to bring together platform, and the comparison of ciphertext is provided by the encryption technology compared in ciphertext;
In described step S6, user is in debt-credit process of exchange, fund is not directly to be delivered in reciprocal account but is first delivered to assure platform, the bank account of correspondence it is delivered to again by guarantee platform, in refund flow process, the most first sending to money assure platform, platform is issued to corresponding bank account again, and concrete steps include:
S6.1, lend people by payment funding to guarantee platform;
S6.2, guarantee platform deduction cost of use;
Fund is beaten to borrowing people's bank account by S6.3, guarantee platform;
S6.4, refund step no longer deduct platform licensing, identical with above-mentioned S6.1~S6.3 step.
CN201610173164.3A 2016-03-23 2016-03-23 Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method Pending CN105825427A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610173164.3A CN105825427A (en) 2016-03-23 2016-03-23 Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610173164.3A CN105825427A (en) 2016-03-23 2016-03-23 Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method

Publications (1)

Publication Number Publication Date
CN105825427A true CN105825427A (en) 2016-08-03

Family

ID=56524526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610173164.3A Pending CN105825427A (en) 2016-03-23 2016-03-23 Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method

Country Status (1)

Country Link
CN (1) CN105825427A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570754A (en) * 2016-10-25 2017-04-19 中国建设银行股份有限公司 Business data transfer method and apparatus
CN108650268A (en) * 2018-05-15 2018-10-12 华南农业大学 It is a kind of realize multistage access can search for encryption method and system
CN108830708A (en) * 2018-06-28 2018-11-16 深圳市有钱科技有限公司 A kind of fund shared system based on immediate communication tool
WO2018214716A1 (en) * 2017-05-25 2018-11-29 重庆小雨点小额贷款有限公司 Method and apparatus for determining line of credit, server and readable storage medium
CN109166027A (en) * 2018-07-02 2019-01-08 阿里巴巴集团控股有限公司 A kind of loaning bill contract processing method and processing device
CN109492410A (en) * 2018-10-09 2019-03-19 华南农业大学 Data can search for encryption and keyword search methodology, system and terminal, equipment
CN109493074A (en) * 2018-10-29 2019-03-19 平安科技(深圳)有限公司 Bookkeeping methods, device, equipment and medium based on instant messaging
CN109711964A (en) * 2017-10-25 2019-05-03 嘉兴市友贷金融信息服务有限公司 A kind of network loan VIP client segmentation culture system and breeding method
CN112910635A (en) * 2020-12-25 2021-06-04 北京明朝万达科技股份有限公司 Method and system for inquiring loan information of lender
CN113744041A (en) * 2021-08-04 2021-12-03 南方电网科学研究院有限责任公司 Intelligent contract credit matching method, system, computer equipment and medium
CN115048406A (en) * 2022-08-16 2022-09-13 北京虹鳟在线科技有限公司 Associated person data information query method based on multi-party credible graph computing technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020816A (en) * 2013-01-21 2013-04-03 孔庆发 Online virtual currency third-party credit method and data processing system thereof
US20150066741A1 (en) * 2013-08-27 2015-03-05 Intuit Inc. Method and system for payment distribution for consigned items
CN104616139A (en) * 2015-02-06 2015-05-13 上海百筹金融信息服务有限公司 Real-time anonymous P2P borrowing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020816A (en) * 2013-01-21 2013-04-03 孔庆发 Online virtual currency third-party credit method and data processing system thereof
US20150066741A1 (en) * 2013-08-27 2015-03-05 Intuit Inc. Method and system for payment distribution for consigned items
CN104616139A (en) * 2015-02-06 2015-05-13 上海百筹金融信息服务有限公司 Real-time anonymous P2P borrowing system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
佚名: "基于社交关系链的匿名P2P借贷", 《HTTPS://36KR.COM/P/219210》 *
佚名: "熟信借贷(熟人匿名借贷)v3.0.3", 《HTTP://WWW.5577.COM/S/82052.HTML》 *
尹光宇: "社交网络中用户间信任度量模型研究", 《万方》 *
曾军: "类P2P平台如何玩转熟人匿名借贷", 《HTTP://FINANCE.SINA.COM.CN/ZL/BANK/20150109/171821263767.SHTML》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570754A (en) * 2016-10-25 2017-04-19 中国建设银行股份有限公司 Business data transfer method and apparatus
WO2018214716A1 (en) * 2017-05-25 2018-11-29 重庆小雨点小额贷款有限公司 Method and apparatus for determining line of credit, server and readable storage medium
CN109711964A (en) * 2017-10-25 2019-05-03 嘉兴市友贷金融信息服务有限公司 A kind of network loan VIP client segmentation culture system and breeding method
CN108650268B (en) * 2018-05-15 2020-09-01 华南农业大学 Searchable encryption method and system for realizing multi-level access
CN108650268A (en) * 2018-05-15 2018-10-12 华南农业大学 It is a kind of realize multistage access can search for encryption method and system
CN108830708A (en) * 2018-06-28 2018-11-16 深圳市有钱科技有限公司 A kind of fund shared system based on immediate communication tool
CN109166027A (en) * 2018-07-02 2019-01-08 阿里巴巴集团控股有限公司 A kind of loaning bill contract processing method and processing device
CN109492410A (en) * 2018-10-09 2019-03-19 华南农业大学 Data can search for encryption and keyword search methodology, system and terminal, equipment
CN109492410B (en) * 2018-10-09 2020-09-01 华南农业大学 Data searchable encryption and keyword search method, system, terminal and equipment
CN109493074A (en) * 2018-10-29 2019-03-19 平安科技(深圳)有限公司 Bookkeeping methods, device, equipment and medium based on instant messaging
CN112910635A (en) * 2020-12-25 2021-06-04 北京明朝万达科技股份有限公司 Method and system for inquiring loan information of lender
CN113744041A (en) * 2021-08-04 2021-12-03 南方电网科学研究院有限责任公司 Intelligent contract credit matching method, system, computer equipment and medium
CN113744041B (en) * 2021-08-04 2024-05-10 南方电网科学研究院有限责任公司 Intelligent contract credit matching method, system, computer equipment and medium
CN115048406A (en) * 2022-08-16 2022-09-13 北京虹鳟在线科技有限公司 Associated person data information query method based on multi-party credible graph computing technology
CN115048406B (en) * 2022-08-16 2022-11-18 北京虹鳟在线科技有限公司 Associated person data information query method based on multi-party credible graph computing technology

Similar Documents

Publication Publication Date Title
CN105825427A (en) Encrypted keyword search-based bidirectional anonymity trusted network debit and credit system and method
Amsden et al. Are blockchain crowdsales the new'gold rush'? Success determinants of initial coin offerings
US11995645B2 (en) Computer-implemented system and method for generating and extracting user related data stored on a blockchain
Chen et al. A trust model for online peer-to-peer lending: a lender’s perspective
US8560436B2 (en) System and method for assessing credit risk in an on-line lending environment
KR20220035050A (en) Identity and risk scoring of tokenized assets and associated token transactions backed by government bonds
CN106447434A (en) Personal credit ecological platform
US20220084015A1 (en) Methods and systems for ethical cryptocurrency management
TWI777991B (en) Fund transaction platform
US20140280568A1 (en) Method and system for providing trust analysis for members of a social network
CN113222750B (en) Cross-border payment settlement method, device, system, equipment and storage medium
US20230368159A1 (en) System and method for transaction settlement
US20220058596A1 (en) Pyramidion Cryptocurrency
US20230222568A1 (en) Product transaction management computer, product transaction system, and product transaction method
Dong et al. Mobile payment services, government involvement, and mobile network operator performance
Pang et al. Social reputation loss model and application to lost-linking borrowers in a internet financial platform
Assensoh-Kodua et al. Mobile Banking in an emerging economy: Facilitating factors and challenges
US20210406999A1 (en) Peer to Peer Information Maintenance and Processing Device and Method of Use
Shaji et al. Decentralized land lending system using blockchain
Turi et al. Blockchain and Distributed Ledger Technology Applications
US20200134715A1 (en) Crowdvouching
NaveenKumaran et al. Blockchain Based Crowd Funding
US20230334489A1 (en) Dynamic Quantum Enabled Method for Large Currency Transaction Exemption Using Distributed Hash Chain
KR102245530B1 (en) International Digital Currency Management system and method thereof
US20230334482A1 (en) Dynamic Quantum Enabled Method for Large Currency Transaction Exemption using Distributed Hash Chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160803

WD01 Invention patent application deemed withdrawn after publication